Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
f4f5143c4d1fe229052aad8f0ec75437_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f5143c4d1fe229052aad8f0ec75437_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4f5143c4d1fe229052aad8f0ec75437_JaffaCakes118.html
-
Size
18KB
-
MD5
f4f5143c4d1fe229052aad8f0ec75437
-
SHA1
513212900f1a09c00a77d6de3a1a080d363b3137
-
SHA256
7793f4a1f1676b0952d17d2da695edf444ac60e876ba9e8de365e454ec7fddff
-
SHA512
ed659c6c7f81d4c6e4c4ff8ce79a851a607ac259d88b7a3700b7ddc615f06672a0507194378f9375b371e1bb25f86617988e7d07b8bcf3ba6c56b7d765c72080
-
SSDEEP
384:AhI1DB50+096fcVJZ5ZdC/VukuBXuUrqiIfUBrF0JxEuTTuu:TiX5f3XunfUBJ0JxEuTuu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98A09E51-7AE4-11EF-BFD6-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d024bb6df10edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433392637" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f0dac76700c1b0179d842263274a1a5863030dded65224329bfbfe51773f8cc9000000000e8000000002000020000000c16fbe21a722d798461299c71cee207ebce29f26f1ec9dd887b0f946354e12ea2000000036590729449305deb51bc16e0c79226ae982898a4bbb97dc0e7e7ba01f46fa534000000052892a48253f1329d615a1692e1084410759ff586af06fd295582d5f82a4521146c38667104b01abbb2ed3ee489687b27541cf78e40724c4c4aaf4baf39414bb iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2760 2652 iexplore.exe 30 PID 2652 wrote to memory of 2760 2652 iexplore.exe 30 PID 2652 wrote to memory of 2760 2652 iexplore.exe 30 PID 2652 wrote to memory of 2760 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4f5143c4d1fe229052aad8f0ec75437_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3aa140d6acf1df835c721ab843dac5d
SHA1a59753618bc986b8a6a01b6415265e710e88497b
SHA256d118f50db3ae2c9c2eeb358109d585c5638e53a6003b5c323d8ab22f71b7996b
SHA512777bb3528e5a04598419750f9108a0d37a90ed4eb7d9efe39cc628862191a275c5c520a6884a1d6d307136011998d67402d8410ea9eaef9d06683af146d3a05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52522952ba3b9612ff017c8347820836f
SHA17e4ad00fa315d9c403305ca59d9cf32104865860
SHA25691fda0d8f20a8c719e2436edaf264d4a18955af6f739136a98e32fb7c85badfa
SHA5125195ecb2ff964df3f46ae0909ff35eac977c1a273546d056c9543923f99ae326d7daa8519ee727fa06e8d86abc553d2896a1f0dbd6cdbe536bf3be121bcb4814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85c265c12ef0a0923e7c3677f5efa31
SHA1ee45893215ebf5acd32823e386086e2eb5a316ee
SHA256179b11404eff55fb7ce979cfc2d8c367386566dc7402047b451981a768115949
SHA512161a4c0d6d031278f75643fa89263341a64b1a18ee75345f2e24bd20d5c3fca23165eec21c1a3d3bda789623e604cd3dd5cd753aa40151bd64c1f44652acd975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50773650b8183c758bef874d8d23def08
SHA18305d375499291147371b4ceb1b6fe684cc7fc5e
SHA2562de195d2bed1f6498f944a35c0f3c0ce1255fb842de091711719c97e09f18001
SHA5125b615aaf4fe5a94adb14f9a9abdb6fab886b550dee235798b2aab574aa6c6e0442dab71a259b7094645f275b9d05cc717b34c8d96b941eeb539aaf89074bcaf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543814482e0403a04181eb50a1d1527ea
SHA128449200d247efbd1a3b77c5d28598ad633ec377
SHA256a5f6c13ae8a32ae264d8128fb3ca011239bc9b8078ecdf73973e7fce2f16ba4b
SHA512349f129c6212a1e618eb2e71672214b18e2d2f5a50247b1ded9d9ba7d31508bb6cd55834638ee81cbe88b0f9379af4014c6704a25434052dfb1a4503d3ece5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532935953fd1ff4d1f4ab0086b86e3cb2
SHA156f8adfde0b33e7174703a3d5b65ede4bfce1572
SHA256c0bd4fd4086fedc0bc402efe64c4a09a2a2a1fc6a0bec4448349319af371dea0
SHA512c9109919aa57d352dfd7543503ddd615ae3f8e73c14efb13269b8c60e8db24d69fff359e0615e7e3d455034293bd7fc090a47744f8d61cdf3fc634d43e28d2bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa17b8ebb89d9e7a9ef502b41e4af40d
SHA1b4af9fe60f66cbc8a2a98f61890f3df2dfb459fb
SHA2563fd9484286188bf52d57912188fd0bc834a2cfa66dbbc9e2acc5f42d5d8f1d6e
SHA5128a492f37efad164b80e82de91f266dc5e7118e741fbcf92a09da334fc88fcecc3d073ba14a108556af0733c0eaa5a376962b1b9a6fe4c5208ebfe17ac9c56400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54986c6dbc0045ff1c4053e1827a262c0
SHA1983dff0caaa30b0c59bc9f1ef7430c531e757dee
SHA25685b4f8c1f795c534905ff7bdf50615ced559c03ec9e2d9bde62f1706ef44baa1
