Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
f04bf3df22ea0672da9e697a2f0d34a4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f04bf3df22ea0672da9e697a2f0d34a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f04bf3df22ea0672da9e697a2f0d34a4_JaffaCakes118.html
-
Size
67KB
-
MD5
f04bf3df22ea0672da9e697a2f0d34a4
-
SHA1
ceb983eccf2ffd52cb09a50582bca2f05de8a7f1
-
SHA256
5d15a78472a32e40c5d36e627a71fcc8ec2185b783d9d410ddfc34a2701c7f2f
-
SHA512
62b4940e0b8acd3a728774f7b4212e3a676eeb9fe02a8c1b9e22bf8b261645a3a1e179c2d6b4ee1ae2e9f96ff19cc7bf24b472e734ac64793240e1d04ec9642b
-
SSDEEP
768:JiwgcMsSZ8tN99OIskjZmcwGNTJoTySqQCZkoTnMdtbBnfBgN8/oygcR/QFVG8cr:JIWZMaTeTYPec0tbrga6cuNnzIjv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000007651e48655fa07524e2811afc8f10a602f71d329ce08994f96f7114c10c90377000000000e80000000020000200000005e83810b479a01cd790047087ef5607e836292456b611ecdc0a991bf3b3acd7020000000e12de04228acc65a0e82730295873498d7d04fb9fc1306fc8b99d9304626de3e40000000bc807036f315329e920fb381cf487925a3cd49bc7bf23de322550660902704e2076afbfc13f24ea24802c2ed37132cadc53df87b9247290b9333b117eaee160e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2484F9F1-783F-11EF-B2CD-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04648fb4b0cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433101674" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 804 iexplore.exe 804 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 804 wrote to memory of 2428 804 iexplore.exe 30 PID 804 wrote to memory of 2428 804 iexplore.exe 30 PID 804 wrote to memory of 2428 804 iexplore.exe 30 PID 804 wrote to memory of 2428 804 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f04bf3df22ea0672da9e697a2f0d34a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:804 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58567556e8768cce6affd4e73d20cb2b1
SHA127fdf74004770489014f36598cc5f9fc330ca158
SHA256f51f9b95423161e659083e8a10f5018d18b0ff1dbc2d0b2e3e94519f352fbd2f
SHA5127029861741bfc85ef5ffd2e6418b7638cbcfbd902aeef26744cb6f8934752e642284917f1a3c5f2eb97415deb733329074b111b19a77e492a3253025d0a14758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52421d656f05b6ba09b03a529b07e439b
SHA17f2b20757817e2afb11969f23a430ac0a84e3009
SHA25668efd4fcc0d37b0bf9adb48fcf489fc598b38365c524030a1585e4a6cc47b4e6
SHA5127f15e7f14f2002dca1774e649e38111428dfdf41517d4f985a36b25ddf467cd05b8c084829c74803ddf111e75cf8436ac47ec05b60e9ed2089ffb1a6c9611561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a187e244cd16b7d80b0ccf94ddb22e1d
SHA1400f24526704bd462a2a8497c8fb02c4437ecc06
SHA2569e5a7c28d9d59eec8b63786a44fac45aa708f2b3ef7d4763b736a0a237e654e2
SHA5126e0b62f8f612371b8c32cb80209057a38e5c94563cc2bc9508d8860bcb7db0d33e7109d4c2417560a91087242839b23f5246df302f0073f18d2a245b798cabe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc123855e1c31898267a766fc6beecea
SHA12877abb3440eea9101d655dc02512942257a26b9
SHA2566e76e131c7b5d2649dcc28c70dc5bd2a97e57375a7ba9c29fbb3ad783691532b
SHA512af4896fb7d8ccd46d95e1464df99acaec5349bfb70d84eed9fdf0a25e96dca6342328f1d9a36c4dbabcdc14aa07ef9bab80c67b0d4d9ba12da4a3c08461b38ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d6015042910fa6bc1a30d4e0b79f36
SHA1c772eca0cddeec1870dbf2f2c2fbfc879ce7fccd
SHA25673d182ab281187ce042665d85a2c2fd5b395412ed67055187c2bc2059c3236b4
SHA512a75080fa3c086d3cdaef007e750fa85e08c76770b585cd80237854e2b2e5bd9b02a1c3a9a22a0eab500a4eb7f5f40db319f505cd5ec3049dbb96c0c6a20771f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584862d70cac5575cc20ffc96a370f82a
SHA142e62cd1b7054b48e649d76208cc1a359c4da7be
SHA25693a69745016791d995f6c038efa1020f0a24e2ab9edb9e49e73cbf4450bc2d9f
SHA512b26015a10dc38f796757ca8bd2a8fcbeba51dc99b04f0c747c69bc56c2ccd7efce7c8d74b73cafe6d62958f0012f8b63ff9b3892d7f247ab419d4e5308a67deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575df72b41d0e75b5f37af5454ee6344f
SHA1106053e7336ddef722ce3189f8af75cfa9556ed4
SHA2568d64c6804900d20591b222f5aedf750b3f1babb82ba4c17cc6d782576e4ea447
