Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
b4cbbb0e04a6d57c885cd030d696d61e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4cbbb0e04a6d57c885cd030d696d61e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b4cbbb0e04a6d57c885cd030d696d61e_JaffaCakes118.html
-
Size
6KB
-
MD5
b4cbbb0e04a6d57c885cd030d696d61e
-
SHA1
523345c9c7520106c79eccd365699207c9ad9237
-
SHA256
65b1156c9077a9603986e9dc2631d206c5181195c8530a3597efc8b5568392d4
-
SHA512
1b9a9e95f7a33c6a2047bd7a2f79fa3c70b72631cc9bc964d1fa626eff1cf75e1ea35d2cc8a9988cbb969f3c11a4edae4286c00461f765bad67ec987ee792ba8
-
SSDEEP
96:uzVs+ux7Ua0LLY1k9o84d12ef7CSTUOZcEZ7ru7f:csz7Ua0AYS/xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430431489" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{220BE871-5FF6-11EF-960D-6A8D92A4B8D0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000001280597a5610200fd3e8dfb07cd623260d39adce97fdfd2c60c086c0d4c5ef13000000000e8000000002000020000000d806d893fca740bf806b86f3424619376efab18419f412a0d46cd095e28f1a60200000000e2caf5534c37af5eb12ddb387375b492f9c260c5466c800e37d717648dcece940000000654976d17a623f950857d17fcc092efc2abaac9856e7087496514a57085258feca42ea16c7e2f961b5a1808d4d7a022a30be97925ee1d8a6ce7a0baf09921b65 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901dc8f702f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2208 2240 iexplore.exe 29 PID 2240 wrote to memory of 2208 2240 iexplore.exe 29 PID 2240 wrote to memory of 2208 2240 iexplore.exe 29 PID 2240 wrote to memory of 2208 2240 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4cbbb0e04a6d57c885cd030d696d61e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087826698d049dc4d5bb90ec67fabe15
SHA15f70c450d7b015ed4b9e1890c757dfa0577b931a
SHA256f2b6ebe32428f8b3321466ef9a28c1daef69eb48f7e38e5a221003e7ca645fa5
SHA5122b65b652453d81fbbcfb343398d5d94c2a61965cd2ed55b2717a131b641d8d044d509b4d2971e80b2730914f81689437e8607ff213ab2201bd19d26b46be00b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d8f79f9a85028c903cc296e02f63c0
SHA111c32603613b9b411b90b96b9a709ae51c427ccc
SHA25665ab4afa1f2e72de9742953f3be21f4ee80682283542d247ebcab1eff27683fc
SHA51260173ab41b8efb1df678377591933f21f9b4ec8a2a8b2d49d32c8571efa62970037b74f0e78657586b57b751b98feed1c216efbdb3c59263652ffcea8ba0dd2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d523bc215aa351adcdaeea8f872ccce6
SHA1c18839636efd1fc5503f78e053cd44103811f106
SHA2560a6e0414fe9f100c378ec01f6daf526e1287cb361b7d9d1709e3e3a6a728a5d4
SHA512b53bdffff0c2ddf3afcac1b5c3f13801933a3468d7d0709a94c72d603a729ec5890e35ae20f6f51252d4c2136eeb510ff29163cab729517d2f9e067b37f758e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193d31f2bcea880e7b9a7aa1efdc7022
SHA15f0f30a621ebfad6965fbe0c74a7cbe4b6b4327f
SHA256a7358c0d98147026767fda7e6d9c2643cd073d8b4b49f7ad05821372fbb57703
SHA5129b9f551d21605207ab1ed2a1fa711bd71624b2f8c3421911f72116761169384209f581fcade249ac52e8ef26aa7669dc4d954b6fcc28846aa54c09a1925190fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a1e393723f8cde9c8f12c21827a0c36
SHA1f9a7bf47166b0a0b4aae73fbd1b08413b029a23a
SHA25634b0acb2507f72f6c5dc15aebb7a1883c94c6bbb6369140adc14bd45c3bc18d0
SHA5124fd044d8502c3aade908cf1c53b90ecbff41e2dad4dcd498ee4f91eabaac21209c53da06f06994a556344d8ba2a726786ee2be9ddfebf128b7e9e2e0aa6434ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698286cf9ea6b5d8c3186e804e94c033
SHA10340522568eb1677976da709700942647ad52363
SHA2564ef7659bcc211d2b1e5e8a62387d0ee7712a4582e6957c3e023aa60bd3bf6d42
SHA5121d252dc85ba8d64c4145f3a9941aad75fd14d77eb8f7733e40865db989d44c3de525a3ce60e985cdf34e2ddf3cd896068f5c8528c19a30295c611ab13d1bcf9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd262433e0680afe2af936cd25006117
SHA13aa67a9b4efed805c6a663d359a23bda9495d417
SHA256b3e16233c052d426b1bbb9861961aff070db1502d1e8700b344712cad0ab4e26
SHA51232dfeb8556bc92fc3ed8cfe0b836efa37f4b61a4df2c006d533f14ac3854782376632b86b81a6847c2e63715eeede8cc7b92de66e0618720d95a72ac0e7c45a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53337775b7d6c5a160b517c17a1ff4f0f
