Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
f08fc9e039c646bd33174f80c649998a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f08fc9e039c646bd33174f80c649998a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f08fc9e039c646bd33174f80c649998a_JaffaCakes118.html
-
Size
67KB
-
MD5
f08fc9e039c646bd33174f80c649998a
-
SHA1
73c96331cbe039bad32d1634b692305ef8d589ea
-
SHA256
5151754ec1b631233634b408f9043ab04694f4a5e9754675200eca92181c4f00
-
SHA512
62e90881cd326d84a4a808f6883f32a4a940081724da73bebe4eab9afbfc9513881cdda930bc487c446a662bc61ffd0b1f6d3e3c14599e7fccd1b0675298e9e5
-
SSDEEP
768:JiHgcMsSZ8tN99OIsVqEJ0FRFqFhWoT2fQCZkoTnMdtbBnfBgN8/oygcRWQFVGyW:JNWH+5nT6Pec0tbrga6crNnz8PJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008c84cc081f96645ea55b014b694d5983f1e53c4a9b225810681ae0c79c4fe853000000000e80000000020000200000003c98cb42004406752630b5fe6edd3d2973759ba2390e925243e59e51c8015d7920000000875786ba301ef1585679fcd9be94b5177768eb19459f6769cb2b14f8ac69f41f40000000806dec760d533d64f42e723c333f63bb4009570f9b081b75fd7bcbd44e3879e063bda154fe9eb6f3b7c2299fe13bed59623e57b24a026de40b254307b64ea2c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0be00bb650cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E56B6AA1-7858-11EF-A1D0-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433112737" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 3032 2724 iexplore.exe 30 PID 2724 wrote to memory of 3032 2724 iexplore.exe 30 PID 2724 wrote to memory of 3032 2724 iexplore.exe 30 PID 2724 wrote to memory of 3032 2724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f08fc9e039c646bd33174f80c649998a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2eb610867e7632f653bd832b37f3809
SHA1b36f0f73ca87f8976646b5ddb58c223d0a479541
SHA25648f6004a917f6513a4516fc25c75a1c81a4681a71423b862ae3addeee7b94369
SHA5122ff31c32f8d000d4a790dcf2134c61932f365020b950f3f01a801ab515c2c42b341f79a8a8b537b4465128ca12f02d5d6b2a515705924b753618443159f9b7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e61ed4ed998fd1eebbf28a4717be6c05
SHA141ef7144cc2defcc8d218be636e74043b23bfa56
SHA2563c92557aca0f3e6a8018191cead006c55c834790dfb019a8f228bba83a1488be
SHA5126396914de5028c998ec945689a079ca3a888f2b1b26f2052a98bb36aca6af49a44d183ccf5eb3de359148b067eeb33b619f3405a361e7c67e3420f9abdc6490a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550549755588587e4ff7dc8e2b85db4f3
SHA10f191036c67f3adc2ba4fcd0fcccd4cf33b14855
SHA256263ef8f4cb79ed153b8320756b58cf7d547903b68e32cd22b745cf554ada1cac
SHA512b6db45d31be2b0359bda45ca54f132b16ea362736860e713f41ebfcdb3fb564236eadec55c3563857625571e029ecccf7a50fd579c588289e97a72482019ea77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d338cc72b345da6b0d319156968f34
SHA19544a454dfd80cd2358e212b381ecf4c5d2c6b3d
SHA25634cf5f28c4f7451aa9cb133499686e02d80bc52cbc8d800160c5085e22cc4c09
SHA5121034778bcf818ba1c38dffd0343ae2a91afc3fd248e9740951d4fdf23202f683c38de5b277b0264a7f29822218ffe536c9d62eeb2359ad3a4406932d05f48533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c72c7568403f887bd25e18b01af195
SHA15b8d1b8598699280d916e293aa147408dce426b0
SHA2566bf84b490f0491cb52860edad6f05d500bb3fcc101cbc252ff3effdc5d416633
SHA51209b370e09a4bf83a8bc3ceca3d1a3c5972ae3bdef50e17fdf94d8069713114cf5dd51ba49ae8b21b103a033d854b9fc0d120024ba9cecd26b44d008365a9b540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2dbdcafff4aaf610f9bac97171ef6f0
SHA17a6e7a86e13411648d0128afa493642d490a5b30
SHA256fe3867f629a291ba64167136b15a4df258836b16800d09e1949dd18e3d6952b5
SHA512c2a75c0424288f28b21c6367ac647634dfd3484a16ae57c96e9dec88c375cca65ea6432d10d73caf086e589da1e0f02dd8897907facb8b2b9118bb6c1bdb4bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a03bc55c1bb69f2adedd9b62cf0eb6
SHA13532f373e8de4ab83e9e49b8ae152947216a16d3
SHA25661e72b903b389487b77e3873dd39f4ffd1ef1e564e85261bddc1027c363cb8eb
SHA512f641e01b7fefe48e6fc961c3ffeeed6784e4630018061ae941fb12952532ae4a39e48cc71149f123605d733255ea8ddf2bfc4e70a2dc15804528aa4accb847b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ee57bc5e59c2c80d3469866ff04528
