Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
b4e9a06f881b685480a6d91501d49ed1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4e9a06f881b685480a6d91501d49ed1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4e9a06f881b685480a6d91501d49ed1_JaffaCakes118.html
-
Size
10KB
-
MD5
b4e9a06f881b685480a6d91501d49ed1
-
SHA1
63a2fe32ecbd15011302553a7d725ffc62d2475a
-
SHA256
53569df33bb1013267131d455fd2ac08e684006905f8925b9db2d2d714d2b255
-
SHA512
f7fcc8d5fd8bd904d4a76f4840e4982deb8b77e6a885bca9eaff79beae350252a4dde191ce48087522f4529c8091f45cf10df3ec948471d0bf46d11b18b0bfbb
-
SSDEEP
192:/PKDJyjXIRKDvo/nymbfKIf0W3tQjUiYvxAj7oLNYi2MYzpLluW3tQjJ:/CDUFIy+3tQjUiYi7oL+LMY/3tQjJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105009" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e078ca95e542db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000000c3f9d5e60a290ecb1766d57ca32b6f6073680d058f183d72aef8ea0b471ce55000000000e80000000020000200000004be210549f45f8672a17eac6a6a54aa8ef3fce36f862e1cec7c3e1ceaf30907f20000000529524a3accf0f2bfbb5f391195b0b40caf2338203a8e2e1cf56aab3974e434f40000000566f707250c742fd1e6850103f00ce7a3f35538165f25892b1bf881107be1d7ccc19e04941ce67043b60c5c336fb47f5e804e50f84c636c607a8c5e75c8ae9a8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFA31641-AED8-11EF-923A-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2900 iexplore.exe 2900 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2840 2900 iexplore.exe 28 PID 2900 wrote to memory of 2840 2900 iexplore.exe 28 PID 2900 wrote to memory of 2840 2900 iexplore.exe 28 PID 2900 wrote to memory of 2840 2900 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4e9a06f881b685480a6d91501d49ed1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2dc9364d618ed87dce7fcd2df4f3899
SHA1f675194f9e8ebac7e06c9e06ff585ae774db34f1
SHA2563dd81f7d93f7c1ce52386e804f4d2c42468df23bc2e500fae4434825dad33c87
SHA5120d38121564768e9484780aa47e4123a21a9b5e01ccebf782e33f0c1ef61cf550e036279942139a386d267f36699faaa5e05bbe03bdfaf678cda913bd9a1c37c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d91eab8311b9484c35abb8588e9b25
SHA1082bc774c209fb7ba27dac9f694102109e09c4df
SHA256d5c608b01c35df10c611aa32fcd197695114f4e51b7fb6f283d540cd975d3307
SHA51214823bbf5739d8da7c4d0f3e78b409b5279a85673471e74be3b3886f83c97a9361ceac789838a0763b59cfee90b5e9f58a84b299afd95a97fec9ec73f631dbbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e1e16249b0fe10e6a0125ae6f44cee1
SHA1809c355c6f86dfbefb845cfe664468b415c6157d
SHA25642aea19401e83d4ca0171d1a564f3673272b1136d26c39264e1f38914aa0de85
SHA5126085afe7e651409bd0bd5621bbdc699159c7740e5d3ca58d67e69d727224ef25b06d6a4d92361fab8a6406f73c543679dd0e17c7fe16be8ba18c665d470e9637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51670ecc2f721f10a0f9d054d05620171
SHA188208fca74e7314bb7a53ce5924a129237042df6
SHA256b841bdf34e266005b91f8b8f4430d755b443a7d4182c795b4e0b1b0e5000ffbf
SHA512f34282ed5a911e2de398cabefbb934af764a98839bc8b52f8bb42e3c22cceb0e6d2ec3e03c3b7f96846ab0c46cc760fff324949a6c91ea0d56464d86f5b5789e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532dc22eb9a08837a49de1c5cfd166bb9
SHA167aa7942914c15ab7a669f6c0d330964fcc18a4a
SHA256644dc483bd32b5f01c0fb23051648fc9c08f2c91f39bf6bef130304a337f2605
SHA5127f89d61447f03e3912e2bd88613f78ff0cc65ff51fe27fcce8f95c36e929d1a8faf0241b82056ebae035a41e2af54a534dba4af10c5c1a0363d04e621c563abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1934f2084d21e9c86abf05d72046a74
SHA189f20bbf91b36d9d5830291f765dcbfb3520c2bf
SHA2560426704dc1a6e81ece7f49c1e50d0ed7c10c4d12a649770b4c27113f5e6ef246
SHA512f01b129306b5036bda78adb4490a867121e0fff254a92596467b704c15834696ef1923bafc9754bbb479c17b6116a151c01ae0364cdc3823d6e7904336b8093f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7296358ad76a6eb8176f621206b547
SHA1e47b2d27eef5aba4391fe16e0a0404afc556e8de
SHA256fd002344e01c0abc05f3dc61b336457bc996070a98e6a62b98815fc3b017225f
SHA5128ce39a7bb4fbad658a48afe9c823007e62a9fc41a01d4f600e2e4f41a1555351869625ee9ded334a26a6e83d70ebf3e625d7041c612702f01c1c024c43af52ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4e1c6e7ae2e514dbe2038e8766aa08
