Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
f535c3e14245c8e381619e30636c35a4_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f535c3e14245c8e381619e30636c35a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f535c3e14245c8e381619e30636c35a4_JaffaCakes118.html
-
Size
27KB
-
MD5
f535c3e14245c8e381619e30636c35a4
-
SHA1
ea86d5180624e489a9c297ef19a1ebdeb173a62a
-
SHA256
b80f6ddc198ff41506f2d5b15d0ea384bce9a484c1fa8999f3b347ef68995b77
-
SHA512
1a3d9fcfecda02ab220cbad0996e975b0847f162f24be688ba10b5cbbe123cde56dc5c352227a117d539c8171cc8324ba5cd269ddc6e78acbabb5d13e73f64a7
-
SSDEEP
192:uwTYb5nS+nQjxn5Q/tnQieQNnwnQOkEntXrnQTbnhnQ9eG4m6lFUOQl7MBwqnYnw:DQ/wHgLUpSyFM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93DC5031-7AF8-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000094ed521d7d67245cd350674bdfe76a08866da7a41e9c48e4092de32726f605e6000000000e800000000200002000000038a41758f2ba6c88cf80e2311076dfdbb138b88f02764e45a3c26b1d5d4434e120000000e1355886b58482617024bd9b4a71c5a1db1c99498de4de673ad98f85e75176ef400000001918365daa9d760e27e555cade768d3be5bfbbe45ff387f927069a54accbdf94a8e262f685ac4ddd8fc187165e82733ce9734e35347106efb1ce0479bec81ba7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0cd056a050fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433401219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2400 1732 iexplore.exe 31 PID 1732 wrote to memory of 2400 1732 iexplore.exe 31 PID 1732 wrote to memory of 2400 1732 iexplore.exe 31 PID 1732 wrote to memory of 2400 1732 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f535c3e14245c8e381619e30636c35a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8e631b0b73ee321d98d5e0a610e439
SHA16b03060c27f3aa82182bd65292e8768e60088c85
SHA2562f3e8e48e943082f2d0a54fa1aee6729f0c418ab8c591066a3491d8009fb78b3
SHA5123d20c75bdc1db7ae56408fa83e70d08512f972e27e873bf21a2f088d506c2c696e02ccacc283056122c640567172c2592b37b34f85816824bc1258b78a7d42e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c368a2513060e9f53f9eefe675920dba
SHA1c08f41602d8d8f5a3288c9724ad495f4d7a9ae78
SHA2566f4d285ed0fbbccd723947cb972735755bdabaa5b35ec10ee6afdb15d53ae80a
SHA512fd86a08516693c7ca911fcde08b5bb7e41c0e6155ad391b298e6b98b346cf2536efa4b9e38bfda2fe8882224c47e559b6130519e028173c27d16184f55c7769b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b46b4a5681204ffc8a7e3901bb2b97
SHA17a1fa4b7e4f6cd28fb18232935b74aaeb2aada3c
SHA2563dc3b1aeadc9c9849196181f84262ec8e1ae37a9c93630ec79c78a4083b9a474
SHA5129231a67e5092a39cde0cac9fc4093d32933cacc0c088ea13d486e687c5bd034ad59e385c39948d6882ce27ece37a860eb778e8050209405184dbf76d975fa2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a6754a5dd66729f4123d216e94a8a9
SHA1b3df6d8d118e235d2b6f8368936c72a90ab29fdc
SHA256d68ce7a5b0de74eadb6be2f19882156a18a1601c925a56477e5b9f7c2bd8f16d
SHA5126bc778494715aeb8889c11f5b1d998731b09e94171a698973723dbf5813caf899c2ea3b7aec1a3ddf8c62a3c0e1793afba1943552f2126ec938812463388c07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e3be7ebebe73236c8ef4582cc9f7d6
SHA1d6e90f4c994c83a772200da35501f13330a3af18
SHA2566284f72cc75b42ff8122f12123806e43a0888076446861ce0efd87e027136fea
SHA512d724c29947b5d6cd17bdd5e4dd9ee7ffe36a32ea96b3264bec8db09f1e12a0f16d42f8caaad9cc1a955c81e034546c9bfca2a47532b373f22e4540ce688323f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5653429a764940794ca61a1e2a1a91
SHA16fbe3c751d5e2af9bf253bbd2d7aae36eda23dea
SHA256dd62584e30d4ce4aed943dad07834299eafb41ab15835493c9262b029c4c5b89
SHA51205e26044f359a8948f149613b96039f75cecf603368390e8e62096f5850741b9e1d989ba93e404fb684c4093fc16afb2e84cd73d0c680e7095d328f6525488c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102b4609b037e37c837417eb41c7b625
SHA1f1005c4d145ec282025af11994f05a58ddfd48c0
SHA25683bc2f960b13448490199de4269fb581658e081109d4a28426b03adbc3a57151
