Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
b4f0796025f92830a0e0aa712e42af75_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f0796025f92830a0e0aa712e42af75_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f0796025f92830a0e0aa712e42af75_JaffaCakes118.html
-
Size
13KB
-
MD5
b4f0796025f92830a0e0aa712e42af75
-
SHA1
6f150431b1c84b01ac0767abb51fb67cbd9c4ea0
-
SHA256
f2bfc06801de72fc43ec55fc13144c871e87fa400265e9fde5f3e6c1e2db83a4
-
SHA512
101c263aadf01396d5dab0425a9e1441a32601c936718e07b6e28c12932b29f43ea1bbb04eb550b41bdc646c89eabc728b50b46b55d4401ac3b486adb02ca19d
-
SSDEEP
384:8fdSptUy2mf15K2s9UnhdKWeQDckCnX0kROF21BNj:ley2k5nsSntDckCnX0JF2/9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000027b0c7051e5ce38ef61294e285d646d102b5b4ff0ba2aa59fe691f8de09b302d000000000e8000000002000020000000b8b34c1f1b41146f5991601c59d9214ff4fde05b4fa1045fe714cb0f825ab37220000000c6acab44ec478ca896d8f81cb7fcb388a4043fa372f43cf87822400d69fa156440000000bac9450b4221e55d419b549719e14768fe1f54a02fef6033b3ad234163313c479da5534f4e7b3b9b1594daad7a8583bcf9e0da9aeb70976c8c78c327a2a2faca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204e39c5e642db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105520" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF9B5731-AED9-11EF-A96C-C6DA928D33CD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2364 2764 iexplore.exe 31 PID 2764 wrote to memory of 2364 2764 iexplore.exe 31 PID 2764 wrote to memory of 2364 2764 iexplore.exe 31 PID 2764 wrote to memory of 2364 2764 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f0796025f92830a0e0aa712e42af75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f76554dfa75ee8f934605f939704e650
SHA1906a8023605084c3fec11c2a8cc52b753dfde06a
SHA256752e0eecc3a9572d1373cbe1d512728aff39f94aba9daa382bd2cf7e9a76808e
SHA512ada070808f926c3e99d863599ff394a33279863587114dbaebac10f3b9ba4c4e4ededf13b182fec8531cfbbda355613457f1cb3ac6e9ffdd998f16c7f4ca2227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb80ee877dae529081d1daec36e7863
SHA1491005ec79c7b5fd17b0be16c9180446d9410e78
SHA256aeb34327dcae62f720e18f3fd1c6881b1c43dc7b24e18f06dc7d4de5ae99711e
SHA5129ad1fca9023b4641241221d4a5d90350b3716d166c97c4c1a1fa7568a922179e1ea743c0886c1b5ba1f5d731d2558aff241377a577bdde0bb96056dc8dfe9a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41e6e3dd59624416be282a3dc2948be
SHA113da354493371b611c522ce36a744cbb9f9267aa
SHA256d7b5383b16333cf2fd5eb4e776d569fc338304d40fdc7bbd8ba537115a15c1bf
SHA512ab0366abe37f2aa9b5448243b99d4f9dc8c5e4744ecf6391adfa852d7a4256de8002f900662613575dd3a5e14c036f9339ee5d57fbbfba2784fff1ce12de89e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebaadae652252358385c6ff7ce42380
SHA1f8cf963a6dce8c3faeefa1cd28bbcc00ae9f8a6b
SHA25605babf92df9a978fd346f0fa61a89e9315045f2f88b0f26d6306763de2d76f0a
SHA512ccd2e520296c68c406c2fc86499b1a307d8d76d2780be7f9b5747e041baf207ee620a5336a07137173fcf40c73defc0d887a195c72bad27a2ebf94954b55a58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54446645572c6c6bb931d08100c20e2
SHA15101c7651039c6d1abd7c3d95113cb90b6c32acd
SHA2562b10f399cfdf787caa7ea0aa106bd7c81594b9461545969d6d8f42b0dab27651
SHA512b0f0c97e0b74bf1a9a87bd7b4aa3e2919f994b4216bba676eab3c959eedd53652b8db49c06e1db947e8c31e5ee5229a07efbec6df95768159b13087e1cd60705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5216855e9d4b8e70a3135c3453d73d985
SHA189c6938a1cbdcbbd67ab18e9655ffcd2cb42fe18
SHA256bb335e13cdb07ee60ecc7b9c17c295c5c3e5d00615dbd92cb0088a89eedffbb3
SHA51290ea919f842da9cf41647a0e36927f0c57caa69aa05958f15a02389e73f7878e866583e9b9a346f32adbc549baec3f3f37d6a36fda5a77be7dc29c28ae23da81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557becc9bbfd3c3ac99442ca75e114a60
SHA1a489df95866328734460f16a5044fee72e0e7235
SHA256982049b047b7bfe77896508f4491f95e29b4f02e181bcff2480cabf047433d05
SHA512fff46f3b88b41f998301d175b2a3eebcc55ca1f7433c2cd4e2d13e1f6d48615edfee2ba2ec013629b9d1b719cff559e914e1746eade1123899968c946f84aceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949dbbf1a20329d055306ddf6064ba1c
