Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
f581b9e6277255035b09c77f39f7e60a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f581b9e6277255035b09c77f39f7e60a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f581b9e6277255035b09c77f39f7e60a_JaffaCakes118.html
-
Size
2KB
-
MD5
f581b9e6277255035b09c77f39f7e60a
-
SHA1
6bf22f149aa7fcb2db36f71f4cfa38034ca089e5
-
SHA256
44803b116e17c023d5498116813df536edf491c719de2198ca6c3e3350aebec0
-
SHA512
8a6ca83d91836a48ebf7f9b74270f9ba13f322704f6d9bf092d5c2c201de83374114a35aee976066f0eef483d02b19b71852391b5c11ca34229c9393b5de25b5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433411522" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000b1e233a81f51359567ab1a5bf2a9c96774e4ba8ff415718adc8dd452578da404000000000e8000000002000020000000bf7520f6349d61a7cc83ee501709f20e529ad76b70fdf1fb6884f66880245e0f20000000adede7d2dd78d31ff6145fe375e418a16875a986dea9e1d0258ee2604b6255bd400000004fe230aa36306a27f825803b1de76855b309380c8de70c1d328bd15c5a167c0f96381df06d0f72980790b98d757958ee37a8b4c7fc6931a327ddb3de4cb66616 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e62b671d0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90EE9231-7B10-11EF-9204-FE6EB537C9A6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2004 2340 iexplore.exe 31 PID 2340 wrote to memory of 2004 2340 iexplore.exe 31 PID 2340 wrote to memory of 2004 2340 iexplore.exe 31 PID 2340 wrote to memory of 2004 2340 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f581b9e6277255035b09c77f39f7e60a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517705b014c6545bb6b72a141e55ad53d
SHA137cb0ec850267d79d7e5de90b65b6c0cb11cef25
SHA2560128978beae0924712ec8282a2315a489301009c866ddaa0a0d7cb7f55832ca3
SHA5127c9ef10544f202b8fb4ec884f1de1f912340f348057ee3c092f69f7e309883b71d71755c4b20d48a8daf7f224167efae648e06be6ff9961cb78ee3ef77a62cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c429cb3639aced8b17fc86d40b32238
SHA12da5cde371fe15ac2e7959893e63197e9dc278f8
SHA25651f86a61b1080a2438a98383ba261000adcee17a059467e1ffc7858dcc98c0b4
SHA512709411806378827991ff322ab1ad76e254af0336db499a7dde6c20db364524352a33728df683fc8c1beb23c1d81b0075e17d78261b7d130212b90aa7e4f9e70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4b1bc43ee129a56bec56b8f2dee129
SHA1705f4e19e5d06d1b393d1a31c1f0c375d3796af8
SHA25613dd495fb43b642d86d8195f3b7ac9f8b838764c1db6ee9b3b9bc6204d850337
SHA512e0eed40ff6d8c704cf11ff4f216c85373a2f54849e86ec8463960e7cd0d3ace43ada5bf9ba78d6d6337e09bf1a11d40bc0fc92620fc76bff7e664fbd8582a2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd593fe4be92500bd3900a131b612682
SHA13ccbcfdfa2a86c5f2010c3f5a7d2c31c8bc93875
SHA2569029d067942e88ea02a0be93fb9e9b386d1f5cc3912e8e88a16efaf2f10eb69c
SHA5129b1ef8a9e20d46794525a91fd0536d17040353a843968a49eb072678b89135e7e2008b9bb90f616abdd3de517b55aa961da1936854ad0fd118b0bf0d3187c7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966539946d8105458f39e311c030ae71
SHA1e5d0125d2cff517ff75143680353603bf94fcf92
SHA256bf6e44be7a84cd63516c6786ede28da4edf316e4dd85d7bd959d651a32d9cf35
SHA5121cfc914037f2832148b91f9fdad3c94c5b7c5a08a40372caa4797fef248b410d1617aa0df0a3ae0ac580f63faa2d1e600e1ac0453913daf9a9e0da6f80701e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b92e68678b066c1896074e9a243fa75e
SHA13edc648fdc109c04463f99bb2bd9bfe68f41c6ac
SHA2566270947a50fc5b96e6de2766303a475804693a515d578822c9f59c4f704c559b
SHA5125640317b98dd0fd1de9bf407dc4e110f00a4aa07d663e87be0064541cc35760998cd37e1e57f7a7d0f91410a281e276fb4b6ec3f7adfcab339cb99bcb5663eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59657795fd2d70e746701a1e0e6cfb0a5
SHA16e1884712e36f53b5519c49659100b55de3a0fc3
SHA25698d08be9249016646dc0e9ac56886cbe544cdff82c39a7fa3854fd3dc07098e9
SHA5125fcf024b594c2d530301057d97fdae405729ad3d811eda4d30c72902e4f7a351dfcac168584297c844c2f579676de57a3e5d16126ffb427cecb17533f6154fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1454b2a98ab808d6c1f5e357bb485b
SHA1ce4ab5038b2d9896d9186172f09353a85ab8d724
SHA256321ff4cbf79f38ebb65606e845c502e6491f544a204261e2fb4e6e4d2a3c268a
SHA5123248be322e88f0cf9652aea2b7a467e79a7df3a8770486b6393324cdb9087e232862cdff2e040ecdd985fe7339ebdcea81bd05aff172a46aec9e09d14eda91f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508fbe2059e5cf044975e22243a3b1f17
