Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
f5d765cf34616306de86cfac145ee93c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5d765cf34616306de86cfac145ee93c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5d765cf34616306de86cfac145ee93c_JaffaCakes118.html
-
Size
18KB
-
MD5
f5d765cf34616306de86cfac145ee93c
-
SHA1
973f0812e9005f42a653de3e029a1640b3c93518
-
SHA256
130990ad206160d65fc843a94fbbb0d82c68179399145e678e70de7f5a71a22d
-
SHA512
e54783bb928d45084d8f893f8f1189b2de91f0508aeb996986c958d4d20f7ba8e2a668a898c95a7ee532a633acaa6468c8f20783fa33837026e4656199b313d6
-
SSDEEP
384:CyiEE2CpfZ3XX/HJ0e080H0i+0L040F0F0R0HH1P:CyiEE9fZH/J0e080H0l0L040F0F0R0Hh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E84D1A41-7B2B-11EF-A0E9-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000002170e12ac9cae91d4d936a839a4abf8185b3ca31d9ae059a2227ad851ba7d3ff000000000e800000000200002000000097c024a0390f5b0d923bee9a783d19ae6929a1ca0ede02f4fe04210b783a5b9d200000006d26b2f845e17b25554b0e4eb586eab16634d0aa130d16e868ace07bcd42925c40000000f4a254025fdd8fd6cef6d5db6961f607f39e2cda29157272744752c8ced47c6cf262d848fd5944a4190053152f1407a6639b5af01ec876cc0bc5a71512e6a2ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0dac6be380fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433423265" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 540 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 540 IEXPLORE.EXE 540 IEXPLORE.EXE 540 IEXPLORE.EXE 540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 540 2148 iexplore.exe 31 PID 2148 wrote to memory of 540 2148 iexplore.exe 31 PID 2148 wrote to memory of 540 2148 iexplore.exe 31 PID 2148 wrote to memory of 540 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5d765cf34616306de86cfac145ee93c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad61097047df00338d1a7122633370a
SHA175a1ad98bd2e1f8e1c106d520d2d1ac3acc95e90
SHA2561019777e7997ec6c32a204ad47c5209fc69d9aa85063852228ca1e9b10afb388
SHA51207dc277d4b9c4cc51cdf6144bdc182f3143df08ee10f8e132906ee8e31682588b97361b49d4062aae16612e46725ae330da6e95b008e560b058ada845074c654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557cb1f365d7fb94fb1f194f96d8fcdb
SHA10e5a4bb9356af6a37c9f57139d9ea26cd7ba3ff3
SHA25667706fded9fc798642adb755bb10526b8db2eda03addf8691013cd85add21e6f
SHA512470ddd9046cdbfaef24b4ac034814faa1a10dbedc6098e0e9fa10ab1d49fceef3cf3da7152fdd068ec22d03bc7ab9a01508745be10e692e3470adfe715d4d9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f37005ae36cd99a591c401f0c5daf3b
SHA10cd1b0f712221e1fd724f32ffbc7b40a1fb31e0f
SHA256ffaf80e89551d530919b3ee8d14f44b06a913862842394980c348f69490c1b52
SHA5122820d00b775794d5488c3b897dfe81ee8d69b3cb3301708d492c0fc2469a2026d0dab8adbdaf2979ecce27b5f8558fec94297008b155725c03b8aa52350e9a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a801f8633c29b9acc2377e0a0ca90c39
SHA1aad6d369f0e18b33fe63cb95dff0497ae64abb89
SHA256acacea0350b2622b77505820a76761770b3182721590879899c24de409a946ff
SHA5129e19caba255b1159fe67e25260ba5c1c173b48d393eb25d5aeb1c09b3cfb6893819cbdb5270de888d8ff857073e49d1b9094cd3942f1360d477e7b37fca4b135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508862a325af12e394a2403bd68e88afd
SHA12b3eea48cc02f7e9cea2436beff6ac0ce8fb71d0
SHA256eda47e6b89be25e97f7fc63fa0536e64456eb09549613886e2e2649503a3257e
SHA5127ca2c8bbd9c7dfd8c86716b88b592ad1ebe4f35087eeaec632ce38ee3fc7a3e97b57428f49628b09d8531f3d6c80f5a993670969167644300528dca4e6e18c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102029e0ba86b1061696c66b86f89aaa
SHA1d3417eeff891f88d497f2da953ca11b0d9c971f3
SHA2564ade42485354dd25d8c434affe03f76bfc103d09473c6637358c31b067427663
SHA51200ce0053959e74c1bd469a194ee770c9e12a4299df73f38db4786373286a4603ae77a748849062a68afd30b53406426c70b2dcf48ca0265e0483f5eb41a4811f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40d543574ce66f77dd604ffe02a752d
SHA10cbcb5b1688ea5f220bdfdd1c0a5acb300b0579e
