Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
f06474926b92d25519e4521581708b4c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f06474926b92d25519e4521581708b4c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f06474926b92d25519e4521581708b4c_JaffaCakes118.html
-
Size
19KB
-
MD5
f06474926b92d25519e4521581708b4c
-
SHA1
f59c974a6a79d3311aebeefff73bbcc0ffcb1e15
-
SHA256
bde0d247eca445c99e60197c8e0232e355d102a93cb4efe3a330a7878fb39fcf
-
SHA512
22d689bd37bb39cdfa3b3127e52b23d206876e28064eb0c0a617348200f94c8f062ce63a0245d225420533dc99dff894f2e587ea489a049b912cc43a3981fdf2
-
SSDEEP
384:ziCKhgESOVBD8cSQ3R/tInemLEXucfIk9xhepzVc952:ziPSOgc13xjmFOIk9ehq52
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09E4B791-7847-11EF-B6CD-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08c78df530cdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433105067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000005756c7bd101fb5062d3e1997742a0682f84edfa41f9d2fd24d85d342218c2936000000000e80000000020000200000001c60d2be2beda33be9d80e02e44e2b2bfb0291cbb26388d3400d12f926ab53bf200000000247f09c573f03e82576f1b5d2a74dd02b51d306a00ab28f4ad908384a55604f40000000ff9c00a4052943ed079dc3a259bd91b864f43ff1a1c302fe7e7acdfc68cc50a7aa60a161854a4524cacbc597fdec32ed6b87306eb9a4d84b1fbc1b4631b3b9c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2960 2208 iexplore.exe 30 PID 2208 wrote to memory of 2960 2208 iexplore.exe 30 PID 2208 wrote to memory of 2960 2208 iexplore.exe 30 PID 2208 wrote to memory of 2960 2208 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f06474926b92d25519e4521581708b4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55203af4ef709aae46a2c056e8b97b8b5
SHA1bc7a2508be6e6ef45c8bd68285acb1870350f0ab
SHA2560305d262ce9bc3dad22cef19505da0ca11ebdaa3fcbd5148d021565be0b1655d
SHA5123762449422f1f6e1fc0f89a1071ff311a3d5611ecbbb0e77202929e2bc7dab6f6e92057e67fe9d3014bea51e9e224e4aac01fd3eae6a8fd09ce6be03788db6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e073aad6eb2d92473e5dd816512a32
SHA1c4960b0086ff2c6839b47314e390cceb5b6b5ebc
SHA256b4171b7a38d8fb91e5e407113e7b0f8847b93eef48371a06c2fe757ae9213a91
SHA512e4ef278da95ae23144940710cce5511880686d26cf63456e951f04ef0efd18954f3017ee654b17a314fef0c6605026bd5d01ac2c950c7dccfaee1897000f65a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c626666b6c3371570d5abc08d86f9e
SHA125884c630b2fdae8aa51845756f272ce5b026e43
SHA256a20d06a1627863041f00d64add55cf7e3e3c0113ebde46d3395498c7fd9149e3
SHA512a487cff6bc9eebde87429d16fe128c802abab5ddb3a5c803ef6c79275082c3df8985ace3d933054646543268ffa6c06d101f45e183044bd0fe965681acecc3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75edbf0a1169c40b291d2bdab211aea
SHA1ab401d96e01d2c5016755899065ee46cdad4729d
SHA2560bd520b7f0a4dc787892c1da124a4dc561f8179fc38d954380dc94c2cbd1aede
SHA512161acdee4108438350e9f9e1e63cbe9bfb5efbb202793964967faf752d298358ce28840905f9028f0ab2a16bef78f53169e4b6f209c73d4971df8aa040948fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505385f69ca1e53f454990fe33f6e6977
SHA14a0f2ef7586473b5466c520684e8f3753e15b43b
SHA256daaf4a0b2deca412a69c11037bfcd9649f5ed38553de5616215e046e99cb9934
SHA512d4fe5578bbc3b1b5bea5591098c5d7428e3c74dfc02d717034c86882d5d8605300145b24c30dd6603dfe1c43f2f6cfe7c450c0c21901d4ae734f7692e9147b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24d9dd46f2c75be31e8e60457b97a38
SHA120fdb6a20138dd180cec7796fc3f3b251decde4d
SHA256fb1b48007f2375d931f3acdfe8994820f1f10ba5666cd99128ac01cde3022315
SHA512be4e37957a615071c7fe980837aaf980534acfa7cc25e7aa1ca5146f1285b56f754aac4fdb8ee4de63c6bf3a5c74ffdf1c51a29543e009cc6f0b39fd23aef77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53614898c7a37fe42bd2f185d68da8031
SHA1555617cc7efe1d9a5d51984165d95df61b5e9e3e
SHA2566a3c4792197061fbdfff43cd351e3eaf17feb37d4e49da21a94a3613d7041f60
SHA5121fcfe40b3e7d3edce9d7f8a19c445c18dace32702c3b102d7d581db23500f7644add10ce65c46be9a4b1fa4300a5223c67c8110bc5a91dfaa96f5daff20888a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d36c5ea9c7d2570ea0a8daea69d308
