Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
00b479e7344985f48247781ed75d43ed_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00b479e7344985f48247781ed75d43ed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
00b479e7344985f48247781ed75d43ed_JaffaCakes118.html
-
Size
23KB
-
MD5
00b479e7344985f48247781ed75d43ed
-
SHA1
5cbf49037b30f4489f56fea9b22c65de17480d46
-
SHA256
77d17cb9b654aa6f502767ed4d72c8da985ee9d4a01f497dc8e0bddb036eacf9
-
SHA512
9e10b939beffff8b685835b7bf14c7af98c339daa5f9b19888131a41983ff30ded110135fa76623b11424cf547e13da14a1dff015fe4a3233152a722da9e32a7
-
SSDEEP
384:eg8GHlHQcq93mlHBOBHtyV3C61ZX0JQGAaq93mlHBOG9uH:orBNyZC61ZE9AB6uH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32ADA8A1-7F11-11EF-8587-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433851599" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000063cb5758bf61f3f5df2f046c95cb83067087b8d23c377c7a9c5e711f8597b7fe000000000e8000000002000020000000bd9274cf2b7539b238f4d145fb94c58d8a492e7ee9d549529681398b76b7fbb0200000002c0dd346caa30812868d6d6af33bc894401d720a194298ee305b376f5da13bf7400000005bb3426cd6979bb57c4a100a161b2c2bc2ee82e9cc5f70f9c5e2f63d8436f0c8900dd9243c081617b164db322f86596c521cf7af4222642dd048b405fb7d2d5b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907b4b091e13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2468 2032 iexplore.exe 31 PID 2032 wrote to memory of 2468 2032 iexplore.exe 31 PID 2032 wrote to memory of 2468 2032 iexplore.exe 31 PID 2032 wrote to memory of 2468 2032 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00b479e7344985f48247781ed75d43ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e3932ad67c22d9c196faf28b689aec
SHA17accb96057338175ed3fda18a862175f982e30ee
SHA2562cadde4a52ca0958119eb407306f4174d9530c037093cd38afa4fe02b3bf58e0
SHA5122a3a42853405e0ed7b8fc9345722a432a2a3f7c625c83b6fa18a6bd399ebdbaed576b8715d1fefe23607c9a5cd55d16b7b1937c924c8230ff471be08478435fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089c73b2dc81cc7a3b5dbac21bfdfc83
SHA10c137a3648c7b7caad6b0bf21653a382232d7aef
SHA256c95cda1d258607f1c1585a17e1182c869d15eb5c113678c4c691a085ab43cb0f
SHA51228d177849a816aff9a534f828585ad5aeed19fbba30ed0ca327f38b5b42e5e92bceaa1669dd3c6910b447ad59412560ab10e8b74d082b13d6d058cbc729c5433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820207586f4b8a247d4f8202a9c231f0
SHA1b39bb8c563252879dd8a1b3cc66997df6663f582
SHA25696238278b58d2791ef9bcea4a582f4afd904aa288427dfa40b24e47b90f9add0
SHA512de54af7dad6c9c0b6c6b6773d9eeecf9f9320fe1df52723ed8f0887dc702c97d458c2f41d4522acf3e847c4bd3006ebefaa335c35d7f1f2f7581cdc98081053d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515dc58ee4deb341a22ace22a712d937f
SHA1610de190d00dac7439161ca82c9c7f4654f499ac
SHA2563eb470ba60c3cfb2986df2ce4bd9f392ebc6528799f6fec5a54a777977c82781
SHA5129af7d07c606a9baf4513dd8f58f697f719568971af216dd0e3c5a5d4a5139c5a9363839678d29c7098f91db861d86999b956730b0f520b405d0eaf682c4546b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eca2455ab46c81e2c7559a49ae72678
SHA1bb92f6638512052042a6429f060008d427c5c0c7
SHA256e32bc8981002cf1a68374baa7973f4c19b1b714bd3753d9af2a746ed82b33b2f
SHA51278ac0a5e78be6cabb0f9ac8db6e4c23fe8440c33a2dd36ff50f2e8be22b3664e318392d05bb1e48201e769f23cd788348c992ff70c7d21a4222576a3b52beff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50293da6a70210f435c6d21079b14fe7a
SHA1e8ac87cfd23e615d80c6f3eb79a307d810083746
SHA25621f36c12ad6c8562cc43c400368f1dce7098a9587df4977f757cbad5de3a4e6e
SHA51237fcaeaac3c0f55f9924315db2b1ae893dab7f84054313dd7483bf4368e0b0a13e9eafec42cbca3e77dfffe70dd0446b7756e9cd31a11d689cf8033c0b2603d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99d12453ab4b169bfd03100e26522e2
SHA125793f2f0e6799ed1174b121b3a88e5a26f84577
SHA256466e1c287302f28fcc7554d289f96b732730b669b83ddd53b86a4cd5f3c564d0
