Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
f4f2d9d443f3dee166b1921b2f65a03e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f2d9d443f3dee166b1921b2f65a03e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4f2d9d443f3dee166b1921b2f65a03e_JaffaCakes118.html
-
Size
960B
-
MD5
f4f2d9d443f3dee166b1921b2f65a03e
-
SHA1
ea12159ff92e859ff005c40880d9ac11028af7bf
-
SHA256
7ca62e2eea1c412aa2560ae70ebd23e506d19273cc8dd13b61cc4084c84d56de
-
SHA512
ef078ea972017d48c8b9243436de8af13a10fd091cd6df0e5e43ec0442c94691a13dbfe27da4ae8f2606599b424bbf6770bfea82fdd177877076dc07ec260ea4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433392272" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07a8593f00edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000048d75c881b9edd8d2deb9c6fd9eaeb04c3b293725fef4a1f1d60b638f4c56683000000000e8000000002000020000000357eeb79a15aaed963ed9e4fe025b62863988950793bfbcbde33ed0ecbb40a76200000007c0699280fcd7241279eeecb3f76f9b2182b7b951fb714d028c3fb1e60d7e3fd40000000b6678e293305c04e4c5b08669cd63e9707cdc703f424f885ee324768d94e79677fd3a1cc0f4f8d1e4828831a435be74a68b62a23169919d1c91ad4c57bab4ec9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF066171-7AE3-11EF-808B-E61828AB23DD} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1528 2276 iexplore.exe 28 PID 2276 wrote to memory of 1528 2276 iexplore.exe 28 PID 2276 wrote to memory of 1528 2276 iexplore.exe 28 PID 2276 wrote to memory of 1528 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4f2d9d443f3dee166b1921b2f65a03e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5756b62f1ab50785b25bdd21e19b31c4d
SHA18c77ee60e4759f1df0797778e73576a8506090a0
SHA2568b221da47c6765a8c4fb0b9e801ea167958e5a8facd590ce5aee131aaa2751a9
SHA512d16a80d98be65c25bfd81a1713c9c3146053206530761a10497d4d26700ddebfe1397e3f11dbc973d7c016618b88fe53f31e4503d5aed5093d717c60fc27bb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d248671b38c0a4bde0035647e6e803
SHA19c745700c71aeb5ccc232cc0ec247ad9149b5367
SHA256b3db54f90f8aeeda40cce6a6ebfea895b07cbb36e0277addfccde69d5f5efd89
SHA5128cb6f51624a42883abef9701a388986840b5725b3f192db43615e4305a335dfc98138e23ae46dfe6f2b3e105c28b559f5b48a0482e8f5d63f07d9526497ac9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b3f65d4421acd6a99773a358d433a9
SHA1b1654b0ac36d827f9a0adc800a4eeb7b5b2ae469
SHA256f4c3a3c5588f1e729917a15ea1fd14033e4a2f010bb853827d1497a76762d900
SHA5125b7d670a6ed853a8d46cffd34d54421319958985f5333d7fb950d2b1cba9bc861c9132dbdfda1d10b6c73def19b682fb19761e54b99b58da9ac7b5c62a87aab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2966b9cee8f77a0653df55632e449c
SHA17f538f9989f724138809db60663242d9ba1c246c
SHA256889d3623a5b1bca05d44a4f67d37f28f4476387de804df943e96bcf9fb90319e
SHA512ef09251647bf32f9e72750939a86a1aa02b621692153fceff7ff7ebccf4ddde02e14c3ad56e3a9e56b3cf952d373240789d471631924097c61da710a5b2e354e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76f9b598b9d9a83688e0f6b061e4c77
SHA105281141134a5ecc4621571d0f337bd7de73e014
SHA2567e0c6868e35a659f6df2ebff7a4fefa568c737df3293581d42fb8d1772c47751
SHA512ff5b34fa3bc4ea29ea57b3d52710cfdbef1171aad375ed6a94050f55dbc70ade2b7cb34668aa02ec1e064bc08d1ef6ae3b64893e893cf87b7e699eacc6552504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f5c897e42b74cfbdc94bc3b84d4181
SHA1a2848325cccc235746b4540916a9fabd06f07bf3
SHA2561fd201400a08de04bb5ead167fa47a78e759e20a3e90c4505fb63e24a4436b81
SHA512f7fa577ff9c33d7255a304b69ea2b18205f5edebaaaed5dccabe969c077efb530e55af1bdc916146ca3e6c92f9b22ccd1fb9a151c475c8c0a9716a44ffb389e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9df7e8c2a945d8924430b2aba50ea2
SHA1725c71b5ac428e2dd9fe4e349c5f3f549f9d0cab
SHA2561029bd9ec8dc2bb9d9b0caffa09641c31612046e85af1b0143a2d3eb7ae90956
