Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
f5769e97ed4ad1ad5da7da6e62e882ad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5769e97ed4ad1ad5da7da6e62e882ad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5769e97ed4ad1ad5da7da6e62e882ad_JaffaCakes118.html
-
Size
3KB
-
MD5
f5769e97ed4ad1ad5da7da6e62e882ad
-
SHA1
6e3a16553c90f8edd87cb2fa92d4f26b2760ad78
-
SHA256
6d808c59862f12175b0bfc904b17e0e45fcb43695157f14cb39c006f869c0729
-
SHA512
a4413757622763fb6278ffe0d55159e8ab9895165bda5067f68706213bdf078ee7e3e44d608f5a274793f7b254f710bd0ba9c8b12997f5a1d3fc994deb03094d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AEBE3DF1-7B0C-11EF-B4B0-E62D5E492327} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000138e5abeda4ed1c1b621a70e11e548710dc8683eec41dea02603e6b2c5b3e950000000000e80000000020000200000008e69917c7bf10f3e3551930d296e230084e3bd683e18ef89ab945b5d93c9d3d3200000004a73d1cb6c3dea75db7fea0790c527134755a2e06cf35b479f454724361c4135400000009010a4f706a6a526b4ff21cdc56ab84bdd1bb38e0027fd7bbdecc853bf9ba6810b207c1daf91e9167a361ce4414c5a01a6819714069fe9a57f87b554886e7277 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06cbf87190fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433409855" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2912 2148 iexplore.exe 31 PID 2148 wrote to memory of 2912 2148 iexplore.exe 31 PID 2148 wrote to memory of 2912 2148 iexplore.exe 31 PID 2148 wrote to memory of 2912 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5769e97ed4ad1ad5da7da6e62e882ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c683e5b0474656e1f61085acb55af300
SHA160cdc5338bb8613d2bf8568538d36547203bd3e6
SHA2566fffb342eacb9194e5d6b67d5c3e568136db8cd531c7bdd3a138b6b718fa90c9
SHA5126a4cd49154a8e8a2af78acfc129d353a5a6702035ff2e0305cc96191295b33da403632617eeda5d6efb487df1f9f176f18a03b402e6415224d2df292cd144784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78ecbdc4993b713b312414633e6f138
SHA1e1621541a9e527d9534c6834562932d94c51778e
SHA2569d052888f2c50bb44b4ace74bd7c9d1bd968c415fc6ad655d672ec9c406770f5
SHA512bcbe82c972412afc2caa8efa1fa5a71a5e7027bc703ee39910779eb90db600dfa554a6d390c7247cfd88bdc3f559c41ef49b275323c5fcd36b5ace9aa9a1e9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9dcd87eea0398dee5a38ff8e8a3132
SHA1bcc9dcdd00d44cbd959137b87b30e9cb06e0c934
SHA256422efd44a037a0649f011324e0ef28e6dbe00d91e0447e4bacdbb02eeb7fc914
SHA512da0e2b3aa3a417240f558c60d10449301974ef712ba19d0e0e89e0e316284d043841fb52e625f2d34749d1d8c34dbcd3d9b6c431f4c26fb05b5a430c3d8a4a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745f08163a908c3ff2c6a077b6c1ee8c
SHA1a52959d0427dfd1c1d47e5be9446c23bd82336ee
SHA256b5c0e2048fa41a261034687b3628f39003873632c1cc0ef61982f04285f3410f
SHA5125db3d93679f7544764c700a69ce07479f6859d99bad8da10081c8671df4808173ff7cc546e05ee0aa38e4a4021d4c4216d36d0b6311143af36b5321758602593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5866997ad21c35374a7c04232cba3a3
SHA1d93ccf3990ec17868681710202b8d134ded50d98
SHA2560809eafaddef7112d9870be330d6ec85bfeeb7c10682c7f9ff27bda21ad2135f
SHA512f5875ac949732d6a729ab4a38aa54273eb33aa165adabc21a552be4ba41905732ed7e19612e23a86313d458c1268a58fadceedc129e2fcbffe9fe191d62c5e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e752021bd831facd181643e4f01d1e
SHA16ebb92cd4ae6fbdf4e67319814e7f557a7d67bcb
SHA256203f6a1e4599d5e9a956dbf3495e40fe4985a0952fa60df65c7c948f6ad7e547
SHA512fac3886be1f047401806410bee861a1767d5c2e758a8f05575c41b1d47dccd345a64a8d09169cd5ce97d2968b634b8d0203a06d4ccb1a7b55e4cd4afec57b6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bec515e3bcbd4e8e81b350352983462
SHA1fdc7cf3e96e78da9e6d1cfae240822a222cdbfe4
SHA256198278c885cd1a8ee1b7fca35e8ea78591d2e1b36ab12527ac94d7422f4a6a28
SHA5125444fe06677b9ffcb403f8c4ca6fed1bfb354e5a92f8347559b32a705c58739661947102f57a154c250ecb980e9fb496e18b5a9824f48fcab7811e517ad28b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116e68df4fb962996578d29e8516f975
