Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 17:34
Static task
static1
Behavioral task
behavioral1
Sample
f04e4241a2cec6c2a739dee69c4ae671_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f04e4241a2cec6c2a739dee69c4ae671_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f04e4241a2cec6c2a739dee69c4ae671_JaffaCakes118.html
-
Size
461KB
-
MD5
f04e4241a2cec6c2a739dee69c4ae671
-
SHA1
e1fbbb91aaba5f17d22db619ea37a88b530017bd
-
SHA256
5d3556c89f6938ac9c7ec9e4a8cc6d8c8645ed2fdf9ad07505ceb8bcba89c6cc
-
SHA512
9752b3a1062c3e4184b6256963b9314546c5f6f6634ddbb168393e23ec89d3636cb36ba5ddc91ae028d8e3794f3647243263cf88fcd6fdb2e594680205d991ca
-
SSDEEP
6144:SosMYod+X3oI+YQsMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X305d+X3+5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAD91D91-783F-11EF-BF61-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06e1fa54c0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433101953" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000048e281e70823fd593575b8fbaa711a0481b00f61c5d23dfa72193426d0079142000000000e80000000020000200000002f47211ceeb3840e21c7aa468a45d694dd6d0a5fbb598b25ee7321a789e3c5ea20000000414ac2f79a3cab87f62a21800a9f80363a83b484fb084416d4810163308e8ab840000000ff0b54f53b7dcb4d19476a165a98d883c8cb94bdb061a82d19fb92af560b7d969bfccbef5d4568f761b29cd5d612e0a231d3dddb8eab687b225d084b1c8de4d7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 596 iexplore.exe 596 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 596 wrote to memory of 2912 596 iexplore.exe 31 PID 596 wrote to memory of 2912 596 iexplore.exe 31 PID 596 wrote to memory of 2912 596 iexplore.exe 31 PID 596 wrote to memory of 2912 596 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f04e4241a2cec6c2a739dee69c4ae671_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:596 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c45adfb82aae81ec0a97f3ca038b1ade
SHA15bfd5cc1be14ec149da9ae7473ec1e57f3b9fa37
SHA256aab1ac09be8e5b374ed261bf5c0b6b6f85669566dcd132dfd30b0e11962389e4
SHA5121d6d679e903d1a94ce201742203ccc079896326536622d8338355f2ed5bf1f4bd0b6d5eca92242094bb616f74a37d01bed3b1fb8af80fddf50affea1a3345747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915ee2af4de80d7348f100ae785ad5a7
SHA11700c54ca48913d11bd03afdfb34c903368b09c8
SHA25675c3edf64503a5dbc6c5dc8fbe5cf9ac6118216592cd14ddaac04c57dc224118
SHA5122d39df7f47495ee2e46ddcfef4a71743b672c8f07b0c01a3dcbaa1ea76f2a36026872e435cb11fe04288a1e158a05e23d6768af356a7a98183dd30f8d319aac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8ab884d8a2283d3f9cd396eea2f002
SHA1a9aa01417e1a7b98ff1f98f0896f68fef5e4e750
SHA256ddd4cf587fc65bff6cf3b1502082c5c99823d702df65c0d14eb826de2c4a77f9
SHA512369b8930ff02ea1279536b9aa6dcc74f752ef54929f3de071b2a661ebf4ad8bcdb6ca360e7a4df398574c83b462189099e96b930816251096fdb62a07553a4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5c75bcc2733a74395fc8f5decf7075
SHA13dc2251975596a7a604c7fc005b42fdfe7dc24b5
SHA256fcb66c86fe989210c5285fc52d81d61d99a3675b47a3db3be3bd14bdbfd306dc
SHA5121326a41fd1e20033b9f0acf24027cf52be02bd4cdde5e98ecec083cc7fd5ebe47b45dbd5d0a62bb5aef682b29413d074247a27363ee2463843396cb1b41f2f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061a9f64aaaace4ba5b6336fdc6da000
SHA1d84bdd494fd489f63539692e797cd0a2f76e08a2
SHA2568a55d639cc478d8a35cc25202bc060e8b55eb98392f56684abf6be2f2327f82b
SHA51262ba530b231e7d5fac6d9718e4a5f5d28f2799b55ed2ccc169a6b6d0655e4a7e0ae027e4b0f0f209b7caf1195cb47caf607886511217f176599ef8fcda84073e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e80b08b9679e80e51dd90a7400c5ce4
SHA1eb7106d9926f613e9c5695721fc86d40cb2b9433
SHA256df0e5f8feb52ca6317bacfa7b7c9bf10319f45239ec3b16a5ef66173a1bf6c13
SHA512f0753ff240d5bcf86e45d9cf962d1c7e15326d027456c9f2b1dbd1f24a4d8c8b2358e107bfe525a16a9cf2d27c2bbd0fc7ca35455bbbc9c06f597f8d706bdaf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d2b96921d082754984870d1a6f4e39
SHA153fcf96d50404a3a09266aae1de9853f0c4c5a6e
SHA256e55d46d80cc705ca5a77426a4ba4450d1403af74f89725881f6296d9c1c6ec10
