Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
f0b63b081ad3863823e53c2985321676_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0b63b081ad3863823e53c2985321676_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0b63b081ad3863823e53c2985321676_JaffaCakes118.html
-
Size
8KB
-
MD5
f0b63b081ad3863823e53c2985321676
-
SHA1
a849157d9988642db21bd7c5ef994fa34ea28c94
-
SHA256
322cad79d67d545dd772980527dbbbd6f7863f0f4d483def013c1703efae4127
-
SHA512
1766c26a3b896049103a6f3cc3a50a3b399e914d803cec637bfadcceedfc61c86a5e57692288bb4cde448e0adda6719627030d72e7911a7c914b94ef25fa529a
-
SSDEEP
192:Up62q8eG0D05FdAPeKN/eUeQj8ldcEe5eZrehengenLU3:EHq8E05aeKN/eUeQjJEe5elehegeLA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000007e34c2db3180327ae63abe2efc4e913729f03db37ed0b06f4722b1072decee7b000000000e80000000020000200000002deddfb66cf76dae18266d7eb20be184cb951bb22b8662732a0cf1743648ac0f20000000f06b4dd6845c77b99e32faa44c31550109e9dea7d252db77662fc7e4b0f42a724000000066f43c0205c6acc0985bba8421d08d576a256a3b15775e837f775e80fcdc79f7cfc41dbb98e8349d49d1bf196abdcbda1a2c22ec43de8794823f765d27e9099a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433118584" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80072d58730cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83AF2E61-7866-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2712 2708 iexplore.exe 31 PID 2708 wrote to memory of 2712 2708 iexplore.exe 31 PID 2708 wrote to memory of 2712 2708 iexplore.exe 31 PID 2708 wrote to memory of 2712 2708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0b63b081ad3863823e53c2985321676_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56128a6f0aee064b2599f648ef071c5a8
SHA14ab5d26da1ca069dbe5ab7971a642be75c23114b
SHA256bb1081b350a082c8430db38aaaed76f2fe8d62369d40b111773421d857a16fdd
SHA51274e3d8c22ba549b1bf132d6b118d13b4692af410bedc5484b2d9512210ae647a21830388d5711fa14472dbdc8c3866913cb4ca79d841edae282b34ca1b97eab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e3706bf01c8e6afe47a4a48ba640cb
SHA109047531c3574b69f11e3195519d83248a3919b8
SHA2563f3847766f662ecf650d2f5aabdff94b60581f48b29a30fc7140d58f4ff56bae
SHA51225c3f58940c0cd36e36edc5f4212194b399d5e2a2c1bfecf161e8eab00a69845f70a703b26bbdf220b97459d5fa236a75e90acd4735e5dd6648e327b99c6af74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527465e4c6c57b93758cc7eafda599369
SHA1c946e7c60602993fbdb5e02c42cad6afcbbd9ca0
SHA256092105065517b0c4bcef1d43d870cb00814957da94394e0df38cc32feafe96ca
SHA512ef37a23920fc3736eb0d5839af094208718ab5702a4839a33e098242939eb84454380dfa859d7307116579d71da9b4b4f2ce3956d6981bb0bbad4178bd29e56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675f961cbefb6f7f15cde300ab72e334
SHA1e42d5700aede568fbcbcef83d61690dd3ead8cba
SHA2567da4ac48642769f7312dc7b2789c3088020b0c1734c6e5fee513d5b32f34e445
SHA512f335bf56ac4e0780d54696a0f6407bd03afe8bbe2c05f72070f94e81568ab613af0714edc35b5885b504702ff192320fd49052f91e553611e731cca9a84ff5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6ad180841e04aa52edbc68f68e2946
SHA1c1c0b02ec66e3ccde7bbd3605c6cf1d443d759d9
SHA2562cd21ae2508bda39b4f7bd177082994384928bd4ea02fc3693132bf6dfae9be7
SHA5127806f82179b3a1b66e202a28cf18c52a832f36ffd8c46b08d67ace00748a2d451b85b2c7ddd5e7b05e591cc2c6d3ea378694b1446a88df50499ca02f8025dfb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1be29145c78fbfbc137a51990e18ead
SHA1ad043fd8ce569268b2a243b2f8ea35a52c5fad8a
SHA2569632d89d32b7babfc8fef819ccef6ba90b4b02b143a5edb06c0893ace9b6ce58
SHA512e80acdf0c1cc4f4d3830a7f6d770da051b2f0e744535973f3ca40e6b6a3e5d0c4ba1f98a810fee08fee85dd8fe05f67099dafc5be181598d5e2f3609c2b36bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b0e990c3f6232e01e1ac5ad3a9beb5
SHA131c4e14f751f6b86e60dada17af163812e76257c
SHA2568df8e53ef2b8f52cde843bf1ee2841905d77fad7f587c7fc1426df2bc308261b
SHA512b0c7efa34e0064063bdaa9a8739662d5a30878b45d7fdeeead5419765d59b0df774fd6def725864724f6188eb04b92c5e3a7e5b56f21bbe6ba7c5f731bf3e8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55390ce5d4eddaf9d8a837870dec09c10
