Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
f55cae0ef94401ad31041695e7938093_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f55cae0ef94401ad31041695e7938093_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f55cae0ef94401ad31041695e7938093_JaffaCakes118.html
-
Size
461KB
-
MD5
f55cae0ef94401ad31041695e7938093
-
SHA1
06b06120167f9fbcc5cfd0f231b2b24a11e8a702
-
SHA256
d921b7b07d1bd1c060b503b5d3e9c85b1326a6132482c63402a027de0741d846
-
SHA512
a7fe1fa6d114ff9cc71b2e799ff8ffd7bc36fd1c197e660c222aac4cbfb27d1fe5d38a4caf26ff434943da4aae41e24c503acf99074b58c504e6d5af07233107
-
SSDEEP
6144:SysMYod+X3oI+YDsMYod+X3oI+YwsMYod+X3oI+YLsMYod+X3oI+YQ:d5d+X3l5d+X3Q5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103c0c78110fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433406390" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E0695A1-7B04-11EF-B729-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000302ad8f0c9825ca46ffe604cc90efdf9d0813179eb0a82162456389314928c76000000000e80000000020000200000008e119fda1849efdb0468c9ca26c77f5c57bef1b399f0087274dbb88eedb4227320000000e0ddd14d66d3e33b78e4d48356ef604802952e5da1d5a51d8105b7cadcda0ccc4000000070772542de7bdcc7e103a653b8fbdf99387cd4aeb7af44e999dd66a7e8c6047770fed9d663977f23dd50a94bac9c38566d5acc7f2cb57c7e47f842f3054b0c0d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 1044 2668 iexplore.exe 30 PID 2668 wrote to memory of 1044 2668 iexplore.exe 30 PID 2668 wrote to memory of 1044 2668 iexplore.exe 30 PID 2668 wrote to memory of 1044 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f55cae0ef94401ad31041695e7938093_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362cd021dd9078553079c1929fa8b7f3
SHA12b8f789f5f7d4d683ffdf72a65a26819a427f6a0
SHA25604eaa3def7b225744aa4880cc2238ff3042c4766564197582458f76bd4de8c86
SHA512fcd856a3368ae331abdeea335ed6c23a1394514a6f6e3eac4a5f4268e00bd1d5b70d19e4da5ebbc02dcedd7f68fce901ca29e91ede0f642d9d3c759338eba62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fc0acc57301bb1d710f631334ee828
SHA1edbb537468271155c3e83dfbffce357362b671d6
SHA25644067700043e494e527ad36f060b82072c9f5ab10d33d19b4568fb56aac194a0
SHA512b781ac2d08c14066e90493f4773e52812fad2c33eebb046199272644247b182036aa9975d171f2141b3ca9aea21a64d35ced0081dd00a78343c8e258a7b11ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d091aa4184c7016cfbf40fb57a1a7c
SHA183970955c7f72827cac95c9607f6c4d8a54a40e6
SHA25654c1bc2f4fadbc650c89d66df4c72aa4d0c81a7a91e5e49358410dcf9241f3ab
SHA512d7ae7e35421f2979caac320b0de4733594dcaf929ae5609309fc59fb9b93a7c0fbc6a325f2000a4fbff5c90b54afd117b67a5f5b297961fc8852fcc330e21fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff24e9e2bbabea29d1e5e0531e33129
SHA19fc186b7d70d5d1e6a1348194981e8db67d5c467
SHA2568c031ad59de0c76669e66052184455fead1ab4d82bf5377dd41b3f2509fc8f57
SHA5128cbb8ce186209db88d6248cee5a1395d1012d9889b5c3948b680161e04cf4ec7b40648d262a4f224a652011b2830ec496d2854833934f3086a58ba962bc6fdc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f4295f29549decbe208622801fba7f
SHA1d7536c6d70a2ce146929cb82aab73f9f689df9b2
SHA256259bc04ea3bd5c2c9867d0046b302da518e1e870e07e86e6ed86895a33649068
SHA512522f0e07d2631e6b221fb332a67233f6f980f1ffc8e9b3548f83c71a4a83facc5137999dbb1f4c44724dfc361f12b38bd4d9d495635edad7304e41f964186286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596452690017c43da40d65f3b85553080
SHA18f3c5702266b4d78336b14f56e9799d1c6aecc97
SHA256a8032970330b3998f3acc54e24260cfd21bf68c0b33329f360ee6bc0f0f10269
SHA51202d3eb7d96700ba189c5318d38a06d819f09350f14178798696817e4cf634bf1ab4543bc6db59ff26962c92a2c23c1268c6df731aa8d3f57d4d051719f446ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54092370545860f883e59534069c94941
SHA1254209872c2f2ad9c0b1dc1f9e98f5f35157bbd4
SHA25687ebbf886df33d1de0b6360b9911f2444a55d25d202895e0e07de1ca27cd3b53
SHA5121cf02e77219761e9986562df3b1c56d5cc3a270f7be5d9c542000fcdc5443d3ffc8bc43d6b84315c6af241d1d3be26dabcf97ae00a1f9521204af4fc1cea4eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b9fb27086b80b4026d8274670d539be
