Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
f4f9da843219c5b07708bb15e861ba40_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f9da843219c5b07708bb15e861ba40_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4f9da843219c5b07708bb15e861ba40_JaffaCakes118.html
-
Size
460KB
-
MD5
f4f9da843219c5b07708bb15e861ba40
-
SHA1
bb78a9df334bb0a0956db42d769dba6554fa669d
-
SHA256
99999ba072350107f0dfae9dfd371e06c5d9a92cece76b4fb92685e6eb853bc1
-
SHA512
44707df86b8a9a68c590cdc0e2d507298fc020254e01a937408878ffae6e95b41b6fe19dae52634d8a603e7742dfb7c64a19459bb6f20dece986e99e4c006c25
-
SSDEEP
6144:ShsMYod+X3oI+YYQ7sMYod+X3oI+YjsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X315d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433393342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CC6A1E1-7AE6-11EF-991F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07d5015f30edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000f1162caf82bb56439b04a437969972d37358b82243e4b6adf9307a1bffb4c7d3000000000e800000000200002000000094759657e48e67da2292c5db95fb8ea0098b474d63079840f57bc86cfbdb2b64200000006ba58044a248e438d63fcc4527b5fdb6d6c175310662126133fb882f5d807bb94000000056cd92a804024594a00067f2d415d210c94e4648226636fc207633037eb81b6f96994c0f003debab783780d3d11510ae9958022bff3df55688af51f29284a487 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2864 2316 iexplore.exe 30 PID 2316 wrote to memory of 2864 2316 iexplore.exe 30 PID 2316 wrote to memory of 2864 2316 iexplore.exe 30 PID 2316 wrote to memory of 2864 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4f9da843219c5b07708bb15e861ba40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae14df58805b646d5c17b4747df75e2e
SHA118d874c12a27f41074b52f62d516d0ef98aeccef
SHA2563a7a9a107d424095aef42f320f439ae9feb5c6be5d9849373e6ba73c147c4aeb
SHA5129b6ce26a78522e48f5bade52b02383011da72c7106d4c4964c3ca93234d35064e0bc76426cfdb44871bab7f2517c97c4eb1da53b36181e3d399b78e9294f1c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543dc525ea422eb0e456e6f2c0fc8ddc
SHA1b74eba862047608a06c639b40195684b336a1022
SHA256a60ed1732358f57a800fb9e0463cd6f9d95c2610e192bbfe11e06051e4b01ff3
SHA5123a629ef9159e628b593094c32c007b01e93388a2aff8234b34d8a4178cf173355e76c6ca62b4510bee2566b0a96b399fb6aa51d9c60e33e8951a3904cf9f5565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974913ae92659c1b10b4648f18f415cf
SHA102de7b465f69c2487f5f716117cd6139a29c14b3
SHA256e73030a1be2d124acf9d34c4d8148fc37ca4eb3be78a5e8545113fcf99aa1b12
SHA51238997c0afca58d9dc2917ae31552a388bb0a75deba1c60eb24b4b0d127f1d94bad9d426b4ee47dfc0d6c6d8a55a985908448680635edf0e47c603fc7d035ab07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6af29a019aac9756e2cf69138eff7c
SHA1cbec37155093b22675240c32eed9382db5a5a524
SHA256a7478303af629cd477979541fd6904ef6be0453600b258eb57e3f895f581b770
SHA512f5df1230ff23a8e41716727b2d950ce669834ce1176f343badf863a777df5bf3aafccac99e07f4e74814476c8ed40e9b58a8853c1515393c9a6d945d16d03b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d592cf9f7f1639236a16978e3734052b
SHA15d4c5fede5f312de10704425a1aca7158fe963ac
SHA256005a5572d629a00eff718fc45b4496566f9a7b75b1fddc80d9f5259cd7a2ccb6
SHA5123087407f5d5ca87df297781f177ce0b0c8605ddb11ce1c9a4d19618c88921f100c0479dad3b40d577d60956348a78e206d5afa49390fc37e7480564d2aa06851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51d5f8215502bb6bf34605ee96ae45f
SHA10c65a68f40a526cf1e7c103a2ab285a6e7d262ef
SHA256930444ed7b77542f0236d59bb8ae66906cd3885b7a3ff2a8368ef41448d37347
SHA51246b6a44f299b82b6f54e460553025d718cd7c8ee441a85ce62968fbc5a1de5cf670bd5741e04e9f6a9d1344d9dc1848ee6a22528af2c8ec739c1c8353bf1f6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69978929045cd8d1dd53c471f24336a
SHA19138f1f5f74d09cff3f9276571b47c147ad1dff9
SHA2560ad90eca71bdc68019624023b81604b65fdd9ddd4fc0449de51c0f7c58dd736e