SHA18a245c51e115e511f2613b2070e73f145fe8bd55
SHA256a923e3f4d75a66179d212b8629b3ebac237a1f292c3ca21d86470e4c5c2ec6a5
SHA512b4f7fbf08a8d307517a1458f4bfc767835b0fac3628dd5d579e35f135a601945db7e40a1b27ab433aba69c08e116f862e364830ba5eddca317271d6942f2639a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54326bc25f6c507c2b89bb4322db19248
SHA123a5bf647baa474da0dc67dba53ad67db6193d48
SHA2567ef97c1ec63c8826318c2d0f4c9ff777123a5010180b66251e284d4b5591ad99
SHA512c6fc6082cd17a06ab64079d3862e80dfd48a824851d85a4403a43e5b11d4640044deb3fe0b1a7edb02f9ff5b90ebec3a8e65175c697ae0b04e7d1294d820b8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54183c195b25c8dc79f2e2e7b50910650
SHA1eeced7b74ba5e8e02e30acf4d9e245a380e2b8dc
SHA2566940604ebaf48cc41e4ce037fc7f4f312bb975581db7d2469c11c8893fbd261b
SHA5122f317ea1ff9be646ce4374161935d226fd3d52005e81e1044e0fcbd7d41e9d8b8ad208e68f88846be243f3c4cbc319989acec9eae78230461bcaf5466398912c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23885435a366ff81b4e3f1d8908012e
SHA178dfe230f92c23ba644459bc1f5263384d900640
SHA2562ce514866bbdd7fc0db2b84ec6b565f0d59a9d21a975c51ea9a21f8ebabab88d
SHA512e6c0fba532e6ef52d3426b10e034a22f7969ce12cc7db71b2cdfbcc64e7187286b2161553bcc0c504027de66cf930ed8562ff1e5f560d2a942dbce30a7cfcefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591121c2e69b587d93335e5d133793957
SHA1488c2b9f068175828d010267935bd46b65d446cc
SHA25695f3488277d6931ed6f0ab3d854b13aa3e0736e38d5e0009c21d025603c1f1b5
SHA512a096bcc445d462acacabbbac2082facc889eea5be3e60972fab08a49b493e040d0a400c2e44c453679f3019856b2c90ffd30b5778030442abb5e498a35ec38f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c59c3a0a6f6ca9af5b11b5dfd1c20a
SHA1f6f963e4217fdddadb8e84aaefd3daefcf565676
SHA25618d0dd104260d82e93d0ed6a09b925e01ed1eb629c575307f8201a5727a0b80b
SHA5123697cd84213bb650abf4d48d6199d45c463e43c49a80e10509451b1525d31d1d3671a6b071222419266ed1541e90000afab24ec04dd7bd8b4b49a0531eaf7f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052dce33278b7547e8365c0a60329e03
SHA1c4e828ad04d2883a77736c115687238a4d72d16d
SHA25687f0e9e81b214867514c52e6ce9556b3a3af5d2f1db5d926032212522172ced5
SHA5128fca7dd6dad6eb3ce583025a8ab4227a0c14215d87b69ea3d3a2abcdebe291bb0c1cf6d5fe6684ff464157bd96c6a77eb0eb2d91205916dc693874d3436aec3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a0c211fcacc03c479fe837eb15e57bd
SHA183b2ff7891252fff919de92ab42c91a7ba9441c1
SHA256dcab0fceb976fca1d53cbcd3f337d7cc58f3a9461d1b7eb564004b27b12d6414
SHA512bbd88c22b4749e91dbe0fd7c731b6a0444f4250053098b8e630a1b709396a5b69dea22dbb1d34bd264ebff1cfe9ff4ee9cca090d48e0884deeabec52acb1b2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b996e76dda5d9c906cbf896d8825d90
SHA1f0485c17d60cc8d37ac40b8bba4abd3abc028347
SHA256161e453790683181cfe7c2d9cbf3f04dff90119d31bf945aca9845682433e933
SHA51259fbf1a3581fa2fe583cb16e74ab189c5d297dc05463033c1f7001697d5b0e02e335ceb4fc85eb3fc127240e74619934c6a3917a475d7a1f831eb5c1ba2e801b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb97f0e542717dae5a1325a19e11750
SHA1302314da781dbe07303df4a2b04a8b8575fec026
SHA256b96fdd353ab0714a2650bc1fd0a38151bbca1c1812c5b80185b622c50a75df09
SHA51226ac728065229de5cf3ff10dd708ff022ac7087ebdd6a7e4d970168b9a231d24a09b60f6c7485712486d08b97ab50cb0f6c0ffd9462fd4ad2619dbb3be5af1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511548da8e2698eabf1e76e5b993d8a70
SHA1eb94d498b405ed8f9f65be7c6d40806dfa5e88d0
SHA256b553b888cdf3e8c3c394a261b499d8a06ce0ac64bdaf9a515381d6c1930e90e6
SHA5125ddc5b613f93f64dc77c45ef43627f8f09a4da4de2cbc4a37e4a79a06d3b4d5113a62485f265f9ea3aad35637b6aef6562521e4febcb5185f138c08d5553a140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533cbb7572e6c1593b9c1e56ef1c48f3b
SHA1292b5f614a3b2f39b1b8ba58a496e6f07cec1908
SHA25651477d19b0488903262e5438be0a39570fafc86b320faeaeee2d912c37f7f396
SHA5127df92246738fb6adea352d0e8b1aaa1539efed8965d938e87c887a608563ed859af764602de706d5a6b1a7f5dc03ed8a4da03bc9114dcba9be1c5980281d1d9e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b