Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
ef99a38859f6089d4b200a8e200e3b13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef99a38859f6089d4b200a8e200e3b13_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef99a38859f6089d4b200a8e200e3b13_JaffaCakes118.html
-
Size
456KB
-
MD5
ef99a38859f6089d4b200a8e200e3b13
-
SHA1
ad24171e6c0597e16536480ca4b820f51be30a8b
-
SHA256
6216dfa10374eee1a9278ec9b24043812b51e9f176a89fbe852fb3229c820d11
-
SHA512
ef9e213540083d313d0f5e8ef6702725312545c99ec2b51954351ccd81d86c3075e9eae3c35d82a33551f9da3830f76caf6c1f22ea508c2a0fab30fc4e31192f
-
SSDEEP
6144:W/sMYod+X3oI+YMsMYod+X3oI+YVSy/sMYod+X3oI+YSsMYod+X3oI+YQ:w5d+X3U5d+X3XJD5d+X3u5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8677B0C1-7804-11EF-B686-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433076497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401a055b110cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000000ae3f28303b61956f69f86f0edcc9f2028b62241c315a804efaf0f103033d512000000000e8000000002000020000000f8bc810db97a433a3c4fd7a5afdb6976e2c949289271d6f8d60e80e22c5282132000000050c741d411beeb66080fffb4c290381b63903402c7c330e2231edf1f3cbb5e1540000000e999de275c37f5f879eb497bcec4457ea399d20513b743957041a225ef6fb56a55dfddaecd5ee5c0e1c7f2b282c684675f7f001e8cfa00d93ad19806791474cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2780 2840 iexplore.exe 30 PID 2840 wrote to memory of 2780 2840 iexplore.exe 30 PID 2840 wrote to memory of 2780 2840 iexplore.exe 30 PID 2840 wrote to memory of 2780 2840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef99a38859f6089d4b200a8e200e3b13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5020ef95e3897705cafca39045c23b83b
SHA11df472afb0be9409c8baa521996df351f7c97fa9
SHA256fc00047fd8e22789aead4f893a91ebe82a5c32c67256054a870fb561be1b1c41
SHA512f6d2c64ae87cc2b590e3bb97d481bf6b1ff204f5df117eb47652c5b647f04f0a602700b395cfa9f21be9d075aa20fffb931664b646653bdecffa2068d0e23135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55179e717f9b8a3f77c2b4943ba24c99c
SHA17f8589cfb0f18a4b69ef9a0fce11971d59356e6e
SHA25668323ded4caaba064d3a9f6588cd2841bcb849a35e7c316b5efced8f9dfff00d
SHA51248351b0d35117ce673506e503b2ff676ad215a2c4340df2c57fe6cc32165cd4d9c32e72cc28486a2be6117a1fee422874769a7bcd1d62c782125ae0b6a23d155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb4462a9fa26f8aaa2361a5f7ed6687
SHA1abf010316ff077ef79cd1701b7413d2b458f67e5
SHA256c1ce2b9d78890c8051226e3e7e9a1bef09e4f09a94a43648364bee251eeb6198
SHA5125451b38d1adbed1dbba71f3a67276c5423bedf584f4ed9c1a1f7e500d4b99c8ba05bbf328e882fc7c1a3ce1100c611454b707e8ba071a2da919e11dde88dc6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b017456ae120b22514ee70724d3c012c
SHA19f8afc58829322f0fdf4caa2c34bb9b489712a56
SHA256c1eb647f81047cee897d4ce2cf6029ef5eefa04eadf68b2791489452b66fbfc4
SHA5124bdf3a71e33ba262d0acbe3914b82a05984790c7e3edd1fc83718a5dfd0c93865b82d53ff0eab465f86d8276a80e03b73bd25b0b9087fbb22bda0559ac4a0f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635ee32551710ee18ec6857467996539
SHA18dfdc549078daf191020a01f2d78dbf43c818d37
SHA256bf3a9212830a33c32b7a087247d12561a0817558a90458b459cc85adff82dd5c
SHA512b03c62c9b2ab9841ec203303668e2d04ab4ef2442128e694d708ca9b647d74bb4f01d305db5fc191ef4f51b9b554e7b9407f4d15949d638cd118a678833b8691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5b2c4426a905e9a1cc8aa1c6418e16
SHA103d2e79cf4b81ca43050a9427e7af07d2508aabb
SHA2561f752cd2e95ab91fad2e81f4019c0f84d5b1e54b412b277ff8c1ead08a7512e6
SHA51270e6e438c290374324c38ddbef682d3f78bc219752a2551140ba03e51cfdd3941d727bec9a784b4661a33108416a48f711df6692bc09a41a3e641caf0198029c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac23ad17dedf4aaaa905df2f55946d7c
SHA15c804cca884e837fa606e383c338a04fab7d33a4
SHA256b9e873463e46d737b98672c9b3ab3247287e3f91187495a496af8e12b066bc9a
SHA5129ff2bf745bfd5ee5bc786f917fc6a7a6279f46d49ec0fc0509d56a6e37025ede362998ef1c859c89d28c13dee1e3c3b2e10c4daab151df248608bb957494be33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd8544b9b04a771b2319c36fa68c92c3
