Analysis
-
max time kernel
68s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
b485dbec489fa8522ed77c07cb828511_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b485dbec489fa8522ed77c07cb828511_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b485dbec489fa8522ed77c07cb828511_JaffaCakes118.html
-
Size
53KB
-
MD5
b485dbec489fa8522ed77c07cb828511
-
SHA1
9ddfcc45dba426e819e2a89f3709d279b6bcf9df
-
SHA256
43626118820fe485f52f9c55ef138e0d7fa5f265952391e6d6a077427fca2bbc
-
SHA512
a53570516d561f7080b5a0b7e2e142c427b64754f954446940a80cb840bd8a4711215e4672e1f1f761f3ce9fdcecbf46fcd2bbc4b69f42be4562b290fff1e380
-
SSDEEP
1536:CkgUiIakTqGivi+PyUurunlYd63Nj+q5VyvR0w2AzTICbb5oS/t9M/dNwIUTDmDe:CkgUiIakTqGivi+PyUurunlYd63Nj+qA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430426224" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000a302e374cfc222236e6f366f33c5223314307dcfbe3ed680697e0bac72e647ab000000000e8000000002000020000000f570b56963602e6be8650a11ebe5f233dfd65f01e0f6638b60d3c6502878fcd020000000341c930259f174a817b7fd601dc341d02258c5f34c38fa5ef873acd8ad78d5a540000000a9dc7801c8fad949f7f3ff19559b46a2786f92dabcf9b1cfa148e2a056da0fb0d9172e09a96fd77e5771c2544fe5f79ce34b6bda249585e2650d44f9ba64acb0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4038f1b5f6f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E00D1091-5FE9-11EF-9A20-C2007F0630F3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 712 iexplore.exe 712 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 712 wrote to memory of 2640 712 iexplore.exe 30 PID 712 wrote to memory of 2640 712 iexplore.exe 30 PID 712 wrote to memory of 2640 712 iexplore.exe 30 PID 712 wrote to memory of 2640 712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b485dbec489fa8522ed77c07cb828511_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb395f6b5680bd7c4b992af508f9496b
SHA1cd3b3e10f9cbffbb8f97cd6048d652da2d350e50
SHA25687d0854fa2b88215e435cfe4d243319d67114d6acff93cef2c87a6a41e21a94b
SHA5126298e0344c629b9c677f121b2526d479346ceaf37e719666b15a59e032275999c05946b30616e1bb47f885d7a15bb8f0b5a9693da4eb34726c52450b35476e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9db6b165707306d4cd3021b7f4bdd54
SHA11970a61fb4253c68638d38b6674bad271f4db0da
SHA2564295af7c3349548fa0fbec0658bb7c173e5adb1377246685e6af813e5597d3f3
SHA51277690888d01028b19d16c408af48e2271b4bbb6a06bf55fbd9a515faada6f9aac87fe30ce2525ec8c7d33abb13f7ed2e2153be77a532ad3a78c32cc99415e67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a84a6778ef37cf4ecf33f446a0c04bcd
SHA1c691f2cda7b23ee85719753eef1c88798671a01c
SHA25605ca746d95547a10f1616c0b45bab1c4d095305b7b89d5802442ebb849c4a73e
SHA5123cdd97770544e24c589f733ff1ca4ac99dcf56c04f1c8dc82bd252534f2c8935bed1b5cf727b8a74840d5908cc0d32dc0851d0f07a53ff88c4a0fc2310af3b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f9715d431df5a06e2351189f3ba9ef
SHA165ccbbaf4990e30d692896d9ae18ddafbae4845f
SHA256cf0a08804a109154eb47bc015a56930fceaa1d54f6d92ecbb3e6f73b8dc8e112
SHA512a2fcbf814a0fd425c3b21a5cbdbfd4d94f117d042fec8be50524196b710b1ff7597affd188d8919a771383944901e35203bc346755bb7fd7f7f936fa1bc60b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce3531e427751422c6a5e9d821defc6
SHA169d3f8e8ce923590653980854505eb6411e6318e
SHA256858e5a65f334ae5c386b23363a576206ba432df622b45a2c5f96c67a4438d123
SHA5124a55bff0614977cf033c06c40b6a2a2b421b4502884c94a2da3c4bdcd7112ed837799226154b2320e19d71af22f16aba4562bc0ed906704e919ec5f1d771dc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc51359b175929e11c90c3caf276c6a2
SHA1e640280896270021eca253de9718a2583ab2e093
SHA256a1c67e8ad89fe4ea78642d338bbc5e66a96120f893a8f3976f0eeb9baa65a5fe
SHA51294a2328364b81ded40808addf441dde2b39899cffe9ed8e35393feb17e548e32add8d551c46a1d811b4f5b59807e6c54add305c4c0da7deeb6baacc11e92cf49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad51b6af0df79a12a07ddc5543fdb6f
SHA130dae9f39dc5cc18db4b9e25061076c6b2a23c95
SHA2562a7f66ba034362a3ee85a9622166be3cf21e2e89ee896c278273282ea61292c7
SHA512ef9e2ed7513306035ff9afe967896e7ca3b0c434746667ac8cbd63f96e1fc4e6dd0773d52432345714b279b5a48eb415da204ae8d08aae28e0acd8a2c0d5ad37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa074d3e87383da2abd659dd7652b91
