Analysis
-
max time kernel
131s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
f0559761b2be1f99ba1cdb3d74f986a4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f0559761b2be1f99ba1cdb3d74f986a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0559761b2be1f99ba1cdb3d74f986a4_JaffaCakes118.html
-
Size
235KB
-
MD5
f0559761b2be1f99ba1cdb3d74f986a4
-
SHA1
cbe01e75da53189e3767aa67196406c5fad5b6ac
-
SHA256
85717d323be8d16f035d5dca573ebd4d5b50c4603f3c437d6f5b558677250c1e
-
SHA512
df5e30229c51a5e7930f8732ee4e15c78b44801d243a0943a90772dab35aff38bc329ecd451743ac19fb259bffcdfff3be09adf51a7c80041ce0602060d782df
-
SSDEEP
3072:YbTRklykrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ1:ARKycz9VxLY7iAVLTBQJl1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d2df05198184487b051de240e5444432132e6b5886ba4a1bf3c8b9bfe3fa3fe2000000000e80000000020000200000004401c6557165a6b2b2ea72969283ee5c342247261820566b82ddb3a9f334649520000000a5f55a9a954c5ab83cb7968c7e8281af3a92d73425a20d18900999f1bb75cadd40000000d287c850328e3f53246905b3d37b20c8221fd60783f76196819779705967a0637fe0d3ce6d348d77282756ed2c497ed1cdd8e6d43a7cc6f739010f8dc9e51b83 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46D1CD01-7842-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606b1a504f0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433103020" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1100 1720 iexplore.exe 30 PID 1720 wrote to memory of 1100 1720 iexplore.exe 30 PID 1720 wrote to memory of 1100 1720 iexplore.exe 30 PID 1720 wrote to memory of 1100 1720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0559761b2be1f99ba1cdb3d74f986a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a150d7ba56e60c8bfdb3f46d4ab7283c
SHA1e130354aa56f00ca208924f5cf253c8f5c3dd58c
SHA25655b424f019219cb869616f17d6eb2715c7f8530c29f3faa8030025e41f045f36
SHA51295c5d72ea742c84cb85cd8d876d3db59a711718376949c6d58f2c230b82c62ee1844f4f608f515146fd01ad089c89da573a26e4e77f0742ec98a8c536f0fcb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce4a524fd9073bb27e2f927ea5d1011
SHA1ca199f74abf166b6008288d3beef44e7624dca65
SHA256f53478e186bc85ba3cf0d9ca04539005f881ae1c385e8ee2f2a1d3da53ff4590
SHA5120d81720260b42dc065841acfd67a83bb8693ed06420be0d6fed0f4654744604cebb2c68b1aa4884328deb568a93515ecdba9555b00174c9d1a66f1bc0be7cb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50737796051d93285526aa1a7fb90b4ef
SHA1b05bd9e4c6d67e42fc4aab20c208be983af17485
SHA256eaccadeaf138c011564811a7a6a9f1c4364f8f290da7478026071e0d40d8e494
SHA5121c8a7502df963a518df208329e5275c955bd9baf20f06a94fc6d8ad31916e1d2e92a649a3878c016836bb1df4067301635860bed7fe5543028ab89f9761f0039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742d7633cbc1f0cef58f7fb806d2184d
SHA1841ec8584c036d1c190917183b488ebbf8806914
SHA25674347e7c6fb9b89561969cc987b465860c024e8957db53bf0894f03444f4a3a9
SHA5125d04b8cd2f7989e9d4a16cf4d5a6f271631661740c52c4000fbe664049821cae19fa9c1f7ad2dc5594dbbbaab33cac5aaedd703ae83b00083e2d2af7b840a67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a19c1d88b999ab70bf014acf700e69
SHA11c1f873a72d54b493b05c8b1cc1896907c395744
SHA25630ed766e5321d962c50237b3786b5d3e38ab4b9693d90e21ecee957a8b63da51
SHA5129b1e41ba7acbb55fe3ed945d9b50676b5576f81daa1834d11062a97b9362a372963f2e9d51365bd21d0d7cf9c29c3eb0f9e973c6aac44b656c7087173c175620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9423ff3af0ca65249d7fcc92e60468
SHA1622d43d41306cd863523f57f7a0b12a38b1c6f70
SHA256bda58752401965cc278b6cec1afe7db0daf7f6ff000ef2a746cdb46a240e0440
SHA51266a498cce5573dddac4cbb85b7c39edb9581972f38df3cdd7fda3891edfb011bacac00bf1f8ece5b0f0b5af477b8cbada2f85f8936cded73ddbcfb2e2534bdec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe46ba6070b2ffbaca2f676c0ed975db
SHA1ccc80fa99b4ddbce1ecb8d70b783859fe4f1db39
SHA25685f061b68f45f3c48ea76e2dd067af0e6e75f9fa7e93498ca3bfd9cefcadea85
SHA512db3242d53bac6585de655482bc63c2b4735a4e6e421eaebf252890293414e6cf94c16c6d5458e94016732acacf231d977c4ec864521d68b3a882901fca143a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f93ec7118c911345c108fac07dfd098
