Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
f07baff66cb194499ba31ad3d42e27f7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f07baff66cb194499ba31ad3d42e27f7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f07baff66cb194499ba31ad3d42e27f7_JaffaCakes118.html
-
Size
12KB
-
MD5
f07baff66cb194499ba31ad3d42e27f7
-
SHA1
b5bda16f03d41460bb37e91d09ff4474dbae6d85
-
SHA256
633f5a038359540ccb6a7418d0757dd9dfe9d151f2e3e5eb62f861b115d5ee9e
-
SHA512
c8ca59900f0c4e02823a1f201e7cc00beff57e78354f02c978a29ee784dbc0a5d7aa5f083854688d24f02c0864c0b04370d41d22482c36bab8097af4de2841cf
-
SSDEEP
384:xy1R1QREDBeVliOcnvU2ee7Io48UXFRmY35eCPRrMO77OM0TCtxYLuZ4mXYHbw98:xy1R1DeVUOScz+Io4bV77OkY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B124A61-7852-11EF-B56E-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433109899" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000096cc6b5fb1ab521307a24465f2c3b6489922cfae51370843dbaf6ab96b33a009000000000e800000000200002000000046d11d3b0bdfe65e67d9be41150db2cb78bd7ae4fe5285786bde63d4648397222000000047d3fcc008810fbc101f304b99b25e0aae91346c60d6a79fd0059b67bd626b4d400000001ed1acea4a1b4158581d26f78efef00b88be1aad23bf80fc0ccda1ae1ca0d335828d7b2405e913c6c522ca86803c09135643ff137086e8b1aae5dc4d15dabb2f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0afae1f5f0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1136 3012 iexplore.exe 30 PID 3012 wrote to memory of 1136 3012 iexplore.exe 30 PID 3012 wrote to memory of 1136 3012 iexplore.exe 30 PID 3012 wrote to memory of 1136 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f07baff66cb194499ba31ad3d42e27f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19ecb2ca3731c6d7320ecfdef6d38e9
SHA1a561a40d2eeb4f5e26cb59da6afebc4c23742609
SHA256e9bd14d6aaad1f0852d1868bb8d62584828655b86bb3b81785f16570cf95e1c6
SHA512a83234c22e445aebc5244f45490fa516c64b760d641b933ba1e191d67e273d000f16b62d9257f88a6a3cd5b99f5866096f9f785e592a327477ca61e351733e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509881c56033d7da3e071084c3c6e73dd
SHA10a034da19e46272ff0702fd2bb11bc36fc02bcbc
SHA2568253931ada6d8f1ba5625a92f8e81ca05fc94f29099279ab771d54fc5b77c770
SHA5121f24446f9a744cd23c22ea2ce112d1c0b327c552633ba0912424057e4075e489e2c58c9439a0502c54f758efbe4ff0e4c1e8990228e5e8caee1f40b0430a23c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae0ffb39be0fc23fb93fb5f6b3b4ea7
SHA1e8286e38d012f0ade28584dbd9aa2bd6feeaaf32
SHA256e61103848914178bd80d8145844db395dacd3ec4e20668788d62d079a6e6cbe3
SHA512d161046c48aa08d932357168413110d0fd2322a312d228b17f5c956fdc4dd22795422a92b614fab2fbddeab86afd08d5238664c2c75e77981f1f595b62d15de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5701ad41d28af0d08ac33beefdbaf2d95
SHA1ae6439a732757b2ea735e57fc1e54eaaff4d6abd
SHA2569165281e2791fe15473d123f6ab65e779521999cdaa579298d66e6fccec7ca22
SHA512e0da0b56d563c4e21f1ce2bd567745be5e75660488cea9be6fc57719055ab58e00d0b245bbe8007d047a108aa5cc99f09faa03bed78302ac2d0852e11c73f99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52852cbf433440bf5e9a6969daaa47a3f
SHA1535be37b9b8034105dfc1b19d5454fbd30ca3f23
SHA25690eeca6ce773c245fda7b220f978b2b5abfcf8f8d7ccce7f47f7403d31fd0a93
SHA512c51c83aebd52441ae0e56da3d82939580df09044e6b59f2bf23ec4377ef7cdb1d52d3e1e90e3f34db07df6b55050f1fcc9c4908a7af247d660ecdbc66b7f6284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52a5c9b1c2570f91771f7d43f66dba7
SHA18842b4f79304731d0cbffa59f01fd881a0a99718
SHA256d096956ab341485274122e733dcc2ccb15d160e1254baa724a2548895069b915
SHA51219789ddbde6630473e6c21dafe03252917c4a022b1e1d92d504e6ef4366ab6960d40319677c13bbd37436e9bf3cd567d05242ec80cda9b1313bf2fa9f01eba60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59920bdb3f64e54a60786b022ece07fa0
SHA11962381d0f3ccad121d6d6dc1c9ee9b416e3c3ec
SHA2561c859942de8cdc40bf9b601cd6a24dc50f8c25f1daa570891761906c25a16d09