SHA512c86998bac50d2ceb36c8c087f5f7ad8df3b724f62eed0974f219b96e13fc815f7038c684ec5e07fcecd7662b9df18280d62415024fa1fdc89c4f4ec6b26ecf2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518aba5287bed29be2af89e6167943f03
SHA138d32d7c6d236bc553451a3b664be848945ded9f
SHA2562dd75ce22f1142ea8d700947a2b1490997778e3ac507a1e760d14309832b7285
SHA51216ccbe7c1e989d54916927af65c53c4bdeb50b7f40bf4b0d646159d73f291aeba078c4dc70e666d927da6f72870223c7c26e4a730213bec99121465072dc329a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e30bee6ada08a221dd56e8b9fab4909
SHA1a4a082eda53138e9e8fc64f925dce5a56a7143c4
SHA256f177729dc40e0c408b8d47be2dd1ddc2304ba1f7164efc3022f55eb69a6fdfc2
SHA51299ac877414c0b7c462d274b5df7be994910e0dfc213c99a711941bb529f57df708502a794ae8c3ea7e8ba7d03a86445fc28e4a0c918cbc13d42d7b5f5b375cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc03231b8728c46471dbd70e1578608
SHA11a61ce7de6384011b950d71db4e4ad86c02f5131
SHA2560be62edbb1e8d391b1640424465be2ab90370e8ccf100649bf671c87668195cf
SHA512cec35cc9250719af8bfa910b2349e27e93387ff05a7abbe06ffde3fc5270b38469858db7bf7942dd35ddc0db885a0d53ad63123bbd4fe4d12461128c20124abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84e2906e676f1c07efba936e77b76b5
SHA1b5c7cd64a03fdb742741190a2d80bc8623296955
SHA25654b2b898a176f341cd8f36776fbd2d6e0b10a6e02a360200305fc21cc25376dd
SHA512d2cdeb1e37661fe08fe51e96e74454065f39ed1b8e050c1b8a8c4ecf1238f35536f6a4ca5a73047c13d5be9075a104fb773909eacce8e1f814fdbccf107e6815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56696e35097f26b59c81aff816978b73e
SHA1644e234279b14e8b56efb0bd615f4dd94132840e
SHA256c84cdf163b70a74603c2140670dccc87abe743ddcb4e3dc291772b85ef956c4f
SHA512c13f051b0331e102608e61ca1281ad7e54f02f885d039a2fecb7599f861deb19feea017f4c236a0c1d3cdda6205ea0db029592ab2b6e71571f8026955bebfe56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8fd8d57ef8cd45a0b6adc57d200fb9
SHA1d23ba78d9650b78bb3ddd96bcca5ff669cd185fe
SHA25633dde059ba77f9407c49ded48c60a8414d26c7d1b028b27bda0bdf3aa3815041
SHA512706ad0a33f124e75d8991179c369355e82dea3479edb0145943117c5c3bb970c54e37bad0db8ea394f8cdf920df0ffcc45523577449b2bc7d093e961aeca6662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554924f56adb80afdcc317ef6b3afa497
SHA1c1864882be62a4cfd99ac53576b3ff454df499a9
SHA25659360cb2c0e1324750ab4e7900001e4d4819a3b31309d40c298c73619d737557
SHA5123606b478ebc540e2872d1c32eafec99086e724307893ce2be425b6b7e5c36fad1b7ea159580d2a304dd5e3b8c4d443589d51ca9fb748f64d68ea40eef1cea487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00ac9ecbe183eb012efff83d9141803
SHA1576ecbee6ef9f45dd41d0bd8250406b0050ce5f2
SHA25677eaa05eeb91c1853271d6052da64d1e2716af4f756e1a2abd364d3ea193f2c9
SHA512cc97533c235cd25d599e948492b6a567d36778de3bf6a633a7d2f2ddf9d921db3ab6d41809a43a7ba92954767a3888ab6578dae720fe8e4de7f29e438b9c508a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a418ba4c3b0e5eec24795681a9daf6a
SHA177d5f74ba3951b2d3a6118ebdf55f0dbad3de725
SHA2563dd163f327749fd116fc5ab6d44ed08ea752a9c3c9d845f36cb00e58bc3ae615
SHA51269203b1a636cbe5b19c78683282b4914f92ef6b965dbb5b8bce4fb705edb3b27183d9af9b1e0e4a77df67817486e06a83655f2e5fda2165e19f241c8e4ae8627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534435d2abf2159cc3c9693db3b6338dd
SHA1e879e20695baa1c4763c42e5a84e361a6f4005dd
SHA2562dfb0f7d5a6aa7ebce9c34580cd14603ad8db72bfd90be444d38c1b0f45feacf
SHA512fed9a84195f7b550b1765285578b8018c473ade6f33983893987a1553a2a8ea4d3413ada3c9260349be30a82ae2b892b5dec3a004baca7eb437405636fb1b1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539315b3d37d0cd8ae522024aa905b6a6
SHA144ad97d724833cd058d19ee056d05fd029a338e5
SHA25675ecc65aa57a54cfbe2bb57905daff9d5b7133f335cd266991b3e64ee5716498
SHA5129baa74501ac0fe48080e9a11ada9e790613f92ab039ed556dbd85b5ea5dc722a6c681bd353657a4aa7e1ecfe6d34943eb9a193246c7bbcea98ca6df744d5fc0f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b