Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
b21108e2a6b2c8435e543b270941bca2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b21108e2a6b2c8435e543b270941bca2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b21108e2a6b2c8435e543b270941bca2_JaffaCakes118.html
-
Size
137KB
-
MD5
b21108e2a6b2c8435e543b270941bca2
-
SHA1
ef8842fe9409acebcb58f86f6f8d0757c06bf6b3
-
SHA256
9be803905011ad8ad460bf0ce1fee97f10707edc97937fb2038944fe33a4888f
-
SHA512
d09273d751223b4e5d38bd0e13e41612666fce565110991827d8b1b5d2142d2dc20bc1e6042b6f5d7b4fdc123d8a8928223093adb35a4196bffe2ba7a964cd44
-
SSDEEP
1536:Yq7QmUjfvQ3hNNBO7WLY5zKIUdCgsowNOEv5bUnM4RYhlCyXI9RnAWOWKbwGNRo6:Yq7zUTvuH8ophMbyRZp2vERI1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430375519" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401f62a780f3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0C76931-5F73-11EF-80D8-CEBD2182E735} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000002e9bc45b6dcc18e743b7868c76a0522da5ec49b69211532eb8d931fe3bf30cfb000000000e800000000200002000000076fbe040558637e3220391d323b03652378e88b1c322a1f6e77eeeeaa56430d520000000444ca7893df4304838cae04c469961ecc6da8ba2b4b4d42bfbd7b6190a7a4cb24000000015eb90ad65df6346ec62b8335aeb5f7b10c80b100a136df8a1d539b54399c457653f7a02a8de51e009ee59f39ddd4acd184e6f2f1c84dfb159f693aafe44bb11 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2452 2292 iexplore.exe 30 PID 2292 wrote to memory of 2452 2292 iexplore.exe 30 PID 2292 wrote to memory of 2452 2292 iexplore.exe 30 PID 2292 wrote to memory of 2452 2292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b21108e2a6b2c8435e543b270941bca2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060a9a64be18a579b4db622719b0e034
SHA13a99878816cd42e32b3814419c55b7bddfea7c36
SHA256681c4f88be8f29d1016ffd020ce2aaba1f084227d1c1ee77f769a8f82867da41
SHA512e9349d28ff5e8714ce0db089962274576d3b6bee650a424f6944df55aa7d1f5dd4b8f3e83a4b41aae919ba68190e7002052d181c04da448cb7fc5c86ac448a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6baea73d9885cdf8bc6afb2feb6db4
SHA15f3b3ba4aada6d57ce4f5ddadcc8c55f496561d0
SHA25675b3ea8cfdae376c563466a80c765a5a82a8ac4beecf069a5355ace6145860cd
SHA5120922e7d3a62b2f95dd1a26e240aa0578b843a11c694ab43baac47ace9f547b9c1c980b3c12a985ea530cea1e392e3be8b0b55374bbb5ae1200c6f1154be45c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf31e612f38f3a40a9fb5c1d78973c1
SHA1b8842cc809375270100e395b70dafc273f6a7df5
SHA256b8079b89e3c4785dc93b3b5f80ec12069e0a8c4411b167a10d96082ff4eeba05
SHA5120c2d7e98e410321aca1059a9cbab02826880867b110beb0bb59c8fd90f9be93f81f745c5ab77f0a31f3b5a80ef9b08ce99df23442e37811dadbbab2b7353be97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b15c9854ccd97ced7601704cf19a04
SHA13fa277e35fe2e4c84def27c12d522678c3d6cea3
SHA2560c3fdf38035317ff2b73aebe31dd08ee81af25d777444fe3b27e9e262d9bb47a
SHA512b005112f753d38dbba230195a8bd90915d8f36e56e3fe3e0978e66383c492caf7808eef8aa9bb2a202ee9212836588e13e168c64a06949723fe6e21a28f6582f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215513dfcb0ef6b8d3fb89c600ccef6f
SHA13da6b810c58bccb68aa8a1295499078554a88137
SHA256562297247f3fde672949464aff79be1e01c8dd4ededb80d77470db2e439a6ecc
SHA51203862e4b32d9dae002bc2f07e6a76dd25d825321700e9b84128b5f1cf3dc731a4585fd488a5483a1f219723001c0d2ea3b052491a9d65788c6d9464f588c8dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b53365a7950ac50845db9b578e6786f
SHA17e0c43dfb3d1f8df58eed49c62dfed21a21eab0e
SHA256209e4508a0114adb53a6f4c9d73cd74084ab64b705cc89652383999a1f224a7b
SHA512d17be5e89e54706249ff1a82d465e37a7fd7aee7009f4ff06c1c5b54573fbaf6bf98ea617d64e231790069df18c7e67536ed444d26aeccdbe4357dd230e1f592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6d799e5782dbd4604d0f7c7bcadd7c
SHA129b7600c1be9fce5f90cf18a0888a4b16e4eb665
SHA256f08d803d0a4bda33eb0cee665cf9d9faa8ae3dfce5a4c0ff60fbdd4457d30a45
SHA5129cd8ca9ee34a569de480fcbe81648179b0044e58eea12b71896d69380f2ea3747e71fc1b1f1bb10bd471b3a6f79ed7258d438f73ca09424f440cd314411cbbcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56082a5b4dd23f76149e6ae11f87e642a