SHA14299d5e9c5f3056aab99715667a03588a69d4ced
SHA256ec27057544fb3d270fe09037a30c22f6ad86928cd69fb97901f8c6303ba8b16c
SHA51226a36c3b63420df38c0a2111a8c5fd8448d71569e1fedf13647383a3634045cca0d76b558186458115b6c2e63199a52badcdde74507b02006c9af669bf5f3c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e485106169d48a96702fff2a0ba1a23
SHA163983741d89c209cd035b167f218ecb3c1a22151
SHA256ecafc131da529c87cd9bedfd2555ac31714b57118da494975b7f4d66c3884900
SHA512710e62e18e4e35f0a8cda5f8d4628ad604fdaf970bd7a31a6227cac23c1e7f88d7c03c46679abd45389c62812c130459bd7f58f673d180baee4aaacc1cf6bc94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d361f30c47e44285faa2fdd5f305a3
SHA13c64951d213c1009d16a6632444b4cce4556dc75
SHA2566ccfa870783599a158637553ebc8bdadbc805fa332c01a386d78d363410de2af
SHA5120e38135e7881ea848021fa620b3779a60e32d72e62fbc8662bef26d503ca681cca58059f21a24ed8a5feee2f3cc7983fc567fdee60342beb9f09156dd44b627d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507dd0d53ec37c6fcd3284d3b19f4d8e0
SHA166f22cb05840499b8b44cb541b80672a9159aa6a
SHA256171651608e3aed19a3b508d4321769211965d9dbdd8f4a979610a29773a278b4
SHA512afdeb49d59bd653ea8e278bae4d47b2d7f841995deeb478d821e20a3afade58833772c32576d01b78aea89d3b7603ef540d50e73e5c8d38ec0e6c0f4ea15769e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fabe3bad7c9857c5d87b64b67b62053
SHA144f069938fbc1f2ab20d57d574cd3162d24a1780
SHA256f41493aa1e4620ee903782cd01fdb762db5c5e66718c39821a0df17a08b6c164
SHA512917715dcebf945a4b03118d7383b7d8eaee70c3ced19c3a91c73b5fdd71f79ecc51d0ec6dae3129fd8e4363f9076d127a2d0ff862e904408e39e5e9fdbfc64f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379c07b40b0e9d3f3d513e5f27c14ea7
SHA1fd0218c2cda13e00ff38d003aef6ea539e8abd74
SHA256ed1031fc8c6ffcf4d703e274103f84febac6d9ef8d733773d8da21c06ee788cb
SHA512a56ec220fcb55bcf9620f17a104f96cd53f1edb809af564ce9d4923e607561e27b2f0de3df6e768fa0a197ae948d947234eb24e9c69b5b9148e967645e3014f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62c0812c1ed09ab7097e96d6d52f15b
SHA1d8f3015c5d90201901f82d30d2091a7d7569cf6f
SHA2563194c34d6cf0c56937977a453abd3ba79c5eeee763f595f130fbb9448d3775e2
SHA512065a0f5bcb5f39289b87058e668907f2e9123e04e47e4b48518244b8dc140b9973f64ecaa02b2ba9e6e63a66e821d539aec8aae94ea5e7229e58eeb2d6cbb624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c825974df3e20d59c9a467d902b0274
SHA1ec445b34ecf3174d160ed7bc045e05a05249dca2
SHA25668042448d34fc38e277ad20b15282a738d90d57f589011787a983c8aaee91d93
SHA512355388ffbf0869f75a5f63c3c2824982ca832b82b67b6288f775d09b173bce144edbdf89f51bc163a4962c7e94ac7908c8916572293ba0833c36bfc606d7c68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3666bd2b2da64fcc7612364fe55c50d
SHA104e7f2e8bd3555f0a2939447a47835e835868308
SHA256820813680437c7c5eeb2f2ca18147d340bf63f18ab6fc6421781028700bac2b5
SHA512337f9848db44fa0c7875dbcfe32b24b93beef8adc842ff0c36990b12703cbf9fbf5a970218eeb7385ee9fb2c9f5ba436572f9ac781ecc8e00961557cc7e4e412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e27a3415905c7a450442ea8db7dd7c
SHA1bd55e86c4df7477298d61a8e774a5bd3a7ae6905
SHA256bea3ad0feda5ee04efa6966222c7f6590e27be54665019daa765a37aad8eb6e3
SHA512f4a9064763f430936d61dbcd07c655bc5d752b384cdbf25e644c366e7791ad18e216da64a2ff8a963c6a370f4fa5ca21393c81d2ddb163acb767f730a173b99c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a6c94da4017f771e186f26a5e5503b
SHA14d5b479354100d9df2cbae68d3fc73c68dd3723c
SHA256e08063a727e8f3ef8de1fc1b3c7c541192bceea4eb1159e1cc2726da9e7941aa
SHA512e065cb2a4da507d1083aa83c2ab775e587cea161cf02c1bafaba4a15eb3643cc8ba9a8cbb3c96b53a3ff1e59a2d2952869bf1e50db10bc25e2885d299502508f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b060306e72a641c002a42d99c68a2522
SHA19753b954f88b34091680d31c8ca72208b9fe406a
SHA2566c53674ee9ea3459300c8c9a2e6623b0af3399a22b269959f01a07712a51bac1
SHA51223020734363fd8aa36bb2e1847cff39871af0b58567fa0391dcb9b9f15a3246a6826ed6641f90bce1eec30488f8d9ce1a58b35bcabc19117dac69ae7283f7ab1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b