Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
b4537eef9d107313650dc5d9ca4eb507_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4537eef9d107313650dc5d9ca4eb507_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b4537eef9d107313650dc5d9ca4eb507_JaffaCakes118.html
-
Size
8KB
-
MD5
b4537eef9d107313650dc5d9ca4eb507
-
SHA1
1a2ad5ae0b04420574cc23391e67442ed6ef23e9
-
SHA256
44d5a6474b6eaef42048d9f439c51a466d16e6aae983d08e30fb1701e9c3860e
-
SHA512
2e3fd3fad8a56e803842eb62ddbbf6ce8a236b4aa237962066558d23120caf39c1aa82005230d961f240bf46f4ee763fb786eab9de28659314ccb3d546210d59
-
SSDEEP
96:uzVs+ux7x4LLY1k9o84d12ef7CSTUazfcsvtF7R569Ehy2Uk0GnUclhADcEZ7rur:csz7x4AYS/g9Qcb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08eb3afedf3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D930CDB1-5FE0-11EF-BC8E-E6140BA5C80C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000004e300d6464e9b3114b8bc85343cff094312adc8f4f6f66ab9b948a5140e09f18000000000e80000000020000200000004b2dff31eebd0572e29e665f5001a5cce7c51bebeca3ef5bfab097af789d38f9200000002f3d2da0052b34e0a8178c55939d399602fe54821bed015f496e15c45cd29c974000000026d753efb25c09f8fd70764088c4e40cab0553b02799d47ab88a0a027734ba7a98e2add2680be0b15c701aabb6abc1d02246aad76a24349cc9d53fcc93fc213b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430422346" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1772 iexplore.exe 1772 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2344 1772 iexplore.exe 30 PID 1772 wrote to memory of 2344 1772 iexplore.exe 30 PID 1772 wrote to memory of 2344 1772 iexplore.exe 30 PID 1772 wrote to memory of 2344 1772 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4537eef9d107313650dc5d9ca4eb507_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca85a1f48c821a10bfa42323041ba77
SHA13ab3314281a335af86dea926615de487c8b98f9c
SHA2563b95cd52e13ad089594fc1fc91a363f2d33621ee5a11a68e05dbf2e398eede3e
SHA512032b514b97cc160b9c34506c55fe4b0c6db70024dc1e9d2f11f079098d0e80d81e54341564b5ffb0442c62e7dd49530bb27e31a03ef9a21565de6035baf26ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e00c97e43da9a417a3042771a35ae39
SHA1f2a5ee2735dd800872b648a8838f1de4bbffeb21
SHA256e3c526a0bde2f1e2c2b30199afa03ae020262eebede53207228987f7aab3ca45
SHA5121022235a18f439f21562ef52965d9ac30f358a3c816460abf3ab19d36dc591e7056484dd49c4dce300cdca832bf3bd99524438d715b6d1ecb056271bae2f14ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561eab2c02b3412c90906e0df2c685a19
SHA1769524b55a9763b4e85ec394d4ac67975a4ecf65
SHA256ab18bc3bbea59dd7ea0317fc065aa936f8f5b478f8878b317be559039ac622f7
SHA51208d50b88d4a837bfdb45ff5d0375ffa9016030f67d523e7fc2d832c92605a037ed4302da88be8ae2ac521cfd73a0dd3e72ba447c5edcd8b580ead2ddfabf5f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561bc7f36f11b8dece4d369556f506cb9
SHA1be731ccd597da8a6ce6c758e8f90a5583150380d
SHA256b66912f96c695adc30b199ac1e334fbda79dbff616369ff2d2dc4a7fd836ca3b
SHA512e727318a2ee39320ac97f637eb90ac6bb9415485803c52ee28ddd73a8aea52fe4080083163b1f3043f2e8ea1a0e1322502e4db76f558fdd728d518ac92abbd9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6069017f7300963239f616601b89e5
SHA1a62f86d7c3d2ec1a48261b26152a61390e7ac47e
SHA256c1f19ba220455679775c33e1c189d5a22164dfc9689268b335b1648501ff3cd8
SHA5120917ecf5109f3acf7242930684deb46eb25d6afd588676261feaf493f55339c095497ffe06cdf9d6b40560d577bbca062a1acfbad7608d1e64500b88aa562a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3b25146765ba3cfdae2f0508d0e933
SHA188c447100ccaa31fed48f74da11b128ffd2fe10c
SHA256a13561176edcd8bd482a3dcaa7911ef10417331490595e15e901aa0919f7afdc
SHA512a3f5a8534d408c16f2122d464379fbe4d72244fbe691539e21d8d86d44b840896caadb951d9ecd402324e9f173510936938a865fd8dbc759f6575b75961f31eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b3fbcb912c40e8ab2452712c11a5dd
SHA11109119437e796311b76e71424e1d034b7526a42
SHA2564e54ede1ca350f73c866032436d7dd0599487c2fb370d3a4452c3a3cce9c3e91
SHA512667673a81a3fc1276d27e31cc81937357abfaa841f098f692f0d8fe7ad721596b786238f773b20494cb19ccb886bfca96560a171c6435fa4ff5a36b612172c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72a5f0c3544bb712460b5d26412ad0c
