Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
f57c7d555fb244bffc153d6eeb1a5c61_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f57c7d555fb244bffc153d6eeb1a5c61_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f57c7d555fb244bffc153d6eeb1a5c61_JaffaCakes118.html
-
Size
3KB
-
MD5
f57c7d555fb244bffc153d6eeb1a5c61
-
SHA1
91ea20967d2aa295dc0e7cf18ba30a427a7dbc65
-
SHA256
5e9c4dcea94efba85de4068803edda47300e321e632c9170b3af1cdc84acc610
-
SHA512
e38dd3f9361b4426d8658684a811abbe782df373e0d6d2ebbfa4d1cd3f44e247e4ebeb4670635c43784ae550650b1720d61487165b50e151445e9c3b8bf6e89b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000003a8db5c50686c968d5bae8bf3ccc500ce86a322dd16a42a276a8b2873d7d5c08000000000e80000000020000200000006667dfd6b73aef6deddb6531406fdf773dadd276b346df3984fb512460b9a0b290000000a57dafcf229a36e0d03c7e0305f2394f0cca2f743f304ae3d39a72eba2c1a17bc6077f60aa8f747e92b08a4172f600bd469b619593f3cc287c49063d2be0bbae7ae63879a893e5fb5bbc5e93c010cb2ca9009cffcf6060543308a4a8728b1b531595bfb3d21405d609d4616ec881cd5feeb9bca73d1e75566cb300969c0a528f192665a35a3fd6a72582b00c15c450d3400000008ad4f120f76ca93ba54bc2e51d97b839228706d611fdf3eba2096c1ab3497e5e9667e1274a2923e7096f0a244ba346375cd645e420c8b63fdf9ac4f08d5c1e11 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8044e2b51b0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000004a20ae13ff6895e557ce462f80f6cc7c5ad234c22fb37194e13c175156698baa000000000e8000000002000020000000489c64a663fb573229338705a4d2460e9b117d1902d3609405a3297173e9f17420000000012cc98e339d8b86b764cbfc623f387f759f332099f345c4789dce3969f26ea5400000000cc08ae0b9c5c46f9a3c1552ce562ebfd210efef93a525dbabe0fe66ec30fe6bdd04fb118a53e2d61061ec80ea1b7d65fcb8fa9b8d5a9910bb2bf842394bce19 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433410796" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DFA04D31-7B0E-11EF-9204-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3056 2484 iexplore.exe 31 PID 2484 wrote to memory of 3056 2484 iexplore.exe 31 PID 2484 wrote to memory of 3056 2484 iexplore.exe 31 PID 2484 wrote to memory of 3056 2484 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f57c7d555fb244bffc153d6eeb1a5c61_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560cac792f1879cdc061669df861e9ec7
SHA16d3726c6bd98b317482d2a94f1774ab80939eb36
SHA256bedbc0ed3500e22f763a63fba7b2a4c08bf38188975a820743fcc325d50a3eea
SHA512db96cd51308cc0c66f1137bc11954cc967157dbf4f21fd31cfa06d6823ee21e2d44d86f4c1ebbbf725ddba6bf05dd891c6548647e9ae2db68c43a1336ae3614d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389be33696b477f849bcd80298c5276b
SHA19e2a38d421d7b25d9491809aeba33f5e660b761c
SHA25630078f46696e4176f789963d27f0724f6b4e0db6261dc3a582dee0858371feda
SHA512e2092ab39cefe235b2a144519b6fe10310c3b5fa0eb4a43050de619886a66a3d7a4523abbc65c664a45a6726547b0f8c34d59235644f34d4d1c587f20dbfa7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c136a927e75a18bb58b2299c637015
SHA13ccb080c274cee34be15e87946465a088740a2f6
SHA256f4ca06205c08dddf74688e06c922d0ad0844f46cd1a9b724e70dacab8f08df56
SHA5125c936ef2071e9733c2210cd431d7687f8a8fad1fb29a7ee36d20c921b71e09267647b5d0a6855e99bc23dec9d35a79a3886898e3257ccc6f17a0acd9abce2986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a50f63982788adfe771843d71003db3
SHA18e8b4f7a75d0344d91d11cd47d07ae807db2b0a1
SHA2563de2e61abc6aa6fd591941d429c8347cd5419515c1a8ceaa55b143d97129c0bf
SHA51285aa173c11090b9c9447c33fdfd5c94debaea80b34163424cf1c3f8ecae702c6fd382ae924df9992196fd81aa104c80e30adb03e8e78f033ad80181e351c720e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ce0dac47608bdaaaa2db93c1d316a1
SHA1d2a480eaa9164833ada94739073d6c11b55b8a2a
SHA256a8c8bbaf9e08cf8b5c5ef29410b168898664a9bc55d8b10910b6a75e314c2ec1
SHA5122d87a7ddf663d4f4b90f45fcfec4c680f972f517daeb786ae74119ccf1789367b5c47a2da1c2eb4b3c4dce9e06f597f3b671e7ab32a0d13fea52fd295ba126d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551cc109891022c35c8c15af5fbbeb15f
SHA167fa848cba8a2e743ff26d7dd835eefa8346793f
SHA2563b148a3e096ea7d78534fa4ff74982e55f58b6875a09171c3077914f63e069d7
