Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
f5477ba2be22a7d77d2787b9c2f419dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5477ba2be22a7d77d2787b9c2f419dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5477ba2be22a7d77d2787b9c2f419dc_JaffaCakes118.html
-
Size
139KB
-
MD5
f5477ba2be22a7d77d2787b9c2f419dc
-
SHA1
d3adcf29251ebfdcd5b4e88b211caa308ad0bfe4
-
SHA256
fa6a7ad1a6241042f285ce27f09c01d5c7d480971b97620bb4b8dabc1b5f1960
-
SHA512
a0110482257f0d02332203986a224ab145958328eaaa97a540a0cef125fad621ab25db1d87941cc7aae8b88db10026879cd5e0aaba4d21efe57831b22a02b213
-
SSDEEP
1536:S01iolCKzlK/JyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:S0aKMJyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000715a35d66eb0ce0882392a04f0a4abee75a97a174c27ab829b3f42c1acf5806b000000000e80000000020000200000009ab4db9b3f66e91fe0e1fa5c314999f01e7e948b72eeec7a41c0c6a9e4af765d200000001e576832d4666b635ecad5391db33e7f0a60a7d1450fff2baad78d8d58c10e0a40000000656b23bbb24de0f8711f75f10c401dbec0bcc9b4feb35662c634adc7b141f4d339615578a705092acfc754a1d983ad738ce9c0f241fa9e994c25d247c9515587 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433403703" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B3A0691-7AFE-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00dd2710b0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2168 2368 iexplore.exe 29 PID 2368 wrote to memory of 2168 2368 iexplore.exe 29 PID 2368 wrote to memory of 2168 2368 iexplore.exe 29 PID 2368 wrote to memory of 2168 2368 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5477ba2be22a7d77d2787b9c2f419dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533491c38593a75d766837600d2beee73
SHA1948b10d89a4266326a2c5748c7d286cd68b93713
SHA256df268ba79aec5617fbf31dc11d89f892b148dde5be1e890199f37ca6e20e6fc0
SHA5121d267ee336a446452468fa6275414c41695b93863f0cd17395fee54308b6d1aa36dcdb6bfa804dc99ee8d091dfa65825b33279fbbd7f46184fd7ecc0e5c83fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187c5871713884d3339496fe34d388e2
SHA1e1f1fdbd810218086812760753ae4d07a7c3ff9e
SHA25673bb9433e7b3734f12ccb599433a62fa684718143bfa01f63e3b235216b7efc4
SHA512270decdb3cc6bd9e2bbdcabade19159d62710dc4b9155bbb93876efcf14e616eb0950d5ae1e5ef091551a557a2385e285d42a9320c12021823136d47c3c8c2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f551e45a2b600640bc20a2cd7f07344
SHA15bcee463bb52fc2d14e0b94094e55bfae820adcf
SHA256aacd609c0a3bf79f8f5d690ad04041766c6184108f3828198d0b02c00073cef8
SHA512b55a0c9b4cf34f94beb3121b554eb21d68abc94d1ede51ce6a602568a7eab0648314e271fc791d45604cbfe0672462af13d132ace2565f2bbd7f4dd1e1c982c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5018ad6656de1e8d01c3989488e8cdf
SHA191be804645128d84f9a4db7c7ce98eb54e1f62a0
SHA2561c8bfc4eb4cea0d6046e4db11093c422123b499c39aa38c7b16fb41b21c1bd62
SHA5127daf178aecba2b84005a3157eecb28cd1bc74194118fbbb1135d931905d325fb78c120f47eecbd48ac41429fa1a647e8501a461faf0adee36bfe3c972c0e2770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e40724149d823aa8d0b5e3facad63f4
SHA1525bc521de113682ab74c066bc3d5f6aa1fc7b77
SHA25609c767cd3f898bf449d4daa1306b21ecc2d0fc7f32dd667e10ab179ef4f2de28
SHA512fa541087a83e338ad91ea5f18410cff7e226d64a7b7a707f28b4dbcd7d3f151dd3dcba066e74911d36dcecfec4043c2dfb4150524700f0bcef5c39ee04219059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ed420e94b2851a5808c704f78584ae
SHA1bee7de72161d04815828cb68145356b4f02c2c81
SHA2560b4fb28ceba33a6d88215fc4b021b3ad1b49026ff4bf443dcd2d3094e2bbaa46
SHA512a01ea80a30d7b17f99749017f69f694641490f9e9a5a8129ef44b0d482e50a5029da304d9d73cc69c670f374fccd0ea3d518c034b1e00450a097b5861058b51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ec84fdb98865f48a0c6ff99a212ea3
SHA1adce9b003d5f98a803b368517c23cf915633b211
SHA2566fe91e9fc192b8ff835451ccddcd82c23139f1de4d0bc495ab87d838d8582be3