SHA1c50b7811a3f11051e65ce728929d0dd9c7c7fa4c
SHA256d6b57f52aa4869c35288e48c8e43f52505a89853bf1943881aa40bc2bfa4d803
SHA5123e0ebe8133cbc0b240e2fc14360c22ec8a4735dfaa50cd7d467334f0b347f4b81283bf5a1f0fa5b71fee8ef6539f0300274c9bab62eca02ad49dff911ae93b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5b83e3fc18b671447cc17512dde8fe
SHA17284acc0681fab84e9b388345a9744572b557483
SHA256ed58ee12438f6f2156ac0eb0ef6d603398356df4960904ecfac17495c041080b
SHA51240b074de8bfc0fcd5d625964aea231cf89e5b013a5397b7fc52450d8b349e2f4e6bf7b368d9a019a75bebad78a998830a95b8e40d12e7aa1dec76d9ffb333e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500028e0d726de7b851baf7e45b868f22
SHA11bd6e76310cdfc1c2d2b9d10ff8ffe350e0caa04
SHA256f174fee064274f4cfb697158c71a1600d71be145375acfeeebd9ba139f71a0c2
SHA5120921e63782f5f15a52f6598369dc889c73dbd4ae0a850987b755e66580a3a0176d0131f44f21ca06a7469e07e6b3c254eacec2fddd3377a30b5c485406af9e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2d72f0e6d26c51ec09d3207d915078
SHA17528aec9fbfd84dc2ff70257dc88207b8073abc6
SHA25613f1955bdf56a2c02a3b0d0f6488b61ca3396fb3543396d0403fa07a839e10fb
SHA5127619dacd84ec688e712f1d6906b3d7e6aa62e61934131734119ac8690ddaf5d2de1925e98b92cb66c48537e92fae4d66f91adf8d09467561cba7b69ca3d33526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539410b8fdf6a39dd46f2ecf4a8ffd10c
SHA1947da8e247bed5caf5f928b709de1945ad43ea72
SHA25600c0f96ad48946d80c19ebf0a45332bcf836bf582d626a024e38313683bd882a
SHA512f5996589e25bfeaf9a2279df2791216b4b0c5db9fd53cce3498809912eb7bad17eb8e3eebb9e316611d0d656767f0b05aed2947e92363df8a28396c24694d625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac71de8d3ee7aba25478ec24e3eb11aa
SHA1db361bc3add332080b839b344aed10d2a365121d
SHA256e5552b29a1d89feff0e0b89349e48e0eeb087a1ba41a298cbbf903810408fccc
SHA51228236cc555d178c34c66452e49d96d4e51f22719917361f0989da29b7c573c178904a6836d36ada1ad7ba8ed9677c06f5e0b24a8508265e3a337113ac8771a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908318d325277c955783985673d16a20
SHA16edf47bd8c1ee80b2b7e1cfe083d456130c0004c
SHA256a0c37e547072f47aac71c5057a1276f39fe10fd411d6dfbf6a1216feb64e2730
SHA512f9731d8e22b6e29abab853deed70f80cd27610814441ec2b07de2a873796be9c172b0959b501c8f93c4213861946b8eb383d0735ada4de30234dd867161c236e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da2512376405560c7d4fed49878d3fe2
SHA114999c4f085536003e017060a88e9feddb8ac604
SHA256eb620fa8993e1022a3914d3f89815ac045c9e55ef9487e4ec0683e0e0c1d8d21
SHA512a5f366553dff25579e5e2d6ef10323f254d886dd385a437138e3e24c2aa224fbcb4c4eeaf4561bed3015983dc21c1871fc953d9aa3ee5138b7f902e6e85ca8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c267d4487d102c2a521d08a7fefa0a
SHA129da96d3e1aea07d4510e9062d8086ad6192437d
SHA256eddc0829647c79625100707ab2507458a5307ce081125b6a90bccb88d41c58a9
SHA512f317c75f6fa50fd7d878b1061cba73dd0596ebfb97eabdea59e4a4b0a97f3b86610dc58bb791adbc036ebbc367d0fcdafae5a1cbba680164beaf916b8a0a48cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df304a691f643d28fa47e49f0c130cb5
SHA17e5b0bbf09a1ead541f893fa454b261a25cfd7ed
SHA256caecc06b2547a8bdf641005cf6ec9a9c6820ec7384c578de7408fcd55dd3f814
SHA5128a25ce9ca80613114971b547c2b55af014b31c1d30dff177ab0ac1df9f772a4beee925baf9d1507f4f3049af79db149f0fb94f8091cd8becdadabe1e6344088f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e92eb3a33d5b900cf23f236f008ba2
SHA15f91fae90c717a95541e0be4114836851fad662d
SHA2565c7895d148f564f0003b53ee99c2c5b804f1c3a5fa21112c1520e2df0755cd95
SHA5124886bfb3cb1dc8ff5dcf0571bd019dc0233c8920d68631aee3c9ebab8015628f64eea39a139efad5cd76808ec20d500aa2152e5359e46016f7806867d57e2ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4851e4d9179646ddbe2dc8f0f314ab2
SHA11eea4f916d1f65440acb9c488d1737e08b97a1f1
SHA2566d8f031d84869c6b887d5922eae5951fea1a71c59bc8956ece913deb88dd9423
SHA512b073ef78c9cb7ea5c776ff56a86373f3f577254bf4b5470089a540a5029329471835a1378d7b0e98ad620142ae93b074779cffd59321ee37ea86c205cdfa81f2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b