SHA11fa33a1c341f224100fd71562f4ae54a9374716b
SHA256307c74458c8bf055b1f57ab2019373ab501a3d87715a9ff435697979aeb6f366
SHA51275a34fa46fd18de59bf28b6278879c38cc92191d4e47c5519a9bf4fc11f2e85914ba479f6ceef7d606f184b79e8eaea12c84caa711ef179f5926275f5c1ff8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a09cbcdf625c4afd70b8a7918111d7b
SHA183773f989969639e066cb8dcb01eb11d62696d77
SHA2560cc3f60c8476304ed3b9e8a8d2c792c32902371074934b347c4dcab49f7667c2
SHA51281ed183ac1adf12547cb4e6b669e0b753b6e6b3e0b5750a3b5e5a19cd6bee4cda0eb9fe75ed917655bdecc9e0b89d99f2fad97c42bb6246c53ba8d598eb6410d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f71415290817442d2ac04d64766bde
SHA1cba99be440102caaceaf6f5ee629ca6f941bf3dd
SHA2565036c70fc6b716bc6d6527693205cad4cf8821c5cd590c7a33621b629c2eeeba
SHA5127e6f9a25041f8061696cc7182dbff486a6f96819e0dccc4225e61996b9be6108822af8a4216fcb0ba5bafa6bef2a026073e88050f2aa40289239eac55b6bcda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab35ea1764b463f993741f14445fe11
SHA11c66471e995dee41c2e3319889d20a0c7c34d61a
SHA2567ea8309fb6cf2bbe443b954d6dbf7d034a59f358941f39e1846a2704a151f73a
SHA5126d40945deb05faca1239e504316b3c5b0e4900c22c3daa3fb7320034bfb42c322a570f8a5503e60d95738d6bf533e5d02f893c24b229edbfeff7692a5b990bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f78d97cc2f956f4d6bc3d9327fec88
SHA17c913ddd905d2f2045c62a3888537959b56959e3
SHA25677fc35c5605219f3ce3e86b1cd35bdffd5b1a256ff5102f8b00cd7b3f2019147
SHA512d6a0191ef6a368a774e1dd7cfa8d4e9851279ba2cb5115cdef6e6f2a02fef324399d84750c7e0e7b3db242f369ee9df8e8b1d5fbce1b8f138f1e120117f909e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78f23ab2bb7916715a557681fb3197d
SHA12aa6bd7385f92e4b87a6244a82ec46bffc25e754
SHA256f560c5643a92c04d36e5fdf76d88e2d9affdc534da4a9ea666a280802fde5417
SHA512abc8318948a3c192047df135abc4f78a483e53f1883fca409508d6205d89805d7f91eae5515d07759073ea5f0476756fc152966120c4edb8bc9cf851e6541bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570560281d979459460df975c3fe13c94
SHA148f6498c65318504ef8c8d6d1a715a97e1e7fa9d
SHA256503c1aba56b2f97619c3ce39fdbd5c88316b73e3472b259da3b9468f5c8da3c0
SHA512c8647c5ad1b0bd8c52d62cb0833fcf2e9d77a18f09e84bc82efa71e27d194d1b03473013a7985b6d3cab597dece089e867df9ad08b8c6cf5479716765fe08732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526447df1151df56929540b3c4e6e14a0
SHA12ce965ffa77c33854331ab015ca8487aa8696e75
SHA256239b3e953e9dfdea24d03732298b2bbe48fb4525c993c032e611f39f1a90188a
SHA5122f01b206b5f50c6382ba5d1b7ca87df474a62797c24b2911dad5c9be0a17d58c8f82461150c51621c9e18137862e74c6f960a9074bba092d6a905f72ef158b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a521010d223baeab9d965d4100f81edd
SHA113c4837649389b3fe5a899bf1264120e8e4513d5
SHA2568add1c41934a23a4878c226f465432f3dda38b471e42e036ad3feb828147565a
SHA5127caf188077592d665cee48542985a85d2770cb5017b2a4af772ef87287e09bf630d424dd1b60cd09c31bfa75fa261ee5b2daf20fbdf90befcfb2a0cb7ff9bf03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55adb1d44f77da17ec470630cae9968a5
SHA1e6b58dee4a390306f1d243df6c60ea83800e3a5e
SHA2569268af8667c4c3fe0c31e5fed54d1688f48084acdc6b8821d95d2ac07f806760
SHA5128519808217b0141d869af9d17ad95665a01acb4053d34a6f5f862c87e8fb72f13d59a1367b329e418699fee3f5f50d7c8fa8853c6e62d671b368b3f7d3409426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9ba3b66a52e8022bf1330e04188aa9
SHA1854a0fef704565357837aa0bf0c3565a847eb279
SHA2568b5a81c3cc81b05c6fcfc86a6c202a830ea733ecc94c8290396ed64a78bfa90d
SHA5121649d8930a8ffc8e26fb88ad812a0be0938ffa58bf05831750306706c285231ac0116682b31ab397459327987a62efad7e0a9e6ce56db9230d92c96d4b728e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b56c863da4a4327a4e7c551f2d7510
SHA131a2fbd67621ff5df9400ff57b914def58144aea
SHA256a7268a615190892beddf0ead28192dcfb4b3c2b06e4f540f04e11732effdff61
SHA512b2e06bd9f7c50888ec471f4acc2306b1a0a0313b0c77e533ee99791a509fb859ae2365a5d8c2bde0b9b3eef450ed1c203dd0c6d76b3aba7fb7eb132c61d36880
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b