Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
f095d81a3b8b2b862a86af073ef21aae_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f095d81a3b8b2b862a86af073ef21aae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f095d81a3b8b2b862a86af073ef21aae_JaffaCakes118.html
-
Size
594KB
-
MD5
f095d81a3b8b2b862a86af073ef21aae
-
SHA1
c965107c7fc4b3ae36f573498c240f53308a44be
-
SHA256
61fa2beb838a0cb99e9fd439de658e3750c66f05d6e98ebaae3633a3fa2119fb
-
SHA512
f19b7a96e9b916e4ad6d4ebe1665b58ae22b1c09f89c0d10bf519339f4fe08ec252b2f6859a80f73639455c5b1a623fefd59bcb58929cfaac0acf51deb4885a3
-
SSDEEP
12288:7GC96VPuBk/wqagyLZjAW9kcpIwjtgKsnxI+gQbTU7JjneOjSBCi:7GC96VPIk/wqagyFjK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433113588" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000009edc3ae0f2a0a7ab38ff9804cf6967570a730671094c152a372706289234b2d9000000000e8000000002000020000000394966c0ee699afa38c23a6d3d54de9e4beb791f03e85e89439468b21113e44e200000002a4d71e3c69bfc055e5b4d2bb5665bb78661b3b2399efd2799fea9fedf450a23400000000dc278b9e082cf055aacc15549b00182dea3a3e715b4cbc6d69e3fccf4cee97b305a29cc0746216e32f8ae4726865dc00b26f44063e9216b625fe6102009ab0b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1DC0FA1-785A-11EF-837F-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80574ebb670cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1424 2060 iexplore.exe 31 PID 2060 wrote to memory of 1424 2060 iexplore.exe 31 PID 2060 wrote to memory of 1424 2060 iexplore.exe 31 PID 2060 wrote to memory of 1424 2060 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f095d81a3b8b2b862a86af073ef21aae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526a64e85ef9e1248fbd92395284ced4c
SHA1d04eb5980324ec2e11d22f032cdb85db51914c0c
SHA2569c10ad29177143dbb28cce099d2a07ca2effdaf81443033bb00c892dc771a22a
SHA512ef0b762f23ca823d7d6fddf6d929845105bb2a4e28f89adfe1a8f89a3b7cf78d7163808aea76fb3868f2d18956b327ebd8178a2acf2197ee382cbed3b0fec078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c473fc1c4d401d2ae84551bfdaef372f
SHA1a820f9b19515a05496d4cb7c911e47f81240eff7
SHA2562ac8bf06df67bd9964b9ca5ed360db2f190fee18de3b482643ea1c8f4900d2e1
SHA51211dc0a0cc84cd4400c118d9c750a28dcc64cdb0cc39dfd7618d3c9422b849b64499d3c73c0ea4f837db2985bb8dc23153e4d17e2be131b53478201b40fad101e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e197d72ffba7c2329f7312136f1a2d4e
SHA1d2d125ff2eaf5aa2b9dcfbd604049f360757cea2
SHA2565a09c6b6c0bfd415c0e684f8c9f7a5adb43f735e6a1404e39ced7d1b50365652
SHA512f5a4ceced655ca15e1b5404502165eab3aab1a5a0905b49b3fbbccaa105cc1acb6a9a7d0d0b0ff7b92ac820478ab409601bce49e2e983f5d504ca4795198c648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3bd9875675f4e382eaf2ae01230ba5
SHA1a19ffd5779abb368892aa5cf5f303e68a6943e10
SHA256575a846fc5cffd1be6f3b4115f63ca8886b4d9199880006747c4231f17722b64
SHA512b6809515c86d8423687e9dab66f17ed48847e177f4256b342fb223bef41800afffbceb643cc20e6011bd27111d2431a46be4b8fc5d7d2f458f4fc57aefdfc5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582cf4dece75bbff0de2ffb6a6cbc4f3d
SHA17639b99b2d8e0ff890ba978e9a2636ba08153105
SHA25666f3e0b30f2e8daff11e2abf1f96a1b6ace5bc0ff66771fcf049c5bbb4559db2
SHA512852d2072a2da7c8536142f958aa0bc9ae9d85cf79f82a4a1341b6e790d747f75936155b2075e64657820bb969de88b82de66a645a20b66c20cc8aebac54332fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c38d2501577c39488e0651af5ae5827
SHA1cf903656eda965346e4d7f81edc2bfbdb2a85fee
SHA256dd68fbc6b6efeed596596839fb9819e837745897a65a4c981fde5fd7abf83447
SHA512b2331cfab017f62bf2a12abcd5973dbfb155ee46741f9b897990e0f09f714b9e0f7c631cbbbed221c004f9328b2eee179ed54f2f4bf9c011c59b02cb81da066a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a099f811386597a6f5a3549cdfaf84
SHA1a8c193349b51f559bd8a5d6a892a6952a788f3f7
SHA2564e50e5579ce79a9472a28bf7c4ad8997971c8c1aba68d836b4c517ad451a0a96
SHA512c2a35c90e2289dbea6d64d28669e2e92b323e203686d0ff63ed339492af2db54c6e542563bd0d48ab60f33c99ea8296423ca9daf6d686b792259049f85d41a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52efacd429c860ae4e4ac33f68074a61a
