Analysis
-
max time kernel
129s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
f561fe4dc3ffece9c53610dd2097f7dd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f561fe4dc3ffece9c53610dd2097f7dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f561fe4dc3ffece9c53610dd2097f7dd_JaffaCakes118.html
-
Size
11KB
-
MD5
f561fe4dc3ffece9c53610dd2097f7dd
-
SHA1
ba76c7965cdd290e1b6806be4df3b7b17f7ac785
-
SHA256
15a8c9b7cbffbab2b24f15b29c82c9e2e3e28f6cb480044354b932e4b6531b6d
-
SHA512
5fca640d555a6053757dc44f687e4a67a9b7ef7af75fe75336d102c95f8340dc0db180f0cc9da022aa432cf2524fddded03ccd0736fc5880a2aa720e2f397d45
-
SSDEEP
192:2VOlIsr03nE8k/w1wvqySBahnvSo2l0018LOXuBuLbdU8d:sOlIcuns/gcSBahnvSo2l008LOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{217552E1-7B06-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000db22c0755a0ea0176b547a5a2f98bb2fa9ba1e0b9e7a01e5ebc70a18736826d3000000000e8000000002000020000000661074f917ffa556c9c64c48ea741e475a4d49a14a161f56e8ed57ee18d3d700200000007492b85135f20b7cf298decdbd910db5b7e99d19a70249a5f5da9ab71d268e8b4000000018b8a7b1e6c78e72fd2ddf339776d1f7847eb9a63c59e880d0df4a138471017499268eb90b998859675f2a27eac4bff03e83b250fd7549dce95a3f6ecc6ecf1c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433407041" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102dbb30130fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2084 2612 iexplore.exe 30 PID 2612 wrote to memory of 2084 2612 iexplore.exe 30 PID 2612 wrote to memory of 2084 2612 iexplore.exe 30 PID 2612 wrote to memory of 2084 2612 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f561fe4dc3ffece9c53610dd2097f7dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58536d487bf7f48467514552254b3358f
SHA1eb68fef5fc3c974fc9470511a70ee37d78741d77
SHA256ad4084aa9f9811571b372bd7668cc816823d16c5fa95c66f1c2700d0caec15cb
SHA512da48d54233ed1d5acac9ac0e28bf84fd51c8f9d130e823fa4311d3bdd37b0d4cf280a97e402cfb29bcbec42b32574f0e9bc78290b8c55663f096e818c744ded9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e440ede12ce201ad65b697f5cce6bb
SHA14030ca4c4458aa242f1550097aa9d922f5ef4527
SHA256a7214f49506f0181de424afb7f79250b34d960664b3cf3a816ee16cd2bc840af
SHA512dc4bd0d617f0fb55381e84d6d623be2ff34e35a2593bad584056bf99f9827a9ac9ef641757d35ff3b0c9d3f52a22f1052c53926977e796319adad8ef03841491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbc55b9d3503f0a2e611a1a21019bbd
SHA1ebbc4ddf4fd8c7af6d4498df01b621a8ad159ca1
SHA2566d07946afec065a6f67eccd94e132ab3879e2c536d7c00d0e6b92839dcae60b4
SHA512e3f307bd0bcf7dbe451b44f2c36f7c77aa089892d3347788f5010a434f7492569ea36b2f6c56afc4eff67ff96e9af1f47c8d1f06cd0ea924d2f845a37d20925c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513621227f530fa67a5c89da343582be2
SHA11c68999e9265ae8dadaa8f82ec41b1afe3c20322
SHA256b7e268b29a228bfc158bfc3365b61606cd340c3e22c5902a9b3b333371f5f9d3
SHA512bdffc9515ad49031aef4bf75659094ae1fd423404150e8959e50a06844f5c2a2a92b0599410f18cea88235d15738652af41c46f798d3d0b19d480b1bebb6610c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571433aa426f3b78a1eedbbc8da1b0a05
SHA1099519916e053848bb85bf31de5cfbaae48a1b62
SHA2564181159b4cabbd438e70d67c21b425cb4d343fe1f588dc192eec6045e5394e0a
SHA5122a5ab2beba7a713158c7658f167c92d9acc79055cf6a67dd64a086788fb3d2551f5aa2ab2c88478a8636da41ae80f70dbdbbfdfa7fc47c4eb20b71fcd23e22c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209d737352a50f40b42adea961edbf85
SHA1c0fd894d83ec92ac3d4c881febf9ccc5e6c639f4
SHA256bb098f38e7650bea7d716dae8cb328dc5b96e1597d7634fb51128cb0df085987
SHA5125c8062881aeb9045e6430d75209de76b2c1792497955c9eaeaada8583534ba9f90dfd6c7f285c3e45512a41ddeebd1a96703524652fcbea4376f23f7f9a29135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9a3392823406cca6ed3b7179c9feb4
SHA1f348a7ecd6c98c192590a586312899f7e6bb4bec
SHA256bc3fd4f2a0cca3e2dd152d1d0c86ad2c6018fde2509b38bd003f5dbccb92bf66
