Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
f05679ccfed4c6d5888d68a48f30f13d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f05679ccfed4c6d5888d68a48f30f13d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f05679ccfed4c6d5888d68a48f30f13d_JaffaCakes118.html
-
Size
4KB
-
MD5
f05679ccfed4c6d5888d68a48f30f13d
-
SHA1
f071e10a4861f9050d3ba759de4d1b8e290ce78f
-
SHA256
bd668a6916a53f2dbbc30c25b9e46a2b54b6e7bb02dcd8d2133464b5378b4a94
-
SHA512
1de2fb148eb8279a7d94f8c59e815ee0046be90ac5395336eb95d35ccd40d694290c1a6ea41a8b05c26315d92396997644f2a264b6ccb259f18e9be4fb61bea0
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8othsacKd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433103149" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1040be684f0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a577fb2aced15b9067f16f5f8ff3f03c08f66da9a1f456b5e606a53bdac71e4f000000000e80000000020000200000003a8de1650de090ed249914e332c67e8c4ffe042747764404ec1bbd2b417e615220000000e7b90c76b09210498a094da74fc9fc4a0d70b6496c56b37d05a0ad668f1fb5fd400000002dd3c4b17132b2b5428cbe4ddd7444edfd10d48337aab65d39ff4541ad19c56b2f2dc974681d404124ca4d2437a1f0f4127fa92ed28fadd530e392a4e1e410c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94483EC1-7842-11EF-A1E2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2860 2644 iexplore.exe 30 PID 2644 wrote to memory of 2860 2644 iexplore.exe 30 PID 2644 wrote to memory of 2860 2644 iexplore.exe 30 PID 2644 wrote to memory of 2860 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f05679ccfed4c6d5888d68a48f30f13d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423abb88812ac77a4c2c5d10c3ba76c1
SHA1423c07fe0788d06c4c648f7d74332994f02d9c34
SHA2566913138dd347a2b3381ef93775d8606a2a7a5ea33e7802ed064cb3a4cf9faa47
SHA512af7063021e8363037af41cfc7a71335f77db8b78359c523a48d18160a7a1870dd4dd338018a048a30bfc67969187111e847d046a674c46637a7b416d77272bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5978e7aa51e304c3e1a38c3538b9af46c
SHA19c2caef854dfe91fd97cb640e5054cc92288c743
SHA256292e120d352d6aa1f9fbd928751a2262bea78ab1d4f07e69ad99d9a2ce046279
SHA5126e234eecbd4ac2569d460f35934c043b35e7bbb5111c752ad6a24c249a835e145a767dab701942b9457b77478e6d4c020a033f0f3e318abaca85d673bf8172eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652faf899ecb503d2de905593a7292d6
SHA177ca700e94712fa474c94b8e84925008c06004bc
SHA25616845b7a3e5778885fd3f87d1d642063c1b4e4ab0bef00f9751838c3fe6407db
SHA5125c781e9d154fd7882976b2c2aad1e9d56598dcbafdcd5bb383c3bd5f60507c77d0b7913f69b441ae8e7f623c300dfa972d3ab03873471e15bfda90dd4e9bc390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1feda06de53d9abc5c306583557b2d1
SHA109e5265cb1a807f9c7da8cf21b9adb22047c487f
SHA256cb6d48ae67b3152f6b1d7e7b320e058c2b34c23d41414d6d1b91a4943736d429
SHA512bc8826be160b5bc473866200d51a5e8fd8ad06108dc0c8219486e30a9898456719e307febb849167a658ea86777620efa83032c28228769222cb72604da43e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d647c3de1bc3f3d6b588db2d4c2055a
SHA1908c6f1669a263d652f826171ec57071cc4ae621
SHA2563c785634dc42eb0ad3b873442381337212f259d8cb48868631fda861d67eca4b
SHA512355ac00e70af74ef9982f0e155c90de2c5645ca2b3af05cd664637852319ae6bcbc2367501c29b24e64e5aab12a3d2bb0a15e65f64cf6ecc9e3741c385c3dfb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509630f29b9b20c7e2253265d5308a701
SHA19f219043107e45963d8f6d1bcb5c98957d08fcdb
SHA25619d379312dc86720cd657e1e1ca053d0ab98700ce584ca5a5d14f9ed5ad05b39
SHA5124aa453e2bed5ba09e4d7d858575066fe58857c582360bcabe55344fbf547a1aa9d6caf32b14cff59fa1256087802d5eeb678da1f7ce52a8ec75fe3b66f05caf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568c38229f4e1a822be62ca8d68f266f
SHA1a9e5f4444e1caf41a3984958117d439a7baf45e7
SHA256c58a1cdb33afd542db076cfc73c7e698560728b25ed0cb79822b80b593d12ebf
SHA512925cd70e9fff07caf1fd9c68e04e132a15d6d938c3cddf10758d0423606a01de3bb1e3b6d5f9354df3d38939797b3ed87541ddc1004396c62a819a7abf77bf5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2925305983ee7fed0b8c63cde1e119f
