Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
b4edfce2ad0866deb0195b42e335ecc5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4edfce2ad0866deb0195b42e335ecc5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4edfce2ad0866deb0195b42e335ecc5_JaffaCakes118.html
-
Size
53KB
-
MD5
b4edfce2ad0866deb0195b42e335ecc5
-
SHA1
c7faad857aec925de64bb95f14323717e3d69963
-
SHA256
bcbeae29ba273cefc0167ff4b653e9df5db439fb240911b715cd60125fa45143
-
SHA512
0598965afb22ae57fcb6f2136293c9a157bd424561f8f0113032fb1913d1194d0eefbffbeb7844d680ab61828384ce3385d69436996c13c0249b58b9be80b5fe
-
SSDEEP
1536:CkgUiIakTqGivi+PyUMrunlYm63Nj+q5VyvR0w2AzTICbbGoD/t9M/dNwIUEDmDb:CkgUiIakTqGivi+PyUMrunlYm63Nj+qm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4084c470e642db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007ea2985b9f63c9e7a3f30cd88e5b2396f574629580f75b424bcde0f03927fb64000000000e8000000002000020000000e2e2c8b02def170b1b9a1887f3fcf16970c8d130c8304da6c65afef46bb0573c200000009b60a1f6e02677207b9c22c93854985feeea20fd57b19e06fab42a9e3fdf343240000000b669ffb6b65db275cc3ec2fb30c36710252ef29b27e81d130a2c5d16cc6a7a1330a20728f883a353e28017ba398900eecfe1fd2b6d2bb9c3c1aa76a0748faa44 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105378" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9AF93BC1-AED9-11EF-93CA-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2592 2280 iexplore.exe 28 PID 2280 wrote to memory of 2592 2280 iexplore.exe 28 PID 2280 wrote to memory of 2592 2280 iexplore.exe 28 PID 2280 wrote to memory of 2592 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4edfce2ad0866deb0195b42e335ecc5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed23fe7ffe5a886675b195a5a7808914
SHA12d882e8b2d8b4e87b274908d7ba2fe5e97b26712
SHA256012248db4b9bab7bfbc46f98f317e5aa8acb2b6350eabd218d9c4e3fd1d1ce56
SHA51238ae5620b1c72efaf32418a0bf5a007a929fb75ea89929232489c669e648f31847eee8821fb048200b6a1f811919d8c620ae50a6a3bbd191b139ff58c785b431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f814de61f2a0893be5372c95ec014b
SHA130d88b67c083c2b07bd98eb6b75d2e9b9c586c70
SHA2564f9ef027ccc9d553bf35d5bcf4c3dc2d5ff048a8b2edd84c886f93056946227f
SHA512b68b51553fc6d11712e4e8585d67faa0dd74fea679d5e5c620a0a0948c6a886e71dbc67837cdfb971141eff0749ae8adcf6e3d134357ef5a677cd5541dc95272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389153de3349c77cc0740ccd20795620
SHA12593099bd75a00d4826d302fc2df75f54e790147
SHA2567f2c976bfa059fff467dfd85971056434082c43ef5c79c0e44fb800870d9dce2
SHA51286c191f9a0e4c0644fa2955e3afa625b64aa1c1127678b12267cc780ef776188859c956bfe927c51de5d565f1531c013aaf71244761e1f453506656a5e6c4cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f24b0647e2d4c34b2f2423362b086a
SHA1c444100998e24e18b61b2eb3d59d98d1aaf153a7
SHA2560a964fccc8b852ab9e35f1ead217554fd86bf1e7f176fc81fb33f39805c1d9e9
SHA512f172ad1546f89e24aa8b3d882040faa6764d192b2227c4b23962d98c28258d5b1f7900e7a9cffbf8d3bbb2788eeea484a3fdfcda2b1f41dc5a2edddd5080c6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510953145fae0856636602b8513b11311
SHA168cb23b6824c6f4f73b5657d98bd7ac80a982361
SHA256b0bfd4830052fc1b2659add782578fe0473f35f04bdb3a0041fcf1a19fc97ed9
SHA512e72866fe2babbd10fd8772f4bea97b26f325a2cc8f59c7ebcabd49a6704c74f5a625ae8bbbe1ce9703407cad7588ba617b55fa7aa9f271cb930e40e668a4702f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54718dfd79f6802cd011507687c9b56fb
SHA12f8cbccaaedc03f9d3438eeb325652ac47d5db9a
SHA256fe9aa14b7843c04e3aa67273e24311aba4c7c4db50cdd6dfa1cf3931b0d868cb
SHA512d300bb6ba74cd10188f81747f915fa9b386136d7ea9134df6200c6f586a8023b457ae953ddbddcccd158f1cd76976235fd3b9a75a72694f9df1fa84d1204967e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d92bddd3f910ff3652fb875de6972a
SHA181a34ec57c503847d4ec75cbb255c4618a28dc5a
SHA256296e9a73b1a0457a80611639204677d6f7d483a67d0b46d7e6a27e4a1ad3c6bf
SHA512754bb9eecb01ee0dd2cc68ea2f6a8cf89d2136d5bef79f4fa9d588dca8fb7360d9dcb6f663fe3d238978f7396909559f0c716fc44f7372816d169c9524f7e010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843746aa7340f55d54ecef6e810f2703
