Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
b212b552f4bcfd8ec8b1635886098582_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b212b552f4bcfd8ec8b1635886098582_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b212b552f4bcfd8ec8b1635886098582_JaffaCakes118.html
-
Size
3KB
-
MD5
b212b552f4bcfd8ec8b1635886098582
-
SHA1
a53c4482f63a09673798d74df977dc115d9bf979
-
SHA256
6a9427a44544a3ae7307fd4b5fb9ec7c47125504befdba89e2fc8eff32dea6d9
-
SHA512
315401f98d2ed3bc14b2d448dc0f558c5103312c326a4de0211b5109b7a6cea71c0183a8ca8d474dca43ee1ce2263df8239debc47e5c9dd7ad92df03d104d73a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430375679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0002ef480f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{317CDB71-5F74-11EF-A543-CAD9DE6C860B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000002b3ef8befa5a11a3f2c6f764824dc081d2f75f9afe1cadc5ed1b98b6b31044db000000000e800000000200002000000012a7f2e51f3fb207eaa450e07fd80af8262febe42ad3792a428a9ed15ddd50102000000022358d0bc3464e9cf0a0ebccf795699454b82809cb58e98536e5cf71687440e240000000a16fa9821c3a4fe100f258cade917ad203e18c402c9e54b9ab158d6ad0a2be02f05c1e5c60f1265e7f85efbc069e5f2e3478c0407820ab45c3fcd90b9535008d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 672 2516 iexplore.exe 29 PID 2516 wrote to memory of 672 2516 iexplore.exe 29 PID 2516 wrote to memory of 672 2516 iexplore.exe 29 PID 2516 wrote to memory of 672 2516 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b212b552f4bcfd8ec8b1635886098582_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc6f03ff6f7f60171f317698e1dbb28
SHA108545e62776733ad5a62cd953f6361568b920b4a
SHA256ebb353384206c63c70551c6668ce33a075e79c7070918d354f96237d39e07924
SHA512cf9e1da375a184c369536259e58ce2b74a2d927029da80e9032a6ca871dba3ed6d8c081794a8fbf7d81fc0afc2b4790c0033e81f74b913ab17934fbc544ab3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7660fb9b36a7a8e7c29ecbce9cb2a9b
SHA1a59363857160c8ea7e225eca49863890c807728e
SHA2565bb7c207931ad7849dac5f0c0edac17a9442fc88b8d01719e690520b5d30cd95
SHA512304352b09f6eebccfb34b171a29cfc8adbcc5739726fad4567db472547511e3d6786f8a5f87836531a03b2a7b742d5b82c2915c7cd0b38069cb1382a8d4513c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc5dec57d440581197712564c95f460
SHA1aefb4e09e3abf3ca081e012e521d94318572f4e8
SHA25692a87da135962b1fcd5ef1e279e5cf756f002403211258a4dcd8426f7790b802
SHA5127b5850c6106528aba77f95688c5139cc76638aae31d681de74edc0f6bcefc8c16b4fb0d4b6552911d54a960dee569334b5880b67c68f4d4deba2cd695224dc36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3b122619f599f193e27f4a152a0b5d
SHA11d8dfe0322cd0a8a778e3cda86649d43a19b8134
SHA25669365d058b8cc9ab9db7961f458161af80c221e340ef0523d6ff9be545b5cae0
SHA5123d8538487c95b706e9940454402e8567fab414285a54e1cc71ba896107872c1fa6c52d97877bb0286a782ebe139a4d9d8594b6a1ff0ad701f4c5309c31db56e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6808f800796e8c63d31da2fee1d6d6e
SHA10378c3770814352a884067dcb63e9f24c8fd840a
SHA25642130c2bd2db6c6cebba5a1caee07c22809341cea1a803747c13745d61da1337
SHA512a5b64ecc3afd3a27eaa20c9dcc730162f3759b989edfee7cbd3284d80505205d0978fa18f9ab73b5b3d53e1b668fa3f80a8cb3a8d928e8eeac937d5de84f7fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876d34b079338b0ddb28020689168ac5
SHA1ccca0f68cf0ecba464cdc67bba6ebbd931ff3817
SHA2560bef60b1e858c80c8652b9ea43a86465d03599b85a99cd3d695dbaa62ec28901
SHA512df984299e2f5b9ac34f9d6580626347ca5a4ddb3f94b0bfb73765a6d431315ab6111eff8a0aebd53776c3f6730fe24ce6803fb21481183b391c52ea0e8e9e8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a75ce0d74a63e8f8c1764c8dbf67d4
SHA175129b9bf49fbfd24c5945d7c46e4a6f401d5b3d
SHA256b57811e5db1c1e9c344eb09ee25d7e6ba65dc3ac3a80f47a1a5a0510afbf1706
SHA5120c6bbc123cf67f866b96935178270785ad00e40936f8a6514ce8140b8360b407f3b74763739679c7c358cfda446c63a1f49ac54d11c45f95fe43ad6782a8d5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b100a7de9c11da8e5c3fbc0af3e02955
