Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
f6f10c2984cad3ba1a5defbe6ce9ac98_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6f10c2984cad3ba1a5defbe6ce9ac98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6f10c2984cad3ba1a5defbe6ce9ac98_JaffaCakes118.html
-
Size
95KB
-
MD5
f6f10c2984cad3ba1a5defbe6ce9ac98
-
SHA1
570e9bfd9f543557b997fd90e3b773745a3cc323
-
SHA256
e0377b29b9c7b81d5db5579c76d4e6fe9eb881a431dcdc989aaa4d65e52c9026
-
SHA512
b42e9b28385ad1270ef691b8e99e72a8a6bfc70d5afd5f1915e398a62b3dc913a2041dc428b0719ace5243b2f3109eff0aea6c457b8967aaac36be7ea0a4c5a7
-
SSDEEP
768:muYSoO9DSUwBjsAgBkp0qpwLM2XX5UlDRBZaDvDnI0O6w7LIML+b8q2:hYi9DSUwBjwkp0qpr2XGZg7Ir68LlL9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF0E9121-7B89-11EF-A17D-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05fa0c3960fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000ec8394c0f03d20a98aec965591a164d465713f11d502cbbcdc48dca4fabbe307000000000e80000000020000200000006e4e93fb623d87f041cc03cb5cec0a4c2c7174880c989871c28be6aeb12a1f1520000000d6a7e6b8b0f2392e55bb79c9577387e2527318004c589980721744408454718040000000c3c4b4e2623c976a464cfd1ff0d7acf15aaac2252707e6b22225ab15c14a2b5f51d878049dd3890be063fe968fa7899c74b50f8b28590d3a999c48819c6e1ae7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433463650" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2680 2672 iexplore.exe 30 PID 2672 wrote to memory of 2680 2672 iexplore.exe 30 PID 2672 wrote to memory of 2680 2672 iexplore.exe 30 PID 2672 wrote to memory of 2680 2672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6f10c2984cad3ba1a5defbe6ce9ac98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f4a7d9a9156b98374c509d9f997804
SHA12e78c1054ee23b9225afca5c1d8d2862e8bcb9a1
SHA256b6d7720f989191b6771108b05a9a999f9059e0e8b6f4b44b5e8c76ae3a5bb9bc
SHA512851a91cb6e081601498d86a1362ed1229b481f9e8b478e61b3a820f9c80bdf76ea9d0802fb1bfa03528b7b0c2c5f0be78c6ddc656458a4800025858078bfb428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e242a80132fa20e42e47ed960b5950aa
SHA1f97b303bf8a9e3dec9865cd79cb855b8c8c0f609
SHA256f8e50fc863a60bd6174e79b487e274e9f6f4c06ec9c9fda7f0e7846757b6790d
SHA51293592633325cd9f4daea3da2be36d8e2e4b0fd18de52b27c0ae0550d9c379991dd04fe1000b9998d675cd2dc89a9f3e8e38c61033d0315e50ad372dbc258baa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e355377821e4e1edb5727ee8ba445910
SHA1242befefeebd696c4a3d637ed7ebff5b8b6b3521
SHA25682b91872e7765fb8f282b8020e7a836fc67a782a5f1c06894e648a171c92b83c
SHA5129a5373307209c3ead83b94466cd24775e57264ca4cf61258efbb1fe64225e4c59dc7d30f6cf797e20c203ce022261cb07f319429bb68f34682099492d88df351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce42c9cf79f62f5630fefd67b9bc6cb
SHA1fe6bbf0acef8c5dcb05caa89696595253a7d8ab9
SHA256cb9fb52a39d4db25a6a9866e7a57f748d6bd8231c2c944830e843e5f94261cec
SHA512b69afb5bdd65ab3b53c7473b6542e1f3f7b97cedbe245ad5a36533591de52737e79162f2664dce9a6b9cf6f84fa4e6afdd61899ea9eecc59231c487e756339a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567990138e2ede011e34605272af52e7f
SHA18c01292bcd5eed7745a3d1c02287278d32d90177
SHA256ac709810b81182e052191377df5a406d4e42738f95af6786817142eb6fd1640a
SHA5128655a9ba15f1573e6d73c4bb5ef2257b19e46d450effd13a949bd589aeaf344578c192acb3b4fdba84ba543f4f664835133abcb980d33a769bcc49385d3cea39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de0fd1703068f490230803b33c9b18d5
SHA177ce30df8fd5ae09987b1d157c91360004b7f50e
SHA256804b6c7cb9f9468f27f4cc71b83b615facc5a4fa7dcf29ba1dc59bb020af280f
SHA512b58247335ff4c186bd47c2156b322440853e047ec1ad262899ff8e47d778b4c19da9b7e812fa8aaf2cb1baeb63ba29ce17f329bb26640f2b4bf2277f7159e736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960cc05c02af588520fd16e52eaddd57
SHA12e96e2211fa94fee1593dc593903298d54b733a6
SHA256447f04f1ff692fe3d3ae8980dfa92a84d13dbf53b0caec7d68414586c3367933
SHA512c0f7689edfec16aca9ddc1c02d97d723fff741e286babb54289872829be00f36cc65e16d8b4539a1fd9c323d0ab58ed8398edda6f482ebd0b075699388056aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee7b1163ce742bf788fa8925fa3a5287