SHA1247fdd49fae90ec85ff4588dd34f0e9180d63d4f
SHA2569879870186225c8f0d9963b96974ae3c4c0a68cbceba0bedb768adb813b6c259
SHA512c75cbaa61e6cbc032bd8ad02f53d18e20df3a0072afed3c5602a02a78db1845223d2fb96814183a99367f76d248f95a7728dcb73c1e840bfc08d2c16791d32f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52e60fb7f1b7125a5c74403d6c79a98
SHA12c694e85afb93c635d7698f5694c51e86286b829
SHA2564a81a70cd82116cb930e569e1186d6deb13cfd25329799987672298c0ffe8efe
SHA51293c03a06d9bdcb5b9b70299ec327825474d7a952d465a8bbc94f18539b4661e939f19744d4dc759cbda862a4a19a0f64ac683b9f2b6f552b34c39acb81e05632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566f2d09e987e6364ed4af29c54c4cd25
SHA143c9c0ffc7194baabaf9d9117e7a60e680d80135
SHA25628316ef99b34b9883f565b05f002823cad6b3d3929ce9d5fc0231af6a1b46b9f
SHA51203a5afddfd9749c36962889ef9a9a2a5a451c4834aba131e12984dc2fb30ef51593e9d4e9334178d794c2eabb25f713e78da6951983d931e996a807df40cf000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f52eeb8450515de722432dc0dba9b8
SHA1842fc8485e14ea3e969e7d9dac2373ab98d52dc7
SHA2563b9b2de3d50c589cac14dcaaddfffdcbc0b4479ce1f039343c5fe78c76e0a0e0
SHA51292def47a16aefe06fc2869fc5796fa5d84279d8c86ec86621fca360200710d4ee9cb89f7e8f79679d3a58c86c2f32bf168dd00931587d829ee77ecc2d7f02ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55a1c920a80112498ad1f67d43a21e6
SHA1f05a5b2bce7559141deb102a2dd6f47d2c3438c4
SHA2565a26f70ee995751fc87b6980964aa9ccd689184b504fe568b1a8d3474be66a85
SHA512515f81a7c74b03bce5059c34eb0fcca7f58a8a01216f88e6a7d013748e4b3f3fb84c1492c033649a61cefc976fab2ce10ba8eb0e72314fb23b7008b700d41ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e730b5384d851a9913a73c16486129
SHA1be5036faab86e68a8835309068c3e0cbdfcb5d94
SHA2562ffe6a191e0252f24abc911faa2efb1a30f25ac436001768e68cb206fdaa0546
SHA51221069877677d02c151d5274e9f99d32df3bdeafa23cafd5ffe181ee541ff1ba25450aa2ced87d4d437e036a1dca5e8f3f8786199d5d683006c2485f5fd4a557d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e06186bc8464cb26d5f2fc9232773bd1
SHA19ec02ce259aeffecff1baffb7c213062b4ff800b
SHA256266ffc9327f615aa1afa1a0984e58e4a5104a18fd529204fa4d65641e2184f76
SHA51227919e4656d9ad68193e94064f17cad71bdf116ef4798179a4420abf08e646201d381ef3b972a864546981e355bce338ea596cabd6db0b74fb553b02d9217c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e3c7a18f02e26eaffe2fb39869e66b
SHA1170b12774fb26f11270c89051edd95c841cff94e
SHA256583c2ebd06ada49d0c1af32d9cdc86c370baac8b59b8eff8fa3541377449299b
SHA512eee3b4e72ca20315a17412c363def561808d3f70e133dd0abebecda4cd14f92ce1b7342f1c079085e0be1f0f28a40164553b97b5284778e9bc58d66a35c3418f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507bbef91546a58c0d7c61160cb45acb7
SHA158d28bc1f02c2a42410f8c81c059a8dc392e9e58
SHA25619b58d218121e45fbd841631e4bf6e82a6f7403f41bc8f6ef5251a003e9e8c47
SHA5126ece1ba8ac2c8b3b161ebab8e67b85746411bc166ebe165cc19e3f743241b8b7ce7999d3059995ba9b3be7a90f242edc0820c4862c612d007c970ecdfe2ea8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488eb20437a7daf8fce02f306c9c3ce2
SHA12ac5097849fd3a4aabfc26e21d0042af8cf45353
SHA25673e9233c09e4ada670dfe8d99498d8682fc971911649f61f623b5dd8c1ada9ed
SHA5126dd29980bd332dd3af2b877348a789f59c35190469c76bd3819ea02579ce90da7d8de401af6d873025e8a0bcfb68e5010cd92dd7923f2a8940e3f07f61465dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c388dfa5315112a5dfae493be42a742
SHA1d379bc5b5bd3fc4137cdb0e56febf328bb3755ff
SHA25612195e9c06a01fbf295d584c671efa7d5d364331b10911d1043c57939e35f9ba
SHA51263e5c4d23a6c3c1b11feee6059ac175c30c4f343edf94e75350e9249118a3ffcf290162fca21815a18987f302d380c24250a3ace0181bbbf660e9af3ba3b36b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ab888c0a4045b129659b7256a8c28c
SHA19fe8acd63a95223607f7c61cd46c44a574cf58c3
SHA25693b59ec3f19ca23ec55b930d1c21209345d241f70d1da4a5c772c5c1e48ea1da
SHA512a14e254336b8957353aaceccc3585f2b2064e8ea2f920b744084a2536a8410baaaba6378de9cfb223c1547000197329254bb9f89ef983e8eb13e42bd45b4c69a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b