Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
f4e690d850fd9703fda8fa38606efd35_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4e690d850fd9703fda8fa38606efd35_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4e690d850fd9703fda8fa38606efd35_JaffaCakes118.html
-
Size
27KB
-
MD5
f4e690d850fd9703fda8fa38606efd35
-
SHA1
3325478dd83ef7c059f838b9116aef3c45f0b057
-
SHA256
23db7dea68a5bf8c85bc12ef8b30dc93f0884b7afd8191d03495be48c2bf3fad
-
SHA512
d7fe0e6bda876212616530192b5e5304b2c2f69894f8370957374a521933ca15e4ed7f34f7cfd4cb427645bea8cf455ef3471ed9848d0a496b2d9daf803f8ffb
-
SSDEEP
192:uWTrb5nF2nQjxn5Q/XBnQie0NnFnQOkEntz3nQTbnJnQcHC+AXBElWcwqHALGeY3:jQ/Xi9tasB1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC3EBA91-7ADF-11EF-BFD6-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433390550" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cfea90ec0edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d137e12359925bddcc8a1ea6b8faeb7d92130aa2acc03560440c5c963d74e57c000000000e8000000002000020000000c1e44d15cd53586b3cb89232b6560c4740fc6c43ce81d1e831e83612302f1c2c200000003192bdd3de759e7783266c564dff0fb1cc2eea059bcf062c594caba41803057d4000000084792f7f25590c0753b438542fec0d61ed19728bd62c5ed20b1fcb2bb4ac32bb2f4a0557096153e7053100247e5eb25dd94f641981700146b58f438bb27ae352 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2760 2652 iexplore.exe 30 PID 2652 wrote to memory of 2760 2652 iexplore.exe 30 PID 2652 wrote to memory of 2760 2652 iexplore.exe 30 PID 2652 wrote to memory of 2760 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4e690d850fd9703fda8fa38606efd35_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f2b20cb1ebd2e70a633efd841c7132
SHA1a544de8b9b66ee8cc4bb54f0e19e5be47acfcc90
SHA256f28e47e470977e0f443008f8fa771de27c9a64a8a619290b83df4f05a86b0686
SHA512c22f362cbe5c30bfe97d43ac2528f8d004a003afa5f6a217e1f04f92a5103ae9cd4c573ee747618809d762c1bbbafb0c060871117447ff29c6dc3d412c796a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880ad79152960f5f13b0befeb37e3d35
SHA1b0258597997ab540701eb0c5545073d942a88ed7
SHA256082d2b4d84b58222fd7994dd3439d0345cb4cbab678ca7fe7fb67dbb4c4bd951
SHA5126180820891dee3271afb1342ba2970638e8b52b88f7581156c27bfd9b5a2119bf7467c274d744b0d7abd659242309f1093a2531083eb57314732d86b29d28078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59883386af5667f5c7ebe36d44cc13c6a
SHA1dc22791535ccaefe5341819578d7581b40a13489
SHA256f84e4db301b464f7891138ca2f9e42c034d51bd53225639153749a44f55e78aa
SHA512c784a3ad516c40235fa5a708be458ddc51c309b3debd297dd4e3ec04a796066b85c1c9f82e264a5073e1724f45fd2d26a15e8831f9227db10b2b58fd55cbdb9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f97fbb229ee0c109bfef65d1c22e83
SHA169e35909f862d5913f27424b31220d473985ec04
SHA256de9de71196224a28e37a0c6b8382f83e1e2a31ce439edb74777611f38d8f28e8
SHA512216a4efd55a528b1b72c7dcc2f6a24b5d7dba0105f54715c540dcb6b7332cd42589f36ebcf6a03ea5479ad207c0686616418573b9b8ce1779c27dea581f2abb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c22e370dab4a65e7f6a88da3fb2f59a
SHA1615b7971147e29dadc6307e875bb2e01f393402b
SHA25677c85c8d59585f033bb0df1bf87588a545aeb4bdd6cf2be7bab764888f9e6622
SHA5123ab4c746ea6de9d0bed748f4574841d50aa50847021634bfb8bc12d3c25fda531d448ebc1f7e883057a61cd405b35367d04e0522bd302f52778db7cd73dba3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e55243e75f550dce4f197990f3b8381
SHA1c49e4d304b9a05ae94e8384a7e8ec9a21a245268
SHA256f60a07b85ccfc406e1077b1b0a920922c30176086e5cdf41d8b0540e9b60b55e