SHA102f72b4d71fcf6d30005572564cf2055ef01d005
SHA256e7048a097fb1c519adc14e5eedb8287f75dfd3d9095b258d8b2fc45fe0b7276c
SHA512fd12d0854046fd04471810b4158e1b1db7aab7930b4b44c96a3a4eb3c2a2d1d77cb274986e94ca92d74624b6982ec3cf3e525eaeb041986ddc1cfe3fdf583822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d503cf7e2de9430ce03594b70bef20
SHA1715d111675c3a080ca164bb49034627b3fa19a4d
SHA256c468e2ac839667c224304680768760c15f19eb66825c39d12c93e07dc4609346
SHA512bf89e6f1222f2693eaf3a9430c7e74f24fe8d6e74baa004f4c37efb04275d622cfb92921f4ee24eb8f507e7f20fb745f6f0a1a220e4e947c8fb17e1d9ac74387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5083e64c5d7e3ecf3ec0d554ba9a1a792
SHA1b34c122f59296913c908a5c478ba3741f5b3dcdf
SHA25602d78df0640f99af82198e68d29cf4681faa5b7a55cc609a0a853bbbc7c8135f
SHA51296b1b62acc2e6395a726c2c083eaf0319a5d44f9bf67a710853cc7e1c166c15019ccfaf45456c0e3a68647b13b6a557ddcec7affb5acd5eee7c4b213da3172b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54546e5dbbaa349980b4698ab68acf736
SHA1e426492e171131195958d2dd426d5d1cdfb2bfb8
SHA256fbd52829f61142abb01a1697c5369893eb76fff23b11256f597364d05690ccc3
SHA512f1f0d1f9b9f03edf19a54a2d0379927c8266b308a7747e73432c602324f22e556e1892abef58827c611865ef42233e4be7c3e6c43775ca8e267bc6c304b7aac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc78bb4557132c62e3eba1ddc78e8bc4
SHA1f64ce0af64ffe9dbe4b3693d0ad8db6048fe729a
SHA2563b184dd907fd77490dc8a0496c7739fa8c216cecb30b9fd5b04762b6a41c9664
SHA5129a39f7ec50e892fa88ce88e5f95da6a77ab5a3611843d4454067370585ca4c0099c56028f48373e79f1a4a0b9ea0871868fdb16d85be29fa8f6697c6a6d8d893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5345d2186ce030c4a68f4ec76fb0580a9
SHA175ed6235e7db1a4685784b9c59a5a2ed84ccba80
SHA2560c53a92c7a9b5b20dd99758eefee5bb92e36b25d57f1aa1f6c8ff43366014035
SHA512697829a6ad883eaa70840d0abe593719257fcdebc9cdba69332ad48db78971cbfba7daf0cc6b9f6c1e9244d7049cd9883a5b73f75552a6a23048df588eb2eedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f7729f2f788cfc5c76806de8683413
SHA120a559cac171d81a1cea3ce4cdf55e9f865cf8ce
SHA2569ad8311a7a20ce22e778b10f78e7d61733ea81520d5917ebb446ff3294e7284c
SHA512a4680f0d8cc969105e9993b7c1cd88dbd2464af4415fe939cd549c7e3444fdd77a7486e7379452bae2b8fa2710f71a95f26fa73eaf5d958c8e82b0e2029a2327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e32d887d99c117af06ae75b2a5ec8fda
SHA1e06257644c52b2bff563cf5a98779f2d9945279c
SHA25612fa0b30f4e00d82fcb4ac8eb4cb5fac8efb1787d53372699d156be1244bae0e
SHA5121085b6e8c76dfe244ab68fc8c5d1fa12df6d23cabb039b2445fa8ffbfc4d38bff01a7622fbde3395ad66f85a9d7e3a3727fd6fbdc4851b9ffcb44db1825267e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d42a42f2eb3bd6d4e8c18d8862abac
SHA13921449c9896bb38f10e7f2b3dd1aee2c22029e9
SHA256f3fb6cf791f8cb4d52d0b60d8ef665de650675f4c4bbd17c3c39f07a3a83f373
SHA51216c5be307073b2af6365ac1a21846095ddc56fc584276e9ecf77714fa0ccfd1a12ccca54fa0a3533754c641d98eebd5ea4198d116c647743ec503dbf88975617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503138498d1a546e5317d6f983156a370
SHA11a1ac5defb45769ce885518c3c8c326e8b7de843
SHA256b261332a457a263731efea44b81728bcd260b912d7140259406a6c7d8eb1a097
SHA512eb5168d4d8c74d8a345ae4a87c8efab314118298816fcf2e0b5a23d6d7ef7b66dbe774d8cb3de7bd292ff587e0737d0e94ea3957246db367391a813a3e444381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b540428e3143340af490c3abe4e5a830
SHA1c89585a3022364358b1783f3a901facf0f73670f
SHA256e9d6fa4cdc201d9bd8d1877434944849b54feb3088878909775e82b459e02ef4
SHA5122a46a8867353e1b75bbd763311353ec72208cbcdbe52908c65ec0dda6419ce2a75eb6a91ea2336282bd4ab6f989a4373ddaad26db1c41574a83f6a0524defe19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5cc3888edf4e6586a2b14c96ef12f78
SHA11a549592296a9ba6fee67673de2dd61f770550e5
SHA2567d3f7d5103d80b278d64ed426293179c5786c25eccc4cec8fd33ee5b054cb6c4
SHA512b23bfbefc39ef16789919af00f4fae3cebf26f888b2f810c4defbc51fd7c63dc046bb15e789e24824762d428fa94555aa35d9b3996c9f581013a01202622f901
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b