Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
f01335734725a84be079e2e163359afd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f01335734725a84be079e2e163359afd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f01335734725a84be079e2e163359afd_JaffaCakes118.html
-
Size
7KB
-
MD5
f01335734725a84be079e2e163359afd
-
SHA1
26033a731d7be64c25bf27fc95caa0d105ef370d
-
SHA256
5a7029e35ae7bb2a0674cfcee2bb80c28d3c3ac56d321272fe12563f45abc282
-
SHA512
972dd589c6eea791c19d90e9e274f2f5af559a4f771b8491d3188c7f0d09437b3f4ae1acfe6a913449fb85302d67d98d40bbc9521c9c55c97f8ea131b5375aa9
-
SSDEEP
96:uzVs+ux7NFLLY1k9o84d12ef7CSTUWzfCwdxCDdCCpdACcdScEZ7ru7f:csz7NFAYS/uOQZ/jZaSb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40065574390cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433093717" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000023a98edf6ef47adebd4dff9cd12e592a443d8653dc59d6959631d54317c370cf000000000e8000000002000020000000dbad170da8bea904ddead2326fb1c8b62a8d02fd0e5978fe17b6eaaef1ffb8cb20000000768c034ec08c9862878f92d8cd41907c10c7b25534cb6ca35485ee267f37d3284000000013f9afef5e6f0b84d0d40c99a54bb2042e25e9fbeb00f8b7eba8fdfdeef4bd986699ac34b92f66373d8f65ac5c6d4e7f6723e67ad9484fc78193bc69c4f0e866 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9DCF10B1-782C-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2284 2368 iexplore.exe 30 PID 2368 wrote to memory of 2284 2368 iexplore.exe 30 PID 2368 wrote to memory of 2284 2368 iexplore.exe 30 PID 2368 wrote to memory of 2284 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f01335734725a84be079e2e163359afd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4565ae1492877074e74038d0798a56
SHA16473e9c497ddfb397af99a95c75db4347d57460a
SHA2567877bccce2221bac9b16909b8218efc3ca13f64b4fd2b98c567c75757d715dc2
SHA512bde3284e09ab8c77bee685f5a3126bd55c9715c6ca62c26871a9d485fe26bfb85916f45ed73daaa4909d9f4cd3ff380052551c4349a3bcc88b82cb2702c75082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aeb2c6e1239455ea59fc4217bbc002a
SHA10dfb80b63a9129c6eb002687aea5754b8e22e1b1
SHA256db40c319d9ca0eb615d8efc65356cdd7afe4889daf416bccd262a01eaa1bfe3c
SHA512dbfbea9cc2c0db252ed53d10617f45ba25e6735db92ec201088d1e6ce5b0cdd45c2f47e67f680caf4972dfd9347306df2cbee0e8fe92ebd75d158806fc55bcd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e4cca45de61f6d432bea9fba89b79ef
SHA1668983d8fa129d3a504c87c3cf2b989982043662
SHA256989fa98ffcf4c860fc243525fe161d04f32ddbb710319f3151848c6a58b2c6ae
SHA5122e0e1865d3cb628f0c031caad62f865b56c04d464ce5321f5c8409102eb8333b9b4ed6748fc96578b1d84bb3e594f9a086daad182c8f94e0f7a055b33cd89016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ddce4e815329b3674bc4887cbdc3f2
SHA1c19d90cea2bd044db7912da5be695eb0543db18a
SHA256078ff5fc395fe737128266d3e814d83a4a3ffe609e278ca2b9fb7d9278485ded
SHA512554dafa57f6bf365ca2cd8ac218bb15d505c9ce8dbbb9eb95cc0d9aed5ea5a51a476cf07681660d3e34bc6fb414bc91239a42d9c43ee196e4d96a313c8a9aa9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a670eb031c6e9549f844a44453a625
SHA1a109b83a358efac4976d3d49cc55e966b3a0ea30
SHA256c22fecfd9e20721ea07f6f0f1cb920e6b1e368fac120cdda73852439813ca449
SHA512c0acf9a5d2307a8ac5f31d03389eb6a8d229719b151b73e10b82c2219e39b46647f707543c54491236ac482c8a34e293413fc27259a64c22633993f7ba05e97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f0a6bcf5e25dba26cd7e102ffa81ec
SHA119abfd5b175bb0ea993cdbbf83ee0dc7c77753bc
SHA256601887edce5d90630a0c784accb2482f2334d0c7dab72d4ed3239783374f2e9d
SHA51242c5798c4725d9a2ce676cb0db384ef47fd96de904dbdde045a9a6c012fb3e23ccd0876e9358d6a81477b6dd47915da0937adec93734691cbd2bc3c82d99b492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510139554a142dbdbc39ef5fd4d77c309
SHA137dbc5c2b5678dc3aa884ceec90e5030ebd7ba19
SHA256dccfd657752782b8a3a37a82c2ef69c0fa84b6bcb9833282943d68589ba4d082
