Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/11/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
b4f181f833096af874a198b76b2d365d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f181f833096af874a198b76b2d365d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f181f833096af874a198b76b2d365d_JaffaCakes118.html
-
Size
48KB
-
MD5
b4f181f833096af874a198b76b2d365d
-
SHA1
3d106de3bc56e5b14897cbaf887c3fbbdcf6deed
-
SHA256
06ae177b422717f074c99a5eb8b425705e235569da9ebd5d6ec350a67db001b1
-
SHA512
2f91e7d066f6d7a29622c2a3899d8f0e07cb6979d949483f802f176137b9f1ef18472e8d0925869e319f3530fdbd6146a3ec37ae6836834a884d88652de8363e
-
SSDEEP
1536:XFtrVzMvjZSL/Q1N7350SWMuwK0HsHFR2u7zrmrBOKM9XHx:XFtrVzUZSL/Qz7350SWMuwK0HsHFR2ux
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004718598c97a7b2041b4c8b45ff7eac3a7d8860e10d38888b2030f26cdaf244fc000000000e8000000002000020000000d2d7a9d374763cc56617936fb62be7412bad9620f763602f21f3ab21985ec08c200000002b8aec13c8b8e3d562405a9e0ec6adef2917c378471b136f5732cd75a0b8545f4000000058ab2071ef8ce1848ce337db0516d1d5b90ec9ebd9a13fc206f548f5ddfe11ee4db151b4708ae894185ecd2b312fac51fda08c3cf0a6d2cf3fc0e261457c2f50 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105647" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0811a11e742db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B4FF4B1-AEDA-11EF-8F1B-EAF933E40231} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 iexplore.exe 1600 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2788 1600 iexplore.exe 30 PID 1600 wrote to memory of 2788 1600 iexplore.exe 30 PID 1600 wrote to memory of 2788 1600 iexplore.exe 30 PID 1600 wrote to memory of 2788 1600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f181f833096af874a198b76b2d365d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51297b3eac51d6fc0cbc3a2d3ea333fad
SHA1eb4e6b1c5b2bdb5bc1463fd25a23dd68571df39d
SHA25607611696e6e58c475f0e6ed5066950eabdcfff8a2d8b3751d4fb8b142aa8c086
SHA5128eca7195d3f78918511d9e14bfa7d6cfea7cd48324b58e0118f84ab38a9562d32240553120f7aaa628988b00b5d79511496be7aba38e353a106bd6ca3ba1b636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbed6acf8a6fa0e789a05d52424b0e5
SHA176cd2a6016829a14407d671a995079a73092f6c3
SHA2563ac47f50a66157ee10f547e65c664804b8876168523a647eff828ce4200196d5
SHA512b1c859dce2a554ef11c1c7154e1bdd854c381edc4f686157b6ee922a9a7ba53bcee3a9eb2b4dd24ee8190eb69b489694146b7c886447f20ec5fecec053f6b47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d37f33aa24263d0d0c3cc48ff190422
SHA1bd107b33f4d9dc09b9a56deb15f549ee66946637
SHA256be123d78c9fc9868e4ffae260b579cea6b53de7f174f72b4fa4adeaf8fa08e3e
SHA5129e09a159f517436ec10ebb1607bed2ec438266a69e0910a849a752de7d660db4eb4b92d42cb37465617d8056d3f0fb50464fa7edeb49e157329865ba64268abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94a697659bc0d951fb6d01b0edcd248
SHA16d130e35f593e7de63ec1f787bbbd5e8f457048c
SHA256132436198ba14be7d34957b556c0e2fe81609c3df5a878bab427ca97c785914f
SHA5122ec2e5558d748354a54cf9a1865386b40bac7863dbbe3357c7c902b4f1174d8a7e2400b3ea654bcf01f7f58351ab43d5b4d2b8c2d9abf125ecc7dfd869bd7f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52446ff270a53086b2f9b62f31e042873
SHA13eec39f8fb69a7dd86cab45b08da7d902c60e1aa
SHA2568bc9d1a0f400000677385c830a36db008685efb055e63ce1ef42134a776ead50
SHA512dd0ef8bcd58218b826740bc096cbea0ed1ba047b16137101d569610ab9e1fb4f5556d38d2635d55dc87b73f8b0aecd3a18b0606c1accc761be9ee964bbd97ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13d50d4bab54dae6e2a8d5ba5f693d4
SHA17af0ae832b77166e1cca376fbfb0f8f9e10fdfae
SHA2569b24f9f3d85153e5bc9f290bd2e713f0f20aff68248c083f4323dbf440672a4d
SHA512f38fc60476db0553c84b0f96d624c35414cb3fed415ea2d3ecad57035bc03a15a6eaff693bdac375158a1c1f5b898ad3e388bf420c9a07a5235e6a0db9b047cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57190d3873ed8cb03957a5984fcf7f568
SHA1761e6f51021b226979d9427d87e9e5321b7a614c
SHA256f4f29828e4eacf0c166b19a605bde25cb40046a3d6c885018045efbac63453c1
SHA5122ee9b836acf1b2e1dc7c58e27a245bf294130c2703065229da43d685fb71684c4b5abe05e98ddeb6e2f95b0bc33dc32a4fd50e2cbbfde6ac69bdd0f51c2b2750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9992bf590dd2194ce3f4495737cae5