SHA149f5f1e1e516c56277b6a438e069bd04827c6f2a
SHA256395b0ccb3f3ae13eb6b7a734a896666edcf044f25cb1c2063f064ec9293122c9
SHA51267a96ee9795315393acedc123e6a9ac77b82e57dd2f065738b14ffd6c6913a51d65d4c3309108163f488d0970985f4d0ead768068e3eb78bac77fde5a5da08bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55efc16b54d5b13cb0c468233e3303b9b
SHA12fe1f0fcc8e58c179d5feb813021586845aceb8d
SHA256dc79d98a6cb6524923dd040b23d46bfff6df74dae452e71ce83033ad4bf7770b
SHA5125ad1bf81776952032814d84ce2acdd43752c8350aff6fe9adf54f5a0da2aa2f2e080c15c75412dd2277acc6d3e015ccff4544684fee24991f7f3ec3a079d230d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578c251435effebc2a90a2bbceda5dfdd
SHA1a162583fa70f759bf687cc45db92fce7b9fffd53
SHA256c44b4327fdc3e738a30eea3379728d5bee67a23c191bb3bfdf316bb765f96772
SHA512ed29bbbd8960d9f241345ddee16fc2b8d526902cdbf4c066430e564ea1b0971790bfe5a7b6fe0fb62958d191f45e89824a562016dbd9f75bcf97b53dbfb45cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52002a397952d351b33435d6bc84d511d
SHA17f4485746ac4c47a5d4c78269356d24b50043db5
SHA256b286b5755f80c5fd4a8c240531d480d6ddc93636395a50709a118db3f24d46d3
SHA512c75f22b0188be031ff50d6ffba6ab1ff0da027bb06860175517cd75abb3c2967e9eba83465abd8f732cd07857b03bb2461a66608743fdc7a6a6ad9fa4a48bcc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0b728e519523ba49e046de49faea80
SHA1256278bad8bab5f1f4f638a593dad035df193ecf
SHA2565258298bbfc1898030ea6987d35781aa694bf65563953aa9d5a3f192605e0abb
SHA5122b8f4ca5e12002bad84f1f2014f01c687fd652b09fc9f9d11f0cd74982ab07c621d31c3ad77266b81363d3e31d75830eb3d39e62220b703f13d1d27767e0d709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c0630a43b06c8239590ad24d0aae91
SHA1b04a0273d0f4b0ec0379ddf7ae014f859cfe24a9
SHA256e3963b269b8c31ca290804402a5d956d378a251e2624357ff25f8651b9ad9eaf
SHA51228ab7d24038b735c761cbe9aeaba3952e1e42c0fdb297f536abad82c505e39593c793c5173adddb8e6645de8cf096f4ae350b66532a5a71ecb98986a7c83dff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b352c0edceda8df5fe33ca26b6ce7d45
SHA10974ac5f954e55bf3606695876045f6c2abce93d
SHA2561fda753ba7cfb683b3c80fe51e22b0ef0f40bdae461eda5bc93cd75f87d773a8
SHA512703906a887efbab98eb22bfdbe2913dd1e6b3917f0a6215f901f2f24420b4f59011095ce04c24b2ed1374bd0467164628039499eb953f4ba9e36d1ceb1c0a00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57940e91685bb5112c914d8c47cac1dd9
SHA19d3f17b319cac8cf1228ec549fc37dd79d7c823f
SHA256db868bd88c46a70ce2ac21ec780cd72a3a910d2ecb89b78246781e2fe97745d9
SHA512b707487b5ea11b630490e2ffac278ef9c9bf2f7a49acde81b85bd5af82284274b7b862adcd974de1117e3a2e2e36323f1f091e3da7962d2c4df308f2bd06a5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53227c127d2064ce7223441d18d08b6d2
SHA1583658a14b9afab2bbd6ebafdcb04d44b8d2262a
SHA256a5eef1a150be353d9b66f299620cd2cbb5fd214a357bc21ae533dd86998f57c3
SHA512a9bb8b31652fdd1c7b033e1250ccbe686f22f7bfbdd2376ec30343b88029967df3986fce861ac12ef4bab8ec99ae19924d2fa6506bd770004bbc277dc6681495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f89e0d91b751725376479ee2e39245c
SHA11db284c857273711ecdc3a2554e156fcdb600fec
SHA25607d195222e1748eb8fcc21fbca39b2a0adb3d284fba4bac60d18d5a78058d559
SHA51252a79747f9fa7c170334cc8b293827cdfe661223c4986e68cb96692b15f3a043e2fca3e9a28d4e85d51b77373c36f6f9b650397f7940aaa29187178add30409f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfb813b1c3fc536e0271478a9673c69
SHA1638e3dbe11ecdab329ccdfa9b2e8e136a07e1adf
SHA25677955aacb9dd5cda263ae3de1bf8c61feef350ad6baf69b5ce89daf4f9e58bc3
SHA512dedd7f86b0d82fddd96a5e1b72982d6b8f3a1ad4b1eb3c2191eb1d75dc2d00c9dcb565487f238980877f0442c56e55588f67f8eac5dbd2d5828e9e485afb9043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca290b28062aac7691d02333d0c60fe
SHA1f7b1711aefcb5a0de40791105e880826e6080e80
SHA256244de299fb81cacded03d2d2bfd096ec2b8bbe0e8dba59ed82ab5aa433d2e24f
SHA512dffbc07460735d474c0b99d7d4461eb03c7a7f577a5da035572a13909b59940387d22a2f048060739dd8ce33c8490acc75702e2693479cb323ef1b14f07a4ceb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b