SHA13ab021187c069d8f05df0072854620c6815f2c8b
SHA256a222e48b1d3014ac09c9ccf9686cdf0f5fb8636d02421dcc69f028f11e34f6f0
SHA512d45b1694b35c6b28658be64e2e9993e111c936818d74b7908e1089097fde2278588fecb950789c0af5d33a88f96fb339129adf818b2a513547c444a9ed509f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c621bc538afc76f57b912e310dfb57dc
SHA12af79dd78489d7c6b7645bcc6d60bc312a26a2c1
SHA256d355d8a2e70ef2ade491609b150124ed1f60ebcb9d8642b30e610b2026f5cc34
SHA5129a6cc0619d2f634d82a26860acb0e2adcdcc5e84047a90a3d666a322a3be482b9acc1f239c9b9df3974b09e5e6d0116e4f39e7a329e9f7a80fe4524ded744d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd564318e91c11982fcd5729c859bac
SHA100324b158017bb09a5c4749b93d0d019d04607b2
SHA2562385aed484abaf36959d0429b5cc1d6008a40a9995c0be47d61f020557fe15c0
SHA5123a804b85578ec091dfb5e0a329d292f0ee5050baa9e0d1e2ea186fcaa8a58749484cf3218799f3a986dbbb1a0b44ed8b7fede4e7bc6a35a40a58e5eb2c50fffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa4d44a35e924b303b339658c350fc0
SHA149168961a3c85c47da474cd7c4a23bc6a38d7362
SHA256b9517f21623387cf7cbea71fff6a284ba7d3693229bad7e4a898d9496b76902d
SHA51205a5344ba7372209aaefac5c0a48657068e2cfb6092092077bfd4bb95abcfa6758738f31ad5a6a905e355252e1b1cf5f40368fe9506592c19d6a01ee47a61214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83c002ffdf7af07396b772df8c784fa
SHA18c7282068b761fcaa29574302424826361b38cf6
SHA25638435583e18d73986859065cad1cce16d799b5ec1d25417234ef34618243cdac
SHA512d612a92c14c82c53d34944828a2fdf59996d1acccaf0d0228a32af20b1417f026e7a4e0f3d4b2bfeafa88cf93d4df21ca06c6c689cc0729003b0a01fe5f07f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1651b848b4124d073494427996e48e
SHA1753a672a2c97f1496728c7e6d444a6254ce57653
SHA256a8af450c23cb8924210ecc90da6b411a8b2b80736dc927f3b930e5c576b1904c
SHA512be176d72a73b9f1f4c0b44e0bc7e9c084ba420697ae1e8bd574619ae522b0c875dc04c93fdf77be52dc410b9e02de08a87edc0408c31ee70f8c68a54de5a30d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5387866f99a333b710479c5f1172ea791
SHA1a572307f9ad82bd547c0889b125dd80f299cdc5c
SHA25618a8ea515a8ad49d079c7a2817d4454ccd49ec2e76e5dd294358a74c3672679a
SHA5121d55a13c540144f9db1de57570bb2861ac26ccba7d7d8da7901af2c775e7d64bef71b1281ced4c8b156f7487530a003111f0d351a0bad0f93f0585f6fa044ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645f6043f768480ef0595971079aa3df
SHA1670e77865658eeed2e8e7d340d67bb9df769e193
SHA25633079427ee0f2be6f03707481f406208b7d0c6cfa257c9000a6bef0ef6616b85
SHA512642759aa530a8e02e8835bae6794023f398b119418f826c77869959fd17ae175252f39122f1558220a31225641d2af48be86698f02162aaba8c31aad1221b37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548cb639e468c1ea3ecc893b82407b4bb
SHA1376b9b1af4c336360a0b0f7d99fc7f8e0885fa17
SHA2566fce6e7913aadd1965d05cf4c917b909f656c4fcbd25822da2dcb15525892c1b
SHA512339fece966b614bacaf74db8f27ae00b55687a5356151cc456d6c187ec3044d6cddd4a2531f5be07f4028bced126c96663a65acc973b6c0dfb9f6d2d0e02ab08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c8052a15b78900ba3bda15074a9165
SHA13c4a5ab1a4602c562963116b1e72f0b5c3b2bd87
SHA256f498be266227dbf4d2c1da9cf34a49de7dce4fe50ac5325d20f3af48a5885848
SHA512ff684da1f2f6b005356e9c2f6394874d85e23caa4764dc9b3b778e1156a4e7c33934797d91d5b590a10cda28328955fd2d9ca1b92ba567e2e6ed8eceec98bfda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587de8cea39de02e25fb8078b8538c515
SHA184661578d1351e6f00616a687f8c3b2f10a900cd
SHA2565ea6787a72c1641c5c79386d654759b424a893323ec710240c9cc02306351120
SHA512036fe27a2756170b11f5539959c953090af0fd80aec1675b9525a00728862dde5d46683b8e09fe5070c3252280e1a5226dcb502ba67abc22287b7c4d207efa63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073efd24d1174d6d92bdf0e52f3b48f4
SHA1ff432bf30104b378bbf6af91c4776140278ff006
SHA256e183eda3388650561f99bbf4c74108b8391f3cb38b6047dda4678de42fcf40fb
SHA51283488bc2f040475eaa683d012e55f25c59b37235222350e853dcdcbacd29509ac02e992c5bfbee14ea1afc011294b4c8b071198116bb9ff57716f36f42437d54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b