Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
b4ef20268f1646677f8d1070e64a3401_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4ef20268f1646677f8d1070e64a3401_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4ef20268f1646677f8d1070e64a3401_JaffaCakes118.html
-
Size
1KB
-
MD5
b4ef20268f1646677f8d1070e64a3401
-
SHA1
3002ffa919caaa6f8a6378747ec680f8b5d73e58
-
SHA256
b416dba3d49e7ec8bc3fb2f1d38a74991b4d69af579d1229b1edc77ca7d79583
-
SHA512
b02b05f87c33011f1598ec8e92e8873ac58857d18b817883778b49bcf7385673f08f7625d27403734c36d52e964f47e489e8b40bff66f26d7070101e81637f26
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09ffdaee642db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFEB16B1-AED9-11EF-AD4F-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000045808a2a89dd664e982f38d50a2abb9b33e20f3368fe3c2940c7c5266f83fe46000000000e800000000200002000000005231d9752d0e7bb106bb18efb4fc8b94fcec90482ebefa9576094e155f4134620000000093b3b78598ffb9d77d7c60ba5b66b3b26bd36cfd3d9e41b65574f18f3d4269f400000004d9ace9f69569e290971c46b7198ad1cfc5cf1ec8335df163cf3d1a6a4b40d040b7672e2d3ec2de42cdd7ba8816de3c61cb5147071da3bacef1455a977995eb8 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2584 2532 iexplore.exe 30 PID 2532 wrote to memory of 2584 2532 iexplore.exe 30 PID 2532 wrote to memory of 2584 2532 iexplore.exe 30 PID 2532 wrote to memory of 2584 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4ef20268f1646677f8d1070e64a3401_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c0c4bd5cf070fe214c5840c86b36ba
SHA18bf53df6a133ef633c57991ff39aaa0131142338
SHA256b6ffe3930a069292bb2b7810acf855fe8189b199563fb4d68463c7ba594c8144
SHA512e45620bc9e08600c6ac58b20f5c5b85ae15058d94645acd0dd1b53697f608ef528c302579101a4b2a551da7be5f9d7b1a8d25dec4ac535868feafd424f24f522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ad7e4be01e943310cf020c93f952db
SHA1e2976b1279b3b24e82efa040fed07c8836418b1b
SHA256dca526d80aacd78456d29f0be872fefbc2eeb1ea2591a821cde7bf1836d5e879
SHA512e758857cada92413c7d0522303d13485d250a04a0f91e95e610aa509cc4b745227790529d6a0b56f8f2c0db99bc3bb546ea533fbc596898dc20047c6345484d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9e9d9cd1118f83027e7f04e6e9399f
SHA12ee1008d981a1508ac75434b08a6f0bab264eda8
SHA256c4823375e1e1630fd813a55367dae65d829b83f8be75d403b3c5f01316163673
SHA51293b74cee38d3c3902cb9f4198bdc853bbd0bcc32bb2466e7f2064693cf5208ee83d5cf3c373688fa888007aee823411dafc8adb0b6e4c114a3cce40d99fe2253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68388a754a566618a96556344184e96
SHA13b74cc56eeefbe2f15ecca957f0cfb9747f20070
SHA256012293e117f12397887366adf41b423cc2d6cb897f2aeedd64f26d9a71698192
SHA512e11e37850b5aebf6b4a0537ebd6fd91cd0e5a39a897d909e7d1de514570ab6b66647cbd0360c786be94e37236040a545d44a400c2f8f73b47d444e2648ffb94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d66e0f98adbc4d01e4d81fc89e1216
SHA1c1f35dd40f2b24da18ebeaa6a819ae3fc49a98ef
SHA2564d4e10623df15148cb12e357d79ebfe722434875346b459bd773af906479f7af
SHA512cd0196609a12f3a04e3e46d8e1b8e37e39825b0b30ab345f8f0092b17eb8c5d41f21d8c08d20c46789525d91527e095ada52a8b8965cc223953dfc1f493e9f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5554a5646bb562a6e01f2a98ff7c20e66
SHA1f43f9eb445325fa376678f80ece1d85a03924059
SHA25667286d37b4fe59bf6f80a1b9b9c3065ce21dc36f035412a7034a3cb91efdbae6
SHA512c749e5222b002c1f9a91f1c492f54ee8215090bf21f7cc5d4e7ba3c4b57d57fd8aaf3c4bb2e93a26754b55a882441d64b7419bdd2f7a973a39ed1e5357f68236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e897f2f65387941c6374c8de517aa7b
SHA1afd85e70e2fec4932708d044c8f990e2f00d1eb5
SHA256323b5a8329b994b9bbb688e4e9ef20ebfc64414406f561c3c221c8816d60a3ad
SHA5124921f24cd4c3eccae9268baeee0941a76b6362d9c0b0ba19b6c47a7fb3d2ae07511c1d2acca149a74ad4c0222e1da48bd80d68b136383b6a9acebb5a422e8e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3910a78fde1a8345b0a682e74a1cdbe
SHA190a4a4afe8fefb4afcd5e128025ac9c729590ca4
