Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
f0c02b4500096950ffba6501e204955c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0c02b4500096950ffba6501e204955c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0c02b4500096950ffba6501e204955c_JaffaCakes118.html
-
Size
21KB
-
MD5
f0c02b4500096950ffba6501e204955c
-
SHA1
2e45a22d482a46513113c103a83c54b51df93cde
-
SHA256
60422c627866640380497cb77724b027bccc06ab26bf2c345536b79137c3bed3
-
SHA512
8f4f2f48eba982a65c1926bd03a8c5010f9d52a85b25884b89a05da166378a7f9a444a9991b005a47f915219dd312a131b83a7e78eb14ef41f0d1e82fea925bd
-
SSDEEP
384:zigKcRAa5r9DIiXbWVBD8c03RThF0+1+z4+YcmEfP4ycbp5C+KzVcrfDJZTO4uL:ziva5r9DFygc03xJcmGP4yXqJZTO4o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433120142" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300d6bfc760cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{245AC651-786A-11EF-94A4-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000002c55a5edc118b515ae244fda0eb753407e354543c443137457b84dcb98d3ae24000000000e8000000002000020000000cc471bce71bf47436dd3b1c346fb07781a8d1615d384264349005b4ed401f0112000000031950d259a451afd9d269e8fdcbacca4adf8f9cc1b1b3ab9462f9eec5ee41bb840000000e9275b6175680afc811cce02dfecc31ef7cba9fcdb4467241443a8e2ee0a44a2ffca6a032e512a5b23a1fc6a92d8b3a7b4fa1c6fd2e7e6917129981f6d133a7c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1808 1724 iexplore.exe 30 PID 1724 wrote to memory of 1808 1724 iexplore.exe 30 PID 1724 wrote to memory of 1808 1724 iexplore.exe 30 PID 1724 wrote to memory of 1808 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0c02b4500096950ffba6501e204955c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52658494d1bce4a66a089bde5114d50e4
SHA1b2c69280d41c0f23f6b0cc0d51a6441522621a44
SHA25643b21f52079eb8e765f154491bead25370fc35453d3d2c4d971cacf79f60e7a7
SHA512e3ce81342d558e01f5da1cc16f50cb8df67afd0dddafe4e4a339bd0ed560ca659debd873cd18aad348bbe7bce3a8a96177c251ec9cd016b49eae0c2eaec756a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e4cf07577c31386f50011cd12cf6655
SHA1a4fa5e25bcabd8d7adcc1246d3f79a36d943da6a
SHA2568467357ecd53dc1640d7e3a0601c352058369f7ff1f85fa87a7cad048502f97b
SHA512098a22ef639cdfa35b8f4ed8820cdbe6be9e7566d31c371f865f9a6e424f2fab173ef6cd8045045006187872a48e391520282800478f3ada54eb4936b1ef4e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1716f5036453d45a2037d5d9fe804af
SHA18d02ebc4ea38f1fe4433c43e617b479c0928adf9
SHA2567cb1b20f77960565219d0a53fd7755dd271df8b60080b68db0d17162190391d1
SHA512ec1923239d6c9ce32e7b588cea93a0bcd1dbbfc2abbc1b914687b1a6288f6ceeb90db363c04c0623aaedbc2191975818d9e46d1ebe7b034231f4fe7cc765a2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a46c0bbfa6efc98529ebb5b0aeeb055
SHA14b3800fb213fce9eea8a6793162287ede698f5b5
SHA25691e0da27a508f0f52f6bffcd6a1196759065f8ba7a1270ab81e599978487c757
SHA512270f0ee183ff4eb587bd449aad0b96d49daa12334503670c909d7fadc855e7cf2f756a9ffd99e932a255a422a00cc956e4a58ae2620356ca0a4bcba7b01f1437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f47cfec0007217da728e0f30d511ad85
SHA1735a230476aa271ab05d741f81937a31f2fda820
SHA256ab00c1a1b86890089ce39d439bef6e532593bfd4a28c883a34a3472c9c87f47b
SHA512cbabda6e36dfa399276daf6b33d945d5301b5a9390521b68b37d098716c897523e1034a034bdd0938e4c97385c93ea4d821e031d6acc9d461fe0a61f36002fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591345105eb2f1794d8e6ebda83ab8a82
SHA1059679d87ef2679d63626453bc8ac6ee17b4d179
SHA25610b33db2c072dfd016f7aed394e0a92bd9d14f490ca9c3c891ba66ad4b555c26
SHA51284cf6450e61bb09082230c7474a57af3956d7b3113fd3993aee88a15eee436c0ad15d430dd942dbea64080466724e4e6e44cb53551075a583a1d3ce4aee0d8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514dd5acde4e7e6c14bc8bf687a892abb
SHA162ec91519a6c8be3912a9974fcabc197835cc0a5
SHA25677a8df8728f813d2d94325912573dea08ccc4c002fe3e421d5056f9f9edc52cb
SHA512218952a01f62da7c29b9e4f089a4d06a87f9f52e92f7758ed9bf0a16ae37cb1b922fcb83622b3cbea822ab28158bddc884980f3a47c3949cf8d0f0a87da6ecde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542da9fea263999d8f3456da39e32a733
