Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
b4ee0e52394e6cd88c867fa5564997c2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4ee0e52394e6cd88c867fa5564997c2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4ee0e52394e6cd88c867fa5564997c2_JaffaCakes118.html
-
Size
53KB
-
MD5
b4ee0e52394e6cd88c867fa5564997c2
-
SHA1
cd25b600bde224a7f065d980d11223f489e88b44
-
SHA256
b0999787e5cd3cc1323e1ec0aeed296fb36cf0464c65c04b1246d1cf70a1328b
-
SHA512
b4f072dc3852a7bde5a52f1887f90ee6f81f35118b5180cd5c8cc882981e7b3296a4fb8e0686c2879354cd7dd96f1fc964806a59a5be6224a7d821df1a045c3b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUarunlYJ63Nj+q5VyvR0w2AzTICbb3o6/t9M/dNwIUTDmDv:CkgUiIakTqGivi+PyUarunlYJ63Nj+qv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0FADC91-AED9-11EF-B578-7A9F8CACAEA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000005f3a2509a7250e82d0918c26006a9d0c9f31fe06aa671e0ff72482adde5aad0a000000000e8000000002000020000000e559c52600f98c0e71d3e3a19ea44ed9d557a545561ef9df40e94f3a01b9375120000000f9c91abaf643c12054f38510946debf4bc0afe8f1aebb2847804a8750a28c2d640000000d27440549d0335af9e7c4c63990a019b07b19f7b1c6fa81ab7bc498852d1d087f762f6d59e9192ea14f0a770cd0bb722d8d3a4c4586787d4a16ac073817a8174 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80654b78e642db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2556 2552 iexplore.exe 30 PID 2552 wrote to memory of 2556 2552 iexplore.exe 30 PID 2552 wrote to memory of 2556 2552 iexplore.exe 30 PID 2552 wrote to memory of 2556 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4ee0e52394e6cd88c867fa5564997c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274e2a0331f9970f1aed364f548fa4d5
SHA1c4aaf530643e125acbf085328ced5b649e002924
SHA256cf018beae70a3de4b324c9596973232f3a328ce5c6e1bc09dca2a131a2942193
SHA5125f853b6a0508b16e77cb058297062b6c2b479091bb73d513de6ef3f2f53464c9e84805b4aa0bf8311e87adb4d6af4dc3c4f02841a056fab9ad104e96bd2fc531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5930a3ba7dc86e561b77fec92d1fad111
SHA1095a8ae2e975999c01028ce3a86c5a55a869464a
SHA256035eb5cdf17b0c5c4b8d9a9666bd6f3b9ef0f4f71851a5ac3c1ba67ce62cdefe
SHA512862d72c7418d9d5b40092e6d9b46b3933aa56b5982ae1a3d0a3b336c1c36a3914876f797277913998f2c107e92eba79b4f34dd360bde16e3b69dcf8bd6872da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee50ec3da42c99bcada7fb285e58fe86
SHA10322cd08e23e081655a1b82adf4463dc7ab0a852
SHA2568138ed2b9f1e391e5c51c7bd88b258e6eaa8fe106fcda5170ba80381e426dd0a
SHA5124c805d0477c33d2db72cbda9c7492c0b6e38d452b9f0138269ad327f9e606d3e537e56dc20c7f989a02cef1c781ba1d1cab84f9b074112eab732162c296b8535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e724a66c6d963cc25583aae3a9f6cc03
SHA1297cbb3380d4c17ff096a1c2482b827b4cf31101
SHA256eaea0011925cd6533ae6632bf8952cd31a935812f9ae416136dd95d9ac16a48c
SHA51258c1b6498f9579052de9273a6366e6f5905b2d2be45643a8fd58d5015c8c576529d50b24712cf04af1058d49bafaded73a1e0a886b7599075b9a1f6fad684ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5147dcbe7861b3cb508bcc5e5d0e83863
SHA1392c04795dcb0356452b457c3abef203d3b8e1bf
SHA256c0cecea4d0e58ce1da9eee02a8ae819d577fd63e82ed919a9609df7d2a5f6f34
SHA512d1d36caa22e8b1c83e60e855537a107cec671bad317c9f059cb4a184ffd0e91f4784647af5395aeae8e3c14ccec47b5220c97c32ab22f688de1224540f8ea15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705f6fa583532c12a9eb0354d06ed1b6
SHA17102caa650ea801a203440bbe7621c404875d809
SHA256a6592e51d8dee327e7e1a2c6d575ec1a678266c0973280d6dbb6d1ff76af85a8
SHA5122c58150f6e25f163d2332e24e4fcc47fda4b14a3662bc2b3c6ecae301f1b31e2c4412da9b6113cfde879234a014067b8eab2ef59165d9c70e170a6a888a2ef06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d185165dbd2b4597a6413c2ac7c8113
SHA14ed1b4756db8dd8fc399857eb88e3b377f86a2a5
SHA256cae825659cc76afff3ee2e06555662593d6bcdd0bd2d75cebd914e85da274d51
