Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
5597bf2965f2869543a1a16d2f42e0fe_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5597bf2965f2869543a1a16d2f42e0fe_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5597bf2965f2869543a1a16d2f42e0fe_JaffaCakes118.html
-
Size
17KB
-
MD5
5597bf2965f2869543a1a16d2f42e0fe
-
SHA1
9d0a8d500c74eaddc1911c5577ece05b4a9c24a3
-
SHA256
a494b7a3dbd101f83ea2d4d1fb55fe8fb13d61a12dfd39f713a3c9f389206fa4
-
SHA512
64ee864f5f53c3c0f57cd392e88ebf1a388b9bdb1048dd6fb5472fb0716e09013970230344400c8a1446d990168e32d4c5d43124ddd43123f21d05e6511f28f9
-
SSDEEP
192:Ed6qYNPMMnIooSGh/idPgKrMfak0UWzcEY3huNpx8ikiuNphVa6eyS8:EMx6AcfUoE7ehVa668
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435389402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409b948b1a21db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACB42891-8D0D-11EF-8CC8-424588269AE0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a435a3d246270a4b8ade61d8e7a46fee0000000002000000000010660000000100002000000057f6712d5c448f3df8e8003f723284b0551b9fcf620cf83852288bcce4d4d83b000000000e800000000200002000000006c9533efbf0aba7071600105995f1f1eea1cd84b1b9bc46449c26a89d608d5420000000b5a6a859897f7676868b604e1d69a3076c08df1711f56a289dcf317b9601df5e40000000ce80881ec95b1dc4dd3ca3d043a30ca64611843c69dbdde79cb209cda3e50d0223a0a30525d4b5e8a1d1dec2679c1c1c597aaf37ed4ece8ae60d416fdb17bf16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2660 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2660 2112 iexplore.exe 30 PID 2112 wrote to memory of 2660 2112 iexplore.exe 30 PID 2112 wrote to memory of 2660 2112 iexplore.exe 30 PID 2112 wrote to memory of 2660 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5597bf2965f2869543a1a16d2f42e0fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dee8af0d9e8ea649bdc117fb33a3956
SHA1d51f361666e255e20dcc25871d1d780d703ffed2
SHA256068b55137d886505c371a0d10e4813e92e70a1f769b3a8e76121d493cc49ad29
SHA512b07a181a9c073d8dc1a0fd19b272692e85bf6817c30b2c3884f47e6cceac5b48c44cb3aadf36f6d22be10aff2a9b166b9ca57cd49828e20489f033a13dcd356c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56912f4c1ffca9566cf1c320d6b69e421
SHA13680700aea713be0564d79c1ce90b80060165cfa
SHA25618c154865f5eb6cf85a1c947440bd2ba43316f4de4bd64dad113a182eab43681
SHA51290440cc71a65c5246ed3403ec78a0ab8909a35b91414a3d4d2e5acfe75dc017754da92bc5457e548b168f40c4dcf40e6bb688bc0b86f739b5c782cff7434d54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f4de9a4da70cdd71cefe57eb3d36c0
SHA1c043ee784a5face018d8fbaced0b021ae5bbc329
SHA2569442784a81e1afd2807d371f473cb42adaffe73162654259484cf16cde5b6b96
SHA512449de354edf7fb3fdfdab94a0c44421081616a5b2106efb8d29faf867c1e9d42e26983d0b9d65c912f3f0cfe0be32eadcb3a28e7b0a3680b27a1b9980f906de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522cdb8b0bb9b1527d1a45ca57c60c2eb
SHA144903a8a80b531a8bdc5fe2e1535f09c75d672dd
SHA2564e6acbb2e46e0a702789219f8bd674bc77a6f2e0c2bf8487f3ce684f59a0db9b
SHA512492f4a6695f82a335bdf596388e4f74c017f0e663c938724b594e0a794942cfae6d458b88f4b15a3963bf2a38d0aa653e2c856992ba28f9821569d2791a1a75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1fa6a6fbc0ad4d1864097b59ced1e9
SHA105176b2cea85b37f2c5b989d0707371f319c7e29
SHA256367b5e97597289e2f5d478e8cc1b7032a84ee1257e31333798d972097ba15697
SHA5124062cfbcd2fb7e595240b7ff8ed827163b722257168b875a38a93e2e1ca7f80c124c406d916ddf8e77400a19168e743dcd37486f83495600b4dac8aa580ded27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78562165ea1fbe4702b47309ead2e7b
SHA1a59bdc8a93e7ecd55342d0b72c69d8e96e0c7851
SHA256914a4f7611df3abb017e575e4d62325b63584f34a324b6f48b85d3376ec26491
SHA512ca1426c09663c123624763a0a1a1ad95cc75ba4d3dc8e7fd0fb314741d6de40d0eb9837b27672ee14e58e5df721584446fbb584bc1eafcc3b0967c1be0300196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512624e340b54ae73cef1edaf6b1e1ad5
SHA18c347aa39fcaf88c95fea4a888b0e4e139e80c61
SHA256b889b366b5299c6b4eb8b404bd8a4d42dc5971a77eb714d6bdb8a3feeafbed91
SHA512fd8af6e5d8e0ad2c8a6d5ae77a53ee4d054366da8c0588cffafc86adb9ab2dc706031a8d6f7c73a2ae08c85299c6e22143b9636a5cad17822ef7c759c09698b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056da627bbfaf2a7707c689c97b26338