SHA1f9be6d26621781f8cd6f4eb4415dd37cf3cab89a
SHA256ba547d44cc33b5557b4534c943492e029285074cf0817a866566f353816ad114
SHA51241eacfdcd0c0e05b986dcdcfdcad81ce181c06aec17e0af8d4d4d65585a347cf1a1b0d0f353181fcf2b0afeaba3e1212d17e99b4ef29292a8ad6d332c24d602c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80806e2235552d6f782468a3586256c
SHA1e4bd535edc8973b732819a3501ef87136778218e
SHA25635b750276cd69b21fea8c6813d4581f20e35da3b7bfeaf78a7fb32fa80ec7de9
SHA512ecb6c417f079b3c5489d0a3079a67e611616bda1cda23e5e7714b5911c65dc1f9a78c2dce34548c7f9161dcde2ef2ee42b6323ad8a56a03fc0acee18f1eacd03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d636372a079384c5c4647399739225e7
SHA16e17af6039c850b98e23f442b0627a3b33f1d254
SHA256d412e5efc1c15757666b6667756af8ee13026547ca8ac330d81c1a1e83c387a0
SHA512bd0bf6e04f910490b11d8f4fc45e05fc8ae5c12b5011c29fd1bd52c61a2e2b9c59f3fc947ce13c33ae88b42084876e092e59e10c59bd91c67a0e0341543122bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25abf261b1a72302833ef4c5c2a5f89
SHA126d18b812fc4cefa74fa80111e14ef19011fccbd
SHA256ea53ec5b38c9056fcc1e32303ae1be7f2ebd66bce9f19733a094b4e30ade6c42
SHA5122486dca85f7f22d2f2795134fe53fe4e664fbd46e640d48a9eff76986f8a1c3562f72d0e878e31b9143e386505b728f4f3ab00c6c885899fafd9fa0cf40c69ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d1fe7fae978adbf35a0a3b1de65bd6
SHA18421310ca859e7ce9676c4106c49afecdce268b3
SHA2563ba57c4505578feeb8e54e1ea29bd823989b6a741b75cda416fef7ad328a8ad7
SHA512577dad12bfa7f4c8a79998313190d93bb471d13b48d8bde367a3939d59f25c0fade8b90162fdb15a2e4dfd356f3ff707a786f4a7a90ba927fc08705fc5cc5e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535868901342d6bf56218f151dfc7bcbf
SHA1d652b49e068b9b04d5fe4174168ac3742f62584c
SHA2566c4dc2c0c1de5722c832a40f394ab8576c1991f7f581ec12e650313cd6b74471
SHA512fac83328464e578b190de116804506dc42cf1b83c34fc29e5a9471a203a9195c0abd411a52f8537e6992e3049f6efd48e9f688c62fd33d75ba0ed7e6967a8759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe4fdc886c714af176281c4c6e2f13e
SHA199e6b196f0f78ace435e6033c79c330d9f6de632
SHA256f39a17d505c77fd4bca7ce07c00a3a7014f656cc29cbeef1421205e94f07941f
SHA51229736cb3de020ab9baa9385819942762fd79c60e63a8dc6ad30f77e65bf81bcdafb686c99efdd0808c92f4606e9dc705334f259d4f2f6b5ca40c7535bfd3f59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bac2955b02a77bde9296b5b1ee127ba
SHA1b5bf0cf52c2bd95e0d2bb1d3d200ec306f9e2727
SHA2566c128edbb94303157e5a2179fe72e4c162a6f5c9d6fa8dc55ca844fd0e3c9059
SHA512395894967dd3179644cea0e8747f8d2fb2d556d5bbd3085386e70f812040bd7fae079da04542f9c570560bfc6cb372f24dbbf9fc0e9185f47f8b578e75377a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85fd997d54d13c5d35a2850f273a35a
SHA1488c1ba7c1157c63d31a1b3ff233102e9c7c6243
SHA256613380d7a8e60d9985b2a5a0935f80990d30494e45c75a3da1cfd4b815edf56f
SHA5123aa60f31ce7f30014ff3919357d48b93e0a9bfeff4c7c10fe857ac1183afd52e0d25ef1931e3f300f187ba18e21c8b9a87db2607166d11b529945b615f9d0b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb281611d6dca5c0f84b9161e85459d5
SHA1e047f5bcea81f4a8a03fb1417264067068f39e45
SHA256da28816c40682940129036f22862f47ea34eb4f15cfab3d81eb0ff3b11dcfc17
SHA512f3272a356a08c8082cf36f9a3dd26eead92124b0eda8743903086152bfd1b44e195b69d3cfc94b91ad88384af1de211f226044ccf2f57e24f21e523dbe432a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b00abc6c600cdabdf59601b1c712322
SHA1abe986865f521333c34a4e3419dcee3bf9064e15
SHA256c7fac0af44aa796b4d2e87b92e027fff847d814452ef15b58aa4a80a013d3a72
SHA512453f9c7b53cf288a69e628bd6938ac64014fcd6f35c489bd70f25980cdbe9f68a456aceccbc3e89fd15e354b10ff4fba0f5fbcd1d80a3d64de0c029094b84ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322d4bc443bd6ddbbbe0e87fe8e975a2
SHA1442475017743090d834afbc5ceb82e5d824b129c
SHA256dd18b0fbf0d303413dcdfa0d24ac695219efb87b1494742a21d98a1bcecede83
SHA5127ca68a1c38ada0d6c86ea6d17378388071db1a1ccfe36f7c67154bcb03b69ec388698ae229a1bf07a06af653db9f48a8343826ada3c758116a1d2d65263fcf68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b