SHA51268c793d3890997cec79ab08b8d006ee39250ee59d65659bd2bc427855eb27038b168117742a8e030722934fb5112840b48edf213db4b818d1b2aad74057fd44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f61b0d7c9bf45a67f5e6e9ef31808f
SHA17f171397470ed013856919200283c7f39f60378e
SHA256b4267a33c6db44dea4c83e32502d2ca60268e47425a8fc7db8299f36d6f9a727
SHA512345f684de9fdfbb99a3015776c8992cb1588bf9cdd2223427f605c43df51ffdb0aa4d5cc6e6faebfd5d75bf41521b589740ff2c6151bdd7f3604e974a513e93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2798a1fa47322a42c29673b51af76f
SHA173bb949bd20bc70cf02d28421839455feb542f6a
SHA256f68596372835a1b4b5d6db7ad895bc723eaeaf2c8ea65fcd033b32f1cd761495
SHA5122a8a7541c567d76bbd2626168e695073bcf9921ec23924976b61de9e0e85df7525d13337d577bc437ea5028c9abfadb9fca946cac21c733d84d9bc76c4d0fc4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89d7f730a9910ccd59e0b4f06d1a360
SHA1b5b8d5fa6f4ef0082be2985d3bf9ac8fab01509d
SHA256ac06ec5b017a657aa640576934a64a318284eb2771b98853aad1d06aa29d76ea
SHA5123c3ebc3d58ce3a930a284814fdb5235c594912551a614b9b7cb9951f7c04c6c059fa3807f85b6588a1282377c1a1e2bd48540f85a714b949b23c15ef0275988a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514398b860865d711f27fd8e2501aa5d9
SHA1bfc3278c30ed7cf667400e730449681ac695eb80
SHA2567b343fae788b2a0ee9059a2ce94e2430edabbb19706fc20eb308b2d9085e6662
SHA512a453d9f45ca3ed5e3b7209b123a7656eb5564ae9897ae879f5a5602181bd33a0c34a057db7ef231c670b61dbe01206d5c051b3ac88ed323f1298fe8cf0db4dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d223865a8f76cb9a22180375325deb
SHA16c313e618d3cdfdd33a091cb12439d546169cfca
SHA2561509c0f54e146a2610138cc0407a58835079e811a56ee72d5a2e0267890b2fae
SHA51259691884d1319e5d9a64fc16b46bf6a3c3e991fb80cc43e68a36b5940622d0efd441ad816e8c6125ad5cbe30c988119c7ae6cb71b57db57b6bd65c805a260eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572982dfbcdd0067b86278b155bf07090
SHA1d8e885c8aef814683fbddfeb83519edf913a646b
SHA2562a55cd2f3162917f61d29dba2164ba76245d8ba331c1ddaae09ad1cd266707d8
SHA512f02063316602b08dbc557e84b86e01a1287b6b4de40f4aa1712c1a1e1f77514647e583a873c0f3a1e2db344fb6076b0da2bd796d849d38680799e4daef12d6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2771f23a367603949622c3e01d8893
SHA1c6276002b586144cd341385c19d6f6a9660b2aa1
SHA256c6c2613b4fda772110fcfc4ff7008e5c3c548ce602c73263db9a30fd7477d0a2
SHA51268ac74f70598f6fb7bdb8ce9b80414ef9434872edb4067800adf13efaca4c7bdee234296bfbee071a25126eb8f95c7f26b7fc6fa0607db968357e73dcaa61646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aaeac36e67bc0d403b9b20ec2e2a393
SHA1f529f1640f21c7f1c60b03eb9325a23e96dfedec
SHA256b7c3b14bf573eddf2d3a6065a2b6066b75950a4d68341f1fb410e370d09bbc1d
SHA512822c6aed18e36c62083f98b65a5a9a983bd234647eae77c0e14a6d8ca2fefd864ca3c7d4969754b968dcfca0969c1aca39996bc89e18477aa0c01c985c8d4066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb71abd3c43b763c38ddcad6a9da7d4
SHA14690442b44d9a5fcb2ffc37ad70d66d9bd5e48f2
SHA256e5515f99a82b20c6f6adb232175af0ddb2427f7342f6b19b6be4954995b49727
SHA512c190c92a52c432a1ba3c25193cc4544168f55996a36959c146df4d88b0162aac666c739c714481f82a49661b7a7d5255e29faaa36990d48d95ad2cf9af4d1fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf10bae3686c3a2de1314c03ce5e495
SHA13bdfbad2560cf9ef38b5d0433f81bd207f1e4d16
SHA2560278fe3e817be8fc8123f192b6431c780ef828e25e98afa48e4def95a1742af6
SHA51292b1558d7e885189f132be9c387bd076ab0a6b11f8a3a3ac668fdc7034e50afa7e88a40a30b21f0f3b100011710c892be0e6d7da9ca30ce52249fd369864fc7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf537242e4cdf9ca16e5b033892df23
SHA1a0f7c4c62e148055826ef8b1f5e18cb8fc68253a
SHA25646f7d450b8866a148ebc8ce3a4d7ff4ce3b5cc3ec302f92e16684028f3c7edc7
SHA512c76948cd7d677eb20529de516ed4313b849a191dede741619d77a6caf308e8f58c8c0d1138ff9de541d9b39f4fdb3fd860a00213ccb02f8a008edc68cc93df66
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b