SHA512300f62f79818f6cf74e7db2a05004675fdc81a2de21271554d03dbac362fec0adb3eefad175431a6fc24e0c233ff4899ad79879ff230621e7c190231f33d138e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be4ae74b664f25000a6cbaac3b3890d
SHA195be8baa37f3db039bd209c960542847e39472f7
SHA25657fb1fb65e2bd275e885f420aba97da7e6d5d44c5b03ab585710846c72cc4e78
SHA5125494236e522d293caa00a08a213e37abab55262d3fa366fdf064bcbd207adc02a9cd12248337e1266cd8ca1593591554ed33edb8e79ba75a29cd685578ec83ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557fcd2588b7c7ddece17302f28294e17
SHA1760770f517f709086261388c4f8f6f6b99ab1a5e
SHA2562642ea498245810984b788b3db079a97acf653506d7ea4286754754847cff13e
SHA512f28b00a6fe3b04788cf63f072212b8baeb3f405f68da301c46e5c0c6b21242725ed1e54ed25eb9374a943caf23cdee7a9dce29da7efc4ea960265cb13dc728a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515adda4a6fc4539a8d0716c1bc5a2a6a
SHA10a0d8f0d0e276dd2bcbfbb0872530354d46d3909
SHA2567b84937a50b651f6dab47b7a812b21090c8ad65b6b0f4c7554db687996109a18
SHA51201132c878632ffb3ba10da855cdd2c9171e8abb001520723cb87869f59d93abb5fa9c7f62ace74432e71bf7c1c24acbe983c04456663ccc7b19b70357be99a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f50589bf53bae44fa606bbd3beff285
SHA1ef5dc4ad47aa18cf528f30d8cf0a139a65a2d7a4
SHA25626a5bda11cd0dfd410c07fb6bbfc2989f7ffd27a16d6ddfffd1520c87ddc7494
SHA512733b55f11219e103506b7464aef8c9538bbecc67231c9cb461e18b42f063d09c00cf5b47233c8fd1e1e5c5a6ac559d5e94eea9e5fcf3581bcfbc44f2373e52cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b8e4c632a669c7374aba5e16e3799c
SHA1db725bf7e0d60464a22d184f274ad9718b9130a9
SHA25674b699d9232d98b33a448c88aa4b18d55983a2017751d6445f5045904a6c3002
SHA512b0c0cee9bb366722e2bfa2dc1cfe4762dd2f024eb239098655bd50c8a56f8d7c573c35611d01814b191af2e986b6d3d5b036ce1adf19e824ad86c3f803fdd897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae129daf1021704fdfd789da56036830
SHA17f1ce055618ac126ba87c79d12c03dc70d1a6425
SHA256503d5a09acb42e89bf7ae4138aba506e8785f8041afc6c457b4dce1536b3d82f
SHA51236ba5cd3dd4556a2d18f8a03874e96eeb6b5a5d2e06ebb91404bbc24f9c659aaff41c8e238ecd99a75b4da4cc9d5ded910299c36556ce9ca38997df2481b1791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4e1409381c20e4bc4f5db93a79fadf
SHA1baf793553779eb03e8238d025b17a594ce8775dd
SHA2565e06dcffceb6a24745a341502a41c0308e5eb54e66c4fd56ca86a4ea2924cefa
SHA5123bf02c69b7e8c5fef7cf0160d1e9a46b4ac246074a18f747ed9541a960f394edcf7231e1925af5b51dfb3a6dfbf4409dc28897ef048364ce564bf0a6b2ea8372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9c1397dfb28442c2f4b3fda45867c0
SHA108b85acff84fcc40020c8aee0bc87f25d7513c91
SHA25603087f97d318157d798321b322da4df5f0fee096ff141dc2e132b0cf73aa50d7
SHA512036086acde1415643f6f4a5eb12e875a5167216415afd1ca8f81e0bc68be095c496f00203d93d3196206808c15be8ae376de732db573de065b34d0fcf549cb38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e286950607d51025f81b6ab13a642b7d
SHA1fbb9d1bc377682bed3583fc093528569217e7995
SHA2568b65f8f95571add9f682b36130e3e275228835707535925d574526c49b6624a9
SHA512436f68c0b8206845de23685427b5206835e4a098981c3dff2330d5ae50cef14ea1c4681126d48b9d686998bea63c286e5f998f40ba0d7eb626061af9bd064815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a7d14ed2829c705b02e814d679c0b2b
SHA1f34c5542f1c7882d8e46aa43570b196155024d0c
SHA2568ed498789c80d8357f59f746fcf223da7facd396fa85370995a57dbb334026d6
SHA512bfc38a7f2ec59bb260c534cc5bf5c57b7bc2d67c58b6c3478be26aef43e93782b120087c4a1d9922b150c1f6091dddd9a339d2d68b2e9e8afde84dee0967636d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f21d8edf78e6dae820719ffdc9fdcd6
SHA101be31e1e6eb85912bcf9b66a15d501734148df4
SHA256e7836a779aa58eaff4f6f7e9a10542354885d8f15fd8e7111854e941f3a61309
SHA51290cb6221cf877c153cf93feba5abe725f45267f508e63107a9ad08e0e0381700b732b6eb5974e2d261d94fccaab859dcd5d7bce10297a1c97f55a30ed2b962e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b