Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
f52ad5d5ed9cabf19dc5fe2c8ba46ae9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f52ad5d5ed9cabf19dc5fe2c8ba46ae9_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
f52ad5d5ed9cabf19dc5fe2c8ba46ae9_JaffaCakes118.html
-
Size
6KB
-
MD5
f52ad5d5ed9cabf19dc5fe2c8ba46ae9
-
SHA1
4662c42d927bc01d2895d1d6a30d8ea351407fc9
-
SHA256
1d4478e581134b246e82dc1e65b4ba73b0428eed7db661e7df6048e6a447abef
-
SHA512
03cadd1c3cc45e0b4442f50100db0ebd3014e09301fe8a2b769b1be23fc2791d364397bd7188dfc5ef81ebb57db47b26e1b7ebece3997f051c7abfdd7d099153
-
SSDEEP
96:uzVs+ux7ZVaLLY1k9o84d12ef7CSTUq7cEZ7ru7f:csz7ZVaAYS/bb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000015e18f0ac3e05fdc662f78edcbeae493e95e8a24385cecc2b2febd2eb5f5c095000000000e80000000020000200000004e90b27b2ca11a02a434e2dc39179b05964fc4d44bfe70be48c9be7dccb148272000000021835384fe1cd64aa7ceeed3641d0554ec07d25d7990636e95e4c3ee7f0e647b40000000e1e298c334484bd515c89ec7714d21cf364f5695e3ce60b4be997f25835657ead1bc69a041c1b9754124f6be38155f14e7d271eeded6695470c735fd8b33c0aa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4081aa3c020fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{658C5AC1-7AF5-11EF-BF4D-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433399856" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1716 2272 iexplore.exe 30 PID 2272 wrote to memory of 1716 2272 iexplore.exe 30 PID 2272 wrote to memory of 1716 2272 iexplore.exe 30 PID 2272 wrote to memory of 1716 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f52ad5d5ed9cabf19dc5fe2c8ba46ae9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe5899bd3597fc208084cc126a287c3
SHA113e1dfb0948813d9f0d3c7c84d2383a567bba31a
SHA25675bbc5cef4df1880e24fba484a144eb64140fa299b2f5089df24ce0c24df79f7
SHA5120570bbc1a8a2085162741f0ce18f051a5b6598dc526988c3101c17584f8bb378997c3f61af4ba93f6326e078543d0b61f19d7429c25e6aacd682d10a088e112b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1bf59fd3153e88e49c0ea99b2295ae
SHA19ed7eee3bbb636c94a7c572860ebc2f8cc4c8c61
SHA256ebe1a9d4235116d552ec9d8f5adf9f63d4f03a931ebb492f63dcc80bb9659fbf
SHA51250a8491b060070d6d0845343724063684592849fe395a45dfdf06fecd833edcec10fd0d6db67fb0030059a1e1bb27168dfdda6b796ff55d5d4db201f1e0b3eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4aeaffe63ba843ed4e8a7dfc5b2f2a
SHA1f6e34c4961649d761dec4b800f703226a29f1421
SHA256739a6a7fe981b6683fc1c36d21a7b1aa88b8f0d28de3cbe83365701af0e1b54a
SHA512e9a9b5a8d52a37d09c36c95813ef117f28f99f31a080edf39e97d40b080acb8d6c0b02d78e635fd3e5d8b99103af910f978bffad2650177220f947d58d200a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d05a16e800371a9de9ef05457d1986
SHA1cccd8ecc916c8aa30a9e61f099c66017b4781b84
SHA2566b17a5b531e7fec7db0c4519a6306cee015a1e648666e2a400a12cd7a96d0d6c
SHA51263154840de3d10caae36ead1d0cebdf4db2ab8105a33302c3a9405bb3d906b378217c209d6744318bf0346a0acfe031e71256be7ec130f53c7c04b7501dab4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8724dc2cb4ec30451c60e8300b024fe
SHA10d0cad7d9bc77332dff679ec27a9919b8574ef3c
SHA256a553f5340d8d4609e12da121eb4f1d07e1b4f1a3a08a9792e1eebc881c4955f1
SHA51236f99ba7cb16a457c925596d05e21aeb81c0ef0c75f9a83914417d14755aef5d69f8c756b1b54a976cda7a4cec0bba8174eea11f01442c162aad6e08e1100e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b6a1bf0ebb043698b04dcf6848e66f
SHA1146b62349668b81e16deabaea36c123b8af5744f
SHA256478c6db07dbfa581676db72337f2736d4339d8ce4734d7aaf7b4eb9f5064f37e
SHA5126540c53d9204c4ae41633512cfce39e0438fa9d49dbd16a5167845c1931c0108d43e22b46f39bd1596102fc65de35783b6525b2498b7d8839926307adb4f2a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa2c3226012f88ddef0e5b4cb16aaa4
SHA1304dd88093149707028d213c5e91e824a7fb0abd
SHA2565285af3d3d38526368c9bf73234a0887988e3d3b68bd4684ee5dc2b6152a64f4
SHA512c07fe2149586d9d0aa00d2dc48af61cad625caf9484a8c78b71e6787d0f50c095c82bfa1866082344f31dc2338c81c2b4ce9b4a6e224dac5bd9fbc008a1d5400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944c1e41d09e7735d84d67a6476fb6dc