SHA18afaefa80c48781a1d3f1e6a72e7c8fdd8c40aa4
SHA256881ee69a3e4f7510fd67eb967a82d27d76f2672e5c833bfdb21d4ba94ad1861a
SHA512f234976b180faf7ed550f0af724ef0ef95b1e621e3738d713cc2b3bc8b05b15675e4b94cf66acd75c69934a0db5abce03e2469b81cad0b4be4df737a0253340b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca92de99a8bbc6253a24bbd0afbd3780
SHA13c2bcceb97d6eb7e2873f1fa0cc7bf1b2d18e6ba
SHA256182f2db42eb3b223f7991ff7e0ba4dd44bffc0d54a1b95a02f7f9c7009fa62db
SHA512dd6f05e11111586af9cd65d4ca977beb04ce8b8c4ed5cc0b0ee12ae91c94ddbc25ed73236a9e1effd0fa24b0416d1a5028bc33d647b4ef05a9627c97a8ed8c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4590fbc17a81e2df6d8958aa0888d4
SHA1c044d4277b8e1a992178f8daa349a9970cf13042
SHA25604c9391e252ce4f6796ed7117f89ae982a733a1de0196319302b52470c577468
SHA512d697c02a5aa8c96c36068794102fd4718aa579a0e0ff81ad123e087785057c47b9349225b8156f57f81c382dee08750f4a25d0522737e6a8f95b04731bebd2b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c0567d300c8d51c1b77ab7f014940f
SHA150081b118eebae842f34c35defb5137378fe6796
SHA2564028954175199bcc72ecfd3fc09705fb80014228d74d0d54b2bf52ab81308296
SHA512cbff9804c1aae30ae6f8b3a549c69fef5ad33a754982c8394521e117fb0a01fa569d263508aef2a57f97174585804383868bf381e0ac165e35d574d583a450cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21fa6f99b70233d36f9863a6976d8a5
SHA1c6b9e393f6a9df78d5ca793216fabfd062ea074d
SHA256e6d7b078bf75cda44f1c1d4365ee61dd556090dbdc1a56ac8fd75f2d6f9b1e19
SHA512827fc820bc10b0647c05ae8f0e11939bfe3696fe524a87df94edffb3fe588f7a46de46f6f5d90a0c99d782498cb3e61f23874496657c51372400ce449a3e7ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59098706bf7b830272b2950769b929080
SHA1bf05e97060da2bf071de46e9d921596ff2252112
SHA256e3c7e71b625dbf547d2fd7d96fd1793487fbaf1adae6e12850c8b1c42dafc9ac
SHA51228f5cdad76865d3def23639675d40ff859c4c1d3ceba96cd7f4a2ed59f446720ab3bb9d15e6b3bd8641251c7605c2dc0afa08b029205513ab2c2fafdfc5b1ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2cec33cfa8839f26c6392614429576
SHA1488659a7170ee73a89ed9ac96325fed31721739f
SHA2568fb4a0cbb68958221b2393bfb3cfb3b15b8290389e304ef7fd3d9390a9274af8
SHA5129c78b06b56b506f412cfd59e6e2152ef3bec1eb29b4bb6707fe9f34eb955e215f6bad9a7d2de8e838e67e9eb493f402510d72fa0e01eecf655f01295ff6b85d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5846c19a84e3c678db5f9268bb05ec9fb
SHA1cb7adf1a3a5f0f81ca93af79f05d47a4a95e8a91
SHA2562a3ad8c9b5b7a7023bf98ec526de415a38d55e0392e36fe187476186aefa6592
SHA51212e83c577cae32b1ffa39f15be9e258d044ecce63e1f4d9ad24885acbfab46da23a3d4445b801389b41807679e3dd103c5e0b5fada5486afb43a2b233bb05629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ef8d57e3977f2a86ab93f94801adce
SHA144e72be2824b344cde166d2813ed4d736d356216
SHA256aa614bc50e1c6f508435b8ed555f06db2d5b7835db44c18e32fb746e889d002e
SHA5126d752a2ce471ff390e4e6656874cf075b868a2d415979ce2d4c427b3d261d16b8d928662a4a47e57728e04609e90d5ca9dd1c1f7f4251f886104458fb47313cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3cb723701efd99a55e89bf0f62eb73d
SHA1a990c51e46761918f262372e2bf909032c1658d6
SHA2560b628635dad88cc3d93225b94cfacd2b192474c57d23112b3b93573403f47daf
SHA512c3c1809781ce95d09968cda415add4b62dd0a158d57cac6a0e1944c0b95f96b09b9303bb636a91340f64bf111ada3b7dc999bbbd900af843c746e9c795f00d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c128a6a8e203a4485042abab1b1e508
SHA14019332d44d1c6f18ab6add900bde4984c708b5c
SHA2567fee419e2c5de513a603a0ce4001a6dfc3f6bd98aa4a0f3d0af85f8631e41011
SHA5127b79a6dce9bed9a4c7395aac9afa1d6805b3ee309d91123efc76e43c5abb5a35b9330630e596a75b8b080824d06632db30a2a9e7e15aa4ae7cca0fbc16744994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d040e927cb036f5465f00b5cc51a24
SHA10d893aa375391a4a34ad6af47f8a425b5f520865
SHA256dc796aff5047bbdeabb871492dd59ae55d393cd88b9b6982a858ab02609de5db
SHA512c38577afa02fe681a68c39dbc37b091174b0e40da7f3e56bd9b8f5ff577297a4943e7173c3a770e7372d346fd4ea632948a25c252af356936067d8bfd0180c32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b