SHA1e1df89f5fa3e219357d9557fe771f9a12526f490
SHA2565a2e73e5af298bc6b7937c5d8b1b7f665ca1987de734fba590b60226ca86ebd6
SHA5126587e4df3dec58d120bd2c6e37fb18a3d84ddf91cadaf44d69607bcba6862a4d1570a6a2ab859eebd6c0ab8fe6bea6cea647ef9d0ade4ee06017c30cbe8b2ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8f13f4aabda05f28237057a7e74344
SHA1e9724e1c70feeb1b9d91a9439d6057f5dc0e638e
SHA25667b9a2a64aa1611bf1e4cae323a05660f3287ee8e00250054a7c93a026972efd
SHA51273d5f97fbb13f827e1d58e7ff227e1f6c6ddcfedc8c4a1a730d32424885dde6d742ae49dd36adca69db7cd891575a534736ccb151aa11b5d45c3120ecec5c0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1b4441fd030b70b31aae17396586545
SHA1d7330f6e3705d50ed38c44b50e69b36619c7d014
SHA256b6797c00665b7a9be0ccd7c4f6aedf88db5838dabc24080e21b074a69d075f39
SHA512a6d1b65b20dbde1363c92159d344ef024b74891381cb30b34ae738b2d1689e2c854db284deb500b71c5b574af1875dd0e40b27cb0382e6d83d65dc2009a3f8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3332c82aa7dfa84fdc561e5f78b80f
SHA1f143c9accbc3609f6bee57431aa8175b0f911aed
SHA25620a1ff57689ebe883343b28f16feb9df745331fc0d89ca5a247a772aad1c9948
SHA5128e834fd7bdda49b68b6854b4919a7f0f5a5fb178d2edc6dacda2c0cd189b8b34fc35baaf20dd370a934e8a7e292b63b3f7fd7853b64c20a2fb14c23c45c464c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864c9b5c108d94a2a8102e4dfbb04591
SHA146fcfe769255e6251e79c8ca58ac5e7212f68991
SHA25648ac06454dac26fee5f0c38fbf37cfd509ead8bba353103123233fc606048c04
SHA512d3001b01c4e7f7a81ba0f748e4d57259ea2382812c198dfd3075c7ee5df1f4b7b6ae95c158a64523c3db566bd4a8bb78dde602757ca5881b6879a9f5594ea569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3dd4d72ed7f32d60b5ba93533c5b9c0
SHA153a003285689e6d196cb45dd2b7bb8c4613d6f95
SHA2560bf8271587a892bd4c90a5bfd13f63f097ad0311b8290adbb8dd2ac378598ffd
SHA5120678e2cb6fba74ed85770ce9405e41ca739c7ded19fdb4c42ce6d2982f089b2680bff5b1e1ecfe427accaa0f8e2ae4b1c5b38d7f1221a22f5d263388f7139ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50778b5a03e0d542026d47666b2e6e212
SHA1a24e94743719581c5218c181975f24de0724fa80
SHA25628c749bfb73af85a14e3dc145274b9fc70b82609d908dc76e6f6df44246da10c
SHA5120517a8b4fe27e497990de59697906ececaef12bf9b7a962aaf0c0ef5b5f66947ef8d2d3f62a38e6e11f66358f998bc26556b707dc9b0f35ba9a277d6dcdf376e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84a5968fa2e2b42dc1b16319f8a39be
SHA13c50d30999a9bdeea8718a8d783aba982594b52a
SHA2566a8cb9f70c7c43882a5ada1b2d165fa26ee0731cdfeeab87b244aedfc2f36549
SHA51234ce6719079682035706cf67f73794290b63584d1bd9b270cb89fac511ab692b2dafcc56ffbe2d0523bc667d94e08829292e62a012626afac4373979faff8723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0df0e035bd807d73cbf241d2555c121
SHA1266b5894a2ce89f97576a4e230fa49cf8a9595c8
SHA2563c11b86a37e74ea52a64e7ff48c951a2164494bc511a8a45b0a00da7afd9ac96
SHA512a686672aed42b6cd4dc08f65bb5edbd1ba62fcd705ca1f5e15e20e543ff768c751b4a0b5e429a5619a6affa697311bd5880829aee4ba295b36c8a99df9739830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a696b506f0476e019c2b795e12293e28
SHA196f6a4eae891551eddaa5d75ea6bb579cd65037b
SHA256d461c0a784a513971a4752c79e5867962330353f3a49fd1f2b9d107d17cab6b2
SHA512df10dd6d770cd9c2ccebb457eafb6f779832775c729fea70c2589bc7911a43841ec5f29bb19e8eed74fa2080037dedb97450bc33ee1a4313b5a22500cd27e837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eee48a390664b234cae86bae6daea8c4
SHA1261f7ef6d752bf1776e42dd8905fa76eb4899112
SHA25691ad2d654f19ada9565606a6cc617110879877acaff66dff7b5f6700de121441
SHA5126bec681561d889abee5a0e5d5cceab49aff1c37f3cec4b8601f6bd98033b25ccc51f939dc8b6625473f7a188eaa133307cb9faee4f4b273e150278bd5f83d3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6e4deb54708919f59599a487691f9d
SHA13ef273997015855d0b35b0fa8b8c787fa5ae7af3
SHA2563becad7c1a2282bde383ac86ef495da25fe0c665747edda534d65d2bca3e32fd
SHA51232068cd3c943da5f203b5ccb9bcce7a9c8a20d51b0778feb68faa7252a7cf2fa7812427b6acd0d11132dd59b88128015c8e4f99eeddbaf112ddf271ecf97733a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b