Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 07:43
Static task
static1
Behavioral task
behavioral1
Sample
f585a0bdd62bf36436f135004740051b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f585a0bdd62bf36436f135004740051b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f585a0bdd62bf36436f135004740051b_JaffaCakes118.html
-
Size
9KB
-
MD5
f585a0bdd62bf36436f135004740051b
-
SHA1
e6e685c6fd812dab9023cee08bfb44bc29e1f6a0
-
SHA256
17507e861bb2340feb7aa6f98d7ef342eb29c78c11fbf312dc5499b8dd8eeb50
-
SHA512
45e402463b51f29a85e6733c22a6b907121075bccd9aa293e91997ef90376545d4a11d0dfdb0fab4ad1e1a920f15465149793c66ad0f09c4d0b9184ef3ba15f3
-
SSDEEP
192:YBgZ3Iw4yGxfF4bWEfwsa6TUjHiYttYaYHz:PJVbWJXt+T
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600be7ac1e0fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b87d38fca3c3d21e8757a49f0381d4046054412a5ac3f5f72a659a0491856c87000000000e80000000020000200000009eac5ef6f80d3ca8322f86c8ab5ea35ae18bbf24b94d5ca3a0f7239ff81170d620000000d6d846c67df0e17ff9aa8c21711811b1952bf1d0944f0661a0777f23df281892400000000386b5d3801407825cf04fa24a4b7fed5b2e2dd2d2974c418da561560a4408367324f79585cb68c66709d70b3d3cf95ddf4db589ca8edda85e563c76c01025ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433412068" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6613CE1-7B11-11EF-B38B-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2540 3000 iexplore.exe 30 PID 3000 wrote to memory of 2540 3000 iexplore.exe 30 PID 3000 wrote to memory of 2540 3000 iexplore.exe 30 PID 3000 wrote to memory of 2540 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f585a0bdd62bf36436f135004740051b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592050a48eb8645467aeb04ab9b325c37
SHA157acbae261eef6ab0b4ef20770c18e8c04bd19bf
SHA2561a557f39465bf206f9d5e44bd87619291e20a178a60e2d1528299f99d9b5ad2f
SHA5127bb04c6449e47080628feb557615d6c3ad8e0013131a053e1591c63964ccbd2d99619501d29f6df1d181279b904cca2284a7a0d4ffc9899610a09e42f011eca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9cae1ded48c447fd99fa5836c8b0c32
SHA1b8bcfa1ac72b928eef6bf4d5f68fa4586bd1f352
SHA2563d7162107eacf93d2eddac5ba0d47890a8529abf7c007d7d52c335942b6b3a96
SHA512b90de8fefb5f17f33225c687d0c84a5d4887efbd4ad5f70b22c67472ac280ccedcd73acc11fd2fbfaf24e2a8a5d22e9ad4f6f7be59e01bac863eef7240b2c569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dcf5ba1bb81a027153e9c6f9a45044d
SHA1185229c1f0644a640927730d27737bf5ef076f40
SHA2568580b9e39c2eced83a2ae68662273dd31fc2af90ac8ea4445e18015eb6a0e542
SHA5121cc660108ca8cdd334ae5ced0d648b1feff1c439c90deaddcdfd015b50dada40e5d0e819a8dd943c16babf3a80a2c924202eb9f631066210b2a49e9985c33661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d607162180b1f41961d9b524ad975a37
SHA1dd3ff4fafd880756c437c5323cc08b14c0337012
SHA2563dc98a2b9cfe113ac1c5883d01adc605d9c5fc2c4950114eeeebef281314ccfa
SHA5128a8ac6336f88bffea6470725ef96dabd43d3eea398abb5d1996b5c947102423165596df08b0236375f74d48c0baad4e4e1d638ff96e7f6d84198f8c9adb0b678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc075bcff8c91d1c168363d0d5c0b0e
SHA1fb4d453e10f66f4462748e79da4888a30f4f80e6
SHA2568830ebe3e0645a7aa068e15bfe37f3c0b3299535a058608c2a7542008c8254c5
SHA512ed94c9c977b3bf0fa91f2a266a804876f0574087b2cb1eb16c8ed612bb1ed2aae59a0833a43dc2293f6e4dd94490465577cba95b358212756f449501f85556ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b13e067cb16f4e9154c2b7027412b3
SHA1b7b818b41a33cfe6ec7ce8611ca38bc6e100582a
SHA256eb46fde331d4c0ab6f40d39b12486451c7321109aac892a10949b554bf319882
SHA512e767a6dc340fe09a69e1eb3c653b5fa754b561e737ec102c55d51ea12ac80a66fe10fa313dbae633c032556e75b19e61abf70cc218bffc167c57d4247178a730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9852a5b619a3c4c72040346a07de280
SHA179274aad0922ac3aff8f1d26a4b249033f6013e9
SHA256987dc30c3360146f18987779d50af0a67c064db0afc44cc858cc6f725a42496a