SHA1b66c263bc57d744ee34927d17b3bd0f3e16a84d6
SHA256d9445ba20f690ab90b6285f2857ae3d465f0ec7b2154c912623ad94ec6296561
SHA5123b852b27a9acc05a86057ef41c0baefecf9f69a70346af8eb8dd1a8a6dbbdd0cdbc8dd0c41371492875ddf5b6d306ba0d4b99f99c91abfe4037b46da5ccf7ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e4461b5bbe543b7f964dfb0bb494df
SHA15e7e0bb6abe5a30e0eab80e431ab0deaa7d20403
SHA2567e484cae284a48722b9f5805ffe8f7605b5dd59207acdd55b94908e6d2796944
SHA512d4106552432527fbdad5f856449332c31c01898f1bdc0ea47f27c3945a75067fc837445a29a1868985f9fcf3921b3b58886b2e721d1eff74ec2e95b4c3caef55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506aef05c77a1b9f0f37618ce5ba8303e
SHA1e3c83e4aa07c3b1e162c2595b294255ae3e181bb
SHA2561ee556b41d1d51f5a9c3117aca708544c55316506e2f795466e704b9479f8e9c
SHA512374880f8de1c4bf75d72de2878b9f9e993fa983c1518ac7a4abbfd20b57065b0ddb3871c5012a2dfe639e00f82df37f2e03164dff8c314537296d8698d6a07a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565087396478f054a5cb257cdc229965e
SHA1a8aafa52326f2cbd4a57e6651f886bcb2a61bb48
SHA256ad904ad17c67426759140dad886b9bfcae0b93c03d075019f6f0242c64c5d875
SHA5127825391315ae270aa8e3f15e389c417213be519bee500117eb7b3ac61f6507bd7d4c19c3be961eb822a8f2fafbd8ffec8baf88804526914d25897484b6afaa48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f70a315e76be82090ec4e11c72fd91
SHA1b6b6213c969358dfdc593acfa8935299dead4278
SHA256a271f13f46b834b837805bc7f8689423d16e18ddba13b78832b3b51c39e77906
SHA512eccac80610465f134ab8633a2c3ac06e1c744f2cccda8ac0d33405384dc0b22a59ebae12170c7a99ee9976c2f78106f159e822f38fa7da5b63a6cd495cc000fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95686bc63b9b378ef0507e46da54da4
SHA129124a7747c41b2f4eb640b292de0ba655938030
SHA25624b8f7297cd56f394136264c4a1f1ff4d8c930d47c99cc7f5867184c2a5b0ac9
SHA5122391a93b2bd9ed84ff97a704da3e83b3935588df956ef0e78317c3dd5955c47c386f93ba8a613fbc7d6840be5b6f8aeb2acd8b6a90a0e5812151092977a0b248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f88cef6df949455f267a91b671a9953
SHA1dba33bad3b6b48708e5a9005ae5235773f847735
SHA25644c92563f7c45b7a3d07132b0e02ed2c511593a8e4cd80b6034ace652e112790
SHA51245f750f76ed34339d9a55285215b447873b988478c226139fe01b6bba06cea343890636d321fe1e1b3c0f598cb2a9085490500aca4177e922618cee7c9a242c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1c50cfb2df5856873c54f9b26be95f
SHA16e24a269a1f776973596f992de1d09d426ef0a89
SHA256ad6cd5ceed2bf5c8d8b0483af8d9a86484de61a71ec4a3f79e2a21b135bea0d4
SHA51245eb95bcb51335856630ac98d5370b5987f3e28ed3b6381b6810be3a96be54f888a569af092fe0fda2b78b21a324c9afa0b343e92f4be761527ccfede0542b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557c79bc1f55516b5ca7e1a7b3ccdea9
SHA1de17581df6f39ab59638d5e2bf0d3c1ff9c55d16
SHA256aab77c3b56915fd4c8afeef438689eb9e660cdca75520748da5512f555174276
SHA51263479207b6ea014b12dc794dcedb80eefd57efe2e0557835b655c91da2d60e3293a5b8845a405bcdcc5559e622a3220aea9eca6f7113b48f98e24622fcb9b5b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57682cceb1a9acb3b31c3803ae928967c
SHA12882040509c3345cb6e2f114854d0c8296eb1e25
SHA256e43b3be30cd117b1b5128039ea758dfa0ce42ca63b01ada9e5c0f31181ee8461
SHA512fa87695024757aa303bba46b3fbd9cc6bb67060276a8693012a9c3657b24af2a8461e15ca8065d12aec9b8d26843f8705b566300b477b42cfa7b5217949c9073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984ae26516650f9fee87a0677cde8708
SHA17080273921bc6f68f7b01ff551302bccd90bfd32
SHA256654c5a4db304f9769991747d857719e7a772f50e21f0de1304fecdf0650e355d
SHA512af018a32946bd016772f620fc02abad3114c1e62a345d044539fad018b19122014348cb14966771c98e5781556cfae333e20cb157b18b8802aa60e1858a376b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a43f88af8880d77234294cfd77c070
SHA1f277ba9cf04e84b1032925bab2fbfc2602b7e398
SHA256e75774b24d8fa286c30c53809939718d7f35a67b5c4eb56e06eca3c9db694c38
SHA512a2611e61f0ead2194754dac30fb80d60da62d394de543c0411c3e50a7d2a22458695b38009c25662269e1e105887eda3bee2e63bd1d744bfeda4d6331b740ef0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b