SHA512fa75577e3b0725bbbb50eea4c652cb7261c0e769f21a33c48f4bf23d5755a3f6e1dcc789e598da8d7f5d36dc26a02e4baa37a0ec379c6bb152a761c7c58ffa64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110e2a6721548baa2ac3d6060dfb5411
SHA11c21863b9c8b8a0ae2fa82cc086d65849c427636
SHA2563b655251a36a450caa579cddc292f048d1ef3a7affa55b89b3f7bcad2e9dc79b
SHA5124eeedc8b5ddabfeed7f2d2fe32ffa5d6ff4878de8d8821d13b23e118721e0a28054a23572d40d7d865be2d8cec97d1a4714c393bd8bd122372d94a8cfc91605e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52011ec687fb710ecfec3e99354787d62
SHA194e7e6282b8676dc5a6d3788be956d0a737b4c2b
SHA25655f07c29fa76f6e476e50cb1d5e6d8540b1bddc8f724211e7b333ff16796c790
SHA5124a6c1044776bbcdcfcf03e6b7092133b008e195095108c9cb5aff0bb396ac6519f4fd12d06f54cd9a211f8343ec735bdddabcec270e2abedbbb9f5e1df5383a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e903a3daefcb078d006c527ca9f12c
SHA188fd093642e873074e3f178c28bba6bb0be14783
SHA25633a083ee8604a4ef4431142ceb1c5dffa76f2f2e965bcae17f71f4fea536c42e
SHA512ed9a366bcf5ee3130a8b83b005aface0f4581a7608571037bdd40238319e6c6c978af355478468721f5e44f5c60fe70787589608f33a3e337ee81c023c92aaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4b617c08de6fbb8de2f640f2a05a71
SHA193f95b979e9a7b603a5cd56fa1c17118a44c64e2
SHA2569bf140d95fcae7f98210f71cf57101ebde29e8294a1900f6fa8c8096f15edd35
SHA512744a0a84d6e0d4c3cd776290c688e9bb718b1aa53ec2c4a888134cc17a63c4912e9150a5a21ac2115e5dbbbec841b5ecd92a6910351429e0ba17d1bcbe9c7cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d595515a3c22a1cd145cb7abf2968e7
SHA15a92ca381d8dfd6fbaf094123c40832e1e3ddded
SHA2561ba9846ad6a4571a3f2d324e831976446b20d7bdb0ef78635012b67354524ce0
SHA512e1e89c24b3f7200e6ff7d38c24d9ee151e273fe25bec2a3ab80813bb1d8c9dd8609e6be5cb0313a9205d35aa5b70cfa751dfced6272079e79adf37a5b5a683a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348bd3069ec576cd6269f7bf28a87f95
SHA19646d609f211c66f7ca36c07d684d5fc6fb52903
SHA256899a0eba0f2702b105b131272f7f57683440adbcd825e497545755f995cf58d1
SHA5122143e343e5566490eb69b1d40906804f642c2f245a27eec2e6bc448d420cf4ac7aa69d337fba7a1429832d300d2368cd0189c3379bfe3d3abc179f545afd44f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a9ffff34f76ee2e3279db3629becf0
SHA1083c9d7fd824dcc89ee0b6ea801dd91e31dde779
SHA256b952803e430dc89ee4c6c0fe05c8e33feb3bf6ee6c6d1918b844a1ef65037c3b
SHA5123781c7ae97971d56845935ef976cb975b8ab345a4ad33173f2b02ad45931ede658919e954c239735ca0af09480fc5624c30dad0b0dab1a8eeeee3e11fe6e42c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e6493a99b098310b08572c3ccb001a
SHA103d9af66ead459f698296f57533468b075840ae3
SHA256bc0e3ee9f3b68d7cd26640b506f7db3c22990c6f85b4f7a526a38162e2767ea5
SHA512c73cf9b4895e63f927002adda29a11cbe6659fa60a7344137117e04e6a843603bc234ca66aba1843328c58aa518b60fb0464b7c67fb5cf512037520a1d1512f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d2a2154689abc6b4f1afcce0054cbb
SHA19e1c04c9349ebf3c6f205306a58ae2f0986aec45
SHA25633adb1f0f169ca89fb8ae42e52dd60088f9738799354b193c5e8d277e2641d83
SHA51207bc6064c0e5b14ed4202bfc5cc051c635a237198ac0b519b050bf71a84c82643209c9f979a037e06ba36af3b2d7eae38a754074251cc7ea56d5cb93b7f720ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f040019947006e4223754dd1740e5387
SHA190f2e93da78939b3138aa2a9bc6462a761f4c5e4
SHA256ecd08fa568a7fab587e0833986a91b33eb0bed88d3dc1ca691a949bb6a1fa95f
SHA512c7efe940d679ed086590c863833a2c35c7e275069e1f4a883e61396764e7b8b82e7c1cf7fde1d64d46d73d0b327a0b247ced8aed96cebe8ed14089028ba52de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f77029b5ca2ab150e396da2f3de676
SHA1e345648b110633c3c99402d7c2e31d410850dfd9
SHA2569b7ef3f3fcdeddb13e5a65399a3c75969fa9da9a83cc1698817eaa828501b989
SHA51217ce76be3b3530f98db4715169d72f30c7f07095c932cffdbe34ea98a1c79a273a167ac06c275cbefc7360e29ab6b3375de888f64730dcd838a55d0fca6444e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b