Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
f5688c419bdb8221f1743d4df1ad87dc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5688c419bdb8221f1743d4df1ad87dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5688c419bdb8221f1743d4df1ad87dc_JaffaCakes118.html
-
Size
94KB
-
MD5
f5688c419bdb8221f1743d4df1ad87dc
-
SHA1
9f67ce445bc63e2241381b6c9ee125dfa98e9c2b
-
SHA256
eb5a16a1bea1bf9bca7c4cb02c182f72a568b7bfed0b6f97271b36fe5d93ed8c
-
SHA512
d15996d49964983313fe3be6527cee9b114d100ffa8a476907e903beb6b14c1bffccc724a2817dab22a2f416ef399ded47becb3f5b1cf04dd3804f0ab0a4440d
-
SSDEEP
1536:u+fojOdS/13GM9SvaXccHAFISc7Pd9KNyEAP/lPF1mOL8Osj2SlzyOFxA7LGFLjg:uYojj/1B9FccHAFISc7Pd9KNyEAPdPFt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ebefd373553cc88cc9ee298e172c131e54b71788309c103a0c1394459883d42e000000000e8000000002000020000000c17f6849873c69fe1f31456f5373e6e3e6bd0a8fb4f2d99055338cae10ccbede200000009a07a45403e5ffa17bd9128e0e2f10e99648173a28b443c4d4f18fa35b3909464000000051dff16caf0e3aa02bda365db23235054a44471c106273960697bfc146840f42ebec203ebe58608070debfe424ff2363758fbed95bac60c351bbcdbd1ae46046 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433407853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0571B6E1-7B08-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500926da140fdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1780 iexplore.exe 1780 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1744 1780 iexplore.exe 31 PID 1780 wrote to memory of 1744 1780 iexplore.exe 31 PID 1780 wrote to memory of 1744 1780 iexplore.exe 31 PID 1780 wrote to memory of 1744 1780 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5688c419bdb8221f1743d4df1ad87dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac096cd9d330bddfd0fb3873601a603d
SHA1625fd7853f627a051a0e81a7a90b5dc5e74564a3
SHA25682a30cf09ebaad4efd074f19f9fd42acc00cb01734df7fc75f1af0ce4e4ee145
SHA512aab729652559579fef0488abf3b711e8baa5c70d0eddaaa4a341e985c378f17a8df64d8f4ea024e5f570294ab5aa29844feed42d34c1b9686fe62088e6318a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a7b3a948027f5e8bc40403afc67889
SHA10120fe1c05a9c0e0df92727328753aac28246f74
SHA2561d88b889c6b2a508a949df84b6f8c995e9b474014bb1a773e2715471772c553b
SHA5126b67b7a0f3f4bff2dacd562baab91b28dd55e82c348c35ea9abf07261ff07ad1313d1ba0d9ada22c293ba96d2a197710b69ea692b568e6150ba887208bf6b225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727f72757349d2118b50f7f5dd1af527
SHA11098ebdd02e97bab65f0c4a0fe2aa04e48510c1a
SHA256f5a85e865e2654e134ec88cce016d09e24a7fd33590116e6bcc30f85252b46c2
SHA512cd1be1c1c64fec6b4954406aff9483c5dc312ed4c4dba47e85c402cae9bcd75b0aa68a99edfc255255f747324f2eb124d1f85642297b1c8d8137066f3c1dbdac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b5de7620ceac2bc18a357d1497aaeb
SHA197ef2c15ea83954f32d0b5104ddbfadbaa5e6de3
SHA2569ed08b8d3fe239e11b428a7c2eb668db70291dc0f8bbeef58744c9665b36e297
SHA512815f29646237004248e9dd0601bf34035ffdc82e9a385754d11436ab8ef356f00dfd041b4f0d89f5ab038708816011a3b5a6a7da66a1b1b8dbf6497e064c45e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a0c1c8d951cf4d2eb3e8d969bdf08a
SHA10d506dc7a6b57dae4c4e90ce47996e5c8e0a2894
SHA256574f038cc02031d1f216fdebafdd924ce611245bef6a8891924fd9e943e4cdea
SHA512bfbecced76edec160e0753039ceaa0872b16756fc95507fd7c7178270a934d43bc2c66ec29087d39c7658a4d07789e25870a86dd800c99cade28c6fdf85c3ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595715f1512b40b1451f42a8cd81434e0
SHA1872960b42d3e07c0008e7faff64e0c01486cbdf9
SHA256b31985bafa24058026881408db0bad781f22831022b827bdaae721da0392293c
SHA5122b74789a08c44a39e37f1b37e5d17aa1a3ae41d878f34a75eb91ddd9865bc82f64a745895317d618cbb2c62c506167ccd1b5109a242d93ea45382cde578725a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac862a1677a0625c7ef83527bedfff68
SHA14963e644f72cc184da98788816b190428f739e6d
SHA256af96e56f8b6ed64f86e0bdfe62c2727c54dccac8c582ead758a94466cc7df49e
SHA5123ba3843ba50a75140c31b12529e09e5fa363f4486a7e22840bd7db3666809d1306f3d807173a507456b11a3fc1ecda383be06da0f919816666d8a9fce5c08aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c734109a4a0ca8caef0c2b588f7531f
SHA14040c9ba7dabb85e193027a611acdff76c08490d
SHA256b1e30ce0ea30540ec86774671fcd61fd636c58848baed7409f48fe1a8704104e