SHA1ddd9004d94302a5fcea969d538e4b6de3e6dc41c
SHA2560a0f8c3977add57e6935e446da43a262b2144b788e95e5ee3767764bd4c7db9b
SHA512bce86e5160ee2dc3dd5ef4b5ae2bc2a6d3e502b35e004c3bbd8123a6f09129c987d46e83bef0876af25739b4fe68f1f7c709dcaa6073cfc9f95144f8249c02a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c385291e6f1ea542dd5208c53f8bcbab
SHA10b550125c4778419e5d8d6b1b96c11fdc3c0bd2e
SHA256df36972cdc983f2facfaf4cc08532521b54e7e66bbd1e8a4e0a2303b9b2d4010
SHA51264ad7997279a9315ed91d38b4a4ff0dc505a6248de69f6a573cbcb76fb30e82042c1467de5b335753886b999d01931fd66f8af825e83bf08a846fa4a1e0c3b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0ac5ee35c1fa58ba79c002cc70b4db
SHA1c0daf057ccb057f51069bf0ecea3dc04ba0fa768
SHA2563cfdec0768694b972b28aa1527291e0d71129e3d72573d6eacadd5ba9f03386f
SHA5125cfd138c6d4ae397e91895755b0392d1e95a6750a472e02d30e15fe60dc156b8788c925c3b7592a1b28660fefd8ce70fc460d90a1ac4f162cd30ae2b63ae328c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507de16f8a8eea52f24628d78031b7463
SHA1648487ba117941f98560d6051bd242db40957d3c
SHA256ebcc366998d4977a9395017c987f61fe34f81ab188601e4820032d79cee679fd
SHA5123d8b91b34ede287b66720c61a6756ec9c419ef68607b35e7109403c9a50eb31a261aec2fe93353eed68345c93a28a40a6cf04dea9c69b8f571cb604032cead1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee796edfdd27314b7655afd76b1b7c7a
SHA1f251e147b75421f3596f2b9c9aea1ccd22a99379
SHA2564a23cc6c80356528d516e0322cf0de6cbcf6549164538a2d19ec3e4e49b4e780
SHA512d7eac3e6901425b23ef88ddd96fc20fc099574e06d41f20d8509eec181da9a1d963a6856238023f4d4420291c447bca8c5c3f01885ab7d2acab3cfa301baf9e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380ebbfc6224430dd7308bfaf111ba3a
SHA1ab96521225455a3610800e07518bbf75d9d47df9
SHA25645068db25ff0b43f8ac13fc14938fa3f9380011c9e68a90f25f7e8dd2352bea9
SHA512336f7519a1aad77bc7ab97c10afb40fdfd5c7a0579788d78f2e92aec3092a63a9e95e65149103eb0818f4fef8877b0f89624089861db51a27a9ba70f9c44e893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56502a1a01e41e374fa9f8d38fae30d25
SHA1a89ddf64c722736c42a72921fc34ef2738559b66
SHA256b79b857b1999618b58945381f58d70824ce520d57f1bdc9d6b344fb35917aa34
SHA512b64b9aff1c788a52ed344332eabdcdec77bbe073d4e8c2e06b8d3ad8858b5aa0825338032875718da77e79b58693b89de710000ee41dbd345baa1577d17a2836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac4e4a78b9f9cdda19851d2eb111afd
SHA178b86faf0f673603977da290230ced05f575da06
SHA256d87b0f170f8338213cebeec463f9c3fc22f4f391f91334662bc1ff5c6e5c6c62
SHA512ce6aed02eca8c0a2a1fd9831ab271c68f5c0fb3c99aa7003574b9877232f899f4d346096c5267384a3018c097469a7e5283bad659bd6a2c1a78280212dec05eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dae8f1f8eeee873a5dec329e988cef5
SHA1be7daa92cf247838cfb901007ff25f548aca3b82
SHA25649135079af5e2a88a5f114c967e0a7111d892e6eb3b103257c30ac995f2aa5f8
SHA512074348bc80eb039be70e84782acd5a4cc1f45be26392bbcdf744fac4587007eee89a62324df6245de9108274fd8498acdb967768710a623fc97e1b534625cc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ddb4534d3b8f4725394d8ec44054a4
SHA15eee55f3e6d53b35267133ebd45964bb59b4f230
SHA2561aa7b75b55af3e586555dc70bf4a26d1bfd3d65d6e9cffa78f6c7a0d5db5f1b6
SHA512f39fd563911f8e4b45406f2c84baf587dd2e3db2575819d150f0ce36e51db06a56a5aaa76d63bfd1340b621e612b28df370c65d1913ccad54bfae7f0519d7375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734c253a35b3ecc4c3c69a0ea7f16399
SHA17a107fbcaaf417c04737eaabd4ed107431d70fa7
SHA2565d9666ea5e8e936e878749641481ae4de326e93415222cc9f776c82a29bf973a
SHA512ef0d408c74c72d1a9b9f80b6ac37ea5a85c86a1a20d32b29f8f9208245b02673491c29c840db4d75a05013210d15033a07a36c54a8c7b43bfa14b1f51082fdb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de34027d7bd4077e437dc87f5df6c89
SHA1e17b2f0ee009a8247a8d628fbf58a248ddcd552a
SHA256cbc59c80c9cc9c17c25b005c16527534c08b1171d10f2d91b41d0b90c492ee21
SHA5126a183bd9e1c1b58cf93edb4df7c8058ee64890e96b1031145d4230d478636cc41c475eca631e60ece915961b97adfe33fa298e89d0b2f151dc664d84a3545c79
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b