SHA51271189b5bdf57c9976c671c038de52d997eccb78e922b0303919dfcd65437875db02e8182b342a3a3b8abd78172d9e03e5cfdea6023bb7dd8e87d9109cddac1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570310acea70a2b604af1a57e66b3efca
SHA179e721f7dc7883af1acf5c71a79a2258e33d212e
SHA256bc192c0df7a966edeb832baaf1e1dc0ebb7b04afbbcdc06c38404c01ca64bb38
SHA5121d2cbd3856c9c84535e19e86a7444c23104f257768aba03f875104221aa0835bf7204b7fe16d57c042266eea4bd16ac51f59e2b50cd41ade907c234c75685a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fc75adaf1b8b57a627a4fed8ff558a
SHA16542510ea31c3251f57c1735e2d50c9738da0960
SHA25684adfede3286e6468e45b2a8278070f5b7c112d1d96dc1732bbedb02a7200faa
SHA5123bbd6728d89e592e9cfc6140da40e4491d54ad0cab1b1952c91bee01e8a017acee816269fdb64d21ea564f37845231872bb760004728896db4f80d9559150c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285eb8b0ad551c263b80db1133e6c00b
SHA1e6c479f41c829f50ee2e6a6edb049440d5edc493
SHA2568f4cf3cc98b8ad881f177a0fd0a015c4cebc1700b2055610d21971da2b6b9b51
SHA512d748a9a20d35630fc28722199aec1df4ce1f2596ca28a40359a972fc3651b4bfde220bf036ed63cfa92074d07a4bd5d4acd03a944424b0889ad418c05866dc7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2887dc89b1760521c84e1e6e8e18c02
SHA1704de7a95db33416722e91432394c85183a4e359
SHA2566f3daeb9ca1962077a72edcd5ddca3fd83e0bf1013a713c83513a997d9f70f50
SHA5127c9829d418ca7abe0ea8f00ec9412131e34fc81fec197953a7a31d8948f5de325d15c8c691511ac5f32c47982f5479779fb601f13a7b11ce201d1ae9a96b071d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4df51a6129798b3dc21fbee645d2d0
SHA1699f044dd6bd490c8c3dd7e8ca97539755da9897
SHA256ccbaeede868708f76dd43ad626de658253135c0b03de91f4d9b51da55e23fbaf
SHA51254b5da07f9e8578b0e368324579a4046aa51093289dd0f12a7a5fbb38204d8156f780cc04c905dea0dc96be6a58dc0668cfed81eced02f23b60cce2c43425ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2c8ab2aa18be87bf681109fa9f441a
SHA10ce780420fdbd7d5203a9500b701a19e118b8a42
SHA25678586d7f7d33732665f0225c742c029935f7c157716bc81e58ade64b30fdd5bf
SHA512c3de9b3a027eaa719cdf45c149e58ba081b4c8af78556ccfd213fbd9eac7902168066eebd9e4170fcbafe0bc6fd19df0209fd20fff20b0a116ead8bcd3079bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc3c24f2b3ff8c3b363c5ea006b4c9f
SHA13a1f4008a58efbeb949b1b285a5bb8e3967efc02
SHA256f8f457ede23f8752585b40c506138750b4359f7bbfc2831f82dce3441df84037
SHA512d81d542e0e0838d29e7b66cfccc3df32cf78175c28c4ed63cd8f60b3d1b9675a7921cfecc073526472cb0d4f430c43f67ac5a3328e9243367778a23b56da80ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a44b22c55125f09c837d35253e5cd99
SHA1b44683a6e01b9a37a43f27949e49e429e2a8e78b
SHA256afe31d95b3edce60a494020b19d58d1f74cacf8be7bcc25389f49fd47887aa63
SHA512d6dc1b2ed5422f62427f686cf3376c53fd122d5610604d388cd759cbcc46587034d0e7ebb5cad515fdfee4f124ded93c9fdd32ddb1f429a3df7dfb1cdae644b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572981f4865470447c54b1895a35c178
SHA1d35dd6aa095e21155f2f1d3cb8b06c4adf0543d1
SHA256e42bceb861af7eaa117901e330a12d99e28775d9500f96f100c5038b1bd86226
SHA512ef156ef09bb0d522f345c45d05cbeb898ab398ae17a9e04341f161455ee67eb96afc7e46e671df8bd86af974a27c01fc646f675be8eb87e3f66b69dab09420bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f21fa0f1305f247cb5f2f49a57a60c
SHA11ff9fc7f727b02d507dbc9e3b3e9bbf756712df1
SHA25669aef66f30e437f843b513b096b2792b42f498d0ddc70ba09d22f943fc244421
SHA51274d45641fa2a7df45b242de7df522a62e676b0c18f436897b02da0d96e5e9c68989d0d5df1349d60375d07ad07470917675b9128cdded1efe81ffee69e3f3553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f9e6e9d1a962a790f7a7e7619494c6
SHA15c2e11f7fdce2f98120c17c615289a08aae088af
SHA2568dbc7337146e8ec323fc763ecb8a00c886ba6d16f9cb41e7e8448ccd7855119d
SHA5129e49f8a65f48323ef479dee86b14e135d672d9f8b005e9dde2cbea9135f84c0181ca22f136ae144dfb4592c1622dea77cfcb8eac31dc49847393d7adc8c02780
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b