Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
b790839b412a06a1956711587f06b536_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b790839b412a06a1956711587f06b536_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b790839b412a06a1956711587f06b536_JaffaCakes118.html
-
Size
6KB
-
MD5
b790839b412a06a1956711587f06b536
-
SHA1
11d887a5d4d57140e951575dc4de0b68ad125329
-
SHA256
1ba97f1bac3b31c43b9e816350621e12c88dba750ea8a631b568a593aa8cee8f
-
SHA512
0f2ed76ad4af9748cfed40fe9e4755a707d6b3ab6f1ac9054523d9e265d8a7f72198ee38bdb8fa2da4c32b25cbe636492f095ff3c443838d116149d9299d4576
-
SSDEEP
96:uzVs+ux7lLLLY1k9o84d12ef7CSTUOZcEZ7ru7f:csz7lLAYS/xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430490265" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f707d28bf4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB75F461-607E-11EF-AD79-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000005b24d5cafb9be25e395a66bc54932e2bbb032aef8f2a8e9fc78e93d5af03cc40000000000e8000000002000020000000cdc7066a3cb62ba6df7d3763a52d363a0b3229d21744c2d83e60e6a5ac1b2b1b200000009cd47e7a77ac1fcbda4a9c551321fa048a396445222a09ee2fa197e25057f75d40000000a1ce9304f4927e5e8092e8fbdf9e66f6081c3bb5cb357e6e9d6db0bdec8cd6cb8284a329a0a42c777462ec831ee7873286d672848aa0e245543a2309e465e02d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2608 iexplore.exe 2608 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2316 2608 iexplore.exe 31 PID 2608 wrote to memory of 2316 2608 iexplore.exe 31 PID 2608 wrote to memory of 2316 2608 iexplore.exe 31 PID 2608 wrote to memory of 2316 2608 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b790839b412a06a1956711587f06b536_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b40568bfeba32a953e53f036ca87f10c
SHA11057d98e219e159a2a7f635090941f011521dcb6
SHA256477448090a2f37234af73ec1e8f50694d3785445043d5c0e205ad8f7ae31abae
SHA5121faf586cc21d10c9ee88b019e7cfcac318e7137c8336aefc1405da15d0f7dcac52d6a6935911da8771af445a494af14dd977070c190bdc5b0818f91229b50e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD527e716ac951626e3414d9a560e791fdb
SHA16e94cbaef7ddf7ce6a01996d1347d9c5b9503719
SHA256a5e3a390994fe396ecdee8bbe5c3e0dfc396cfb8a1c0acc086e89728fb0b5cfa
SHA512a7bdcc1c9073f2e05f91dc26b8370f90ff99a464c36fc6e002acdb1d4eca2423119178339f0ead520e8cccfdcfa11db5214ab7d5416d351d47d6a89475659c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b06fbe74ab90c01b6295cab1ff044e1d
SHA1928aa8ce65037928e5d5cf57e99f70a7d8d0c114
SHA2560fb5c09b5f723cf82f413e90ce30e0a8c35afa381ad1668e5f9bf9356dc51a3c
SHA512956247c1d5f0e7c644a943e7a9819c8bd3e370ca6c5fe83da4ec3ecd79c38a334fc5c3412e067f85eb581d50902245747b24db9d5cc83c90f40adbc817993ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fc344f37d933486ef192115ed509651a
SHA10a57132b7b3f5ed1d9e65898dcb6f4b3f1b469d0
SHA2568389526aeb14c797b7a604be3ae8a55de2fd69524e4cc645f6e6f48b7b65c7c9
SHA512a7341b322644b1a9494305daca1a076a98e7846b091d8008fe93b44bee8a5e9421ce5cb6511071ebe75f0ff3fea17811a0eeacbfca8c23af4e17ed33e68c6e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d16fff90fc2c67b17408c9e1b86be29f
SHA1863a4b314db593474dfcac8d8a16590eabef58ea
SHA2560779cbee2be1a5ad11317079f623d541c86197a8a50b02351d350ec5f3148188
SHA51255903cf8093d960d8408cf4f639faa6254e0d88df99faf1ef7fca70a28d635ec496472ebf4dd0403a2f1b6ac9625f764516573edb2e3fc50862e4f1f4d117180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50c9dcb4fde3006a3958df23cb1181cba
SHA161d18f1c48a9c9a620455b32022d915a396d3420
SHA256f0a306fdcfa9fc17c4e7316b66e0cba0b124bb20bb4cf08ba1efe910b61ce43d
SHA512c24aab3a76f523e37ebb668f8d094304499714fce88e258724f329bb3b73f6e946121e471ce3540624b57d947ff386005b83d37cb03448ddb93f9afb0e97fe73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a2609aa759080e909d093161981d104f
SHA1c368e6382260deec2aaad821645e478170031c1c
SHA2566fe5a98b9880609c9f7a14475b76b0dbadcc688a1aece3d091d01200f48bd7cf