SHA1fd5f6c811ed9e556391f452eae968b392d1d1204
SHA2565c05d6b9fd356d31d146268b4c8b84395272ec758883cfc41fa218d7d159ee4e
SHA512bf8564fa8eecf3e4872cd384badd02663c537ca55c54f4aec208daf7d4337e19160725962e05f5b263a12e8b3fca7b9e211bcebae46c1c4ca88c321fbc009699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518314670d6d0e34e94404b0914bd7a4d
SHA1d1938f8d17e63e89802b6df06f840d4b774d8a68
SHA2569287fa5955668916cf21769bbbbb3981237c9d2c8a34311f779f376ef4a19006
SHA5124ce81500af2056d7243d8b2521773b513ad7dcc382f77cfaa74e9cd7fff84392f39cc1ae4444e9f12fcaa25c0124a67f755154dd30ba5e2a26e9534145d28780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d126709445232e06bcd278bef9b69650
SHA18885d07a67fe5145638a63bbcff5232a6c0a76b0
SHA256eb1abcbe2609449d7436ab2a9f4fa2743a549dd1a5562bd1adc3fcfe5da509df
SHA51286d0fabfb36bea646183e34b562aead0ce99393027111c20f56484303e8286fc45173f5ce605ef455ef1569016dc446dd8515c6d9b7e76665306a249160da2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad2b47fc85e30516c007b9024cfa8e2
SHA13aecddf7f369203ea6100219c79885ede5ead215
SHA2560319100d83dadb47b506a3e7f367627a3cab18a8632071695a1521bdaf033f03
SHA512567b79bacc9059d75b9dcfaf2aff7133f3e17721808c6078c64895c20968bc3fc6a5f7f190601a5bbac73bf3edff32b4686184b8cea2b6bd22415bd7933a9a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc86e32b0ae693caf1701ddb7dc71bd
SHA1148012c932c76d7cfc5b3b269293452f42a52d21
SHA256f8204731f1560d5e4aff93504c96e87f9fd56bfe55fee637f7610c86e53b985c
SHA5126b6446754d905f299fa04ac18449146ae50e39a70716ba7be5fe8fc3e2f41e54951ec14e2061a1e9b24f57ae0bc0f820f94c07524029b06059e15f3b33c4219e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53324d2c3ea6a33e9d35ff0a22ed3c8c9
SHA1f31d95baab455a696788d8b7dead49ac32564213
SHA256a28f2a1c2fc38b106dec71d10795e0a8ff2c561e7563921326bd99d2c91fad9d
SHA512e02c54a4da0ddef12774fe942fe7315351f83bad2eebdbbc5a192e206045c36ea4f31416d7d2bfce9ee05c1bd1acd8ed5ba3e7c5cc125d1281729af3175af847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51658822a595ca21af4bb488e8873f077
SHA1a32f7f61a6f8c09fb765009d062b348b9bf519b0
SHA256d20f1dc20c7818bcb4c8291e6ac517dbec6a3b9371f50a158e6ee5515803ef28
SHA5125dc0a22f56dc8e762b1624a5471d323c3c87f610e45676e59b294ec44ec47b46788a84bed51b0fe599e3daa440944bece1de1a719eee4015155366396bfef6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0bc96384767243bdcf71470460bade2
SHA1f20d3ca7a402333ef99effe1121db8ef1bae7419
SHA256c0d7d949ca2328e110294a9db0f813d013aac4b04ec8522191e06af7d62d3f1e
SHA5127fe3070c4024b982d97d7462f15368cba3b91ca4630696592bc8bf4ad6e0ecb55e19a36214fc2eadec8b175ef6df6824abf9420ca9164f37197e35b046f4868e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd6f3c8f7f2353096c2c09956f549a1
SHA1d09f15b584ea5124b80c0055ea2c95fe341c1077
SHA256d58fa3463f47af44b2e6888bc2899f82a5a47ed51a7df27bf3b04325befa352d
SHA5123e62efdd0676a9b3f705da1b8d3bef0b62826f9221296a1f10ea20a7aecc177d673372a8f840dc2b15fd73f66ee07c888d506c4eb560f1848330ed0b5d921104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbda1a0de5e10071c1ad749580d94b15
SHA16adfc26ca76bace6bd5828cb98af771dc7171125
SHA2565462ff5a96440b0363192c2d2e01ea3bbd0ba426e9491b385ff6445967411639
SHA5120a4200d8ee5602a3e078287da8b6c4866687f33cc8a368007256b1b2df7b6a3ebfe3d886b3ff1f262c27e2011c74e99432992f9c9e6333a66e90c541d6ed5553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009e207beac06381b4d8150a96851f9f
SHA1e6896acd77cec070936c411b951beff8bc1e8e31
SHA2566a315c0cf4c661c6e753ed290faab52e06b0c6411ced543103be4519876533f5
SHA5126d75c577d2ccaca428fbf6317109072aa10ddb2e7dd21d3dc83034d64f9a95fb1656743218d1ac254e7306354493c8eee84e75d523db5cd5c365986ab92b9eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba9b40b54f7001b40beafc1f8325897
SHA1a380b43cd22d220fbcad7ca090f3ab72a2c462b6
SHA256aa4b40c896c019aed966f9a4352cd8c34ead79cf616d2d25a13ba47cb7be56bf
SHA512abac48f5834bab7336a59fc6fac56a944c0a600ba0c519d9f528b85f424162623fcc713558690a5f699a099bba718f3f5038cfe9952ac2d4174ff6b1a95c30d0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b