SHA1bff901d5667b7bac7678861da0d2fcc06acdb9c3
SHA25643c9a0967e8fbe69b5cbf9f505fe3bb03b96d88178e316a4d53814864708e54c
SHA512ad3423f2af018bddb84ca51b059ec4fba67e2c30996c3abc9a9fd83ee22f2cdbcc1cbbc94bd07be97d066443f40b2ec06e08057c325c85876ffd6b0a0315c303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6e8aea1b61b97fb0e130b2e6ed67b3
SHA10c013ab2a26570796ed54e15eae6767cfc3d0fa5
SHA256fc04ad2389b64d1e580cacfe8e6c890a3eb210b7f64ff998a32c449ecd35fb4c
SHA512292d21607feb476fd74516ad5d20cbac90ec0caec82e851ba38a932a50905c42e137d8bc1eeaf655b2edf047dfdbfd792a13461fc6aa0755099d1bf7eb57b9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334824866c68cd9fd8cc39c343b5ea03
SHA121078b143026115b8df814143b5e42540b6b0a81
SHA256e1370fc52f64ca0de17064aae5fee4ae6a554f7343315ad4a9605c60b6a0b92c
SHA512f646b009ba38b2ca3624d2c1dc7e14d4645c9c39ebdaac6cd2e0afddacf08a7378c68bd4c885cc8942d065936474ee822ac2d500ab2971498bdaa6aed05d0866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1caea8f8424fcd31705886fdfefb9ef
SHA15ed3b6b671399aedaa333547d9ccfa3e0ca99b94
SHA256bf9e1677ef9efe6f5528a1f12783f3d3994f37415724046b4058512a6eac6b18
SHA51243f42c2549f25b741389ac3297964a184e67db5ebffe4aaf30fcafa6d96da340232ce1f534822284ac58a7c43e82e159b7e661f5acbbe2d552f435d4a2f44ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a5611dffe91865572c50179f89bf58
SHA103910ad2e47d6bdf16829d11ae8ef1de62539e3c
SHA2564c8c487f541441f577382c1506ec6cf28ca4a5dea194abe6f372c2cd5abcb74e
SHA5120827a9982121b287328a001f404e435a2ce5e9b8ba74db84c262a4319362d16ad00fbc55696521d670deb533087f50b95bf96907b9d40bc1be336081555b4efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7543d28c15b40e213be578c38127705
SHA154a550625620ad0ac9a9479f78ed186722d8f419
SHA25635c0f82436887e29e87e88509005fb2a1b1401fc9bb5e719a5fd010beb62c694
SHA512e92dac451d35dc1b29ebc122d82ca6c5ec1e39927707dd99dbb3f2d985450392a9b076d4df8a621a2cdbb16171527acc5f88a12802eaa7235fe146ea902bc0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57689146e19c7cf1ee206d4e447e93921
SHA15ab940f65c6e6f7bd87cfc81e90393580aea32c5
SHA256e3542b12248a53bd847fe15a14847aad443420b64fb343b798e54fb2f58cda47
SHA51222e778c66c56bb29fe5c05274b8a933397bfddffd9172cf8089e3de789dbe6263788b31a1a49c0eaf4edda710ccf799ecd96f5b14932ad3869b938a6f279847a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d3fb4f07ba61df6d080264d211da534
SHA17e6046e3ad9dcf3aeae7faa20815de790242bbaf
SHA25603a3e3e6e2113e2df5d65e1bea282a5b363218676d83a7ffd04261c52ef36b63
SHA5123e436c38aaea9846215ddd34ef13ad00e9511788140726c8f47924180b753e683bc6c9903f1afd6be1a9a4698bc3bd3a07c72558a3999a378e57362c4f4d6673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9b107b54de9443624a3699442bef77
SHA1ac9961cda23867b0fa7248372f063be163d06612
SHA256aa91c07c786a477254e7c9a959803ec0e735b4bf18a159b10048f7982d3795dd
SHA512af386a157161033ea8b87f5017d4b6cea418e44478d1fee69a428e48e8ed0e90e1d0e96864cfc83ac7870db3c602e1e2e2fd97902c5097fb261f98638ded2b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560f0aee467c167d13602ee59d9007b0c
SHA15dc3dbd923b6481d84ac116ba3d214191e6c6938
SHA256105c0f0feb24e3adc9308a2d4103678e1a95529e9fd862ffbffa148a958ad11a
SHA51267acb19339a992e1947c048b2275115abea7f39189b0cc54da9da5d068ac99e2966d541c283f4b478cc4b71860957392200e2b8ad12b4c7f8e48fe1d7ed0da7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dc417625babd8b54b180398b1a63b35
SHA1fbaea50cc88aae427f433722e84cdb6c36e36282
SHA256311f6be90d05992e601086d74c1828995f96e4743f64f7df2c3d87ea91cbfc64
SHA512586f07e293acb52ea7e20c6bbbdcbc502bbfe272d3d4b7b4687af9e4418c6d7c6f67f16d35aa9631c97861751ab8546f756d761553eabccde44cbc5f7bc88c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e50eb2f76f03a355a5059a5e5fa264
SHA137c5999d2b56dfd57e681092f3ab5114f638617f
SHA256376a808bf19d15a89ef03031296ce24f87acd00acb46709d844403ede8ea5430
SHA51248707bbf71fe5f586bdefd0bb4bd6245c4b7bfc2d89f13f360d3f50defdadace7118bfad8adb9e1ced99a262f0768987397137f09ef33aa62cb8586490f507eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20411b4b607c71138ae261106a1a788
SHA13a3bb54b064538c4d6c99697517b5c4a7ef32cfb
SHA2562e67e11726251107bc891e3e3509f77006f93360181398cec7e04b0050e03a88
SHA512c72ef822deec50212bce4c48bf49c431612eb4e3d8597b55aa39448e726b17895ff6ac7bffd8d09e1d5fc890f15d025d20a69811be005ffa681a539c2eab609f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b