SHA51299c7d06e0bad914a1863272a9b7d77ce580a37d4e25fd52bf1928d913a4de42a24a9815ed1938e7115e0aaf4461e65710263f1d2f64ab5af762af7c878c317ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d738ab62463a78df6b503587f1cfdacc
SHA1c9e64f0558ce3bb10dbbc2e6670e8aea97fea4c6
SHA2561c23b92ea6c81f13da2022d009d9ac62650f616d30e001aa7ce695352843aa73
SHA512cb86054ce621cd8f564b70d8cf917a5882e41d9f9c1051d63318369a46541652c79160675d9bfa390420e00c34acfd119a451340f9cfd0d8fa52ececdf43358a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53887302310e8a46f6972a3bc9434530b
SHA1439b13f0f7b88229bd86ee1ccbc64e07b2922e79
SHA256402fa2a578b46fd0266cebd400bdb1fa3346801a9063dc40d1b01749dbf486db
SHA5125040dbf0c77f1685ac92b181c9a8e09a8b9118b792d91d46acdaa7faf90ea00b9289e18b93177862f97596b0e386969d17341a067624243a8ccae8a6346422e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530f53d570598133827272a2ec8d47566
SHA1452228a4eb8a3286e28e777a8ed3b169438f75e3
SHA256c4cfd74f6680f2fe1c3443b9965997f12372905e1fccd3d339bb04d3a031d953
SHA5122417ed35655989e8772a0ec659f1115e0ccab7630217a5a894626931c5fba2bd0ba6a75f83c078443365ac9fe6ccce751a13ebaee4c4b882cc4c5ae59865fd68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50258778f701cdccad6237466b900ed3a
SHA1c31f88155878b1855d9fc8d13dae8e7d92d85232
SHA2566da353e2d78be24ac19371f35151a9352511738d48a50243d1d72e39dfaf362f
SHA51241af38fdd731ba5114f82bb202adb613d47496231c3e64a6bc5886f711ab83a02f5a3f00fe21f66a2d7dcb88be35f4ed144b50305fd7be1c6253556669d43d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a688a6cd4c0e901389c5c950e6a97ce
SHA1fa427c2d1e6df09e98e800476b4050c93f8cdb95
SHA2560b806d0d897382b05ee16d148c952a30f45edb72778bd79b7700ab1ea13463ec
SHA512f66f67af1211aaf62a9964de7c5997702c265564747e1dca119491ddf3523bf1121bf389752aaab1ef3906e5f0f0100373b17a3c8ded6086da1047b6eab7a779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff02eda3d7e4c311196403252d0334de
SHA1874eeaf04a446eddfa32f83e11ea844607a2362d
SHA2569a707104f26c36b68958f925da7b8387a9c5063e3f1b5cc7280f3becb9fdb134
SHA5129a97fd52ec40b4eb08f789cd10e58f983bd80d589e33e9272448a782e69656ec8595ee49ceba893c4476c53918f325463242f02065aafc7bff75a6d9f826f361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c5f5f0c745382127979c38337c4e0e1c
SHA12e1b0eabef5455c0f548eae3f47a76961d42ec90
SHA25669ac5fe9f1b0138073a40741765d1b33bbd63297da093797a374ae551d4fcf85
SHA5121aed58e2c54b5f8b8d20ce107340beba281204cc2596b6de0df6f3ec552c9ed7cf9c8e1ef6f64798f9213a9aa4d0d8ebe36862fbbed7df37340a85244441927f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a37786d6bceffeb0f2a31442c9cb76c2
SHA16412fcf437a4e5501b38843152f35fe206a3eca8
SHA256abeff7eb0b13941969911d75785714e7e754c83c90237ee41840d9d7a3cad0e8
SHA512ebbb6075f703f1de4ae421507c4ca9b7527cd6128a83ff907524d80c255e48c4581d7eac88a7ce6f2b79518294a3af104368fd7657605319ae46708a005eb531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53f3e111349d8e2d8f0f7715d88944c93
SHA1dab53baf035a8928d7c36cacde16b494782e97e5
SHA25684a65ae9622ec1daa23aff8c4cbbbaa61a5de659187f18efb641691fe3c1b657
SHA51208fa2fba48f147724c69e5f922f5d32e8650c1c0754e95447ab47b7c3da44b4285b89f8c46772b2b580ab0b2b7dc5ed7678af54c9b90bf96d5ec9a6b698470ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595bc396dd80ec7a4a56c44745eeb2801
SHA13d70a810ecddc02fc42a2a34dc8aace37ec85615
SHA2563434e575049be7c89c0bc9d4eb48e410fd801ddaaf1ac17b171227c2ba6bc1fb
SHA51278f3d8a796222d446ecba6470646e30620b662db70265a72568d7830da9c592b8cf07014118f89518b1cf0f5bcc630dddffc7185aa52d606d4d3fe5abb4eff5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50c7e15b11f5e45f92823a53d6299e804
SHA119cbbc3082ecb4ffe5a2c0c701fd98377bd64d7c
SHA2562df68bc6dabe06d2c8a04acf572e11dd8bbf4e96d72d50108fdaa6b3a907d021
SHA512134e0e187bfbe78d22c3d2d3cb591e876dc8e327af5ca344bec258aee08c33274b1d8b13b76a5d2f330a68feb6eb7c14f9d0e3401650807b60c9338c1e12f39e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b