Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
b4f645847fa4964a35e88f45e5300c4f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f645847fa4964a35e88f45e5300c4f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f645847fa4964a35e88f45e5300c4f_JaffaCakes118.html
-
Size
28KB
-
MD5
b4f645847fa4964a35e88f45e5300c4f
-
SHA1
b1802cc93771b3bd2956fd879a0aa3f1291cdc23
-
SHA256
97f48841150e2892cdcf33a208bc51a55f897b9b854dcefadc629e99b0cbc12f
-
SHA512
3dcc7e324ff5d8c38ae834c8c9d587bb9a95c91dc343d8635cb476cd7158898404e81daa0700368d86b88f6d64622d5bc4b121f2072d9a1f3f0f91bdfe7b4d1d
-
SSDEEP
384:yZTfMFqaJz/VoUKTCCxuN9zlv93Q5rjT+A:yZTEFP3oUECCxuN999+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000600038860b40deb105216c1d12427ac21a41bc1f616ccd4cb84fa748d45000fd000000000e8000000002000020000000112dd0b643d6515863395a241cca3c60091a488e9baef14422478e40385ae88e200000006ad43a5a3965b055462c34accf549d36b3ca543c733e131de3ea3d80f68aec4640000000e841b2d537165861364f33253080591dd8db35b24c93644b59717ab7ec4b445e018fda8be26a9461fdf0dd45316b75740ae92f9f6885dd626d412a8566005aec iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00077e2e742db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{098A7B21-AEDB-11EF-B984-5A85C185DB3E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1928 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1928 2196 iexplore.exe 30 PID 2196 wrote to memory of 1928 2196 iexplore.exe 30 PID 2196 wrote to memory of 1928 2196 iexplore.exe 30 PID 2196 wrote to memory of 1928 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f645847fa4964a35e88f45e5300c4f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa9cb9729ec31374f16bf196bac2d46
SHA1f89377e1a0233c7f079e84f428ecaab5a07ef5d2
SHA2563e7076d17f66042902a58a7fc3605fe20176f2ee9092cca6a00216a65438b92c
SHA51253d5ac96fd7354a054954282946df3a17283bcbd05e7dafb878b143fa5423d7e9aa10e4fb6e9743338abf0f6a5854dff611bc3a12e98b9ab4f71f6d2d93767cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912def09a0ee7f72addc48b04dfdb4f3
SHA192fabacbcdc17c81b488f107525b98c7515c022d
SHA2560b4696c0bbd921758752938a7810095cd9e7272a3461e94c0f90d16cedcf074d
SHA5123a5cf15d0cd7d1f66658a77d456152a502b54d742393c8dd1d2b338c1878c8567d67f16c5bd8edc2e72fab4e701362b1710f5b0218e20d5738e73ecd9b98251a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518807e255a67289940fcaceec3a0e975
SHA11950414c578829534daae0c9836ca29be849a06c
SHA2561f88fce193af00bf26418d054d947c6517edb1f429fd173226e6b6afa8919d1c
SHA5122dabd6ea93582356204bf0da8d4ed638bc01e80bc17906e83f5c031f24aad22b87823d45c0d142c7b4803d5e45dc9ffcb2d083de294284385ed26ebbad8d4ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffca1e7144d9e63fa5e70256204b6fa9
SHA19c98fdd302bf589c8ff2bd07f7c6eb00e9d64506
SHA25621734d6058159ac1b470cfc5380b6c37def952b8ca493feb573c0ce515ef929b
SHA5127ac7ef253d6a5d014ff484073008eb602698492e5c6b902f5419609cb94795009dc6615194e306b9451e9bbdc5731d30a4b47b993acbfdb200d2f76d81e98f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c387b855d33100e868fd73e78691a9
SHA15aab6cf84efe66524f66c111bb5606dc04bda907
SHA25652524dff659e862ebf7bd9089a98a5cfb07bf2c2b408358debaef54c1bf09a92
SHA5124962c218fc774d64902e228f0cdab298cb4f24c7344c2aa2488cf270c566678744d5fa0ef21b8390052c8e3018e4ef73148be9d092956af40449426c98855361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefd2403f4ec0e0bf7666589387a4928
SHA1686ee031fc37eae5cade9f72bf348793469de670
SHA256dd126d147d731ab91bcf5878e272faf76c423d9d12aa307207670c36ae51519c
SHA512063e537b26f89aeadb8a6761b9c90a96f59994cbc642dd2cdc887c0a40369b82fb7ce33b85fcac4150e917024d25fd07f06d313713d6e7b748a00341c504275e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d8bbe71f81eb05d209bfefe2be747b
SHA120b231c0ce597759fc0604521cb42b4e2473a871
SHA2568df03db30550d572609b0968980abe44330812a34fc6f77941c8c3c4cbe67cc1
SHA512823c0bd9d36952348ee51dc56f4d2615bcbf9f1eec3f934fca95f1c955959805fdd705ff29124f93d0d1d50c2ef4d717325225baacd08bfc4ae8e6a7e873aa6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e554940d95dc717ce8fd7f4e6a10af9d
SHA126a5e3bf3446a45b809c028b5829e9b94b012d42
SHA256237e633b7ce36358268298a1ffee9bb0798e05d07fef78d3b20596f28245e2ef
SHA51209bd49f449d3fe735a5d89c029a113794a1513123920b2ead2a9322239be13392ecc9d9b2ab6f7538055cc63f6c0dd9419b5219336a6b74e48011ce30833bbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa5313f44629f130e9be949532334f8e
SHA1011542b14825e73ba6ca7e55aa132a2938f05a06
SHA256cb8c97abf1ef639d8c7e5f812d399be9011ec3892adb4af9f730637824441895
SHA512f5ab51dbea94a42819c92dce5dd20e21a0b1739dc6697f7418a8640e6b294aee642ae6f577bf967b7ff334451b2dfdb84f147355845111f890ee7a15f1d1f2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e81371223644542ff7e844b416b3477
SHA11f4251d7297136abe749c2c19f030a3634569322
SHA256958ec9085e1cedef6e11eab41b1de96fc6ddcf4473132d428e83afff3660c4c7
SHA5125654150621ff962a7b9f4b23e20c98f0595fc1261713a8d95f9b1874908904a50a0b433595ea665cc10df90e7fd1b43f9cf3cd1edc3ceb973f3904fe3cd1214c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876b3dc860b1ca52731af4481d0a6e5a
SHA1961b8fe50bcd19460f848d72aa8641dee1dbd7fa
SHA2563f171dc1d5898a0fb8f211f57c82bd3fd8cd315ec877336056129afb48a620da
SHA51240b06134d1b91b17171a2e2c8e8359a1e48cd2fb57d354be0aace04d16a71c9a051ca18c15ed5488673d5a4eb6d079bc056bb9ac912f376f4081804bb86e6b16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b