SHA1f0f56c52d937a68aad233660379dc21b56ecc3ef
SHA2569d8b02d0952205a2eb6544af91e4bfac590dfa34d2400bd7ef81700a55e5a62c
SHA512a2c251a7437fcc335954288f93fed2f17e1a28c61ea203280033b14c8ef99fdf403a825b901eefb27d317d44bec4d02fa5a5764bf3b1bae2c121e60cc7e5aff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfe5c3869c1369e879a18b495180708
SHA1420e53e2af1170745ac1270be17662d3d6988406
SHA2565ec5e38c10ebb9004e2ef6d9e7dad9a454f91d8018cbd92f4a0d807e2575980a
SHA512fcf0e48bf763170df3eb4dc9982c42766e8f09caa0ac827c3fc21e5b2c53adaf6a378b99d7c09d687ee783fceb6243195e8a65f78560f2eef1bf02465a13451a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808a570d89cc1f52436740ec2ebd3ab9
SHA10a64cb2c520ec8edb99ab9089dab5aa873dfc943
SHA256f458ab78ca4ebe9de514aa6379ca4e6b04caf3b04695a94648f4946e63322991
SHA512a666221b782df627ca6fba661bfdfc3ee353ca18879ee452ee228dff586d7cefd85c1e0cd452e9ef83fadac36e233082c7f4988273a18b6f324f12710ab018e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a7ad5afb146902700ab4f276277697
SHA145de5b76a08198d8456b4da80c73b891f4cb9138
SHA2569daf54c901496f83380d92670d25e3b895c04b67ba1095717b0ae7c689027cce
SHA51281b7bb86096b7ee440942c96f43410257e9439900193cf4d3a5b59671f6aba04e6a56230f36be7009fd4c90c4414e9cf8c5e4c40617b43037791713901c1acaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cad722e0c0356cf1a1ca9bc8d5412fe
SHA196d8779e4da29df0e783ea7ce4b96f1772609a12
SHA25698bb5844ffbcacc6bcef76d825dd3243c3f5212e1f78321acb5f32dcf57fd559
SHA51204e09026d5c0c94bfdd8e37682127d574773901bbda842e89057edd33e3d7fde94d2a648c8947c87df7443ecb56239ebc57481bff6afbec9fff1111341a602f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5f99abc22c188c7f804c2e62ec9d0f
SHA16878d9c6654618e8428552d7539aa66bc3168e46
SHA25606333308003325cc13df4354d927ac072899b23c51fbb9a6aa4f2bc201fc3010
SHA512fff91e040880b88718a134a75b37618c53724e02cadd0639c41dc95fd658df28b97fbb25ed54620093c972ed73c73ebf22ea23b30514dc7458387bea831e8637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0f953c0adb712d6ee46b0553016f0c
SHA1ef5c9e29d3585506be81800d8c7bb578e267c19a
SHA256640106840b2a9bd99d271f1c50d97b443de376ebe31cb3eb446375a9106fd1e5
SHA51202edceb88d4bd0461a4a7d09690e059ac1718309c5605411175bad184cffc17c2e38d964c9445639fd2f9fb2d8d54e53f18008a431e3764b2386d27f5848f6fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef33bb47bac78c4433393a4d13ec460
SHA1248112decdba1900d7e98db65248af5b8012017b
SHA256a2aad5e0a5a07ab5d698271cf26c730f451de4cca7ff98745846a6386f4b544e
SHA5122e16ca5382458c777bab075ee6336cb7f488164f23f9e22404513cad9c1229d91adfbb29c12c7056ae3ca7f84b1a4839c6ffa478441fec24d601ed5da9ce8c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a32d2fce73b55db864af27c7a49e774
SHA1b97cacf553e09720ee330edc7f14afebddb345ed
SHA2563f5391b9371ac66c738f99c94a8377d67875c74c598439c7007d3893c2883aa7
SHA5124bf4fdc6751254e721d2e7851fd13d1596ca274a232b63e9057daf834ae98f02573f927468774ff89fb9a6958c1a5bcb619c339063f1e34e4a552cb56ea6460b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980c39e2b67d230a5c8a9ac871b68226
SHA1309641e5bcfb714dc604b9b24bb1710d9d8e0f75
SHA256ea7e2d90fc83f1917e48f079b0e6cc94b52320be51723f877da674be5e85b9d1
SHA5121d5fafa48634a163ee778b823ffff4ea3e6c678b90b9c4604274ab262698bb502b063f9827294e91bf668f8c60bf3aa73e67159043ce4e357d2f24fbfdad9356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc557be1a7bd7170d608a44b20f2f004
SHA12956c3d4c827dfbd4b47231b43945e1a7b2aecab
SHA25691626cdc25c9d0f86bc4b936f14aceef9c3b2fc6fe1d99817b0d4cac130b35ef
SHA51224b061c6b04846c861e4c803e3ab30e82723b63f4d2da075111eb3e1b8fde0832ccae1a70b56deb7db6115432d27f8f7dcf1a4932f559e9a86ef4f622aadace9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6231e760b80fb03b63f510b4cea849
SHA1f1079ff3394b8fd9a46e6422c2615290c4e3f3e8
SHA2564f35ff4a78e1d31df21817490492498590c56c82b4f2f53fae0e7b8200cf8c7f
SHA5123fe3b4f719f8519e749e3e3438405f549626de1b4990b178684762b982797404dd9cf4619a5f0eda1b65c8ff4829f7f9af288a7b80d6905d6292084163b2bf4e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b