SHA2564ac49ce2ff1678d1e54eb46a34b58111bdf2eff615ebdacffcaab5035501b2c6
SHA51202f36caa14e0f5c31a6d04adf9d9ba08c7988a583978a153f0f7247d5aad5a8bff936eb8890b7d1513b61856f5d601c80db521fe15814952f94dce4b725f2627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56265e4463436e8b286e4a15d1a62305f
SHA122a4c4cf12dd2f8ade3a95240ff8170633448d74
SHA2563230edbded51797a82a9949b7afeb8c4b3c8c4607e9205f073c68972de40b85b
SHA512a8edc586ed48a57507418090eeb6bdc404c8084d6b7912ad8b11b00574d87ac77ff49ee27ad8b809ad85f415214fb7ecd096d7ef8c71750a177a52788ba93e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50519bec06b146ce89d222071ae444e9f
SHA12e80aad069585d371192210f80b2dfb0753a3656
SHA256d0ab1e5d4c83e3186fe85bbd08356fb96d031c2eb17926c1c5bb445bd4f6402c
SHA512dcaecf5910d6b4a5426afd8fc2aa37dbc52d1f289452deadca82529db69d3dc88cdc44a911d9cd94839d646e8932dde306c293e0b5e048bbf4e763c25d59a20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af7b920912294769c2c2794f3578cf5d
SHA1157fe017c8fe2453f232a1937fadc182e0791f9f
SHA25619c5677472bae076a17c8dc8b3bcf05585d381302ff2eda4cd1df6472497c8c1
SHA512c56c4bccd28e31a77b55f811300f1fd6ef9e0eaa74b95bf36b0b8f1b2c15b71bc56d8f7893e8e8463d94c742a17ad917f55c51f264c22a643f128374d29df538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4ec3a3462d6a5e1f36f4e00ab7525b
SHA1045cb8ee450bf52ea3c503b91ae55eb6d5a09da3
SHA25629284f249eb5434eeb86f19e6f21d69d03ffa98aae41ff8171d047ecac64317d
SHA512112d609b1b741045c9b452949ca5fad745303abd144558511d4883226d286da478674f30d8aacfe9cf20ec2a3d0bcd7c6f0dc0658f72910583f12791be200f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51061bbfa9ec008ac0b62c92d79c26c5c
SHA1fc540730615d4720b68157b7f55020aa473a8597
SHA25697a66899524c71881cb4fcde96b0e1ca05d0f1998e95e96dbd276ad6e1089ab0
SHA512b7d00f2193efb5d43f998acc53a50053b5cbd5b2d0880a0eb7ff753f70241cbd5d6f04104b2a62dbf32d7abc41013378b2f91f5c857d9e033ff52c7e99053312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f06a2bf7e4c764038bd56ae01ea42e3
SHA19d78e0dc859271f30ce540d9e3ee7c6f1029257e
SHA25609c688ee06a048bee41a2887bb9ee68e2131e473d731aee56fb1a6dc67f94bf9
SHA512125b5692c29605860c3b7dcc8c600542a338616f79f64d233fee0c1a7dc1b5d152968c56ffe1a06d44018456df2f668c554440f9fa7a36d568bd9e61855d6430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ef67363e21c6538638d2ce23e969e4
SHA18d24e2833edd41923759a00893662230bc249ab3
SHA256157ae444c9cb0f5752781f2025526fd119bff8d27325bbcafb8212c4dee5450b
SHA512903f2393d73f7bb52b85e9186f298f811526105f6692c6ee2dd3bf72d8366f68aa70a1f24d25940b558bd35ddf3329394e37271a5d08765494d93a5f50940e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2f9a797aa01bad1dccfeae73336b41
SHA14f0ca5c117a9c28b985540d0098fef668b47d215
SHA256a04110940e4078df6ff0ccc83b6858f408a0d4b16a5b01ffc415d588394af4b3
SHA5128e05d1d1195b2608e692265d45eadacd1c4f4880e06affafff650f2010e0141ff03e57ba9056da51ead0a25563d99f2b8161c38c79bc2bcba0bc14048ca70476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b89594e4db0cf8f3d4c59b6f644681
SHA1b6f617e5772dbd9f64ce5fe31c4182fde8f34c87
SHA2566cc5c2e633fce0292e258cab8110d5c21bb964b5b6831d209c0bcb5cb2cdc672
SHA512cba9bc9cf37feddcbd858ba7943b7f1621aeeaef9a8bebf657b7cb03e4161de930df107983ce65bd2773255450d1a31f95e2b9a393f37c159b898bbd98a10683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca5de9bcf1714583f7400625a4610f9
SHA10389c1a814e36683b86a373318278920ef2b7d67
SHA2561397066fbc01113cbe35dfca715069d798d26150bd1d7d9e1987ff9b664ea249
SHA512431d9a3752fbec380cc57ff4ca1b3281a0a6eaeb4e1c63ec2f04679f39a722e280af230957d8f8d285522beb1dad32fcc5802e83e362b8d3137e293d849dcfc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfaa6598b372539f9fc567e862d30cf1
SHA1c9102b33189726d5c2726ba1c42680f7a14e3587
SHA2561264e340be34eb8750da6630c8a8ed1091814aebf12cb0b38d930eff6898aab1
SHA5126b3b2d4e514954a44abb4a02d59d65c3a20665b6056bcbf308c2724b27a94b8e78519b5a9e690060d66f7bbc155b75c5051082e7c9dab3c258f5e44df0d8e788
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b