SHA512a3b2ba60df44a250c25b178c62dc9de43aaa5ac3aadef2adfbaf323818a200b8d69e01806d08d0f2439a0c55bb96367def8e06d92e00f382c8823d35f33ebf6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586cff29c1a85d885d79ce6369eabfa4b
SHA1fc91a7deb8f6daa9e02114384155eb275d3554b2
SHA25609fed273719160ca2ce40b81094361bdf976c5ad82761b988d489ddf97425142
SHA512763154af274ac4c02995d77130f951aa1a685928411eacf10ea114fd14e1cfa53198b95921d837525a6302b74a1ded90d93974f164dba8273c31c67ac5fced61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd1d8757cd3942b40ea027079fd0cc3
SHA1df18dc6b1fbe43aecb3daccece52bd789f4ae897
SHA256f12f4057c51e4ce6f700e635f8cb13e3635a8711a0a5f279e8623c761e15bd57
SHA5125200ebe10ea8973833180726463a1f090a7a4ffa760b65034ef4e820580cd122823550c16c60d31ed231bdb613db743109dfa7c40ebeecce607695c742db3f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55554690bb7564cfcf6607c96d4e0dd04
SHA173dc4f40b0fecd6884aa6d6b82c821e760b69cf3
SHA256ad47ec88b5b9231cd5b5829c8c937a9f72624f86f82781bc73448d25ee2c18f7
SHA512c75f414fc212eb4954fa3ef127308e059262b37cb24ad8638f066985849068f4e6cc2073ce3019f07353583a468817d6a930af1f7dced68e97d6980b7355d69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ba758ea2671b89531ff2fb7cd2e462
SHA157467d45f7b3cd66e4aa4c8f03c387135062f4b2
SHA25621db1a16e80febebf09e4136fd1a884c3c9b1cbca58ae89bdce0da45276ed696
SHA512f9ae3e4397114e3a2960b9b40feb3184171aac5d025461c940273fb68f859ca8f9b515bf8534c9a4846f07124ee831ea0818c1766ee2ce4e6ef61facc3943d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b2ec851db920abd68606611ddbf0e7
SHA17b63805ab9e76cb0081a70d3330aa9264c6d65a6
SHA25624266f7a651dfdfdfc56641092101532d0bc312e2d2c909f016cb310b8eecc27
SHA512f36f2bdc682c91770e80f137e03156c55d4f659bde3464b466258ac8c423986302839fcc8352b655a2603a6be52719e760c095a20fe7890c288f57fe45eeeda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddcd920ac9a237e908550bbb3e661972
SHA11c93bc56ab4afc63e6994ada37f980da2c18a349
SHA256bab5a6c764262f2c8647b9c329cf8c71bab7e1f601b935c217362a108716bb17
SHA512e6d0cb79d0bac45f52dd469b918677fa40a605d11e0a97f8ae7dce518d2abac9d66d8d9cdf6bb8785b7e3f7f63dbc7ed9bdb037e6066bb9b70249263907f7058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a54a5a55b6a08cff38eeea29c0191e2
SHA11f3999bbc8d9b846707a45d018efb2a2ddfa84a4
SHA256e2e0b621cf1413f878a155c0f3dd11e19e839ca1adfe86d3481c52899d48943d
SHA51262b2fe1dd15494d5463ee2a476b5be20069274761999a60bce2cc2c0a4c41282bb69198b753b849b8075f746737465937a8910f219029e769163fde05093781b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5533f9c360945aae9c3c3510df410c534
SHA16753b3e49759c16098a2044cd0f1d8017eca7ee8
SHA256bb58119d9bf675a5b715ace50cb89d6e8fdc301a9795e5a7faa3b95cba5ad16e
SHA51241aa1a9c131f2fee176abc98491660eb8940f6acf9f9bc283d259c412ed903eb07b3a12bd768a2d804534032113455ec7635cb5923188842acfac07bd7db3b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ec0f05a36bdda22c4490641e4bd138
SHA12b20f41b5a118b0ae3f950c06356f3a488f4a0f0
SHA256f9398af6045b43d537a3d7a80aa7899769884267a022dfe39604d824a69e35ee
SHA512d0b539e9d823683c5530a373db180f0cd2ec6baaceb14ee0c88a4212e54b6eac5cd922f94fa1e17fe799497f338ba6b7de7a14344acc47cda7e128fc08e4c6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593641bd10d886c2cd1ed74784b1a38dd
SHA1f59b3743ea86f89502373c6bf3eff50a118357e5
SHA256865025e527ac26ad162aa64aaad96356da690bc72353c477911d66427369c291
SHA512e1b5fb70e6ce8b1b7aa31a2e71e67ca5084a77464b5f93059603d9b695129f2cff772699c5ec9cf301aadecce4cbda235bed1ae09108d2e970a016592212e066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313e69defb185ec6bae8f162147f1eb0
SHA144cf879ea91686346e42afae7d56a7d9236a3b2b
SHA256e5e37a26a1d35fa5eef9b486313a7685b47f310ac1b6132dc3da165cb93dd4bc
SHA5129db41000155cfb5509ab7e7eb0e1583b22172834142342e30f5aec174897d225493338dc237e90f17cdfa6b4b9d0027a242373386ce05a01befdb8a513c8c14f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b