SHA1151bec0a17528bea65b0bd4fe2e4a617d90d7d73
SHA25604f9a0ac7dfe379e5e37d178eb23437bcbac3e6bebde161598be00aa6040ef33
SHA512573ea89426cac0b5ccbf70981d7b30ab48f5cef03f0d10af4e4afbe10ac543f52f7b06b571e6903b7893a486608689d0129d3649f18eed84275919664c489b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5858ec3880e8eea31a8f4d7c52f06b84b
SHA18bef62dc8d9bdbef56ccd4d1ec7bd714602af16b
SHA2561a9a07f73aa50d123e32148ea3478900589ebc72277804ca6f60347676ffbe50
SHA512b79900c1a0d12c43f745b32a7055e8602d96ab259e593af1a4cf671ecd0aab569752cc8c5db8d83d3141a566b227e13c24ceaa4ab23e219e93f0a53dd0200c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847c152948486e1c0754af4d370b33f2
SHA12bee23cedf69c337ad7fcb5f0710e265626862bf
SHA256c367157af2342cdf226f95c4acba639e60257b95b6cee84b6847adfe00c1c06a
SHA512ba9b4cb97e068d108700bdc3eb4b8e87794810a5d9c600f769264911fed121de652bb6406d8c464dd8d423efb142a3d8cf5305c7d1f4898b885d1e773b43fb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066588d54bdd8f6eff7003c5b02be744
SHA196e389eaa1806ee6174911813949dc00c368cc77
SHA2560b22580d7d024d4930bd1cbe33f1d349ac1831cf00deeda572f8aa31c6d89d63
SHA5129c85c533c503ef7aef5800985ace32fa4797a5b4de95faf4f01e548ddfce1cd5b745efeb59dbce8831bf7a11bec95e7455481b1c1040ddc68fcb6f4c9c7bd1e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e40fea3377f938654f7cc4482c288f9d
SHA124c26a44d51e858fe591749a39feaf6b2112df1a
SHA256a45fd3ff5c3af0378a598c93a9cd45ee3ba77a2d648d2d5c42158d147e15a7bb
SHA512ae18987291e1a0903feea3e175230a237a028ddd703d49ac1c24e36597d93300c05c8ad787f1ae35285d5af8bbc57ca386483b530e6221017de54de32b0ea87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53503102805521f9a5f759c01f1ebe1d5
SHA1ec6b41a3e5e574a5aa93b5f1248416eebb5ed15c
SHA256527767f932bb78be65c4152a21839364ad3bb95a4706f217acf42c70850adf3c
SHA512fd6289b5772524471ec70ad4f3bd8c79af773e1ebf5b00fad0c763b426a6b92b4b53fbb91c3f7deed09feb781904f682a2dc1efc8f1954c1e7758091c32e2656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ed28e290e0ef891e6b7f4edfdca3e4
SHA1931cafc9c8bd8b9751f6a04ce3ebd89f9a9a8664
SHA2564fd9d52c81512d94a64e850874d71b5f01470cd532aed7af4fd64e71c6787fcb
SHA5121faa5a61cbda7d628fd17abb6e39a9974711908da72fe340671ae5975c3109b6c149ba158f08632adb84cbcb2dcdebbbefab343da65f2a9d5ab3a4796bd6f331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ac61bdf08fe4b42778f148239f138c
SHA1883e675bb54123bb1b313dc903d4db199e303764
SHA256f9b4d4a514896b4e9e72737cd0014ebc46cee7b261d1700ff1bdb834e72d8678
SHA512a085c4e5129241b93a4f06b08857371b15538fa6d4542ce1fb9e5bb51733c8301ed209eec1a84ffed568064077581f68ab34b78a33cefc95a57dd8eb65ffb551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9ce3c1c31c37e2d9495e9182922715
SHA15fdffa9c6257b5a38a4543d6c312a0ecc643b4d6
SHA256c73d250d8afb4d64b174a71083ae6b6cac69559d0d53626d8842a9eaa79d47ab
SHA512f4a23194630f63a6f7389371ed1a90881677ec01a900e3d4a61ecc3bee5470fd281867eb27af0e7a45d9b7a4fe67f470b18d7d6f9d418d070028d4d1a84b2b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52429ae0cbf985631f6310e958f67adf1
SHA1e95a7397db555aa4d727bfbec46d2c406211c6f6
SHA25672f4cab9d8f0db2c41340ab443f3e0a96256093458fb606e576928aae5774718
SHA512a52a425b58ff9b77f5f715caaeb32dd5caf24b08b9d39a83683aba095bbe363f512d9cad256f899c5f12b79cd4f7df27b47ea06973a0514ffdb29ff805e4be37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515b69f90715c26d9d6d3e462e5662ae
SHA1098e1c49e55692be3a64539b737ed076afd67b18
SHA256078f2bbb97f9cb660e0f63774e33165afbf1107247728f9c82558eadcfc7e44b
SHA5124232c3557b86a05268da779b8fdadd3a9b1a88f6cadceb6d3f1ee54c1dd93ea0de355f9c8f83c50cb17ba171e17d5f7988301870567214389956d0e6f9e3b9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db45ff83ebd634a98bc72ab993eb380
SHA1764c0cfddab750ce22074c3bf81343d80a8c6a9a
SHA256ddf8d062bd6b814965fd0934055e8a92a85b8b8c574169bd43b7c8c37de739dc
SHA5128b73d123b37b2f032d04b466a1756112858f208bd8a83c188097e8d81ce472a1377a5d6a6a411fc0ac88fe5bdd621da663b18b0ae6b90ba62427bc056f124904
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b