Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
f4e314075c97d7dc28031c8bd7cac5f6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f4e314075c97d7dc28031c8bd7cac5f6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4e314075c97d7dc28031c8bd7cac5f6_JaffaCakes118.html
-
Size
23KB
-
MD5
f4e314075c97d7dc28031c8bd7cac5f6
-
SHA1
86a1174c2db5cb9e3016b0c1da3fe844425d1fcd
-
SHA256
2fe36feed1d253b95da871801a3392034d4e03572263f818ef184e8e7b4a8e01
-
SHA512
c84e2432dc5c16f51e447ca2cd2a2ac0381bf8c915a4945886c0496bf16e92f9a6f00b792f6e9012bf39041b4e64c5e3b8cd1bc22d83374b50cc87ce26bbbe21
-
SSDEEP
192:N0Dopi0b5nnnQjLntQ/QnQieWnanQOkrntaVnQTbnInQ9anQtXM6nFnQ7XnjnQTH:yDoYzQ/7q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61C17EF1-7ADE-11EF-881A-CE9644F3BBBD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000000d4f058fb1a2ad03eecdeba53ec6e5be5b909787cbdacee08573ae50709042e4000000000e8000000002000020000000a9cbdbc83fbcd408f3c2e54183fd6122aed1deaffdb67f20e16d2322a3e383bf200000007fcfa33b824d1657e2c23fa4b68e23cc47d85dd05a02edc53846f8e6b4a9bd364000000026db43f78810a76c585b4a7d3cb340370609ec1235f5b479068d3b3847014b470c6af505152adf7ba58355baf7b4d5eb8da4cd3bffb5727e6335393fe54d58c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433389968" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9034f636eb0edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2804 2848 iexplore.exe 30 PID 2848 wrote to memory of 2804 2848 iexplore.exe 30 PID 2848 wrote to memory of 2804 2848 iexplore.exe 30 PID 2848 wrote to memory of 2804 2848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4e314075c97d7dc28031c8bd7cac5f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8390b3be8e0bab27c6f2d063bb10ac
SHA17c2266dce81e7181e34a0492785340d40b615635
SHA256e200e2737904b296052c14ec0f47410ccf63886fb9a787782c9876202079011f
SHA5125af0474927287081374ca1ea924155ec56f7533c5e4a0e3c13cd0759931e36c6547959acf25fcf6b32f3365ca5d9989cf03fcaa847996cf691999a143e71327e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8cca38ab447a08a77bbca67fec94750
SHA1379a178a24c68c02695bb578c979b617368877e2
SHA2564efc2558d7af46758b5bffa9b1846ba817d8ee371758d0691e5df132d4333455
SHA5126be5c3afe091c975c528f1d0c9469ee4d95d88f408eb690ce6e9cd7002f2c56b1a6ee3b8ee05ec684a7d5a74c00964d740ca381670a5307adc90bcb9ef3fe3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d050ebc385b83fe0b1f1ec7c1a874505
SHA13587f5d6026b02416144d318ec6b71f2a0c94cb1
SHA256ab225864237d40bb67f545ca1fe243e19076774de184bcc24dd6b7194252ef86
SHA512e84f6f6e195c062cbb555c0ae0e583ae062d49e882752778ece9ba7114c7b75f498f5625f5680346dc7321238acb7ff8d57de42e2ae3e38efdbaa6bb5bdb5230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d70594b570b6263ca2ff9163c37333
SHA11b19b55154333fdb44a0bc3ed83b6bb8429d7e38
SHA256db21cc8cb85fca48681743fc86e8b6ce7f7016b404c146dee23bdca5f320daca
SHA51215051f3a06e22d66fa9909a9abdd9ce85394ae45fe82d97c58b67e70c762ed6f87af5a46632816992b65a0d1368fe5e55d5bf0298f7c2c6dde4f0a5acecbde80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f32f5a66c9be0c149e6167dbcd44c1
SHA13f11010d39ae2ce5d0b414937cae8ebf1b3159b3
SHA256774ed2a397e17f66a45981b2a28ac531d68b4e052b74b728f4c22126d8fe8cd9
SHA512397d558b9c832f81bfcaed7b906f93f64a1ea8708a5277e5b85d8a54a904871f31eff3d3b1f3e1c0de4bd5681a04ea01c7ecc7489bd60dbdd99fed55b6580ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53597aa929a3470937b201012402cfd94
SHA1136f1b3c1dc9e30760ec9299b78a73e007d52fed
SHA2569bcc11a7fda46cfb30f2fc0c9acf2ee5c300c75bd883b430633c3a9b87af7d75
SHA512480208aa479d25a1bd165752d8c8cc77468bcea5fdac4d7d2eb3ec1b3a40e61fe2943c3976fbebc1aea1161b5aa6bee94d0ad16a4d50c4d22804e979b6672235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b098d17482d1180defb6f95fa681fd5
SHA1135c522db8f9ab2bdb1d2a26ab28ff980a36e0f5
SHA256242bb53e84f7d318719a76159d5c2199295545c6156b5b06c48a9ac465c4fbe8