SHA12906fd43205f3a5206b1398d4a7d8570b4325165
SHA2568f13c3320140d8b4c98ed32060fd01ea951973610a0f87bfb8be4edc17aaf9d5
SHA512a2263f1c5b5bbb0421a7cbef31a5303e0718ae36fba7278c7f0800c6adbfff58344c6f968b15721360c89583beb5ee7d376193ec4f6b38c212df5fb11b41c397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fccb63d811d7737af48d269ae1b558
SHA19104fc535427cbc4ddeca2cdb5828e3cb99162d9
SHA256f6e74548c8958b6af9cac61480d595d37e9dbf5557600bbca820aa494f3cad6c
SHA5121795ea40ed96fdda9af7055dc74d8f60e1c54ca3527a99ba6eb7e784a8ffa69f21ec52ae366af3812a12e8c57504413161fe34201a1a400fdcf1f44bcd0debb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51becf5a81ec8aeebb4bfed10734a56af
SHA1818d0eedfceccc5c92f56c4c9b4a615b711c5060
SHA25609d4d78e160aa98d785aa5918add5bf38c45ccb98b1b3938e3640e54b3b2bcdc
SHA512016a25a910d8d63b4433c3232e5d479fd54c277ec2321ebb649b6ad3ec96756956cc911d43011570c8cecff020af766f919e3f88b6a45672cc4124007b7b269c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56558f46c8dcfd918d9e8aa5e7ab113fd
SHA12eb2e38df9f583b47cf19693fb411be94df7325c
SHA25634f4a405a8f9d0c6e49004f56933d310f16beb4e6959ebe9b0175a596dbaaabc
SHA512cec115a6d18cfa4d0ee3a3c83267d3c8f891655201f0f54e5aec68c1547cc82db5c459765e899b346417730db2df831140dc17348b3cd90f279703a6a88b2741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51517e3758a0f90859bcc97257f2ebb75
SHA12594d071babd478ee97798ca8458fd9e439c8e26
SHA25606636582c487fc57da47fe735c10010830dfbbccea1a0012f0bb356e9552ecbc
SHA512dc2b60c1a0507cca7b667fa1888b62db0bd2556c79e0cc75c239040bfbd916b4db74f823bc0abdc16c5a548aa8e75b4487127535935bc7a8dd81e9f472cb7184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e24468268cd2a7e64a3d2bccd86750
SHA1544a4c38cff82c30df79613fa20ca5e992c8e1cf
SHA256ee1522e451b8d18cc36b3246e9c126d732b4092aea9cbc87defd7e057af9b70b
SHA51262af384b9a7125233e3db794ce32f94608538de8077362cebb862d3abd3b466dd1b35a4648e6cd4203c2123067f767ad3b5873ec687a04253fc414c3109e0fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262d956f3323499ef5edbb3475d326d8
SHA193ec5d6e35f187793c7b884a203b15b47570032a
SHA2566eca07d382fe8a7e58924aab8253099b7e6b3b73337ec02f0fa5a06241c95d42
SHA5129d368f57f45be59bda24eba9d06c35abb0e8c90e882c4e9bfac0e8f4b768a5fc6c4df065368fb371033adf4aac7f9b8dc4ea73b75a706dbbf939f980f6f8d185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0f27bb5666723bc3af85106e857bad
SHA12faff7705dfae93bd3b4d00fa4c7bc405e831cec
SHA256092abe5ca7573dd754fadcf7d995b52002f5274bac0f0cba2bf5189b7c678062
SHA512604c0f03749a703349cc560d6e5db9d9ef897645bb17000cd99a6abc1603fd395a27e537355bb3d1c7583e04b0bccccaaa7951a01ef373c066a8e41e1e2bc8c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9754692726281e9ae966d706416205c
SHA144012880b9decab51c81cc2499b72421239b1d71
SHA25601dbc5473796dc0857dc3e53d72d21f35948d9354d651721c066be90147f8950
SHA5124e4f2edbfcab662dfc6a261b7928a42d60e99ad14115bd3c32ceee1241b03a5da54e0fc6cc5dabc804d88d25f7ee3918ced4a16d9512511c515464032cf1b471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f492f1be1b953be70fe3ab6a3722c2b8
SHA1c62a5837b5ba102229331ee1c25db01d7337312b
SHA2567fd086b6e081b3616920a3b7c0fef3d51f7f242ffeb8162579582fd93c4c9e60
SHA512f32667fd3e1e9a6d99f9b7f1e5d4818f29726b3658670fd71b9a3aaead8fb852d0b4f61f21886fe930e86ac2667939b2e2b1e1140a4bfbb51429a7398dd2865c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572af39d8d68a01572424d99d83da50e2
SHA137a668bd69ffc8ef3de52e641695f62bfb64723d
SHA25608039ab70b1e0969bc305d6786cf2ba0a6ac4a27a48a854e419c0f0215509d19
SHA51273a5100b67e8abba3bbf1b88225371bdaa49745023dc3c644235e3d7fe0349bed32f9c82721fa0adb83a677cae8e08ef053a585d4c2f3c4d3c824358cd4fc7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbe2c8b10710735268af8ce2f05397d
SHA1b3790546094a014d03e6f5353ea9b1072cf45c08
SHA25662874e8ce41f274a79bbe2bf6593554b5579d8747eb3592b513772136b0dff70
SHA5122e8c42fdd65ec5437237cc40cbed29135a24665e579803bb92217a90c00154f06558af95f7b7a2b423fe3faeffbf2e97a9c9506214392b687475623aa8690c7f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b