Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
f514333f6d72751eb4cc77819b0e0ee7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f514333f6d72751eb4cc77819b0e0ee7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f514333f6d72751eb4cc77819b0e0ee7_JaffaCakes118.html
-
Size
55KB
-
MD5
f514333f6d72751eb4cc77819b0e0ee7
-
SHA1
482493bb52b9f27e61871b094f632b9fdf6df548
-
SHA256
f648c8f0fc57e0cb0f53583a2e3dd68b67b4b6a2a93ca01e1b9c2470f78b92c7
-
SHA512
e2b73952d95a62b17d29c4e0afc9603f9abc7afa458849e61510fd1791180d3e41a9add401627f4810099c112ee5891b4db7bce82e5dcabc949e08a5a48b07b2
-
SSDEEP
1536:BisIgSAEZdJI7reguFuJeh9EKwFrxYXgaHNkrRP:BcgSAqeRP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000b3c27578c9a49d8c67d8b55eb94cc5c86b78c5273c3ab3460251d4482fb8067a000000000e80000000020000200000005b1eadf849f119c9407a78f6f782dc7ee22e081c8da2bd8e47faea6730804b9820000000332052f2748fa462e3cbe3de7010ae37f362f22594311ae6f1f5acd55f121105400000000ba20bb343124e135b49d309b566f328e7e8491142c2e57a3ec5d9f2c4c23d515e82566ab95d276fa9f305515f5530864600366391e97ab452ecfff88f074015 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903ff3aafb0edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433397034" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4CEF201-7AEE-11EF-808B-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2028 2432 iexplore.exe 28 PID 2432 wrote to memory of 2028 2432 iexplore.exe 28 PID 2432 wrote to memory of 2028 2432 iexplore.exe 28 PID 2432 wrote to memory of 2028 2432 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f514333f6d72751eb4cc77819b0e0ee7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5517409b361c9ddfb1cbb23c3545aba6b
SHA17802d40a4059144972c0420310368762e89a1179
SHA2563ae1fe2b3593b9d0f18e1e0ef62186ade6c4887c0119f00f1c5c87af5b64965d
SHA512bacabe028babc1fa5e40f75365cb476477641572ec9a1594cb4df08e548e5c1de3959a0db1be3cd82701b46f6c78c7b52f149704ec39a6ea9928831b22d01176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84316dff9c01de446175a02ec554f4c
SHA18647e745c5687c5a83ce3e0ed238c25b1445ffb9
SHA2567a9d3cc4e6171c29123eef408b7d18a459e2957273ba47da94b45413409c2f84
SHA512c1e09b005fdfa02f705882cbd85cf826a1aba0d30997c1eb0b92c75e5a01963ccab9e8296bfc9de3815e9ae6b753befe12772bfba160d4cc8fc0b1ba49d40c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e637756844a06054e517e774e03e5256
SHA1b13e6d3ae5a40c893c030a37a628f6e55c7aed97
SHA2567634201dfb89b806447b47d9da2a067c496ff1fafeecb2fb76e9a27143a80829
SHA5122c748cf7de6fc41223e8c9ed21ee61d2359241cee975e04dcd25e8c5807d12f2c214d4bf6758b0899c6ef5e0d10b122b31bb8205410d101169da3f3b80fbd458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d0f0c4a558ed3cc9c9a7f9a6d62933
SHA1153f9233fe4bb0201882e385536b3528b44896cd
SHA2560febecf43b75111ab09d9f553e05aecf316c4d69c3d6829ee459f7e8f7123451
SHA512aca6c967268cef008d90930d6de8da29c184b76a6a1fefb27e4fd71c5096de4a73941987f27b8d32fecb02012df2877f5758b98a460274bfaf02d3455dc6a641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c105519b02c52c6fd733fdc4164739d
SHA1efc0700d6aba601fb274827ae7959bb36e0c286e
SHA2564696653da2dfeeb38d4fefd86aa778c3d1cf9a986510a11f81e7de8ef368c658
SHA5122ecb9a4da4620b7527690d66a03bcdb2c4d3fdbf695c1eb38fa827bf239be84e3b98b6821f7e42716e752b5377fb0a9d0b924155e324f9898d9a69fce94ac74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb37a329172fdbc99c5b3a3c2c179a8
SHA13eacc8e0da258b7bb6c0dea6fa21aaf67ea46e74
SHA2569b8a2ef61ef685c7c7799a834df371c8be1c39a653e2cd630312737825beda92
SHA512482d821415ac77f2237ab30929f5ee2e4d83f35123cf33db38597428a2fec62843dbe7bb0c6ba629e513f12eab0449fafc5c752e4d010c61a7d7b467b7bcf9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af9d24ccdcc2824e8fddaebd554c82b4
SHA13e0588e4196086d791bcd47452343b44a37958b1
SHA256c61878d8f48aa95c3b817a75e16d810ee0bd4545e76a197464f704f842e069dc
SHA51263ce6fd084654769d8d0e505c36d0ce90bfcc70b586b7758222d0c6a399362ab241d14fc28b4dc38664fac42ea147bd59bd90b11d59cf8dee37f37205df7e57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cb090a94b0e2b2b5418675c5b6a8d7