SHA512f74c636ba7dcc521b502639bda98b4bdb9391af69c8efb542ea14e121ba5532413ae0601e915a97345ba90c73f95714b745f31d473240874d292e26c1189c8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71ecdcf4d4bb3234fdb86f157575fcd
SHA17a332b61b7d3bc67590a955a1394822b95a4d436
SHA25607aa79111d1afff16f5b3bc48838954f2dd202289ecda46753d4ef5767c452db
SHA512b9bbb10407fd318817343c6ab2ff602a51a85402d4c297cfdf9ea7f99e72da04af6de7424b4f0fe0a4da83884e2cd157c2b26a15f250c9fff95b24500334581a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db26fa1862cbf212baceea6b34515f7
SHA1926c816cf9686ccc0105ea115b492229c9655f98
SHA256e6df1c81082abc2276ee69785c012ed4a0664e4f6be19ae547b3648209655c30
SHA512910e52c78aa1d83ad05590c4bde48f93b649ae27a702a9e3856ad45633aeb84c8884218f42a75def4d60030e0d0fd3cc66903ec16fe8f529f9f29c9ae790361e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f5ab45b9d42a968652c3ac059d796d
SHA14a096eb32a640aeda79450308a8e64ba9b3afc7d
SHA256fb143b2465e75f5e14cd2ee16b128900c15c4bff8bedca5e2a5cce051be834aa
SHA512062b2d8ab40ddd7d846cca7249c4a5296d4b77230698e976a8e0c3033af1ab50e6e39c57d20191794283301786a19b1e2d08d142b19b4879623d7783c4d0647b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc7c328769fa7f945638a7285fbb9aa
SHA131fea71543c627760d0f99418c402ae519900706
SHA256b6d5502b7643979504676ab8ec5e3350178208808cf6f24f1f8281c38cc1df4d
SHA512aa0d372ecfcee36d59dc05f68d13456c693a693ac7fb860b5fedff543aef8ee195ecbdefa19339f06ce631d7fc10caa364ebb40c1a33b5bdb7032e7a12643944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5018eb694c097956b7158f208351e11a5
SHA12325ed8f62d97b58f7232b8c39ed4861db160abe
SHA256f35c8dd94c8f3b8c0ca54680a50367a7845bfb15bca6767defe67b85dbae99bf
SHA5124a3dfcd4cef33f2e14bd915e42978765adbec4a5924706bb992340557e966486450e5469edf2074b0c7a18467c1d781e4fc1bce2a727fda3ecbb53dd0b401e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737d3c6da214b220c08f4b74dcd1b233
SHA10d1106277b1b21bbb692fea86850a75e5fa5509c
SHA2565c4703e1058067747f29d44f819a05af09270357fbe9f1a241f1cb0e4fdecca1
SHA5121a04ac8d40034a79e3f28124f5e3c751205d1c5fe234eb139f210995c8fe29e70c8c9782d5671249a88e83e79c3e824a9866ffc0428c7d9cdd137f987c7d023c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da72b5bc919601b70e56f7ffa644f410
SHA14beed4ab23aa3bb321b5f285e4f2f1cf8610f781
SHA256adb3815815185001ba4e390a0fb7832372d25fd471f25958ae1d1b34c2ac459f
SHA512c0fda26c02b2773a8f8d1b19b7ab1b0c86f8c343b66179f0dfcd56fdc4652c2903b4b816cb232916f7df12f5f61d24ed01cc31bed53dc5a2908423a2a085d10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534da3bc8c4864d98eff15c3794471f4b
SHA1177b4c1d93e4d86a56695f0f02fc4ca4b0114f85
SHA2565a2beedabc40219468e23e24cf9d53176db884843348f6aa036971149ed69be9
SHA5129a84e46f7adab3ea87ecc2772ea157fde8415796ccb1f6a3d614997ba5c2552563ab9db35baa3e991dc8086e6449ad93cc62133936dd7068ab965c7b2fc96adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fba23731be109847dd4dd6dca19455e
SHA16e6d9113ea8478ded02b02d7f355e6e6116b3414
SHA256aa4a507875e4e8625971e00c87b4a4dd7a0fa865c83cd1b1258f387f8d17e0ad
SHA512808502c04ec675aa10beab04788179eadaa526084cf11af7ddb6b21d0019da949cf3132f800800899717fd5b942fd898d93553c0e48e46a1740d126c683f8891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1304e5b4783dcba7c90ce1331aa4379
SHA13e7d8d330036741139ea38b724988d04e243c9fa
SHA256fd5426666bf7eb88736206727a95131c5421c953cc2010944487014bdfd395e5
SHA512dda16db6148f46aa6b5872b198482e98029e7e704d727161b78ac81029b9cf0034204467fd9fe555c33a25e3d722c04291b777c1712545333a631f125a19a7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeed106784a1977fdcc57598b0ad1edc
SHA1d6738017cda0fc79984e3f7ecd097d2657cf660d
SHA256321880ace5de894902d0e271e713b621c57a3804319336ad83231ad0bef2cfd5
SHA51227997fb9a867e62570e23bfa2511ee690b7a529117aa1b38c31c326b4c966111ce22378bda5a90014c8bd9451f42d3b4948d380a794eb5cccae983bb385c1ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea535cba429ea3c62667ac056ec2cfa4
SHA188c950042363746b2dd074c387bc814faafa619c
SHA25661ba48ac46fcd0b4d17b64635acc9525016e875071e5f98eae1a8632b4b834f8
SHA51269b2a3251df45a82301ba3b0ac88cef4a74ef022ca36e353dc2b5eb9b0b7f4dd98588277b1454d10c01da28ed8490729f9c332e385a5531cc66c49ec1549c1c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b