SHA512ad26a0f444a282df2652c5e871d099fc92efee268947d434f8f746f128fb0a342dac4a60ed2e4690f2d3f39c41b024434575ccc22218957f862a3d834ff9fa20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba4e38a5388ec091bef8c67a71d4712
SHA148bd4b402add4d78475326cddc394504b7754a5c
SHA2564a795da450b694e785da5a332af3cce3c0475366f653fa6ae7b07832c6687efc
SHA512290615e99c1398c2cd29b8776523d3dcf4370ceb40bea55cf12fd2dac18d6424d5e76b0e332531275cfa54036e3a2b327748d2326a2f31aa18cb1de411a2222a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e6d7ec319ff326532732921f00e84b
SHA1e8b9470464e47949b4e8a74580cf1be3df30a107
SHA2566e11c381c4f21da767fa6961c6b562d187a7eb4aec927c50a1762ffa2ebb24b4
SHA51277fdc647173a4cef9bf670c93f940bb93ea01ac342997c60b49b5088493e7f1a6a5b530892158da8c195406708c58af62e38e679fee8fac728247a527c3b7bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba072d3b07128d2a0c1f83677ae6d4d5
SHA18ef4e73e796d05160be5c24ad9e12ae646f4b58b
SHA256943d9a700b6e07ba39570bec4e495ed2923b3b5196393436cce98fc761f394d1
SHA512ba26b05f248e21fd6bf06cf45e7e7dd11b1570b1d6c1a3a5885d17ca920a3b87445200c92efa9280dc149b53c592a3d81a1647827e6e9132a5edbe43e0f47785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e7330479cbc807894f737ca7a094de
SHA1469f6644e17b8be52ba9ce372693b99f6fe61794
SHA2567a466c6c445972d20c2a4303df4ae767feb77e00f35754ef1aa1cbd9643a9695
SHA5125e82b0699646b50a066ef60c6fedf7b12332302bc25c7c06a6c5cfbc3349b6179ca71ba0cd4acf688e0929093cdbd63c4db39fec86f5b2080e9b571add6d84d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed7b8ecbafa0b6b89b26b9c3216ef54
SHA1862e5d10b72cad0baa68b6ec92c70f9d0fcdb554
SHA256d691bc7cad3e742da70c36eed825477e6eb0d2d3da98b0638e5374e72ca93136
SHA51298249059ae5bf0f35db3eea010c657447f602da096382ae55aec510af98a66a864e16ea3e83be9ceec1337c821131caaa9978bb969e01e2183ad9ca9350c804c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f5913e2a4103af92f53c08707d0d73
SHA1fb3aff02a9b4f0d0dea91c2a0cc00dc9762f70f5
SHA25604a4f79dfb2c6f12a6566b202182960c13352ad83ed71910f685dbe89536645d
SHA512f5df00f6e6c80d5201f4de0a3fa3628f31bc68b4cdcab65e531b528a028b8508f0c218e861d34e1edfd2aba859f235bc59937860ba5b265155a6a05a67ca7e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be5f6219af8b4c58ef0f1fdeff224c9
SHA185a09acdf514a81cbd7a88506ee2755eabdd2657
SHA25633315d8dca7fe3f058fbc99591421a47a0f06d94c70b5ea7135bda2d51d87e93
SHA512591cec97c3d6080589599d502d5678ab85be7dab9081a7711a1c4b665a77fa177a69c06d04a11d000fb5db447596a8d96cc7f35c189517f9d05bbd2153677a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5722707820c908cc4020ec2dbb6b640dd
SHA1a8ea8cfccbc0957c2ab477356338af840e412eec
SHA256ae130f5a28fbb744915977c186504268994f378dd20f08709126caed492955b6
SHA5120bd47e32c6dfededc92b59be66485e7d9379fb1fcfc2d16120b1ea99f7a2e71d2c21dd97f06a5251d8e6a4808610afbea76b11e6fd4d4a7cccaeba96da554fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54faacc411eb9762e769729d607791502
SHA1e803ba2af9e42ae18db34d48794cb10b50d37783
SHA2563b23894363921af427d448bc49f8a0cb7790f4ba46c0c3c3d24275208457a335
SHA51267cb00b600a83f8d7be251a80a853b8e202ac95a21e191b29d8c5829eaa74c59283cd6c49d9e5c04c9c00261583d3dc203333a17cc9260c0ce6b087ce1a21e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb8c7e11e317ab1280247db5ba92311
SHA11240e71f040e2ef5a79c3a9c18a16febf6b31b56
SHA256d69d75486a26d1f58cd2e8e403c3539177f72fa17353312d3dce3910b88145b4
SHA512ebe3a61c8bc578581dd3204c47688e8bd882f4865a554b4dadcd91076a6e36fa98e203b6ea7a4508348f2d1c3d8825af6a8eb73ba6d68206a7673c34245448a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa2a754dc97ce72148b09e39f0f0a13
SHA1bcf78f33f9f587ef4dd9cc731f06d280d7ed8c1c
SHA256f38460dbf3e88a7c43d808777b924e310e3d924fc26f7df13acdd6045251f41e
SHA5123a99d4ace8fa8b5eff37afef71b6daa7c9e244303cddbe3ae7ff18dff6e4e848598ff106a86a94591cdafda120420b0d4de4034b339d437419961e1322707b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ea662316c82749b28acd9e6f073496
SHA1019edf40174440151ae65b4a43212397d7623ab2
SHA2564dc12d4ca6bba90d5cc22ddb2a1791718286eb4b511dff889405dcab2095d3f4
SHA5127117e7e60f427c48f6526abc02c7fdd3590a1f04db9c6a277d8316ae8d5a54de315f943c6252643d2514cb7651278240e842451f6cf0a9d67a898e90ea353b9e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b