SHA163e71706368a913c421e5e22ef8462221a6faec0
SHA25602a8c8384fb3aee566f25484c5eaf147ab3b503a3b96cd67202ba33a36d2178a
SHA5120a967c7004a291353a2bbbc8e21c578d25b84ff19f00cb5dd5ec05644559eaa310d0e8909933f2cc2c7d57f90683d8b37b4ac92c0d6b798dead7aeda1d10c407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723ddaa255a7b24c2de1ad340f820ab1
SHA15cd70b70ef777d88354be5da952c7ac57835ad4c
SHA2564d8178bb338435f901c9e9933440328e20e1c310df40b522f3e7d2ec8867d932
SHA512b173ed7416702bb49db1c8b1056f0c383bd256aae453dad79b732c8a07ad7d69c6c613e74c7fcfae6cc49947ee98208598ff7674ad38eadd873f8df644d310a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56922fcc29847e82c1d1499871ce41f8a
SHA10bcb7ad99f949ff386fe35c2962cb931cd1d58e2
SHA25625960d7310517c2662de4de43739e12aad9948ff50e317724852e2934e860f44
SHA5123fa2cffdf48ca3bb0887301d6e9bc3b4e88346a54049101363b809f0015c52b0f52e5df00b3d0a3dcaf7487d07db1e89dd7c5cc053e4ca3c3ae50d0220e4d3e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1559c2b2a41226868a4435ebef3d588
SHA16b05ba7c84adbe6d5fadde8afb62d568302c0720
SHA256a622c9f63392c699e2b074c179918566cda5e88081d1badf7aefc8be1a62368f
SHA512be5b6bf9725fb866ace36a44c25285b142a93589bf4cef5430e93f71ec5eb35bc3fa6cc3ee6fdc2b83ac7661fa29ec91ae56622e5d62070cb57457105db4474f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5074c3983cda10e4197629d84c9d0ab62
SHA1eceab8826c12fe04e7f54a97c1af337ebcf15233
SHA2560fa55735a10aa3a63086bf6b47ecfd9d577a32938bff141e8cadec65eca4bb18
SHA5127beba257e56ca01438dbf478ef1aa3e27dd0cac2e1704dfaa1683ad57a4830df1a183dde0607b3ba2d5c4d19402cc64a0978496f6f10b24452e273e4fac000f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c5c8672c690db8a82b564020eb01e2
SHA1dde1d6c299b13234bae6cec786edfc86e647762d
SHA25679df98f50703e8f6b6e2f2c3df3e9612b1f7a029b24e18ac7a4cd4b1e2b2e41d
SHA512035ba5a03906134ba0c31f242e5fe4b313f339f2c2f1b1b7a450035011a4c9ed8b5de6f6c59e22b51c1eba7e72d94287e3c3e7173158dc8fb278bcd46beb5aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5781314a40c62dae3074d78c6a5ab2480
SHA17f169a088291b78bda6cf15e4dab4f0fa036076b
SHA2560302ba3f231a3e85a305db5b8a6d8aee50fd1d3feda2ab89748b76e99a119597
SHA51291d4a7fde682a49d4d8ba9f2391b09bafc1f75f4e384612caaad8fcc507f92b63fa48e88f188c818eeac6c40b11c0dc40ebcda638cbd1ef0e3e4d7cbda17ab85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e90bcdc3db6d0035eca60b3f21882e
SHA1112274c8f8d4dfd979e471bb6be5ef9109e811bc
SHA256731c7239eba87f074d4e248b7158b44635eba51839b904641e202f7a183dcefb
SHA512c3c9a30ad66c56aed3a7eb30c69bd4427aaf3c0852af3c2eb1937400bfa8a24624f055234bf2da58e272b8afa56f8dc6b5479b3ea7d5c0aa84abd267cc3c0aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f1f81ee3f106d4603927d725b8943c
SHA1efe067e4d15458a3490c4fee957af26fe3dc0f13
SHA25680091e59079225f770ad62ca08a72e4666775307df4f21fbe1e202976fc3fa45
SHA512768da2d34482de8d2406dbc8644b61d8d85243bb356bca0f55e559a9c9335fb1331f354b0e3fc4909274b2e3756ad7dd8d4a15d903895db1e5712e3011f719dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d9af7c4143e980c402681eea27bc55f
SHA16573a5c64a03393af09745ea6a6d6ad1f847031e
SHA2564ee6540c914a17851242a1ec62abf820684b111bd7fee36870ac7646f458eb64
SHA512a9a365f9454eb18e6446640afdbdf02f0af2599eed59b589117ff0b7e098480ab79514d38f30aed722129eda246b2600e44241b5848c8e9910ab9a3bafdd920f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b44d1db2b0e4a8ae24f5c3ecf423f31
SHA1c150196eb1ab9bd1a01794e8ea7945b2643ceeae
SHA25676c1f2328e9de813cd8fed6442b472fc101e35ea8dbb47a87b89cd5a718aad87
SHA512b1176c6aebe7ff6c3df20d561be53eaaf285a189864b7bc5604c446427ed5a335db497195cfa4d58deebc839a1a801ef6bac27630b96d7524c7b8ccbdc56a7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5815aefac6e36bbf4d28655df775cb736
SHA11409d2808c2210387de339282862c77753541955
SHA2560c3b4f2bfa71933aac5a11cedddbf57fa221345ada544bb1ed3492721c76e27d
SHA512675a1b33f1cabc9ef92bb9f0d64850be03ad203df9cb56825587ffb0b8ed298b1221b4c69b733310ae8d6698aef70921764aefd7f9961257eeb824a57247d930
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b