Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
f54b8ac4e24bf6ea20e5ccdd1e15d8c7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f54b8ac4e24bf6ea20e5ccdd1e15d8c7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f54b8ac4e24bf6ea20e5ccdd1e15d8c7_JaffaCakes118.html
-
Size
964B
-
MD5
f54b8ac4e24bf6ea20e5ccdd1e15d8c7
-
SHA1
3d333074b51310fbece8db51b1a56e61c8ed28e9
-
SHA256
acc6aeee2bd192c84d5d3fdece605fb83f30a2ad0f5880e7d3ba291623677e20
-
SHA512
38b7876d119b4e501a7608b14f7b0822fdeb44962b9c63505aecaf8da689c8b1e9166149a5bddfe3a773ff8112a455e791abbdeedf00ad089c82caf7a4d8a38d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000004d810df462ead1ea37d6ab28cee849d8ad0a5f34fd07135e69b8b10abd73f2b9000000000e8000000002000020000000fc3dac737283604c8ede2cad5b81ea3bd14bf79ea827a72eefd20623d62badca2000000030862cc79eacb1a5484470ec635086e6e93713ef41cd11bc4c320055e6256397400000006448131bd49145098ab8231685bb84b5357312de644497e653a7cfb64cd2b7fe7906c364e8bbbbb321c4bc11648da275af88fa5bb78b005ef71c098880362af6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433404125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5763DBD1-7AFF-11EF-A0C3-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f031e22b0c0fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2056 2496 iexplore.exe 30 PID 2496 wrote to memory of 2056 2496 iexplore.exe 30 PID 2496 wrote to memory of 2056 2496 iexplore.exe 30 PID 2496 wrote to memory of 2056 2496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f54b8ac4e24bf6ea20e5ccdd1e15d8c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6f64c59ff8d8590d838c7f7a72f5d8
SHA1eb037c8cd2e64af061bb2a7f136ab6ba7a71751c
SHA256c8a3edf406aa88dc10cbc8a051542c54568e0ca4d6775591f4ee9d4680e04318
SHA5121697c92483c6cddd5fc080873cf982735a61169c58eba234420c1e31687c6721679417e7586c72eb7cf6a64d07290b32ce489ecad230fbc19a45b5840e8e1ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b97ccabcc493e2d9b5078d6a25ebf0
SHA121753af23a8060c3a2d4cf574c53d4b0279e8124
SHA2564ec75e3660d9e040120b2ca7f70f0280f8e0d247994ac262617b9afa1b1c9a57
SHA5125c1776a73f1e651080e4b5f45879dde511938129ec20c0691e13114cfc3d294c3d1b819f414cf870b6e7f96fe1c6ae08ece232e4fcf20c7f9eb18e4257aacfad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53551027ff17c3868840f0d39b117a2b0
SHA1676c13ab03648433044fee81d488c19f48c4f0cb
SHA2562fc7499b26ca803cb57cdf3df6975b72a6c812741dddda8a10aa2b5d288d8148
SHA51265d734e2ddaff3ecc85b06fd83e85585213f0a4e9a336c6d707a1e193433a18088aa4a5f907b530b6d1edaa63ebe5b6fc230af5561649bfc88ebf3d85a6f7058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1b8af027cb8e9133e0c3791ecd81b08
SHA1971af01332a8b5ddb5ce7208d3a85fb773f12c72
SHA2567b93a72235c866bb56d0d7a7ab7f55a5a89d2ac792dfb96bc7c312e4a91f4ad4
SHA51220b6d1cde6f65ce6ae7e5bebeff8a91cfed1b6380677c6346a3bf1897b9c1a6a2fff2a7799a1daddd096799a00bb27c0992b464f255e51621063290bad85186d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f4b989ff7a83b2b4d86f170fb4d5bb
SHA1846b10f59c72e24a8cca116cf154feb377ec84dd
SHA256146cde13a91d4a5ebb6ca0a294e253d3ba33aa03c80e2b38fd45d3b18a88cad4
SHA5127a2949062acdcc8f4ba8e860a4dcdc5788edb942a0f836b704fae6f09153213f472636c1ff3b6ba57ed6e74fa27045b2c5cf058459267c6f7415d5b9e5480de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1ef0830063b96f874b53d8f6b6bce0
SHA13f91c5ca0befb33afbefb0aae3e3c2f495871275
SHA25614265d6540e88dd8df5b5a8aad04c45ce93cdfd8ae4380f301a38efa92162f31
SHA512f293af9bc40c728273cdd04025ef45ad1fa3ff0a38777537e0cd425d19318302de04a8fbafb5b0c0d0c91f6bdc941cc2896ef7ec8c3d4d769613f9df6d272c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0d913f42ca146a78abd7cfbd9c86b4
SHA1a743d1ecacde2cf1240c84130998736aa1506bbe
SHA25648313966ecf07098071966fd881df2e391a8d02091ac23b02ec67fe163223060
SHA5124f9a061048df3dbf1a1e3e3158f86bd83c4d03a6696c296db3e763995487605d595becf69bf54c5e0ed77a49dab5b2daf3429fb30528e60778c453b335030b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57fcad2540a4325caa03b6ebc88a141
SHA1623b6ee3f67f8ea288d3f4f3b5569f7f0d226b7f
SHA256bac6d0bb3f810c44e0eb665d8c7fda7a423f84995c13df4ae351e2436683898b