SHA1ccdc975e65e713764e7b7d24500f1f035f8a16ed
SHA2561eebfe68b07d0e7917789d76bd7d3c3173ba5d6bee724919bdc49c723268d116
SHA5123d596d009a1d68a0f8f83d3bb484797304a09d561fb6a842c679e9bbb2fc591e00d93a328ef75712b001f0314dcb422a3d2af3971312f9f78d1f33474370ba37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae11e42a24692f7749666c8bb893dfa6
SHA1787622bfa80f6213e121338f9243fcdcd0af8a96
SHA2562fda81b07e51722f4936f5570b301ca6d70673bc47508328b3de4b1b4426ab9a
SHA512a7461175ed59d19b6c23db234d7a85d3a81346e29daa3f138d52940dadaac7caad239fd54c95b961c388e8e56c3b8d076868f008b2d49d3958b056ae87da5d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560eff072bb6f91b910172207c06358f1
SHA1f96b8d7d1da9637a9265cb6926babcde6c138c89
SHA2568b366626bf4499d4d19b124e5763730e50d1939e3a661cc48a39d4d77c9ea9cb
SHA51236e08f7696313051f3e77313e36ba3854ee11e5e4c1ef1df040cf9c39d8ede3e90b55af08cd4e426e90354dd04bfba4cca0a6eda4b96eb59be300b1d1ba1e1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d89eb5510b68c26a560a1e4b614b2f3
SHA1cc0f71974c66271a31b202b96ed5983a51665d70
SHA256bb72b8e14f4b9cbb1d7fafb1005869c4e4e80ff84ee78d306f8507cfd911a8f6
SHA5127d0d3035edd472b8a7bd3a2efa14c757eedfc160b8686937b048e4c72a3c652700cd9a5e44b3eea70885fd8cc10c9b4d1149b97da89cb65ea9d4ebcbc77e7122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5246308a3841e83f10d4c0db548c01913
SHA13a394d8da0f5b7977863d44dd7612db334b06001
SHA25655de01c940c6a1d717bbc828325a00279172d592780dc58920f424bae5567158
SHA512677865a6421df808606447ed617fe26b699e40afac1265a92e7d25811010c7b9b23e0d46a47a63ddb7b800e5f1e40697337a1a05e47de1441675a1d8c1afa3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05061eb6a649de475e0bd2590ffc6b1
SHA1ed8221fc8102fc4a9c5272b6ced64f72db8a8c40
SHA2564110046f11d2228a019d7f790ab38c89602329f5a95c979e350b450c3514e865
SHA51276bf8c0ddd9390523b53be03fd7402713e731d21c4d4a42e68e50e599790480cdb852493135c13c0511adb57e0766028b6403a103aa19513a1223858b2281804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5600d6445f4bd6d4f01a04313f4ed9098
SHA121f736f3aacf2b7abab5789801c5e4059323ac39
SHA256418de589f6f406f41ab2fea28a33331ee12098b3c910ab085100626128652bb3
SHA512011dd36d8133049492c930707fb2a5c97131e78cb4d418e18559c91e6b037c8645e5534e09382baf9e18d36adc628980693cf48f59ab2a3e815f7c820b036219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a2d3033303a518f5d353d5e7c85a6e2
SHA1e509f1fecf9a8f613aa0839f54ac91755a9b054d
SHA25615ff69064b51025c116db796c3ed53aac0c91f3e80cda98ecdd0411d85ec2a23
SHA512bb32cb7d6b62395abce1a3ae9e016b5396b2e247e0f93f76adaffb4e965340febe33e70ddba12e7dceb8e57954e0da307e11592c58db6b412fe1b1db784e6d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc02ab22c9c33f65f8a01a88746172a7
SHA125052796a070d63b1b9e475e82e9c3495d2bd3f5
SHA25604a8a85bb18062fb50246e103b5283d944efc27917323cbca1689f561b6f911f
SHA512c7f9311a2eee9b76bc8d593b3b5ef4c6fff15ad8e066432574a66b5d365b64cbf5a2186fadbc10a47c81419e1084c543804018705ce3bba305ec552bd5f4fc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd32643904f68182830d3a0adf463417
SHA15d4e7e8717f47a84d80ce164c6b5a223d2d9c96c
SHA256fd75c63fe443f8c5244e5786ee7d2ec09067cc3db90ef018cd015c5368ca6bdd
SHA5122ab305a80f8e4ee5abfbc37999b19e1c4e7bffe9067dd6a2cea69eb580c9df9027ae8b2acb79580bfc92c5b499fbb9beb6b28fe23880d44f4b2830b9fd6bc903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f027f79d7284f6fb7355ba89f58b2a
SHA1dbb6305f18a5a86975307eb2906060c09f033d84
SHA256498978995eccdaffc9759f66c1e880fdc85dc7e085f00a5dea3ad2815e3909d8
SHA512d9b6dac4de4c4c9593e7f2fc20fa5083af549a3b993dcfa4189e4af2eb64f564808fed144d2aa8c56e30790775d297b78d389a2fec3f961080910cc33bb54f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9d09b0eb30846f073b04d2fcfd03b4
SHA11f4bde2c8cbc68ef26361d9148c82f853f2631ab
SHA2567b6413c93d9fe2ba95a031a0f331bff156bb3532cad3832f7ff446e96e9ac9f3
SHA512bc6bdc680c1736adc25c66147d966930f7911243b92b05117facf125688e3508175a1369dd24cd0e3cceffb8b5e2e7eb86a402c78634c30d92dd348412210b43
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b