SHA1b9a0fb8d0402e6b080ce9c44aa7b4bce737a1e39
SHA2564f11063778cb2b7c3352b0c8a1ac1e8f97ddcef1d9609bb1c2c0e886e6aee213
SHA512be0e4259da482b2049550da45ab3a5511ac592e8c0faa1ed26679e81b5fc6388aaaa536465872d913e7193453af3a0e8450accd17ae2e411fac1605a3ae5fda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf2889a2b671be28368c6499d0e6dc3
SHA1879183adacacd1c34b79959d9ff474194113a812
SHA256a9d38c8ada71b4ea5d38ca8c3a454bed6f4a108b2f8ed955d797ac79754e6562
SHA5123b89933b174eb3c302fc289093a32bcbc59e530068a5888f3f0180e4897a71ea9e61d6c30443606dc4bcb301787b76abb8a2d2f41491338f16527029bd607e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579933a8f67f9089aa710586496035fc1
SHA1cf396e841386d7505ec3371d7d13fefae59b283b
SHA25617a44196f2da491a7c83855c75c21446ebe0aac387119ef5789954a67db1fe17
SHA512b128ddfbd1d2bc7079608b715166aeb74e8ea9e00fc3f231d35361881a4e0344088b23f177a301555f921df690d21911b08827bbb3021fa860626ed81f120eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586c67f69fe67b4738ee731219b15038
SHA165fa0de8e56d4fdf48094a6af278697156bd50b9
SHA25681770224038544b7d130ab60ff6068914a86c4488e373b0e437745f13a7b58f7
SHA512b0e94c57412eca78b42f65c4223d1063638eb57d609f216216aad4a0c1b3e5f11f0d34b16b73c68339539ec4d57bb7a938a5c468a5dbda400cc71c8f6ee7a9b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d174f06fdc1f64f06e0619e4cc1706d6
SHA126d9495ec55ad564b210b382c864bb532b29c662
SHA256767ec53df277a605d1706701ba489646a01e9c6d8e738614c1372d42b06257da
SHA51230430cb44989cd950773bb5c7e1df3d6773cf9ed9a327c9c0a74eae10a683cfbdd81b45fc11fea9e7b12d6bcdb64900470600d991f4ac1314c69ab5e806a41e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1e98cb3ef3921e5961b2a8e136a1b9
SHA19aff05fb78537eabee6924790267ac68c740a1cb
SHA2562f9f09bb38e915d93f8dfc611846c090c458e337c9d873a4e36b5011de273d6c
SHA5122d1e28d04e4a0fa163655eb4720e585d6e16198d35f6417837500f9679100f9149810993923f7035c098a149918c057fdc53666d1c228c2b5ab36e72a37308b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdf731adc6b2522b584d8754d46e99f
SHA1e766d5a3918fa23fe1ef246965f094e54b60ccf1
SHA256a8e1016d5f98d9f38837a94a56b4815dddb4b4c6d14694077ea7b98a0002e4de
SHA512d925ae598b5f31237ece5469a0479e1feecb915c3a93b42e922f9b872278626035ec677abd40f0a04d968870f0ce9ab622ae1efd15dac5afcaf4a6ae1af5ca15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6149a8cab4beaf41c83c085a044a361
SHA1ba3fa7e9accab6eb5e975e44459328efed2919f0
SHA256a97bdf5dac7a248f8c430a17527428c2ab3ba4fd52bdacdb0c33a8baf3297ac0
SHA5121ebf8be2bb0360aea7960965fa2d054dfe9f6cfe56157132ebac408bba2433124eff3e68de96ead95990e64d72bc7c70000b57e643e79fdb395d114825a4862b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59968ae8a15419167a0041a7fd8c89691
SHA1464b2f7d0b8038bc6fbd85df8a96eb331b96e216
SHA25644f15abae10cf878ea7e9470371c4d70cfa1f207f45ad9df906b829b47a8eba9
SHA5123499dc9a9a5b46b6839c1b30b720a395d92bdf44ee610e87322048d216e4972891edaca27ea91f994357b8707f321571d6c5bdaf9df5cb708716d516f8594ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a20e481e07a0e4a67a9f32087fc4173
SHA18f16a5162321ced59daa2b9110353627b1679def
SHA256c6a1aec0fb7656769c1621b5d7193df0877c4259121ebe54bfe1457331f576fe
SHA512867d44f5c305a7025bcc60d1a2686942ad8f672e5ed00b5905081952b812c50631986bb72d623f71ca3362f677f22965cfe4cbcd73f4638eb06cbe64e163cc60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4be443725b91516d7066a94968bad7f
SHA167fc49294b80defaae3fb0d0078ceddcd6e7c410
SHA25659de2310b12489ff73144373ef5b689fdc673d6537b5a024882c347f809fcd67
SHA512aa87f60d40ad75463c33f552d27f1de47f88b4fe4051f04d970b8bff9e7dafb00c8200f82989918a214e10ec16eeb2ddf30440d1bfed34625e6af53ab01f10b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eebb318932a9b5819181a9ae9e03622
SHA1cc6c6e3d13204ec31d0ae88a8393eb16c9da7de8
SHA256a77a2b57b831922a69e0733daba67b4d8367dad1de11637d1aef9335bc3524ed
SHA512f56684062312d30d8cd72197ef7d27379b1cb3cf75e43dea876679ca9817d368cfef820b28d86e49c97e0421145348a8dc7b269569be8a8feec66f5c6135be08
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b