SHA5127697f94ad83cb902a6062da3c2235432d5f1465a42d172a56d0bd7b551dc3805e81ed03a4188010d6be5ba91806e64f39bd5eb8ce191c8c341ca4244c3af8fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a21886b314a1eee109ad0f01f5b684c
SHA10cdca3a8f6d95f350bd3fd9f9a62983cc4431615
SHA256ff96e6f9c927a2eb837c3f4472e9eb382a9c454daf325a364192e3925fff5925
SHA5129ed6e6ac28793c859c011604bb551784afd227fb9d55613648161bc6972925924554792a3894fdf240d3159daaf80bc0181d17001d8e678bf225c8815f81e61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc810d4426e8975fb0aebe20a5f1ff34
SHA155e8f553bf53e03263a4eed414d693ddb1709314
SHA2562133bdcf8349cbfffe72cfca7fc6dd6692082704c486bc321daeba376aa7092d
SHA5129e81162266fa03d3531f34c37034c0a1bec26ae5df4a823f59f886a209577244d0db71917cbf1b0af65a090138f7d1f760ee33d8574ad34664d0bd588bf4fde3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5d3b4f286d4a89ac1fe0c56f732da9
SHA1b39bf9e0c8a8f0b49895097aec22e2477bb9767f
SHA256b315c9d529c92f419b76d8daa7b996b3897f6801f7327fd60cee2d25d2da3ca2
SHA512bc9f70cb9cbe5453d1af7e5d3bccabcb047afbcb43bf546ef6e50d27a7c883083ad3928b54a7934dc624344fd37b683aa927fc9a5214a45bee254c91449bdd39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a98604bbc7a3968b0212073a090417ca
SHA176ad5569e79cdc567e053e74c01b91affedc3006
SHA2561c94ff81390909abc35daf145d1ee9e2c349c7b45039d3166382a9e6bb5c831f
SHA512433f8ce11e3e69f816721121e0a13eee200566a1d33d76b93925e0d220213791692e786ddd6fb5efa5b6c4915acb4c64843267ca49cc0f3ff819ae40c3360bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51decab0c25f7d6c80da060977b9aff2b
SHA1992591a6ea94e5d71c77d5b46a29646f1262f157
SHA2562bd938a80cd43c419038135736efb0bc0f228d882af56883560bff28eaccec36
SHA51228b3c6735d1b5698a6aaf9699fe75bc817c974cdcd96166f5163880827b33d7019374993aeefa7e21e60a1f086f87413c89030437a7a48f1f6c01da4af6c428d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562122a19344f6e6ad0688fd91a8eb211
SHA1b7ea1395aa10b9bd54bf10bd62eef8bbd9ecca6a
SHA256797f0f37b94a5edd1583580fc83fba3fa8e66ce94c5901682204f7909d584b3c
SHA51219e944a1d7e70a02d330af6f8da9a41a40dd694e60108b51299add93e4b558b2429f5c4705de065a5b68979871bfbb14a39b6cd41e93569f2b472a807281e711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510afa3a90229734e75e6c1cdc7f87577
SHA1621b984de15de1d96a572f25747cd71bd3c2c8a3
SHA256e4ecef484d06712d25ff0ba0fbdd98cf69b7c7896182b10610b4ef83f1e0da22
SHA51239851c9d656ffed47b920bb6cc50a1dd91a1c119e877f1780b0b260141fec46fafdf7eb4612f150ea8cfc4472e7677979b8961aa4cd3eb22aa7327e0f9ebaf33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54fb81394e53bbc58e85003b69c0a53
SHA154f17cdea9681dcf94f57e3b1527dd09a50973ad
SHA2565a63d5590baf99a8cf5b53d31218a0dfec6bb5e9695bae08d52b32115ab3aae7
SHA512e9d76626d948e44f64b76c73f9b2dbcd8fa670731ad08745467db3697a7f0b8eacdb8758819f9abf73ca0642f85470bfb555aa31b7df755c89b8920e39ec7486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c777351e3c60defd51a9f5531c5ecac0
SHA1fb7eac73afc74a6010265830c01d0ae6fce53fca
SHA25685b0b98b016a9e2a30f65e7f89d8d4b4bb7fd12b17046b4e2001566b62d02f64
SHA512f1dbf80e47f4a9ed38984845efde3715f0ce0e8fae5ba680f898e3f0e584bdc9af0b463dc35bcd4a5cf3ae6deebb055961bc8c0b6794ab19320c7c01fd0ec4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351abea936c86cdc0d22e2c3299763e0
SHA1bb681ab78d05076968deeae0646ceda1028c2cd3
SHA25622b42a4d619c1b5201cbddb6acba8c3f924543b9c35fc95ae299edfe8ba9ae20
SHA51205529c3820b4bc7be90304216bbe56bb5ac9298b52de3cd89f16db20cced698a5bc1a11c7b86adcb451de9c6a4c012f0c8d765b2fe1d0c9ecc112ed4874ff54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5495dea76667a17330f16aa77f039e2d2
SHA193c2aa715d5a17f8c63de12a5a7222525e030cdc
SHA2569f93e2764c78659ee551bef1eb6169c5e930b589877e6ebcc8f2b7a16f3723e9
SHA5125d58a3c9a4202433b5694d3db4faf314f930069e34915cae05d4aaffc9c0b5df0ec26c145ffb593741fc128a31cdd6e9a223bc1480b52e31d26f40b3d48db97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5668bed94e98de42dc93ae25ed5725be1
SHA16adf3cd50b2fe691970031d9acc555ac201b30c1
SHA256602ba44a2004d72c7e4dfdcb83768a5fa1f4807512e76037bd0c997d6bbb7617
SHA512650fe964cca9a319b696f45070598eea5c716c590e190b3b9e842d1c5380c7a3e3823c4f862659b2db7c9517bb1f200937ba04cae0808d925ef01a1cc821fc68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b