SHA5121c3b523fd397d24c685b48567a7271fff8217ec705ba8ea69144ce44e28ae1d623687b2981b7c0b81cf5fd7f7136bf38a195b25758d72fc025cd7f591b421210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2a4c29b71325cf9d449947b9fca3533
SHA1e50dd9e10c93255cad024905d7dedc0077fd1b17
SHA256a48675beda4f8f3bb12490151dd8fdc94d12699e03e6d00d6c839f96959cbdf9
SHA5126c9ae5803e86965205c049aeee4f8838215f33fd83e5831ea6bf0cb4ef76d1cb8f9abf7964db7085f40d1501ea7f62acc60499890a6bd4845151edc6b8122879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abeb9f909777eab1a2260d2620ff203
SHA10027de655b5ecebf187122d1b50862e35600ab05
SHA2566137a930b0babad88a7cf9e98f4ef16dc1a5fcb4cf564957a6c785bbcc51b61c
SHA512b8dfff78434ca18553399a8fddd2ba9a7a065a26d7db82b5c02d91f7afb4a61b14ee9c0a018330f64cc998525abc4c035869c00d2c72edaec87f2e52b356e858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446b1d8603501728c779086f9114a42a
SHA17f4163c6642e985d913b73ffcbabb960a718b14a
SHA256a94d42e3ce7d2511b0f82cf2d12a31d958dcceaf71f1476e15a28415dc4df79f
SHA512abd49718c0e9e524df95ee63fa3608dc4ec5cd1d39a357d1e57205588da92b43c86ff0a11d77f3f14099d54939c39e3803b1e4103ccb69c56a5fc1ce66599f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006c08b55e3da82c738bde793100820f
SHA12a82157d42750b3273fbd68c578a63aaa59081d4
SHA256a9c5bd8105077856235f9487e8b40049d255db76f65a4c38ce97447b329503b5
SHA5123215b734c42ea2c9b5653017012a60b71e842d6b58ff8c5a9a32b40cbcfe6d4b42ea56158b9d9038cabfb34fc938f64882c238613dceeac812804dae6425fff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0401fd24c39ededd33c649b3cfad12
SHA15341919fc80e7fa937ebb557c793f7390840c110
SHA25620c89af19a8ca6ffe2c866ac78129db71ab43b7ab9a335ad8cd348af41e8ace5
SHA512494ea61022605bf410a7f7295da1f51722236e59cdd711f0b69bee0785f20a4bdf52a84fabe10d5a9c6bf79088b89e1831e55d0e0f80d805aba0d94cc4866143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b172352de4c80e485866cc5000a275c
SHA1646fdbeb2d88a7a74c7790e2273937027d8a72d6
SHA256662ac094c5bd57c430c871ca76333075f5b7bf7cf28b3c054b45f56f42c91738
SHA5129c1d938b27bd833f2772bdf97f68188fd8c0fbfa960d3686f9d52a581fc8dc669f0c20a5c68a6566c35d62575ccc91a88b751c76eda601cd4cfd65409e5de90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3115c46c97555bbe45df894b7ba0721
SHA15f46bdc681d4811d8d4a71a7a33b08bf1e8ed311
SHA2567ed5b574c282062d93d8f7d4a9b689af73a53d7050f85a126fba5a15340d0578
SHA5127c1f03f36104089b193fd69e521f865cf64ab5f9cb88d2d0a9ef23f15cdfd659f69aecc3dc2ac1dd083c6ae818b065f8427a31bb3976b4a9cfba25855b741761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598eef717ebd6bd43fc1562887333790a
SHA1a0f552595d06ee14549e270d0a22c17a20a12336
SHA256fea2b8a5c96d453270234ee771797a38063c0894a2d3b89481a87bafb19efabc
SHA512fec9d38d8982aecaadf3113c89a7b989b301ee01aa10cc2a60dbe6faa295b910c5269dc4235fcae301620e1410c683c9b5650b4a8807692b191dbf093bdf7c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0616bd7f07c3a2596031e9dbdf7940
SHA1f45bd49d6a032b7c44bf660be6d6668a0436c9f4
SHA25697136cf699f2b6b769022fa9445e7409030dd33e494fd1ca6637ccc5d13985f9
SHA51214b5946ad305b43b14c9c6bb630addc6c342a061edaddda21f7638dced17c3e44dd09bf56f00b7ecf7d5e4288a09ac030e0809cf4f605273910e0ac7cd863c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a736258c456609449b3c8314948b2602
SHA18169f04a480fba88255e6a00d2d90b932dae33ec
SHA256e577d4177799202bf1c929d9abaab152a2d7149ed30c1c28b62746423ed3e857
SHA5121ba35a0bac45e1e33bddcebdc017558509e4e1048f46d017766905309c8e025e20361de5a3209bcc8a7ee3d170e7d6c2d1e57196efe1ae313f1740197cec502a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5ee1ae1c74b97d901228abbd1a23dd
SHA1d77c2b71ecde7fc8c278adc36f02bb67494a9654
SHA256ef434ce9bddd2f1e09c6b5d3a0212e0bf95c9aa70be90b9633998ad898fdac6a
SHA51288ec06bfba6350ee795b399e2f11f12f4f3a423a71a06bace5d87756308c65e5ebde485bc3cf41e006c4383eeb572367c196efc8f8957def3c92109260ef7853
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b