SHA1c0a81958ae79291ddb16849d724a1262bd76d192
SHA256c82413dfe6fb9d690552f05874128309b611ff26b5d3331e83864ad983a4bc4a
SHA512b50b24cde34cb6e867bb684c6419ffee11264fd5d689d10cb25defd6b021fc9334d08e33ef93929af574087c6528b0df773f7eda8451f6987731e9aa0d7ab763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a707a5f636e66a8af95e820158e44a9
SHA1d512bf6d2f3554d561adf647042fa6f755ce47c7
SHA256ecdbf3cb0fbc5c3588c20f436f97a40d08d74ae3e2226dffedc7f41a920ffe22
SHA512ac6c6b97ee7264809025659232836f6a0fce9b03b1000488b84712d7bf5544457b7296a458fa62d417059220d84e951684b39204613360e49e1941db6972e3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fef1c004178e256d823fd747a0b1889
SHA195b75824c3347d1e7a54e9134dd0a6c7cb08ad21
SHA2567fd1ce64416bd688724dec537616ee4d62cc8135d65e5405f84492350b8807ca
SHA512482cf80a3d51d88402ce684363fe8a995b410e75d5c2017fd82c063d2e6b97c78e5867ae48d037eeba66a55db45309918a439456bd666a35cbd38f3acb7f55d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6177759e10e6b884d418c924d87604
SHA1bb4d12420886b0b12d83703fe7c812127d553990
SHA256dd78079fe37e3a8f1dee9207ca62daff7e5c33e3993aafda13ef8fdce0afec95
SHA51202ece4ce2c072370848f805f2008ca3b937f812949aafd205df097e899a4ed8b24492730ade196c55b483f0c70e4c972a5ae60504a9c1b1f709dd2688dddba47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516abcec35e8f88ceda5f44b3e89a5e96
SHA18911dbb770a5b69ccbca2d3a15b798364def19bd
SHA256d8c93b7993dfc6007ad9f89ba61774eb29fe6fce7a8558a353cb0840b4bc1679
SHA512afb9e3fe2dc955d94cbd38a655438a1f35c00903a3ff8c2849a3c77dc78740351fd03b942e24217775f899464ad78aba61ac02ec96bf1073e4a671e5250214fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f963a66e4fa4722aa82a7d69fbad77
SHA1228854031f5726b7726b0a714c2a7666c4492468
SHA256f5f9ee49795d025b286506fa262d2d058e27d48d75f427471843ce6c2eb5575a
SHA512cba3427153ec4ab309b42fb99367336843229033c0d52c98ed3eefe3be7e75c6369d0136ba212574ae60c804680326d19d7e3773813274552eef5393fb7c5030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8ea03e7fc747577cb75f98de796a6b
SHA1d42a7f78852c0f26c167f1b77380fa1773b3db12
SHA25660402fd5d03c3d2aabebd4174f8fa18a651fb4d10ae2300d2a01ddf191f5cf95
SHA512d63888817fb10a70815029729d41775d729290a9b16fdf7789a8eacb67d3001bffe0dbadc73a3060c0c2aa05e91e30421cd90cccbda001437d67a4744422f002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5668a813f56c17f2fa6695bbe009901c7
SHA190a720359963f0fe5b81be640d82220834f01abe
SHA256fc8d994b1b7bbb0e178aa759a15d1bc0395597ebeb756b41242b4e1d595d703f
SHA51284f4dd95d322d40bd4c9d3af947cd08fc2c80e4b963847aac66bbd3f1854dd0fac548d9c06c23070f8bfebb09425ebb1ca38e1e3f8d59a9b647604e95d0c467a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b73c2fa193d7089892633020cbe352
SHA13e760e3cf41bb3a192d6af9ace590e2d00740bf1
SHA256f5f69088d4290bc43fc4100c2279bdcc6e0aba58343ac81ec108a5d6815866d2
SHA5120488d0985f280d2c2b996797fdd0137c1ea4817696392dcdb0c9575c7e260e5dc6c5f199aad17955f95f9fa5436c7ff657cda968dacc84100b3cf42d4e9648c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e77c687ebe5cda052a4ec14c9253a862
SHA17e275abedbebdc839f2889bce4cd345680966771
SHA256ec6c939dd801f6b2f99d4ff8ff9e9616104c60c3f1940af51ffaf00c0c1cd36f
SHA5129dd56c7159603fdd45acd919327190554bca9acaedb9db535a4185c9ff18a83290a2c49bc056f1b7624f4b220c66d071d8afbdb434f2d3991d8b7ee9b42d0ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779cd44ccb001b31ff9886418ad6f907
SHA160c782ae62c7e7e8484ff385cac3f83bd02dfb16
SHA2567bc81576c4b233849cce13fea5a1fb140e9ad936bd9e05ddbbabd44e74b6e6a4
SHA512bc951daa417f36c779d28de565dc806c266a8f1e2c8841980b67a2354b30ac3f408201d397c824ec62c74aefe5fc580815b84a56b84f8f6f48c91c15eeaf9fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594de5c2847978ad54f17a68910187f82
SHA1ff398e758f427c0a6a6453980634c37139596bf5
SHA256d59ec9d686f05080abc78ae1353fb0e2873e22a700ac273649661a82e0435b15
SHA5128a97a72442064b6ee8a6b9c375de7e9a33e8170160609f4b82937495ba54eb187c6aa261cfd46bf554e2fa9a6ea3a5740d54ba54815a3845a08d59570e0102e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b