SHA256fec9640e43f72836a7ee736dc10d15724a973a83033baefbee4d7ef198f1cb01
SHA512c4cd9abe00ccccf8b808170a94b8ccfe40ba66bb298f6e56b982c8ec3bd47e2aeb9b5d5e665e14a6ba8784e9c015ace8367271b89c4601406acb532c9adedfdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd7083e4803b1c4f35a3c60603673ff
SHA16626ceb53fb2be0a9e116f481aa948d789f8d554
SHA2563d31c19ac21fa5da0b41d644c0ba121e89d4937d579b0de1db301fe33e31951e
SHA512f1756c4e4e1697148de3e8dac8f90196a15c3379f0615a1d115e305e8127010c1edc795fd9fbbd91745af14bdaeca97de4a6d18a0ec35f89c00519d59294a74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0cafcae385288f226bfd296eed62c33
SHA162aca7b595ce88a8a27cab6cdc6c8183bc3569ef
SHA256960adb942ff0b8e9e6723e013b891d66212c57091468ec83fb20c17f0fe60c52
SHA512e4a35d2822e10e4a4c22fc9ad492148bbaf8814356f64700b415731e3a60a9963ecda0f2eb527ff67ef28d581ebf0abe33aba32a2e3a00aa0368ba8842905a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57920f7b9c59e52f2dc5d18571d536951
SHA11889b15a6985bf682908e6489e6c110ef4bb0c91
SHA256a4cab98b66d23a8ad4b69199987bd1b66c7b93a40adfb9f636d82061a2b7efdf
SHA5126d723a19f567174ce988eed8f726c25ed7366f5a4c76ed20e46f35e11c351b0e489b0aa9739f56465f7f879b3c078eb946918c03ffb8c483cf56e14de94a9ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5461bbac34144123b192528b0a22f2969
SHA154572760a0d823de0a026750a42d4b9a6c1ad751
SHA25673e0990cee50c89ba56261858265d9d71412c0734045912e761cd6a924036f0d
SHA5125b2a231c99ad42b9aef6f2257170ef34d23bc12fccaf7820a321fde70acb223358ad24ceeeb45ac3b6267a8bdd9b6a7f0f57a875771dcf1b7e75fce5e411d9f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482d029c89585500c209b6702d38dad6
SHA172bdf596283ecee039f5a5f13bbf0447ac4170a1
SHA256b509c4769fb90ac88c75c4d89f4931a3200486969f2d7593a8efd05317a48736
SHA512be0d1ba7cd6a778cb4248b1b0ac4b241047c7c0f7da258e4980132f4dad1df4d4346afdfcfd4ea9adbf17a79fbfcfb2c5dc7e2aaffacb570d6e632fd999a6fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d996a0530828c36d0a2545cb4c2444
SHA11c6d15899127ba0239e0743b0dd188a4b31de52d
SHA2564144a03b27eaa65b6b41f7183068006559fae8dc763200e6bbde126cc4b37d1e
SHA5120042a59bdd9ab2cd4577473c3a20142db5acff63eedee7da22b252ba48ce168613af2f4406be2c6d2cd0553c8164413372411fee00430cf5897ae1cf61190f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b73bd720849bf2a78cf1b4dc6a3dfe
SHA1a639716a97ae154522189b56dfdfa909fb669efa
SHA256b1a9a66d1a33d824a1f97ebc28914f3601635b595f7fed121f03371b05a95b88
SHA512e2508467b31b1dd36276a17e089ed71fbdef1833c1d50647d4ce3b47b82fc67878458a4a3e931c543517dab0c2d4315a59e08a70422ceb2151237d354a4e5078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa4938846fffd1b029ca96e47f20d2e
SHA151b084a624c2dcdf379f70425b8a6ff693e9628f
SHA256dc9e801ec0e368550acc3b02272baf43e182b3a1bd718c6751f61f0301ba8227
SHA5128ed08502ee6112d9f0041d10cf92cacb7d8dfd27f41334e29cb563baf2d06d7b987bbeeff4654228e0eed21a4325028519f2e2ca3701955686ba8769582d5fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f90ab71e3077d7185783317a171129d
SHA1aa8c39acb36ae5b2b3bf34508a9324fb7fdff23f
SHA2563600fe159bdabbb96e3ebf1ed27712cc0a5c7ef55f441025b2ab0a86766eb33f
SHA512d3437e11ee2e610faccb339b95674556cf301e423c3a152eb81ed1cecc9ee4551388ce12324db232189416dc227bc403b94e5f38542764c8524bbf806fb230ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517debe621ed29e29e8f06c179902ce2e
SHA13e2758e63e56f9507b0759e0e1550041fe021f3b
SHA2567036f61e2e8ce77aa9a6297bd6b7ba60abb04855997cff88fdf19c43ae426a0a
SHA512b717edf58e915746bb44d30e582edcb95ecf432687b94375fc6cb63c16e03e6ce15a6982375ee7cce81ca3fad074df32cf58f9db7b6bd1e1be8b1891d4e71405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da43292d87dd3933d14f7a539983234
SHA134466f6e01a72e60d4738da5eece6ee1fc5e1235
SHA25654d1d9a19ddcb37bd0be36dc5d0b4138f6ab7aa00c3334cc3178726604838ffe
SHA512c634dc00f4eb8e668d0ba48eb71e340058c43e25cbf683cb5a9e4c2c84b924cbdf8c85bb3f8e99373127c5dbd7320fae79525d7ffe1549e42a0cdf899220f0d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b