SHA14b793a9d0e26640b124bc7c983e8e43a51711c99
SHA25626754b9167d42c89abe5065760dcb8120397e4a636827a26ee8192d3b1b393b1
SHA5125f625cd1f5beafcd7078c69a3db7c895d2ff4f1bc6480da2dc384a483c0c948f136542e93bbdc035a498addfbec1b6ed8c4a46080ec1eaa4dbbf6e8512eca6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59382b624e239f7a49a5f45a449f6f990
SHA180c1061def4988cfb3c28b7a9b9effa0f1c944be
SHA25630ffa75d88cc32a2c6eb6957825d3e03dc3884956506fa288bf4601550881867
SHA51218fb03963a9b712148eda4098fd018e73bc8d078205313de1dff43d31aa08d2f6ca1b9303f64ec4ba2a8eec15303266d53cd14b0223d7af0fbf9027ef4cb07c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537edf1b90ee29cc77aa270f85f51e4e5
SHA148d1a8fe6ec4e70cfea6e41979c2692b2664b94b
SHA2561794c183b782d672fe7ab862c40e233cc18bab6068abd79d443a8598253a7fb9
SHA5128b8cf9d7d718623dd7b16c5d992c01e776d9d853bb2f0dcf4f72840bb54f02ef93825ff1a6919b6969b6a30610814378be58b16654d999ede553d9677e903570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056627080e3b1c0e4e04e21d6effedc9
SHA1083361855575d0855b9a453665113c332f6a6115
SHA256e7704c75f361d8f5cee0150305583e6324c8c89c93a0f281f337a3b98f80454f
SHA512abbab59363c7885ee0effb144d6955dfa8ac3ba463747f50e81e72dd7ea71fc3f0cbdcd70a28db6bfb30b61bd85b3b1588ea7fdd32b48c1a76af959d68fba6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b55c14661175000a6f98f55e42e7e3
SHA1b24dac2728c6f1d6119c97585a7d5dd1339eea1b
SHA2562b0288dde8c45dacd061970d9a41504647b5c3cdf8d678e9c4e73c7d506dece5
SHA512a5947b565ac8370361d1840ec1cf1b304860088378586310c03ffc623b0fdee5ece523d1ff34e14e168faee14790de27cc9fe2cb5aeff5e68bebfe3963ca18e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595211e9d5b3a9ca5ab5224b1bb19a5b1
SHA10bc10a95c51c8b731f3e3102e13f9da86d4ec174
SHA256adf4dae9361bd843c816c1bc9feb73c9b94b5bf3c8ef98c95c0166e030dcf986
SHA512a90f3b65ac5eb1348e967fd2edb54cbdcf6ada9acb1a8b278386a2b79be0850ec07659f2751bd8636deb8a053ea652667282d20c34ec1ee6e3ef66425acd3f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af8f5e82359c5cfe1537a7ed92c62d3
SHA1963b67fe36674c8d4af6bdd747843be901158d68
SHA256517bfe2b68063393b85aa2803a5ef160928d83efe667c126077c027ba2c370c9
SHA512d6b109cdc180ab81d56a3475d6c154a1c37f07053570240a4b195e22dfde4728e646287d05d7b674ef56aa0bccacf6346dba754f805f2df4ad6fdd20d953f6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552884e611740653c43f31d6dde7c1a39
SHA13402b1f818c1d9311dbee70ef61143fb325be4d3
SHA256be5afc1d0e435662588427ce4b9c16cb002b38ec1607a911231e9fa13be50c90
SHA5127555aae70444f3b391e88d304aa2f882e2ea00e4d2adb49e2a1bf0421e89d4bc19ba6573aad5fb97ecdfdea5e8a26d892f9727bfbcdd9d582754071a31a5ffa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de125c76e26c5a9c9dbf0038a3dddb82
SHA13e567322046ad8739a327c3a769680cb0a41b2d5
SHA25622acc7c97adf3c3ac5d55bfd5ee91292de977c002246b75ee52c998d27ee4f90
SHA512b593b925e5fa162f86d4f21c3089a158f5bb848c4f9a35cfaaffdef5846a2c08fe34d15999061355565458d622eaf4254aa3c57d11dfd2c239fd4f6d06a83c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e217a37581d25738f37bd27105cb13b
SHA1e98530756d94bfc627fd326ed8345f4d47dd8200
SHA25694bc4313cd95bc43212a7f112b26d224f75b387953cd6e68c6a1855542e0b9ad
SHA512dbdc2deb83ea8e79c81cd0b1cf28950c30f999321204fbe09e60283bb718ebfcce6fbb8c94300003e51a575b10ea11ba499c88e1f9b06822f476157792dae21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da48a791808f815acfd788f4346200d7
SHA1bd6b1cfa94c1cd8551f87b64bdd62a15d7888052
SHA256c11d5de74cd1a7b52db07cecf895f676f473d4af3c9c287d974f1716c9f3b81d
SHA5122d48e58343ebd4e0722a2c82590873d2eea9345fb3e6dd7b53d993adcbb249143ddac1899c9e678c414a7ab603160f9b2e44592bd9aaf4d1c6ec965e132482a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303cdedfdabbb69172a7f0326920fea7
SHA1e1046d4bb02609b2f80d7c6bb6a5bd631b9828b8
SHA256dfe7ee912cc4a5b2f16a682cda754a2809f196fa1f208b6b042f013dbe75424b
SHA512230f3e2f6c112bb95d339cd0e44d7784158e9983a3fd9a1b52bb322cc5d95cec2bacda15d97d46e9fe22b06cbb0b8a76377cbbf704152ac08f9928c5991a806f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b