Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
ef993f1a65bf4d7de7eb655775d9883f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef993f1a65bf4d7de7eb655775d9883f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef993f1a65bf4d7de7eb655775d9883f_JaffaCakes118.html
-
Size
26KB
-
MD5
ef993f1a65bf4d7de7eb655775d9883f
-
SHA1
9eb4cea7a05f26ca0f98f6479ebc37f4485f465f
-
SHA256
3ee76eef5f17c71f35074da97359aa07355b6fa629cc08f1f5d3bba6cc1be096
-
SHA512
53a24fe26e30806734bd42ff697856b03e9cb16b228e6f6d34a7a5e566b8ab87c9d9fb1cd74b40d95ad96fee48cb0cbcf69ca505f391ff20f4691826898ef58a
-
SSDEEP
192:RsVorIub5nRnQjLntQ/ynQieQn9nQOkrntMbnQTbnInQT+zqm6Cr1GXdQl7MQnFe:OVoEHQ/SC+CaIXMg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433076428" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c085af33110cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D59B851-7804-11EF-B939-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000406d0ced47d652d7dcc43d5eb1dbff619a5adc66657a1ae433dc4c7542040dda000000000e800000000200002000000057f99afc28347a92c0f5dafd2274609ca3d21a0baa51e6c4f68a97e2a9a6a01e200000002bc27499bda691b9644c6fd2d4a9a3714f5914afaf23b3dbd42f43cefa331d7440000000e5139e5996da04effa5324b9755ee92797a01f273c115aedb403aa4f0ab7db22887cae4a0c6445ff715b2721219205a581bc4f3a3b3e1978c2aecded68e96ba2 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2692 2392 iexplore.exe 31 PID 2392 wrote to memory of 2692 2392 iexplore.exe 31 PID 2392 wrote to memory of 2692 2392 iexplore.exe 31 PID 2392 wrote to memory of 2692 2392 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef993f1a65bf4d7de7eb655775d9883f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527d2b0d891c60e8ae360b66a1eaaa72
SHA159ce21361916b8359d35ca192c7fe399954ee3c9
SHA25670515128fe3b96d24f253dd0fda70a149ca4f198b6817c364fc62d9ac6b3df05
SHA512692d01a98ab563619fd91945df17cdb91bd422d579bae5a0cc3c72293991df90e61a5c41ce40614aeaefe429e6a158dde8313f8aca5f1981534058bea1bc1ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54101a65e1fd749f9e0321984cd3cbbe6
SHA1f96460c7b6da36f802904af52b150a66eeaa6d46
SHA2563d456f48eed498a07895879295cbe0ce53ece15873ff13ecb2e4d4e5448651db
SHA5121bea371ca1f47cc6b8c3dd12bb47f46e3eec124ff13e7a449ff49262909c788ca7d8e5f5f39832942c93ad81368855f75456803a23531ebd5e7c16ef941ce620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51909c79065a22bf8694aec8aaace90f1
SHA148419b988999e90c4bef34b6b65ed85c7e847227
SHA256eb9aa785deabb98914fcfb1fd218a60dc846b90ab5a3b48c1e598ae1b5535e59
SHA512a4f959dc06822bcc3f791cf9dac4b8209818627dbe4fe03d1c2d9d98902510b46e365f6e9f19ae317a8c1c25eed674f6e01be8aaace18c1e43a3d1956833b4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c4be21adb9c53fc76b74bd4584501f
SHA18d21650bd02809aeda102e80b2f41951d709ca43
SHA256a65daba3210b2db10a25c385f2f7a2378fffe4b32accaaf696077c4de3ed5e67
SHA512cf5748a1ce66229c4357336d9e729d1d7de0f6d2393082c5af824122f8a74d9f2464166a1816e7f29ac8c96d54ac6c3cd54cecba828b51283602805765b14b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851a350878a07d9db4ca17087be86117
SHA195739233546804dbb4b43f6167ea7493acc149a7
SHA2562d413b13279abb71a2e6a80d158ecf7771342428bc5dd9a49f14e65a86afa92a
SHA5123fdf833cb290c27bacb464689ae544fd12807cb90e97e8f0ce99364c3f1af44de90d21c52991c947e6b01f350ec755715fbef1fc9de7bb5a211b41119f81186a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635285c6ae76270faeeffd2ef0962d6c
SHA191807823678a4cc06909a5acbf4f47e26f69eddc
SHA2567956ed5445e950e77ce061c03e7dadf5f8c2f93a6754396b55be5b1a8167f85d
SHA51264f8e8ff4d8a7543f8a27e25cad6599cc9921f900f7d6612cb7a6c01f0fb9206a58b48cbb28d81e8bdd96861b64e5a59e51a04da6760c7b3cbf6ab93ae4d682e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9eed1ef0ed7f4531e314fb0f206b80
SHA1d8abfb345a17d39698c6ffde6aec5a8c48b0d1ab
SHA25639c4973fb236c74f4ebc563714bcdec53e25e5c92f73465ae6c5b4bbbec7194a
SHA512d2265f1049aa82cefe276217f69a6993ae29c618180d234f0a04584a07c86e115cf9fcf4a29e5f6be090bc05db4f819b58f4d008422a5c0725c9585ac92b30cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea958818f654be1ee5a4064bf84400ee