SHA5125afe7102ecaa4b8faded32ad192a1329b9fb49ef808517273da356c20e66a261a43cbc25259ce722bf00e29f069b0b95bf0988ec6f1093fb8ec40a403719cc47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adad4a1ce523a5959c0d1aea1612533c
SHA1731b1d14b116e7a16d0e0134e47a57179f5f5f02
SHA256214a57e6ba09ba1f99dcd5c5ab21e22955b71842e55c4bb388dbc9eabfdc7243
SHA512df84d59397a5cff4d3a9d648886aff28c48006ae7667d8c5361bf3e6663a0607a551f6585d827eb381d67fb474065a05834416481425d84b2b7173ef0291f1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5909436a1e89122431ca714fa46e03897
SHA1b65c4f43bbb6c4f977d731d7c7b73891c4f31ed2
SHA256493446e3d4b701a134abafd974170d7c57b7fc4000d7af147e978ba355990f59
SHA5126b25cdbc5e76e06c5d47ad0eecfa869bf267ea65afda627e7546b5a71634846297d1826cfcc3a7656df8d0b515c52f8c309385b044e84902a18017eaccb6b803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0811600ec0ce38bb92a563ddf64bb1
SHA168c9252e631113e98ee3842b2da3f42dc234493f
SHA25690a5a690352246f92ed17f4f7db462f4ce24e18080dcb77f5ec6c3869564b306
SHA51227dc0f11f1fe72c350ec97079f9cbfcc478f53d931aacf6db1de034a64861352a74870a3f33995ad1b625dd478e28a11a3547bef8f9ab6104d31f47efe8600c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53392f49f5b93363b38b97527d2ffe7eb
SHA1e045f4e3704c8a335704feb4de70f2364f59dbf6
SHA256946dd0b211a265cd8d26d9179706a3c3d025cfa7058dca54c2149537ae0673fc
SHA5128cf84f0f91c599f10853da3f79b30acb1307b275133462884acce34c2d1d5883f72d2edfa34a2506a591a3634249df03ec7242879f0d5d9842956fa2a738161e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526edbf8a71bce1b81cba6195f81e8f44
SHA11e1d860f03b0b273768e2fe1e17df6964d094e08
SHA2566f6c3c665205d3fe51af1f4baf234f14b487e6296be48960c4fe29e8faa1c607
SHA512583bf1a06c5bcaa813bf1ad3d8e759316bf4ce5324df2b1066f5ea46c1ac34940c3ab7c033b0df28f39a3766bf74abcb4576416c619de857e6b21f162945b3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677ee19b0af49136dd127bd4ec782f94
SHA156609aa7d864ed43874a8b1a8041c7bb7e0a420a
SHA25682edfececa29aa4e017c0b3f3d077de46bc51225bc00e01e53538d614f7d9d17
SHA5127035f4cd84fcfe36aeccbe73c95d38929f8daeb4431b1e15af7eccc8c87e458d87fd25e9f7d63aa80e4e92403ce688e6e8921342dc7f6352dfa4e0b2d5877b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c547ae37d46f9ebd39465768faaec1
SHA13d071ea0f1c8a2f4c7ef904dd7035f3ac0748258
SHA2566a5a4a8bfb3cbc5e3d360bd8658d23d7b97b0e351a07504ee491327b98e2ce09
SHA5127a5a9be990f6304568a92ee4674013109c8181d14796b21d3d47f5a6ee5dd151358969b859ce70517c2316573bd56c7922c2367236914ac80a8d60dca9073641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3f2bdbb00eadc090de4d4298a97455
SHA1be90883108ab18d078e89f009d13e06362f00fa6
SHA256ed2b0464349beb837ec0e8a4b241e564adb9e2ce1117dd9115596468ba451fca
SHA5127e1f24b8d288d8341583d11d645e8dedcbe473a142c5209982e85f10d992bd24920e02a1b816873fd3f7953126b911cca61b45b656fbce1e3339f2c749341d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d473c5f68415f22650c55cca0179a48c
SHA1d80e9c7c7caaa75a4bd107d8ebd64fa6273baa96
SHA2565a2a20c14db27c035cd80086ec461895d450b7194b870974bc2cff913a8f17a4
SHA51268351687333f6fa9f415b96bdb54633faab7c70b89aeb612313dcebc69e2e13487c6d51e267debd18301b0aa5680597d0c8372f7e8426bbb9755afb4243eb052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378147dd65a79a8648316061c376aa89
SHA139056a24b94dee68b1a8b4c96130d18b7ebc5f16
SHA256ccc994f27f3b77c6b4feb749f7384b2ee820fd960f9c124099790c5ab5f99f0e
SHA51223b103f8cec0c235575f3f94023bfbc64535b7e176f786ed2d870a32ea9830e7febd7f0ad1c3493e9b7fac5f6e25dcb46e9c44f7023c0e49f60d23205ad7f566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a1553fbf1cbf29f1e3dc7d756c66f7
SHA19edcb26a1f2ae85f61767dfefc3d8c51d2a9b171
SHA2565de8cf751e46a0ac8b083215667cb6e14a0e781dd36e4abba6c8d0062ec748ee
SHA512fa1f8f2618b15ad4a2d8cdabc34e2315a4879c3a02219fb4d0951881ebb38c8493827621658f44f5c406bf45fe7011b168a918e3236a35c876dc6a9336ee7c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b