SHA5120838f95fcb7f7397c4381fb86d53795273f64a77470c09a2ac8fb3172fe77205e1c23ad7113f82bc9cb8dd730c6a235ec55ccd98104cd89d6d580d3d29d790a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537810b627d3d14a74c2e2eadd5b2f806
SHA16312825e647e3badcfe71a0492fc31397df1c1be
SHA2560bd623a9b4f740acf4dc0b3fe84ccde07bb45abc9964b9803824ec85070e21f4
SHA512dc85529cf443089f6f0d45e973843b06b5321533fae9b43c58ed37d02fce38daf99db0ba46551d827dd582ea592d8870272fe45b07cdd6c2b33d165d1b0376d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3c50b56e226a520ec36b9e3ef21b85
SHA1853a7dc544a3cb7c51eff0151f0bf90253542408
SHA256f4dac8a130e4d31e6e02c83341e780063066014a1965b2ff328a8ddddf7066d0
SHA512f9c6b40cf0022ab2c27af06be52d587bdd6b739afc988180c3ca7ab08303689d4b7bab36d782574196cf7cbce1e3387e1d46bcabffd55546f718b0be6d282b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4117c23886b08d1fd0fa3226da70b3b
SHA1606e8c56ff66da81d0c380ff131d981a81243b0b
SHA2564e6cd7c09d0032288624466805138d1ffed40b0528c385203c68f8e7c65ce66e
SHA51200ae2329ffd369c5c8db98d4e93975504eddb1e0918aae9e1f301dd726db0885bfda70b12479469e3e54488e623f5c174fedbb823cb902f312e876f1d1a09b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f63439943297495273332fd501bd8df
SHA1f37382fc58693e7f6fb98584b0583870ede32779
SHA25621d73c20cb01eba83b09d823b24d939f8125795bb065acfac32fc9eea57e2517
SHA51200598b6ca2f7304f16cf8fb345e880fc92610bee5ec043687aa3d2840247f41ec3ad7e443df91719ccd7acf010f4a83a821bff8aee18d421f415ec3c696ad05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59c2e9913befdc84cc54908bcaf0d0b
SHA1730b7cc20d58ac944931c1e3bcddd287e2a8b1fd
SHA2568fdb8131d38e7c6ddf3ccde25b6d875721e481df10d374689dfb788e53a5d0b4
SHA512869ba34a62202f1e07bfe27b36205170ccfeee7866f592ff2da3d5ec2b14f391434180bc06395483111ac958eb8f1a418f70b5235f68d04acbbf8b3a294c227d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f972ecc23fd73c4184f64abb612957cd
SHA1a3c3f56c750cc17cd881d1d41aca4cd78054e4f6
SHA2566bb07f6d4bb8b4b9c620e3e879b0b02ee24a5c04443cf6b037efde1cae90ec1d
SHA51253c9fa110ea2cf0840926cf900087d6b5555d9bbb36b71532d029b288556e9ebc23f241c03daa2f8ee05480ee6a8c88ea70ba656b0d4bc42523424ab8d95466c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a84b3f1265d689f7f8d1f163624e70c5
SHA1d8a16ddd5a5562b5bbb6c47c993ed12792a0a72f
SHA2561b070c06051c2220a6cd415b53e08295020476722c9cbf4bcaf67ffea1dffcb1
SHA51236ef27487f9538b57570697a108c7a17a19dc0516c871ccb01fb525e6cacd0aa8c4641eb4338c1be3e31c7113a8f7a5a9c3b2c4925f4d7aa40364dc92795b499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1be078de2ee44fdec6384793a13c508
SHA1f768de4db7ca05fc21962a34b85a7b2e66da33de
SHA256d301d994e675cdd8c6d5b3afe12d49079aeec16b03b412d0536f93393dd95c53
SHA512611f8c1a9c182caa45da36600f4fc669a5e2fd23acd467e73449fcd7fb6225aefcb266db6ac74b679804e950ec548146a2189c2bb89e4b976f83a458308be364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da01e277a444ab2e246f979c96ce1b0
SHA1b5526493491af9334961c66790a87aa234b94625
SHA256892a0c06df1e3dd24af280515b9dbbfae1b2c884e71687edd5741791405f2031
SHA512d170a1364b57108558a0eb4136bc924cd3a8715aaa5fb12f8cb41dc5e4c9d436809c7e84db71113c7e58c8efb47ee1eadd97e77c448fece6583ded9f742868cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a43219f90ba33059294c159d804b36c
SHA120d82aca55b736b1421f6607e37ddf34ac9d36fc
SHA2566fcd8f0390193ce14e28b06cbf09b2a05e1429a391e6fb08188d5bcf9870ca91
SHA512c114aaf818462f996a8c5fd84d94d48a0344e32055571cf69ca671caf786e50328f2d03a8c78e575d9e87d0238b6211adc1387beb3a0719d3f92d459c2bd900c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab6ac2a0412e71181c33b4c40772a4c
SHA1b542c3b3e319e7bfae6b713c2bb378ec476262a2
SHA256e60e889ee6e5b93ab551e83454b401935d5890231a347b40dbb6e084fd5e7f26
SHA512a274d6369df1a696ada4166aa355ca72ca80d5b6ffeffd8b908ebe7b8b4419729daff96af8b2953c84e92048d42e34e076f9dfdb90aefada868ea783cbfd2a94
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b