Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
f5967b52639bdb7c37fd8406b7a70347_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5967b52639bdb7c37fd8406b7a70347_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5967b52639bdb7c37fd8406b7a70347_JaffaCakes118.html
-
Size
175KB
-
MD5
f5967b52639bdb7c37fd8406b7a70347
-
SHA1
83fa5f10591f8222aeb1034c6d7d9a18b2a54c37
-
SHA256
5269b8e07abe73eb48794317e28919ac4b1d4fbda1b18d4dae77a0be43317a6b
-
SHA512
d7bff0dff16140962f006fe58b62d6531aad510212892e892be6782c295fe9b55def0d1c423747e8f134027b38578bc19dbfa4a5e8955d28ff9c24f3f039879b
-
SSDEEP
3072:SiXVCJPs6bOkSgNETlyEYBZMNj6durZH2FbIu5zWU6fcrDIEMjHj8ZyfkMY+BES9:SOVCJPs6bOkSgNETlyEYBZMNj6durZHR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9066c457240fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4296AD51-7B17-11EF-A2A1-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433414397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000004733c53391b6cfd89f85753d79faf75335b96a83cc90dd66ee1a8edc53ae5571000000000e800000000200002000000082a4709432bd03905889ae1cc5beab6efcdf776e970879fe584968f553d5217720000000b8e13aa46a8ea52bc9e1d77fbe93d1477fe6fdb02ff38dbc3147437993b484c34000000045a353910a2ae05bc4b8ada63d8ede0de97cef41c1a6bf4c4e5978598290ccca82477d469b9fdf2892377730ac710da8e611a9ed932ed6c23bd611b8b26391a0 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2368 2104 iexplore.exe 30 PID 2104 wrote to memory of 2368 2104 iexplore.exe 30 PID 2104 wrote to memory of 2368 2104 iexplore.exe 30 PID 2104 wrote to memory of 2368 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5967b52639bdb7c37fd8406b7a70347_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e51f47031e34b0f1ddc1371aca3c3f9
SHA1ed9fdc208600aeef7100af2191bccc4b7e5a3548
SHA25601d840604e400b0d162900caf5033acf36ea9c2576c38c99f76092d2896bfca7
SHA512b68e9aaef28f23d34464fb1ae877e992c5cff0c384a1c34d18210e188403050b5caf5ab9f1dd2b2a4a73b972532523e0c46a68cb76cefd86270b6e5b65661a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb612b7d816d4a84715b2ddd2cefe09
SHA11f89eeb8db04d2e205cef44951d071edef38b223
SHA25622436cc0623500254a51d7a1db8d538c209c4b18fe8c627c84f73cce609916e2
SHA5123bde501956454fb093f9b0838af1c052b9045d62fcf05042db047f57196735185c74333a45ab0a40c44dea050836bcfb001ce3945ac964c04c30fb163a76136c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa5a847e398c003b9abbb40746c1987
SHA1cc13a6c21039c60c57efc95e93aa945f451323fb
SHA256c801254c4c1c5367163b84ab6808f807739e4d370b27e7f35819a59d29691f7a
SHA512e6e301217169c05f1229d16db013bd93a13fb82f0140ac19cbe3468035e20ae32106c0744c07adfa6317b328f43225108e35a9eb5f435ca05c3d966f0edd352f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18e9e83ba8f974880f05557a3eb3dd6
SHA19b6f8115c2cecc8e4673419b514197b6300351ee
SHA256422382fe590328811de16bc73597fbe82ce8227e5772c99ac5a367b959223dff
SHA5124af2d7865580d5fbb91aa929fa14b05fcaa423e4bc3173bd630f8986d50df73fd040bb10f62b055bb1e8295ad67a9559039b13550db8fa3cbf4fb1eb06569bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712797be9f7ab513b4fc7723126cf632
SHA1a619303f2da4a20fb77a84ca4bbdf0765231c9a5
SHA256b2129501844033a30043d957d5dcd442f91e978ec9bb314fe0a5eafe2f588e24
SHA512d091d5da6b54faff5c8b571478c65473b248b0ba72612513518d6ccf1f6d1e3a39e910527cb12a3ecf621f511cb4556d809212d6362cdd9057ac31b962966175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5e51baab21e38e2792268b672b7893
SHA1adefda975b42232507159d68271516dd206c75f6
SHA25656a0ff56b9aae43f9a48d2d4f0cb4711f12421dece04775dc7f6a4b868ad386f
SHA51256ed77fe5cbc13cf475cce8e60bf7a9de9335a779364acda3eb8ffe3cb7fd6e5252a3f8a59ccdc1582d8a3dee3d112ffe116387c51f025b2a09a62b43265ca10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf8ec0761693da34ceadb001c698e426
SHA1e4592c9200db6a99015d35d5a999416b8b0b2540
SHA256a7ace4b2209d60d6fbc55d5294c3682f38ac2a719b9e4e87103a5334d5df4e1e
