Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
f0796f3d4ee649cd0eb3caa343d0932d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0796f3d4ee649cd0eb3caa343d0932d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0796f3d4ee649cd0eb3caa343d0932d_JaffaCakes118.html
-
Size
29KB
-
MD5
f0796f3d4ee649cd0eb3caa343d0932d
-
SHA1
db1aeb0b79c562181772af726e045246b04de4d5
-
SHA256
2da90558f91f48a62718da64da2dc04c7653aff7645412af52f8ad13c7605538
-
SHA512
6bf2d3e36a5fa6a678de2a2b69d7354efaaabe1ed2643aa50bf02a251f17cc26391b7c2b8aa270063f409a34cee3dfde7f75d1351d671e798353fd9c04278415
-
SSDEEP
384:CwtNhvhIxTNz4oq8hjOGOZxONBOAVOPBjGOFO0OWOZhOkx1P:CwtjhIxTNz4oq8hH1P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B56C6271-7851-11EF-8C8A-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000a51157c2ca07312b099b319a04e26260e5257ec0ed52d3402c2eeb9621a05578000000000e8000000002000020000000052b33a73a94196f7bc56bd61efecb5f0351ba3b91e4d7287a94eab74cf8578420000000f990541e4298e3c445f47f137ca24e5c104e0267543a1696e62808ec71b394b140000000ddcbd2d4a42665ceef193df7743cfb3d21ea46aa85c4f1ed88f176f4262df3af2995387342c8497251ea29fc414e09ce04e9fdcb58a2a2b6666bd004e4ececab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433109648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20db698f5e0cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2660 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2660 3064 iexplore.exe 30 PID 3064 wrote to memory of 2660 3064 iexplore.exe 30 PID 3064 wrote to memory of 2660 3064 iexplore.exe 30 PID 3064 wrote to memory of 2660 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0796f3d4ee649cd0eb3caa343d0932d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c59e5e6ca5cb1fe37fb59e5bfbeae0
SHA1525a6478f12fea7765264a88263ad7e03b3cb247
SHA256fad66f4e281b0c2bbacc2d4ba59c29bf02af4ab249ca3d50784e9d61d4678e2e
SHA512cfb1163cc3fd952ff3d1adef47ebde35278cdab164da574c4bee40d341c61a83891bc650d1ced1c8819d6b3919e029b575881ce63555b5175278032a4696c00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52011081a9ec107c43ecfedce5f1532bf
SHA1fc466192969fb629dcc65d023164d2b09a3ac0b6
SHA2569a9d0033eb3491d549e0827d206f448c4f7a68d2ddcb3d53a1a2fc4a82cd17ca
SHA5127541e3dc6f1edecd0d51e15255acc496776bedfc2f52d2c2a3345a22dff7c4ba7c9ced96d6f78d44335dc4f6a6314580398d30b27423ba5178413b19a98b234e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433e2d7c2287b0dd42838a80ec67961b
SHA1bf0babb9c9fbd0c22fda3dab3d90dd60a5c82436
SHA256599869b0fadf4f03d5a2da79ec16937ec455a1fb0642c4b14459512970c203e2
SHA51289122e9ae1301042b9ae5d90d086177e6aa1ec6f31265f1c0ba07eb35d394bf59a48f2b4139bca20c36aa12373d9373d517b46a49d67836e9ba0fac436726ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283af02a13b2386e00299f3196b94e33
SHA14b57faa2bc469cfa551752f11b38508b39ea4691
SHA2563fd4d50376d2dbd49a7cc52efb8329564170643baa3ebc266c6fc4dc3eaee8a9
SHA512dcbb7d4aeac22a21eb86ad333e4ab37d81b1ecd4004e14bc48bb3497e9a1b40d855753f81b992588f144fa579a5d027bf0e8880afb13ef2bd82bf8e7229e2e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3605ece10b134fb89632a56e631cb7
SHA1f5e51e42846631ec9d641bf3bbe5735a1beff788
SHA2564a4ee790866db2e47d5c7fe62c052a5be37b1fd10d625932481b4db1ad02f4d5
SHA51241bff95eb2780c74a289c50be373e31dd1d8ac003c716d2b4ef7ca2d9fdc6da747d082f4afbe6811bbfeee4900a2f0dbbc4fb71488d8fa7cbc3e24ab3c614a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adf3e9ff186596556fa664ba1898b433
SHA1fa3d20d1666064d789f6fbf623d93f262ab9f63f
SHA25668e0597e94d4dfec0e57958d9e7d3e6774d7e647447fa73ce91941b647254fc8
SHA512b8fa8567e12c0e72c08054a10e4be00a714e4871d37aabe43d0ecb6827b4c3d8a4d34a3d18998ef296bfea53c1e2158135c4ce75b8c366e77bc57841b7d02cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519454a11dff6dbfb25ef8d09320f4763
SHA101240736179896442be5702f5ddf42ab0b85908e
SHA25632086f2fa20723195843cb1cf7706be9a718dc9e95604c97e0f2c2b3282a4036
SHA51250c11e4971fd87489bf70ee04d4f4eb0b553ee80c84c9acfe42a7341d214862463d82fa79512fc8eb8a7b5ccaec4079a927b9dfd30177f9563a889e4d547ee37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a558b5ace8f7af804f5aba1b10ab8d