SHA1257625acb46e9c66efd92dbdf4783fe8ed863cea
SHA25687bb7465a2752240c24bb3045f38a44df472b00b5596cd00ef4beb8e59ce26ec
SHA5126df1811baf809b45b0c905b74761dc3e2e1bdf72d6a6bad1e16fdfbb44482411a0c14906479281080ad16562317889af247af29cb450a15999e654b092095322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c4f119f78507b38edc9cb4fdb9eaeb
SHA1be3a423b2ca5ed2481e8fbe9a71b54ee50c7e009
SHA25649f98bd559c5e3582eb1cb70d8e1adf4e4dc0285caf77cf888fb88e803d4cb0e
SHA512ac93ea89f1aabccc712b85c5ada21030ce76ce841ff0b57f16205e7515aec333fae21919dc477ced4a159050d5882eb88d05fcb766cf7c9293ad6cbce59dc139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be46ffd5164d5bcd3ee1b481a7d2d85
SHA1a82b45162193dbae42674f50568405fb21576965
SHA256d2a8b8ab7c4c5bfd32933ed30625f49a274d4217b40e57aa9d09f036840bfff1
SHA512686159cff5aa921b0ef16b67aa11cf85453c9940adab0bf1d151abb6ebe44a9719e339ad43bcc72bdf3ed2488baa6c338fdddd3d6e43f48ce1586c969ff622ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5803b42ab49aa559c02184d7109cd7bc7
SHA170ac4e6ac658d7e47668f663587536c610fdefd9
SHA256ac3c8964c6a7521653527be9e427c775c85a8ffe15ce7b2da640c65c9d681298
SHA512eba354157de196f83686f7d488ba453ed2bbd88318e1b7892d0d8e53252143156d27ec33fac26f9fca1b77199ec458129ba2918b56198b7730fb2dd29edbc114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b964f6dd5eaae6e956d8547516e832
SHA1980c9f4612263b41f0f6a874848973e7c1522867
SHA256f7117e20c867611c74eac957be4e790bcb77e15d8835778fdfcf9661e8ec4241
SHA512243647e064ce8ee7576923b28deab82350c7e1fa1b6a99b58d18a7a80737fbe7cf9f7ecb7007034e47dd936a124ece019808c90a10290af16708e701b897e12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a9a727fa99a804e3ee3a6c427cb3b3
SHA138f4ab660b92006b53dafd41a34ef3e65d3fcbf2
SHA256fb3215e303245792b5f81628aad2da04600291b833b656ba2871f994099ab92f
SHA512116684aa08b9a2cfe7a85519dda58ef4fdd193602ac6dff0a7ec2769ddb9106c9182c7806ff6689068b5d34099fbdb7c337cb4daf58c5a5a1a9ce784e792d8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55880d7c60aa8f23cb41871d11247c1f5
SHA1af4b5dcf4f34c26b4330e38ced1a1ae1e138ff3a
SHA2563e4ea089eeb8f68c28d83a48ac710aa1488a4d01dec56ca1e147fb0a44cb6abf
SHA5122ac7e6c45f813850eea7f99f11a25fd56e1818654c6514f2f7957fbdc9a362ee10d64c4830c826426ededd85d623898f9d4f59f1b9c4a3ab429f635e49b0cbe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f31dacba1004d70edf0f4a0509d26d
SHA17c69b14f5ac13b9d7b35ccb6a73654aafce33cf6
SHA256f0b35d3ba6eabf0bcf80f08696120005acd4a26ee869ca6a11c929589394d529
SHA512c071db3ef7ee695d175e046e6aeab541365bf2a108eba2f980e1d30b4891835a0e0e8c4543ca3f21ededf9339d3e880299a39d7e76a7d283c0f06ac4e6d2a3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51481b273a4ad8a527ef978119d142884
SHA142e2f5d35968cacfb4612ee1465e748c0ee96caf
SHA2560ecc801a3b036d420dfc9a3170561b9673d9670bd907a42982b823f56544870a
SHA512182b3dc3012c34875e940d0cccbcff31819a7b22cd7c05dbe4baa4c7c0a893645895ffe52cf759e9a73de913af75df665d8e8a38930704735e9aaa5663464ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55bea7fb0c42d683994c8b236375fa3
SHA1f660180a57f0445be624599b23b560bb56af8c54
SHA2563f131d6209f465939f82b04ebf8f6f1a07149fb821218d58399ecea9e132e30b
SHA5129ffc48771608f8a8dc92e7ff727204764006a1562a3ace13246194dbe3c58edfa63bf2f9fca52c53d5ed595b870aff0680ceab4d4feb9c9d1b5a2f7f77d2a5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86c42da64e23faf77435187d503344a
SHA181e6b3217641170fa427ecc52ddc62da161d7ccb
SHA256f4183d9a82d1107352789e7876b65126cdfc62a21d0774a869801dbb97817299
SHA512838172c5fafbbec698daa9cdca9f1418fb42b57b0501d3269297e12de838207ff81d272caaf13b96efc2289c7df870ae30e584395ec600195a64929a7328d1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d4b3d5c7598a8fb2d8dcefcd095782
SHA1206887ca98239961284ea81ae9255823de192679
SHA25607baf31f12e3d308e09c11077be8a3ee122ab46a7fa4830233b35771802b6f2f
SHA512a916290d7b03bb5f99c7f3a4e6ded0b9617788bfbac489ed04bbce61fb517c2d3e9aec3df4408d9944a2ce212b90760a554936cae22786edd9326ee2c6ff549b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b