Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
f0c39628cd6ed7ede5d6ce9009a5952d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0c39628cd6ed7ede5d6ce9009a5952d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0c39628cd6ed7ede5d6ce9009a5952d_JaffaCakes118.html
-
Size
2KB
-
MD5
f0c39628cd6ed7ede5d6ce9009a5952d
-
SHA1
ed801c960fbf3f39447d3240422a1a1b793051ae
-
SHA256
ac9d3b1c044d2226b4ab0d9241680b9db1a230c355c1c6b44a6fa83364137f79
-
SHA512
4a5bd0ced31246e2ab0b9d629e92c37a187a0afa4cac38d2e907a11ee0c4f5e8289f26e19818fa4dcd6e0cde7b67d77829054b4debce87262676bb0f7184a861
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003754425141e638b9c084af23dc89a45b905653d39a40b597c7c6deab8a3d35fa000000000e8000000002000020000000cfb4f514a11767dc3f11114e3f197d29f9d37d71116293c6709da9b7063bfe7720000000f493d75c5d91a92013408cafd1ad2b0f930d14d0a50c63af903696b623dcbbcc4000000005deda34a18823b1426c51d27a6f64f475056580af4f79a7cfe7759d06c2dd4568f57c6f4ee27585173db44f312872dfdda220e2065fb3ae90e8d16a7eb106f5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d9b23a780cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{662613E1-786B-11EF-A817-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433120681" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2340 2972 iexplore.exe 29 PID 2972 wrote to memory of 2340 2972 iexplore.exe 29 PID 2972 wrote to memory of 2340 2972 iexplore.exe 29 PID 2972 wrote to memory of 2340 2972 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0c39628cd6ed7ede5d6ce9009a5952d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658bf16f79929da91e6e9cbb89e16da8
SHA161357b918ae1ea962fcea0e2a970c8ed38484dbd
SHA2569dba757833791f8a07416e5a94721ef472aeaee769592a665e3bc140481dbfdf
SHA512a9a9975ea8902e51c2cad93f00a976ae32043955605160b7307f0ec6868f31084e4418ffe6432026b150a579ce8824ac8013beb16807d1399e6006021e35ac83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65139b9a5c3ab39c6511c865c6fe99d
SHA126d57474c288fa965cd54eabc09fe9ff04a8a7be
SHA2563a6905b726634772b441f58bd502e26e9ff0a10f20611e0812525ce24f4dd6b8
SHA5121b717388846fee273845ac2059d0f3c7f5586069b24d07cfe650067bacff70591bb84d086671a98bac748c870437a51447d4b9c5df92a26bde6b85389ccd5cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb28331caf18bbff12cbe0e17f86f9a1
SHA1d1939bc0ddf5cb5afbd8b8c2fe9e8982a3372d63
SHA2563e5f92f2dbb37801e7f3fb9ee22c3da92049ae06d307842be334dc97a62191ce
SHA51255eb678dba29587b4ac8292181be681fd1a476042fd5bff8a33667dab576c483d007f22b003980985c84d3e1b7dae15e770b48e7b4410eda4d9ef04c5e5cec62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70e80c6c54b780a1e71a8bbed2399db
SHA17893ff0bf45cd48e639fc272415740e628c51069
SHA256fd13b11f1a33a70c8d0f9ed3faec54cbad8fa3bb8a74261cbebf25103fc04331
SHA51247efc8fc32214b5eaed02aa1aad143e1175c575d7d390de129d2482bb475e9dcdedfc688d5524f6446b1e20193860eebc125e2912f7e0d87fc2890fa14bd3bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a3c7bfb7482ece28ed72e374160354f
SHA124039bd95d65581850365308bbdd8f9ca88f14b5
SHA2568269b671b84706995bdf760b3773184effa82250d62321030e315373278014c6
SHA512793fbd025ec210b752986bff1b8339fb6f74f5b280e5847509353658e1f2e830d1ff48cf7e71c338317827a875d9120077a03bd4b36ca6b0dc613e5d68d2ab7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a1d76484dc0db21a952b09afce93ae
SHA1569de8efcf652a971abbb99cf74ef3061bb68096
SHA256aa548514ac2c7278a27df636c4fd03b13aa0dd2e08032c096257823c0bd7167a
SHA512244effd411e20347700aef0681bd982624d19e6746ce10ad996f3c1e41accb8e8f3948b6bb766805cb50a21fdfd071c62deae7231526c59f42c6050fb4c44f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30c4bb82e6b21ff9e87713654d4748e
SHA1b048e1d0ea45beb1ff24a1152c33c4b600e4f260
SHA256bbd6fe2b94be65313e4741a8c00b65d15f802665bf7951ca69f11c9290962d11
SHA512202b79a00e57cc040bd01839b1c4e1f02985272b25e2b813ae714d4b04ad80d87d26114552c2c9a993c70f6fd9ee37bf219e4e1bf93f21804d97fae412157293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507318754ac9c3a08fb49de14b62a3763
SHA15999ebad7af34b4267792996236e3acd57eff853
SHA256a0a0daa30ab76aa03ab873200f13ea5bcfc9e96adf768dab28735989dd39b85f
SHA512a2a29f95d30d166d9626a819c1795250d64ecea3b5c6f0feb18320dc216400849752165f062262cd102dc79eb14968e23072f1172a6dba45b7bdd030c0c6b384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed3063d0487bb80f19feb3405817fcb