SHA512a0c3f1a52c2c701a6ac8b96b4dadf95cb24db6b33014768bf73cc959d94b0f281bd9a1ce1438b0f702c4de305da9c2ab6a1671de14271e4b86a095eb71a3dc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de9d46f451b5c8140a195bbf192ae44
SHA184af8c648ca1618f48a92460b6128dc50df09673
SHA2566f160cbfe26539582bd000390a963053ab118d8f5917aee4524b0f5700598f85
SHA51216a6de819d39a9d1a194dcd2aec31763567ea4b0d57b8bf32594fbfde86240470b7b7856c1e2a6343a6362e56d1a1fa9495224eee653502bfa2fb8cac0f1df97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c884f1f5e15ce697629bb302a3b6cc8f
SHA19b0e11cc428aee79b30d35f8992d15e3fd45122c
SHA2562be55d93b048d9f0e79be7774dbfe810e75c0d6b255f9450d03e97959c2a9236
SHA512c52aae94979772ad057806ebe9c9b712934e5bac29f4015a534533ac309c08f40512b364063ae495dd462973c25e9c7ce665a6b5abc3ad6369ba49a7ea714bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0242c898ff778c76379cd1025f31dc
SHA10c103d7d98b1090d35a863fda0779f70fe26f836
SHA2569bcbf1dc30ae8990d073b0e9c01c3ccd38591d98a9603776670e278d68e6391e
SHA51281a896d49eee1aca721379f0aaea1303d3ae2a0ccb264a8905a488cf49acc590f3a5edc361c94ba61a947a46eca0609012a9d726f7be8f8d2c2abee2aa93fa93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf0df9de9279affcc8f992bf01063b3
SHA148fc6cad09acc08578c4fcf8c037b5678b6b0abc
SHA2561e9075afc00db2a69b1689dd4e8969db3b5c91e402f8d770453636da1fdc8e90
SHA512f54095e3760666a4ffbbfbd8aa924675335ac889d1a55fa685d1d6da30a125438e316cfed09981976ce27369c8d4ee80cd7bdaf1408d899eec8a23a319f99942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146cf1bf5742c36932f795b79d42fed2
SHA1cd6beb2b7da43ef07423cc3761b6e5a4a0e20627
SHA2564ef7bd6c88c502d380db4fc1327ffe294c122a0c590bcf741c60a8769f04b8d4
SHA512fd92f2aa91ab851c905f1a38b55b3df74d766f939e37701f5fbd6a053df11cea6fef4ebbdfb277ed277e4cef9b14bb8932367fef3e8326e2e57658ffbf9a8148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca42e1ef14767b04dda7b59295440a5b
SHA1b9635ccf8597f669ed0782c58ea92005bc6f921a
SHA256d3b2fd2d05c061020053601d312661f8640b0e180228f182fa3a0ced98fee1f6
SHA51217ffe179814f7c657066f67415b614926646bcdc905b776adcc73334380eeb4af19fa0a464919d2509e3d21e6b7076dab9dda3fdc5ed8459e37358aed4df01e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae9d69ed64c9aa8b85bb242936f8a05f
SHA128d4b225efc136b97a16587eec6e3c52e2c04746
SHA2564351e0f0ddd209c1cfc22a934fc5b2d04aee3a5d5619e216e8f4d8e3fb5bbe1b
SHA512a89a3c53d9697ff54e6c0b3203d6ef71db0411a85368b742ff87b1f4a654f59e5ae5163d84d5ab5dfdfdd1665d39e54d64ab77a7f140d6ad514985777e9f94c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc2db3cf89729143483389cb5cbcab6
SHA13b8b72b548daa95b405ed5a0dbc41b8357fcc2d0
SHA256a05bde76cbf7e8ece9c13b11c5454acb5e1b09243d18b42854a6a6176fed5554
SHA51288c700a4e87764b887385b9b8f3567b51cdff613dd283fefd2fe13d7407600139d4bda8dca9efc8f3a90a37d6a51f48724bbfd8c1e8e5e0d95f9c0e1066f3d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc49e794441e64d9678ae2b37a57aacb
SHA1f9c2887ab3ab7dc9dbcb672fd95fc9b791e99048
SHA25653292f3c3f2cdf559649e5d052e0663bdd3542e25d3215bbdc25f9c3db14d932
SHA512b1620574317e646145c26c73cd0ac4e499fbb459df8a2fc3d78f42f064d71619cf1a9d2a73322b559a383969b0ffb6e5c66c0f8c0ece6fd3e821d3f8d256be44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590766ba08bba94a7261db980414624dd
SHA1df427778339fb785bd662221a54b1c35b148eeb8
SHA256b1203f252139c35551f53f7ed9c5327661761e7427d082d93497c84b7dd73d54
SHA512a1165fbdcaee279715787f871c57caefb6035748a4283b59e19603f8b6c19f53de5eae7f65a73d3e1b88702c84e0801fd42d7bedaaa1359868c53533eda7e17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992ece6bfb2953e7fc436a7522bdeea4
SHA1d0450387adca298bfc61835f024e45fd70b69128
SHA2562f43a5647564d733137cd8cd5fd3398a33422997cf93663d1aaf60fefa5ba44d
SHA512b0569176d9c676b590224cbfe18191a18bc1ce71c2e0bb7c434bf1f255c394b5e74424fddfac7722681f72b0034cb9e7304465ad916f2d6bc5338b6b197f2a5c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b