SHA1ea9d8f7f2f0625ad600cd1d909827abea0f28b48
SHA256fe8329627dc1b15193612601ff310519f5bce06142b8d5ea670484a1a765398b
SHA512a6899a0da03cd548a3ed08894c71cdd87b8524e5cfce07c0e5e8b3ea879055eef41c999efafca5cce0f73f6a43b7a98cc05ddc5be34412457410b71043250d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c9a860f94753f97f21856e692e7cad
SHA1ed45566b29e8a22b4361df2fd1ab2ff6c7659206
SHA256056a956a6fa000bb78db0edae38f9c9ad62972ce903bced44c2b856251a6e3c6
SHA512e99623b0a5bb3e4f4d569091fff36556c4454eaed0e62c900f2c5c19a482bb0eb6283a4538263fa65883f457f7124b5c4d0ef06afa583ebbdd1ddd6db784cb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb36130400838147713d15d72a7a51a
SHA1b1b9c8a2ac3b58e5cc63254e590171ac1bed7d44
SHA2564f48b743ec579fcddb1302e81cb83f96c410aea7071f51d7f73af632d107b088
SHA512d49d0b974de7917e77ef66d52c449e2a43efa800f8afca712e3bc8880dd6a79333b003084a13260aac5a2dada833a857d958d0ebbb96ca1419a74c5e77fe6cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a75e624c201a768677ea2229441741
SHA1fa31be9324d550514876076af28afd2ae149d44a
SHA256e425064340d33e6d654736d64814f0cea72287503400f109c2f2db478e07c126
SHA512d318bbe75a725be1685db65445a8d864f2df17d582f41f882334cfbf895a5686484a9777f89c267d9c717a5b808400b098428dc164d17e7bcf2b37b81cd0ded9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b30efc925d79d8b1ab306a095ffe61
SHA1ed9687a8d249286fffd16bf7af1fd24e933af5c5
SHA256f01b1c3022b105fc38687a4432a9da2bd0604725584bb5206c1e5b7b027e9552
SHA512c01e245a9e89867062e41be9769b81b8182ebb7b961e5a646eecd78f51aa70aacf0639330110522b0efd825ee13309ed1bf2724de63bd62cb1116e6f956bb0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0ac183c6c96d0798ff80f8364d5868
SHA15f4c9e4932447dfa17e8d7b0c43dfbced5479ec7
SHA2566d111cc96d89921d3c9c1b25158800afe73776d776284dcc5ad588cea4606278
SHA512196e275c4e999785d25794f80dbca8ea33053c01d6e84a393ca739a77a0ee1e4c19268517e92411bb81c4e4e9cd8b139c7ae6cf1c095769a6e0f846991a49e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839c76953f1bed89796fe8cfe534284d
SHA1627ed9eaa9f498385a00a20c51af95f81900f3d4
SHA256c7cbe9f0eac8d4bf094a42e88d7ac831d20899dcac9afaf7b3c031d85071cc5b
SHA512e3e1b549b4fd668b64f27848daee6f96d483cfde653dae59248c59c5b9dbc3bd5c18651dbcf07fd4df46014767145f5fb7ea20b07d8d3ca2f32e4baf9daa668e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b092438f2d00ecdf400026655f30eb51
SHA1494ed8fc3fec695e8a168c13270a05822cbfb398
SHA256c77c7f075fcb22920f57dc7fad96c2ba1ded17f0f0c81214fd1b10430a2ed8e8
SHA512ae6438c12eeb7a7a5def93868fb28d7e69125833aa7cb58c534f6bb7bb7a6ea9837b25a3aea077f99c5ff495e6a689891117aa0320ff837aa0306d0fc23bb30a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848e1ef2694445a2529d8c842cfd6387
SHA110a7a313a6a0f377b9cd630f583d407d95171b28
SHA256e8801c0931d5f61bf134eb5899543b27f518a5b0e45216c4eea2046dfde60d73
SHA512801667597d2814b1062e4766d0f7d2391d6af88a23fde12fd2c607b8868536d4c2b98a42a236cc9f7efff4ce85f3ee32f1d8f96846599ee253da8802bc238d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ad9601d78ac100b67a672740bb6ba2
SHA17549c275fa612493d9e4c9784788caa1f10ffdc5
SHA25664e63a29bdfdb67a4973022a7b5d48753a533345b7edcedc0e6331a5afa847f1
SHA512df6ef3ffb29fae91df08c0bcabfb5f53189082c2344b552b0638741899952e2d461245da3e292107d183caf13955bf07ae9a76cec2701bba766e11116bae2a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984cd1877e601aeaa602d0d57e1152af
SHA142836879d80828f9efe97e5742f51cf9e3fcf6a2
SHA25607ffe19b915e363805fb9cfc744664b096a68a9f331691997d260c2bccb38c37
SHA5126685baa1f4f16b64e5420fe59ae7676696df8997151f141e67263c6eb3caa6cb1f526d06025d4abb7df6f1cff4a084476ad1b72f31a80ae31e15401d1bade236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590392268db462499a26fbdcf94926f2e
SHA1b332da9c5bfce46a9084b37961f80ba7981c6982
SHA25647d5c901fd5620bdafeea1babd5c596c84d5fe8c84663129d29ac83a10e40e0e
SHA51214c818015ae70d489f9e46ab195002a73628825932bc1f202eb6a7faf4426ed70cdf3b103e5e7e7fd83f18a43851aa528f88b997a66d846e4cf775eef8b59b93
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b