SHA1d65ce212096b062419e2060fe970f04d958815c6
SHA25614a61a940569ae82c33c950bf9aab97f42d2cfb46dd5957b97f7c31ca015e23e
SHA512f0393ce2738fe90c258aa39427e1a4f3a6bd42f964bfb2e181064366b5bbe081d9e596097f0b87e4fd7f06f69a583c0ea53a2122e94aba90d25a2eb46de5f295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587434775dfba6dad7ffa7bd2ba0d48ca
SHA18bc1f24bc948e2c7166b5b71c228e123ee63e97a
SHA2565d0bc67e12352e839efe02164d0eebdb093f283b6d8a3911591344319723932a
SHA51253e00793c4d834c343636c15970a4678293b1d264a53704c090cbac56ab0cba80fd390b80cbc5eac70fbd880da6bdf25764e7867b6da84d58cc4c1404fb0a654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834f476ed33c6b2c3d14c1fed8452bba
SHA19d2b5f74d3f8da493c1f75f23215b97628eef89a
SHA25639c55f044133d4fd2bde195ab6b8615fb9ea35b9e9dfdced5b10e45af5e9c330
SHA512a6af1e7e6192466f6a50aff516b59afa919bc905b50192acac4b74cc2137e059be7a6480c47c08fc298c5a57afbfc40ec12fb0176700c76699b5b809f10187fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569367938da988018f91938bd6518f62c
SHA176f2134df53c25ba0fb363f79ad9fb1fe5d930a3
SHA25693198742ae6fb7a6a6e86c8f3f36df31c4a6b53b362d3ad8c2d400ad8537bf06
SHA512b03b06b8df97253f374e271c2bc03b1a253934da90f6d596676d0fded489bd632f80e619cd670c16dd68272170fb8b6023c1f7a0f94037506c4aab76724ee785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514be513b4c32c3f14a536c1b2445d834
SHA1a97ef842638737a04772bcc70afebb000a054c6a
SHA25624ac05dafc46fa25efb3d99509d5589c3818709f1d6dfa6e972f1a1bf1d65806
SHA512d836b96bbd3138c87d8d7d66c58385fd606745f7406478ef5557058e672befb5664ee5694fec574a0bbf3f60e597f2cf8d8ae623ed059b1ab39e0a291e96ba27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c092f6909f981a297f87bb671022afe
SHA1d2e21aef051fc58a9c2c064cac5e2de8b0f2aa09
SHA256f8bb8dd460a2689b7d8b021767fbaad9683b7bda5ba6bdb2178472033a1d5835
SHA512c9a2f279ee67e3e5a7f63ef530c1023cb6bd758b626aa2cbbf3cdeb1529fc68b10dd1f67c53812b9b3ab7cc123fd524be5703b5676e729ba5c528e866f598b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523025445b40d67eee695c250a2e5e074
SHA1db9f55b413056a6605821573c180a392ebe1defb
SHA256a272e65537f75bdb4fe38b7c4be034cea349c0e581e941eb73004f118852f2b3
SHA512f13b8d07612d3290472484758a8b5e9716b0179378fc7ab06398ebaf8ab8748ae3e5a67c214f7028d38cfb47dc221fb50e9d395507d9523c2d39b5fc01d8dbaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b89d75d0c0399d684463dce9d7e8cd4
SHA19191452301c115ca0d470fe21438c4d75b146176
SHA256024b729ab5bd17d77ccb1ba45df0b878382ebe39859ab58faa51f3aceee9a859
SHA512c04a7bc5751ab2366696fc2666163d82766aa8352d16e38a8add0295d8742883525917eb089f9744893ba2480fa5c13a3585c65e2a02667c834feffc26062fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b563e4f416966177a09becded423f40
SHA160ae688c2c941996202ca212d54a77e121091e75
SHA256551e793503e982ba873a58c74b7a73e36e29094521b22bea20bb392c689c9e5e
SHA512ef6a75741637763966baf887c8252e100e84ddd68c3ccd5e7dfcb534aa6f8ced37438a6c3a8ec3add160a0e8ae773d8a781a1670453f3ddc3576bed8419aba04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d64bdf066958cd3d414fdd5bf9e218e
SHA1bfe9d8586335f7fc79fc3e2e88b961f4bf288a56
SHA2566cb2110cd256ce4fb9e4803d647c95a19e1daa4dc7c0ad1c03c50160887c17e5
SHA5126009fd1968f180479e163c907a19496d29dc31f4c2da91977330a75dedbc58d421bf417e19f4285a83fcb730c940ef0930c13f4f28cffca586dac2a6ceb31452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3697775601217382639b153dbe810e
SHA16a5141dc8de1c882bd24b63e200104c16a339935
SHA25646a34645f5755c2e39de825c45604dd3ad74b8b22ac2197dcf47fbf6d70bb0df
SHA5125fb9c71ac38ef0c4ef1949d2d609dd374ac7f8cb6c6170651e19e1f01cec23dfe9931ea9dfb0828b397b64b018ef3331d42e4a8c305adbaf1e225c7ef3643d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf78f8a9922a2605323aa66a6d1a08b
SHA16dbc740b431d61182b1cdf5f6f2248a76bd4c754
SHA256b7162dbdabb965185d89ee241b3e0606ce35d9e1d125e3769ac2003c724b54f6
SHA51280d0cd10c3b13d579e04ac1094e669b50f6d9257e6057bc109fd8d30c5836c46553cb02a83ab24ffb67b899b63ebf9a29fd692224162a97edb7c00a49748cbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f607e3ed410ab934a280298aaa62a620
SHA159f2cb91033c4ed82ff8443b372ec2399f3e62fb
SHA256eb5e5a5402596641720ca3709a3131920a1e8ff8da39b26a1277e8ec3af003bf
SHA51268c50b65fe6d87c4e0aa0851766fbd3a61b4fefb3f00a5101a8c2725f2e7bad30aacfa29fc2298bedbfab67fd9a4f5acdfb396ad908a20c1cc5e51e90a4d3cd3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b