SHA512f1a7e129e4729328aef2b199af12991bdc554709f51b25c47296010b1240088e765fec25a053ef8b6c3e4011e12804c3cac7f62e41c6f018e9b181ebfbb171d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad48344ea81288583e193ae34586214
SHA145daf5e1ad00939980a568f2fd95e3ce85b2b66a
SHA256db0653b0551d7385b1d52e45515643a012662939cb53be3998c40218dd27de61
SHA512fc854efb4057d003de5d9939544f3bd825cf07e4d1d8231e1f324a6b95377f236891b671af0373808505db9a058c6cdd3b35c1eede3010ace7162dbc95bb3e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5fa2a7fafef597fa6a79c851fa550e
SHA16bbf0c44cafa6a369d2c1529922184d2d6a9e508
SHA256e64b15701e1f554915448a12e605797d27d7b17a6bb1bcf1a9dd92e7fdd89767
SHA512e725dcdd7534337f7db2c5bb64ee5bb8ea86b0c7ba851c575f6858275a733ebd36ff752d16e7ba71280f2a974b70833a023606c2669d8a636a983195b490d8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2754a9eb7fa56c5492d28d341b17b4b
SHA1d62683eec5590ea943bea3c9450d9c5c5e896ce5
SHA25629acdf7ccb2125ac6a3a67acae0e526aa88bcb301350ab718f8b0dc058edf89d
SHA51256bfc2201e310ff8524f4f1fc088d58105965ebb11dc69a1c20cd8a2db29be9b72a81c90f9c564c3bc7d645b273e793921a47005de221fa5b1a8afafcc0fea3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a781d47911ad9a94f12a8543c13cff5
SHA1949c5299cb6862e0d4e001fb5d87cd9dd4909193
SHA2565f4ca6b518e3dc1dc36f799dc5a8604ea1716d7251c65a76e83b529d9f2c998c
SHA512620876f7ab998ccc8de054951d8269bf6c2bb32221e38e3552a03d880a1acefe865d6b58166eeb5330c5d75b068327262164169e43b26f602e0c4120af1103ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5e41ec892d3edc0bc38647a8820423
SHA1d41030343c21d00208220244883cfb8a6f8bb2bf
SHA256b49fc491da01e6b3592f62435d91c0c98442bab81abebd20aa7a768dab726711
SHA512f181e6e99eb5265775bbc13ea3d42801ab82ee9ee69c01ac50a7d9da64d60bcc28c9fbf2d6081e5fb22ada5a6e45f1cbd9d7b17b20f2c7f4bcb72a227425860c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ed2545c913eefcdac0852ab87bf20b
SHA1de0f0a6b40b7f6e422fc0b5b1fa075c02ca10221
SHA256f6d6cd2a515663e2b5d71d3afcb86452f310cb7466035e3debbf6ba190017897
SHA5125fb0b8ab37372aa7df506fc0d1170e9bb98d696a3211d6f0652028ee67383e55c3fa659397b9b31a5f323e40a223aa7f9f39e97b21534e72c2b7f2ef8fd38d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0c3f4a9d3b883d3b2f61da2da0037f
SHA1078eaab10493b32262b95d64fe29ce7fa91e47ad
SHA2564a747789129dfecff4b89603ed0432ecbbdda05fdc705acafebf4965220353f5
SHA512a4121c2de4b17be1dfb4b894b2eab33d9ce1f37f73d54ac42a17f4627919aef06e1e6d02c8740ec6b8994720fa8fcd54dd1a68277ecb22c5874f1ca71cc2494c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65e5cbc72c987f448c03ffa945db610
SHA1450a54f978d2c299a560a76519714b6329ee7d4e
SHA25671df76e48440d0e6cb494f72b3f38b9adacb21892b3a2d5a973b614655a9b5b8
SHA5128a1706fa31769266e86bc4fd541ef33068628647fb470617fcfa19a4f2ef440742120551210cdcb8a2d5846d80dfb63c8b8917ca723e4dd2559c79466929f7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51fdf37d3f02204d9a3ca322e43556a
SHA1c367b8433eb6223b2b39bf19a3c868137b4b6dfd
SHA256f31303d1a5c416c2dda9bbb5329e2ce4f250ed48c0eafd2a5ab50aa5154743a0
SHA5127227d2c2c7e5a2c3ad9b00c674a458069a3f4fc8d49e7a5539f9ea8c9dddb68e68f24cd553438d4e829aac74b9efcf361ca2e9a7d75ceaf5f11dc94971cf6770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54beee534e5965d6dcbc93559b2dad3cb
SHA18a5daf5bec5b7461828866f919092a57da2a909d
SHA256c787ef443de2b4f5bf4ee4a0e0ce7ba9df4303c2c74521c69e829501d5696f6b
SHA512ebbf33e599e91c46640d34ab34a66538dc231f9956c93b4436d30eb8cbcbd172107b2f196b1ce03694adf1912db8d74d2545755a52124e874de6eaed87b707fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b