SHA512744d0eac6e601bfea0a70e1cc6b55059fb9d886ec08293cee28828a8e6167153079fc63fd128cb6a1562c96cf4739086916279019ba57838da021e04c85527f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee3c9863efd6c0e631492160e3a896a
SHA13348b36e1ed01bafe79c69b0b3c6ed9ce9b41f7e
SHA256b480db30a5c1ae7a6df74105339ffd9eb6fdf13f768713a654616f14fa10460f
SHA5124249b4f855f284a80cf5d2a73f0bff04b996368b787649fb944449735b0f2b7bd0ae7236e6c2bf7e98f3501b47d8eaad9da2b935c402d9a091d1f9140955a9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b813c3f2027533b424b871b22533ba17
SHA1e3a05f5df5fdc8a195d86e69ae62188d1a3a0df4
SHA256d596e4c2cc2acffc0449b0627943fcb908c0a8b51e740525d7d0805d1436605a
SHA512f8a64e96c173dfbe74e680d349e139da95244247825d40337e91ad0ff2f45b2e44009a12898d4c08538c43f1aae52a208e95f745b4839db50905b477319f3a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56349d14eb19dc383740ede64e5880e0e
SHA157268c816877281b6fee01c81e307b0b127daeda
SHA256f01e2bf3609898b857da0d1c38f4bee84f1d160310c4a3eb3e10ab777734acf7
SHA51254577298dbbb09d2655dd92ebf6fe9a207e047845e324546ec0563755dc576e663f1dfde6883ebd8622b4668ae11db38c5d268e6c52bce2eaf60b1cd47e73e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50988e8fba01e1febc83fc4518854cb9b
SHA1757dc797b426e35760f9d75f474534d649092c49
SHA256d09fae84db4cb3c250f5cc743f38870f267033ac43ac21ead32a9938245f681e
SHA5125e20a9d650f19aed1e98cb6e4f800445b19f73fe0bd045694b57c0d1fdd130bd0976c1e58eb470420cc7ee787b21865cf75048e01c0aae39e1159b9c61b25fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a4ab2e2c90d0fb6eb6b863ab9c534e1
SHA14aae748e9bd8ff7165b789985465f6b8b1ff6b3e
SHA25670a05dc4a69bc6f5131ba7d08a11271944286a4e7b9c412ddbd8354d457d0b99
SHA512fb1f603795ac46654b374831fb872edb164d7c59a755c817642fd9eb1373a4ca796d982330a83130d4de792f59134f2e92b7a1dafb6013dda967eadf2613dd53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e06ca45a01ea986a5b485154b0025f3
SHA1af5496f286c621e02da772c3d1c0c4d01788c835
SHA2563a40d8e929179016f1dbe1f0aea987aaf8e9993889689d6331eaebee65e686b4
SHA512d9293f4f5f18477b5520a049436cd87626647a8ce2361397b47ca70f847c41e2098b6823adb2e3981643e0397168a6c87b2dcbb1286c67c2bccee5f9630357c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b034777d5166a85f33967d02f716013
SHA100b4defafab785163eb83ad212d36956f7bb7169
SHA256da04f7956a2d3eb3c82e3bda04c7010354b3b2cf4da5c1dca6320ddfa3610a6b
SHA5128a20f8a07bd7f961e8fbc45982d02a06342b1fc1cf2eb7ac0b48ba2daa084de070aca8753b172ab48513f16e2100ffbc728fb7b56682474bedd8a2c31151c65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bce9c2970abe487d0fc223b90e1269e
SHA1ade31b468a40a5cc6ff862bafe5fcb9d1f00903d
SHA256dd378e5ba14456a85045d71d73fc01d11433d97bf7e892fa5cc4b6d9344f8a2d
SHA5122d658485a7153e209820cb9d6d1bedad099239471642211ec9dad2719b4159c809794877625836c4c281407c5456e054ae3c305b4a214045326422abe24e4863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f3c0e87197c0f93533b559fd321cfa
SHA129ec8ed39782afa063a6f33b888a69ff3b4b9fcb
SHA2562303225cab1a7aa8439ee2f186470532e2bfced8e1b109cacd67a589b05ba198
SHA512124690afa0038d30a4a7e43fbb75378534c309926c83b5194ca71a693f6f5766685c67abba2dba38e126d2ecfd680134c059f25f0a8b0ff22c124aab085947df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ea741e8718eb4e6ec06563dac96a63
SHA19adce9cfe7596d0124bc10dbc60cc93de49c5d9e
SHA256c96818a7693c6d4528d28ddd3235f5f15bff041772185078b409e45990be0ca6
SHA512ec1cdbf1cd1d302e9be68e63e821953c5859d63c273919f16185d21e4e591b9993aecd4d852ca6dace4ebcad4cccf04e86a597e1e9182397c9880ddb6261df56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd0c73e89845a3e056b495b965f82f9
SHA18198aa9425c5f366b06a3f7494e8e35e9ba5e663
SHA25624202d41e736f6a3142b5fcfefd1c7ef2ca195bbcb7faba159be7c1290ace05d
SHA512a432d9f51bb2a4c1aeb23cf9dfe846266744246135b5070c7e7380a5edcb091b0e2ec52e2fbbcc1f293234b82d8d98f22732d6e447537a1e7a4277c6bf17c7dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b