SHA1d539581d27bbcc8d2802d08a90e8c159394e78f4
SHA2566876ebb98d609053d89710e2038647f0f71bfe95193a22c0e3d993de41cec768
SHA512a00ccd8b0a211494037be14c445b389469102e9d7897ddcf55ce71e0dfacf8c5386cbd826186536fc16004f3013870178949939745b749409cf69b72d450cdf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f5bd1a73af7d38b25034b4a7bfea97
SHA156b70469aab4e6e97e49e407e9108cfc30084c8f
SHA2564e1ea7ea56dbdf04a52c1b36bc1a3e53089829664fa52185a6339eaa02f570d2
SHA512e3e9365cf5cee2e1444562ddf9ec91265b764c2075e3c490fc908db93cf86e9bc99a671648ca1ca15d55b9060aea01e12b93ceca4970b278a4aa51cc78d34022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58daaf2c79d1576e0b03c7497960e5e24
SHA1cdabffae62802f4d76ab9595c57befb847a17ac4
SHA2569c45e01ae26039fd6b3e9440baf879909dc9ddadf27b578bc07eb12631ee5ecc
SHA5123f48807610d327f52ca1c0b913693d9fc1625387689f553e78718965d2924c8e88128e4b490173cd19d9b255cb2d26c29279d5a15e669ab2001956900f539da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d357cfafe4c05e59d8a84f8d0e4fed5
SHA19af27df58f09414337763a5d651706bc76097bf6
SHA2562d0fea8fdab02fec075d13b04c02ac87d7e8ec39d7e8d28d2983e24a52544544
SHA51215f6ea3ca9d3bcbfb9ce1f109dc54b449732e0cab3725831d373299104626ea654dd832167828a80d0993cdba27982ed30bcb379ffbcef6dcdbf70a3ee45a824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d574f340858e5525874e7b5ae858e44
SHA1a4cefdc4455ed0165841f9e73ab6007e618743e4
SHA25626bead42ea71a16fc1be93d7e150a6a15e77056ed01cb3b69e74b548ee431242
SHA512efad3cb5149457d197a4f99c79f6068634ef1e1f502589149b46999d349b51250638081ccf371fb758ab68aa3dd367ef81ba5fbe800decb4a3481da272bb2ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961a7db53d397032dc23bcffae725366
SHA1ac2ff5c2c0bb865ffe2ac4e49821715a9d5df3b3
SHA25665bda7169cd1cd74bcb212428f368f3076d03d499f77340ca264dbf15daf2192
SHA5127f873273066bab35a145ed3e22a0309cb5b1ba81d159c664c67a12a3c799ab8653d1c7d4fe9c56fcf9a0582700f5eadb6594dabfca375484ada8d0f8c486624c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b1843dcf1729370e76be05a07be83a
SHA109cea46dddc823c438de83241ef7e27e08ae226e
SHA2564067ec2f5eb922c599c8a850834dd7bc6be4e39cd35ff8aba3015be36b3812c1
SHA512b680ef3cf38c0cf961510c692fcc9ac1ee567ed74b804d16ef89bdacf31b7bc9975fb0b734f6b5c1b53bc3e271b4c598e8d3b48b37addd8c4c3fab36617cc077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4412ee0e4887cfcf19a9259bde0c11
SHA1d15f2265e31cb8c84e6ae8b4206bc93eb920117c
SHA256177da61be2fc4651ffbd7a68573bf0908ca0226891e851347648e906adcab015
SHA51253d666aa319f28d554fc89bf85c9ad417675c7625a41bb6f3fda5af557c8929a9613238b6f350b3923502ad6146e2c0e1ced1429b90ad73b4dc5e80cab5fa639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570664fdf38170c51daf5ccb6be3c7992
SHA1b10254792ec69582ccd50f086c88f6e16291dac0
SHA256ac01b6d69611511610a6b521548855aa3d23bc497771235fc15a07bf4d59502a
SHA512326f484745eaafec98049dee949f1852fedc996dd6beec75cc6873e7b214b0de6641798fbbc4eae5a376911b0f1ad9f06e852c304744c6ad2720efe287c5571c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f715261fd2cdfd0a8f3a44d6ddb4e02d
SHA11b69e3e7fadcbe8328ac9fa06b0c69472864deea
SHA2561cd8761d18b8f64794729436d277ff55aeec6720df094681c7a403c9e66cdf5f
SHA5123e193b5df245f4fccd80770cef4fba50dbdbe65580123e10cb481256a12b194832bf14a44456d4b572f31dc1e3a535f033ace7a6df10557d73f05370ae5ba0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589eeb8996674a9d3df25a2d015cc490e
SHA11b63fb41cfec941c5047fe381f792b7064233de4
SHA256dd0b69851085de2a56548ef3b605d7fca1185c9c5b93f9e20a7ff1363977307b
SHA512471dfb55366dd1d2d90cc003afc4564021d8cf4d7b3de4c6bc7b7b556724934d302b779c18883d829faffc12b55690f7b0155095268042737a3366de386cf545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ce27fb150e5ad1cb6edbba4c547e75
SHA124ef5261be6fa1a84d380bcf708a5a72f47f354c
SHA256097175b3cfb326c305236041f81dc91228332dedb91cd140e96f2c8aa3b98989
SHA512491d69b6aabb223ce1288add39cb9e68a3dca3d883eef0a7e380cf7a5a7f63342f408a8d4f70d43b4d9f71f1a135722f0875510c369b490f675d8b7deb14b9e0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b