SHA512485090f84eb25ccfc20415d3fd03fb6688037ade00edb6ecd63550be255a8032c113770dd4f5eb7c603a04b75f738cddaeed3f6bb6b2e83b1ec562f4031fe5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c887a784b5f106e6a077c0489b5375
SHA1a89ffd1f6f9432be7d26f04766d72572fc2007be
SHA256ab23190a088521a92067442408b697cb81a8d85ddcbe0d30177a33928b1651fc
SHA512ad6deeeec98c21557f628e567dfcb3e40381e946fe33c708663003b84f30a55e843d49aae47abfacc42d26e45d2d52f5306a3eb0596fe1ae194e1627577024a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a373f8898499d96a1f1d32268d1ff670
SHA1688020046c7eff217686e962cb809fdb94da13d8
SHA256c7f6f21f90c672aae4f5527edbb1c1a48c3c181e60d4105f80f4a946ba979e44
SHA5121aa3f380d812c915ee0810d2dbc58309773e3c19989c6c91ceaa284cf1a84d8b26387f476095cc59a5f5e7363e42c0dbaa2486ea98208de6795013afe44b8c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ec9e8ddf077591ae1ad2393176c134
SHA1f46da899a5164cd5374f9229a833b69045fdff5a
SHA25626646db2f409b0b9f694dff023548d0f334469f3f418a2485811c3d1ca59b965
SHA512038b508361430bdd351b7386470a130812060cc668998555853ae93fd870058100782e76b0ab85d3ef64f64751a731a0b5ac9a0efd24d5432830facb0b31eec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57985a97d31d24748c849be66c9423cbb
SHA1397e12507988d5249d2230871c2aa37501bc88d0
SHA256e6c10a43213f93e5b45b501c1ef7347c8fdab6a92ed0d21809ebb74fc83529b8
SHA512e695c818c8ce6ce18aca7e8672c95b1d0762239d6bd085d63d6280dbfdb8988f30aaf305fa93a3970a4732833ed35e0cd27788e93ce6bb0d2d180cc2884be080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a186685a676cef9cc84f2ee585e636f
SHA106289c34c44ccf661ad7945716c47d21454d9c67
SHA256c28d42bf5552c09e1f1f82d979b066d51d893b6411b11c182258ec530a77318d
SHA512b05fc0e13970ea68b904b3cd196d3f3fd3a6d0db1af7277ecde12bd9d9a3aca342d53b8d269488c8bd5a65b4bd47d0c0dd61fa9d5a7e917c32a061cb8066fff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101443562f708c303a90c175e4050e5e
SHA1f627bed51cf23529c246dd2bfbeb2e192fc4786d
SHA2561335347a4482b6d56feaea9f63254b9cbb31c1644d005c3966b149710e257392
SHA5124e33786341cf09fe3f716a8d08722796c09dcd36e605508cae4afbc55d0f71c9d84bde79b754b61e806865aa1fc8a0e0e2ed4b7149a3376aabedd6798e1548e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee233a9605e244e0683bf30a24a1b83
SHA1724621d52f9994649fb48b211ac273e66d74a2ab
SHA2564bc314f98c7c01d5c29d9bdfc6c1b9264703cbe9657a50e7cc7eafb6b640fa1b
SHA51269df2c41a671b4505bf3af7c18875dfaa74a57b56eeb854aaa2635cbcef7ef5c559a66089d57ef5c5077393be603cbc6a2c3e6aa71568f7dc40350b298acd79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e999fe851bc09acc75bbc755c0c249
SHA16164bf8559eb12f03ef022dd00f51f16ad00239a
SHA256030565e43c2f9c7fdd8dec2c84a241bc4ca442e54295e6c06cd2d7cc76a7c655
SHA512e8070005c04a67771a9b18ecee721905ceb8c0bd01693a4fc46e8095f33183b6f2210fd980e682a604335c2c5032c9adb7fff98c3b324f9cc1bb8b2721c5e61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568388d7ff9c82da634e8cd81cd9429bf
SHA167a59d2b40bd8f051b6a51062966a0700f3eef0f
SHA256dda223fe3c177b1136714534499d94db917983bff75647d197aa7394a21e1d8f
SHA5129567c18f8824adf42ae5b58f907343d82a7401a6675a84b926e4eae2f99c1d17dedc0be82abf8173b320894c665243ca56089a255342877f3e8a5504e02fc899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0186efd073c8eb6d0e9b12c4d5527b0
SHA1699d510e3bd81ab053dff7eaeb022c516ff6b8fd
SHA2561be1b820baa774779c474e19a158af4163e708bed1587c6e7c5632f5222946c4
SHA512e68e5073404e08ee905d601057a8a51d6121df1a0d721371aacf655e05edfa469e5d7242523053c4b36e9ae43aecd7f16181a07e78a5d5e6b6fe8264f0c17372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00c6ed30b759c195d8abe103b44a05c
SHA1dacf89ca6e5320640fce31451844114e456c155b
SHA25685818048f40cd49c447b45b6544db55b6378bfbca39382d3a927b93705688a03
SHA512121b28832fc8f6fb1196b4d9c58b0abc8c627322797a3578da35e33e1a98159626150d8cb98706c3d17174c9b88eacc3150f649c9bd1b3a54ef0135908550226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58258f49308a7a0333232205601af1976
SHA1c3a1c264295717bf1a8f9fa8e201ed2a45bbfb54
SHA2567cf08331a0a643edd6117402e20d3fbd4e0c8a916d86a449c8ff3e5539df6cf5
SHA512e952a8fbdd9aef47d0436376443dda10b9ca9e0ea997736d76b11cad3ad063747a9c491af68fcaffde13173130c05b563e2e0c6f89085c67fa969b62532e49bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b