SHA51250879e27eec942138f676eb7893b1bce440260c5883483d12be79e31eb45e6cfd56db96f830ee149defad580551ba71fc6b61ee2c0a0ad63e13a4d3620728166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc098b3c6e18bfb82948f483e3d9beb9
SHA1fecbd3656fb61ce94f5bde48cc7c57205552d456
SHA25611d92b3b73228ced05b581c4f4a516119e8e644801dc8174b565736cfce17b18
SHA5128951554b49f321a73149438bf635b994917b5fe0d96c563e085a48a1162be40806efac3632b0fa95a4889a76e9e7b41e9799a2bdd0165210bc69ff5c9b327c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50941749c1deba1a22727c5e3361aa2bc
SHA1527e995b56b59cd7fd1426a1dd95c02b94e46d1d
SHA256a9ea032d9694b50fcd35800bd5b6f21e1e82466d053bcc138fb5326de1e2517b
SHA512ea0c8e7fe4798e8d69bd77cd0411e044b211fb05a67afd5709341e10a5f2a232b0ec79d8630cac89d2cd04196c4056428a99c9606dd952237dbbd382adcaa19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485de4b5ecd3df6f531d8d9044e23132
SHA184fe0e8ee1fd6113af16724df73915d10256fea6
SHA25622930beccd190a02f00d08317382e013a6fbecb1546c9ed640e92a81132d3eb4
SHA512b3f19873d0beb727e0b31e8222ffcb2aa946a27f5cd4e489c8c0f68e830c4f633e9110837d50f19a4ae0600ac8187b34d83c3413e05ec771521ceb2b1a7ed0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57856267c850e08eb61b709454e45e598
SHA11dc655afa8f96d72a56672839bc54e8ce8964d30
SHA2565183d98a3368c0ffa76ab300eec2bbd0215dc02aaff347419f5fc5c10ce6c0d1
SHA512136037f2d1ebea653e2e974a787fb6dadeb3f09359eac692b016804b76116a8d5b74aaa74ad7d94e3f641ca11521e38c6e5e7d0c33a8b2b97702507049736c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b36fa16250c1f4edd6df7c9d89d0afdd
SHA14d0730eac12c9ad6dce310a46e8c395d7e260eca
SHA256aa2f93a143c006670676c2dd77c700e31757f435cca43b01fcd44dfcc6c2bf67
SHA51226bb8d38c82d0f565f30376b3c6e033c874e0787c8959d80a0944bc813f66c1f46f7bc919b35471d2102db7df44b035e8b0ddc809fe20aea39c932b72412b693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587da37cc119ec11b9a569964d4544627
SHA1f8aed38925ac12a0b0d4fea1c2683bf8b4477fc7
SHA25649b73cf9b14f236461b3fea070cb6e56f1fe3cb8468bd5f071602dd4f95b97aa
SHA5126f1f09ae3076198dcc8c5eb7b3532dc3d7883cb553f2d48a27e7890692052046a0c67038de2c966e04385f5596263498e4243080e52825221c58c31d3bf3658a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523535e25a6e3aae42ad8f5d7e7fd410a
SHA141a5092b4ff5fc43e59d10865d8c5ecd48e347e7
SHA256c58f9574b47267fa2d69779cae7be8253932b485c2987f614a7eb33501f0e00a
SHA512ae6aa031f5df1abdaf8d1b6c58e78aed28dbfdab3b81398959713ff4b43d90a441b27d1a68a6591b388154e3656ccada5b8b58ce6f0861a7d643c2cde158cd19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525658be923d42d2c609e8d0974a0a9a5
SHA1b42bef3393490cae6e794f466c91792dbe408785
SHA256ce15927afa441374591e0bd605358c5294eca3fd50f923c0ef36b4a7eb41c310
SHA5124d9aad808950110e9bebc9dab6b1e01a4760cff451d184e0d382d222c187e0bbe233514c2ad68f719538bfcb53259937e0b30753d460c5667961dd5715f65bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e8cee8bd7e16b5214f5d56749fb281
SHA1b61804e91df06d9b70b56125b760c6f257084fdc
SHA256dbb16e4fa3ac0dd1f9c5993f12e0b2cae87ccd1f18fc67aace094056b1657973
SHA5126441a8f5c54e0d487da64abc0105f6baedd07019ca9b33bc160fc2dfdf7f9ad82069b28165251a0b061f0ad7bde4d43ede278a3b9c380ed1d1278e7d642faec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de391610f9791933a8f8df764e2641f3
SHA184c2be3d88cf9f51443bf6cabe2df0c31a6fa5ac
SHA256ac188d116e76d7c67505b0f87c8502153669a2188382a4f01f8afabab55f1c01
SHA5120458518ce506e26b8883363308a92c62d12d14510d33d1182abea8891efdfb7a28d7cc09cd16befc8c03327b891d2838c36aa2c853574bed8cb560c783021b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42173591c949c7864354ccd3ba36c90
SHA1f933d6b7705598ca6516bde38bb6eaad7ea7508a
SHA25660ea4c2533271523a8508c80f85316f52a4c1bc23ca0379f7bb4240e82dbeef8
SHA512a270994a7401f63db2e072554b3c581fa6b8fdd9a8fbb179e5657f9d19c9289d1b8875eaa47f330f73e4e173cd0830aafa4b25e3ae34db0ce8831fd2fff6e024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6b575b53014dd20ecd63175b067008
SHA11b78a30497d993e6952f3d07728758abd037d986
SHA256414180eaf4ab45f2eecfe27c529a7f2fa7337f76f457bff0869fa3b62c7b8b2b
SHA512ba2db2811d125ebf628e374b6e8970cba6cd5ffc0ddc586a651405d6f663a23af3ccd779d9fdbb0d1d649dfdb3462aa401995723d27e6a93e05e5e54e650aefe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b