SHA512c12aabcf7c3cd94db960c6e559f74a6c5068ea8d75862aa9da6d08ef9e64689db975491cca70cc571f9b5d4b06e67ddac2518ace5139b80bc2f56ee5b7757a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f211233e1b64b15f1043eeaa3552b6
SHA11ee236653b86d6fb06459ce06978a3db145480dc
SHA2564e9abc8cee6d2cd276ffb13ecddf42efb61e66c515298a25cf0d93305f69a0b5
SHA5122703bf1fb3911c277da7d69aaa2af288b309124a28b3cbd6ebc466dc7d9f9875b4fb6dadcd8d79c67cebba741f66c3b2d1bae6be747be9bc43a392ee30b8c78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537369f79f0f267014608b4f1d01da407
SHA103053367122aba3449e4bc5b8b3744d71780c936
SHA256ba253970176c6f7842c3e492ea92581986bddfd4d2b85a992b0224abcc382a0b
SHA512bb0b65cc61262380d535bf7b7f33092e65b47597b1adce8cde9669a7368031b412ec1edb94b6075ac6f74e5b70a00ec9e7c5e7fa8a397103af6053dcdd7e88de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190aabf0a1793f70babd6475dc81bc08
SHA10f487422936c83d74232386486addefbb5e297a2
SHA25625a2e72778d35346336f64207747dac281fe39e3e04f50a68edb59eeaceba252
SHA512afda135a9d715cb02144c980469447fe62b073dd5d7e871ca314216df5a89acfdffa9bd81e1d0df11650447f3984358b340d98fc68ec2db0838d05c331bf08d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a946915bbac53f76dce2a3b06d2441
SHA159299fc08657f00c5396691dcf4a076d3fc8fade
SHA25604f1ccbd42ce72a68b45bec42b401da849d82ae4f0fc0a0ed88672a0f88b0c6f
SHA512fa86441c04bd2a1cda45001c08f0685f54a902261f87b4c604e9ab62037d4ba8307f84d018ca201f0c431287592fb001c7e39097c1975d5fdbb2d14e95e27307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9927090422428c0597e36bdf43df16b
SHA10a6c186f4b520a7dc7dae9ae2d1036f455c3391b
SHA256030cb83c25cc7416f130c39b8bfba41c9abe2c3e8f209dac5d6db637f8fc394c
SHA5121216177154d3c001adc1377006c4b41cb02506912933c58ae94ef6dee75309e6c44835b45b5eb66f36632734e9819713d528d70806194728fc992ae15fe5b979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be650ef81143758e5d9f596b57a572c
SHA134853c8917bb00580fb37a98fb0ba6a0425ee761
SHA256c4e6fdd8304fab0ed34a867c3d63463ca25299c6bfaca0df6d50c7aebbf094db
SHA512a94fc0485ff8d176dcdc429cef4ad28518aa699bf6ac8df0cc89fd6c3db648bf4fe344e42678d9267e2a6454c08e9e9e8c1fd1c108b4d616d407dbb2342e49aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73596186d93ede3e65371397e135791
SHA1d978aeaa11025718a89643b3cde64d811a8e0ff6
SHA2560c6804f47405a2b659666f2eecf3d0cf39cfa5ec9013ddcca0f8cff58274492b
SHA51248d00bf5fc1d900fe106638346b7dda5a86b91f981f593b659ab647ce1712f2d665a5fc6065069eefcc254ef6c90e146448bf9e9450b8a2c8d1a867553dd6953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59deca1bbf9d703a3493daf4f6cc1fe67
SHA17bc6edf6f7007b15302f762fdddb48ea9f293f75
SHA2567d9ce9bbcf2bdf68507efd11a6195b573c8a7593c97d6a183492c792b4e243f3
SHA512406e61e004047ced39b228dce9e9ee933122fa8c6ec3ccc1a9350c32877960648e4bbc1ca39a7014b387a4a5e3548f3e45087e3a3e227203d43ed7b4468a3665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9491aeaf1bda93b2022370e35945edf
SHA1836df467bb2182ffa698a90347e78d1236a96221
SHA256f95978e9e2ddd3a1425157fa643038986176a2703dbd7665bfaafe72aa66a0bb
SHA5122472e7b31e4378264505eb7440f1bf7c445bf1821502e7796b0db8fcce1c68fc00969fb2c84719b42a1e965b2aec32afe0d938ee42dbf236f20ce3b9a0a91f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659d13f4cbb9ba0e6b295437836d1cff
SHA1cf6dc800e41efe3dd71e3e0179c7193752f425f5
SHA25639b09ea54530b0df2728a19ddb0baf2b99a6ef69dfa4c280bc8d926563a70b35
SHA5127bf8bcf0d6b7355aceff69bdcae6329a35fa236dba9e14ffe4befe73c1a33c450d8ba366b7b8677aed9caae241759589cc0e9b7d4c8b9a1975da07af95dff155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbf41dbd75c2caf55826afe4fec54a74
SHA1d4ba097a5f371b32eab8b977bd8a45df25bfd3bf
SHA25649c907d39cf16ee26b794b9a4ae541b93ba4ffdc1ae55cff383b5c534e5115f4
SHA51291d4242a577d65ef88f9543af0ab8a7769da5a226b37df1403dd0fe68a2b707a724745d4522f07ed3bef86484c480815ffc2589eb243fe45313884aa219f31a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6fe7bf7e137b4617eafc2855ced2146
SHA1b456f13260c5d68e5614c0e57a662e7064d41d4c
SHA25691715f4cdd9698d7202c7cc770bfbf1767dacb99f758a03b5061957c5aa46312
SHA512d1e3adb5434fc8ab8be3af84916f4a365c2c21d5f765cc18e8ae40ba53117bcf2075ead32f5ae3f2e1fca1d5c7761f889b9750ec131519c9bc7d0889d1fb275a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b