SHA512e7448328d580237475adbb71cd58d47069b1c2fdfbae448ccf9d935de29f374c2f8617677388903426d0b0e08426ae4c37fa9bb0442f47105aacb30942e0a3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53968ddd1bf36cba060f2757210477afa
SHA17e4093a33fa89e5fb6a8461c2778eeaf530506e5
SHA2568986888690ea4b66337c076e225e84de59bde988a6c29a047511eb46f37eabea
SHA512771c1cf3e6d5bf6fd2d1be7801aad63ee5c92c28685c55c339451c12e991af45ace0c287567b47df4f906eda6e12acb5256dcd026926f516fe2c85ad241cc262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2b1844fcbe24f2189710fd86e27709
SHA15847796b0afcc71ec4446843b5c013d882c04402
SHA256292fc93462f840999ffa1fa9581ed0425610df8e68158e5bad6b79c983ef1bfc
SHA5127869040bff9b47f85fc2b68df1cdc6503f42930e2171bd4322ab0e83de3f544578357ee89989372b0f0e68b6d63fca7c68e5df31bf4c93562c4fb292af1e31f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad0b366f4c75442be568bb908e98c45
SHA1d84ec09eeff60735cd310b61f39eb776c1b61ea7
SHA25650845389bdb66592e4b293a88f580308dcfc218cdbf2ba596911117b3ca95220
SHA512b2b46dc7a0a1d18110ef1993f50d3de086fd995aeb0600f74da1025dda710c8a3c5e5c1feaa976585da3dc1a66046f5773d2d7a83ca133186ea14166b1110717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56739e1b9423ba881409aca2f584d9c5e
SHA109ed3af174d830b1bdb087366930c937be82efeb
SHA2569270c6c3be2b5bf728fc3119c1746bd883f2a5204111de7442f5d9f64c0f49e4
SHA5128617c91b42fe3992e245ef04f07962ab9d9ae512b48f30b21d4252d17719d2dbb8bb42c98569558f5e10cca1b579c498cad8972ebd920cf5aa8c038742d26de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c1cd64461b95b50021665d6bc8690b
SHA1ea863baedd848b70dfb8178379b3e823554fa6fc
SHA256d7629f5987cb0cf50e58ae92403bd0fa3ce363005f20f9cbf4773e6a20746796
SHA512a72bfd85b34ae16842df7fb553030936c866b30b522f0a32800e05d147170956fdc175a8613b5bea22c1d2dd2394c3b24e3579a194d81d30dd46eb382f23dec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcdbe0c13edf3c79d60ebc84cbdf304c
SHA172dd334c8503f3690f69b2d1c00b397d33fb8971
SHA25603a7c73299f5c5913aa8fcae3a222d67db01a79f478ce4eedfbda8e4d136315f
SHA51265f1e511fc081ef5b2764bc372834bb4c9d7e332b146857a4ccb57eabc06cad038575673f619dbdc3268908dc072b136320713e1eee0abb09fcc0fbb8070f577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee41f9b1c12212a8a96ef754f9e33bf6
SHA13385425c540cadb90b0e904c643e3fe734e51c48
SHA256f52390e0f9cd15b73c501ccbf6d02e3bf15b185403e94c100f4717e2a77603c5
SHA5127b8a8e34c5a2e5f978fca6fe096374b15b2df9057b92e8289c8c933478243cb853099eee2ba02227af87bedf56b3e735cfb62f8fdb76fa10754616190445715c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4cd7da6346b5e8a6ea3a77f3a80bd9
SHA1ae57e3a8c9be124a74f42c719c1029ddeeb62046
SHA2566b8d839f3607942ae7fc9b8903a0b4ff4f2718f975765376fb1280096592ac81
SHA512d698a812d799ed1b319389893a2022d4b800b4c6a8ddc420ed4a3d259611b8477aece8d116dbfec202720a42280e7beff2c6bfb64defa4e0cce642cc227dd220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bdb48ff45ea1ac1f4cf2e4d2df17852
SHA13b19bb12c9d5997fedd86b0e5213bb32d35916b7
SHA2564a73bd60332c4191ce6cf9fc566e044546efbbbe816f59428975f21e73eb3839
SHA51277c9e48667888a3f2a4cd8201c2831608699cfc254180d276f152c6189f80b971cd63f493b9dbdf48fcdf5c3f6bc3cf4eb0a674843f3c8e6c133612bad644c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcacd7088bd710472fb74874945a3cbc
SHA17058976eef847aa9a2762966c41fe2e69b8eb376
SHA2566ac6c04884eca6650adf13a0918682323ba09665e15b6677c55ec2b23a317c7f
SHA512ab9d2afa03e096ef4c42df1f7211d77cd2582f6a6986694be052c4af76e653a5da780e673348676f6cbf92159b3d17ea24f2c78d73e0510f1c7343bed5c8dd2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cf02d31aa568aa107c4df523c160fcb
SHA181b0153beee7aac16ac9e25061129336bbcb3c23
SHA25650e0f2025cbe2c59a8769a7a91731b8c31705a6975d4d8735a60dd7c9681be5f
SHA512fd0af6b9bfbdafba58d68792d840b31a5ccc6e373b33ee2e1f680a99be18a8ac2f93ba22d4625a19a82b4fc70d6d5fb3c5db3ca565e984b39fb1b4a490a40e54
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b