Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
f585ada50e1152dede39e56115ac427a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f585ada50e1152dede39e56115ac427a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f585ada50e1152dede39e56115ac427a_JaffaCakes118.html
-
Size
495B
-
MD5
f585ada50e1152dede39e56115ac427a
-
SHA1
9ad796dc48d111120b03a4c5cb68fb778f252197
-
SHA256
88a2574636bcd2d000400495ca3f9f45d45d6ae86e0c55bde778953273070433
-
SHA512
b110b2105647b723a4f28135bd44c7af5cf76b0a0323daf1dc7e67d977b25d94bfc026c8ebdda331cb27c58f15d698f2fa48dc4c51fd3d2ab287eb6fd55128c7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000044406f5e844d3ba86644f088672d827a8cf995802e106b8fb068246e3843cf95000000000e80000000020000200000006a7de455cc2508cc55d9fd26fb9e109ee66000657a0e1d746a72c80770d73236200000004914a6f72661257f16698a6d23adae102ffd1faf430754ee0c997a444a907e9240000000625db4d2cb3cfd632008488fad6c6f3f2337eacb6f2233acae7754593d632aefa19032d21c32326c54566207e7f14f6c449297418f77334ea1b524f6f8b51382 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08d03b01e0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB20D061-7B11-11EF-9319-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433412078" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2808 2992 iexplore.exe 30 PID 2992 wrote to memory of 2808 2992 iexplore.exe 30 PID 2992 wrote to memory of 2808 2992 iexplore.exe 30 PID 2992 wrote to memory of 2808 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f585ada50e1152dede39e56115ac427a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b836944453081d5967ec03d2a0ebc00
SHA1217f246060ffebae72c206a3ee07660a21eed0bc
SHA256d3d1a800fa636797e4d039bce1aabd7378de11e5233f1d6607a2e3d992aeb9c0
SHA51257744a225feb614ec36d06b1e00ecb2133fba0ce1b2e17c845694efccae0573878b44707ec7b079cd5cac1b6502defddbdc475ae4173b8b74296ca294ef1f7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae9a813720c485a18accea1eed55d34
SHA1c17bbcb375d6a589b40bb1bca0db95ee6dd478bb
SHA25618bd737bb73964b42385d76b2f7f4afaef686917122cfc532d93911240a6aab0
SHA5125e4f97081ac76f79450fa71bf5534667719a185f9187b99477c687a2689f8850126b92cd95ba5e81e1657bce776a10de5b7b0e3c0cadd54eae1dc3226f4dfe1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde5ad74e1bd989744105ff34eaf6152
SHA11a88eb0b76c3add45e2e5e644e9f1492e596f0e9
SHA25606e31108c975544d0dca41638949ccec41405c7901b5b9df3bb732abf9083549
SHA512bdb57e7378fe43dd2282bbe50c3af5079ede3dbd48aac1edb3708deca10229d211e3c2b034ec3cd82ff35cce804a650b9dc97c9046a52e001f6e958a7c25ac34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0eb948980e7a020859b5bbb345f471
SHA1a91943e9e3b2b9f87c7c7fb239d91ddc86ff4ed6
SHA2562b20844cb178ca77c8edd8d949111cf528de2f1ae0f0c766757838a0d95dcd00
SHA512471da7ee610f12eb5f9ead7a064dc7b8f68d023c8ed35adc5cd404c6c075762aeadf06b6dc063ee18d11258b8d900e623d036d31fa859511c7820fa5ed5a36b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d393d96f348102281d01f0a0baffcd1
SHA18db63a14a4e4d4e0a5a98377ee36ca490430a423
SHA256c86294ff6cecb63d48b9281f4171976bdc9211634af888022b254f537b2c728a
SHA512be0d603ab0b4ed07856dbe98ae339a033e63c74bb3b442ba61c819b269ec5c186bbb4361b2f90804be23d373c658379d193d039b7672072891c234b700817466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527bc83d69a8f8dac1163f7cda486cc25
SHA19096c49f4281fb76ed65d0cfa2a8e8d26bece632
SHA256db4b1b471aa6440618a4cd5eeb43e635b2161b63717dac1d3a9ff1943a2f4be3
SHA5122499aefb7c3167374951352620e435911861777016f494e4448438c7701d3d5bc634465e0ca488774209870bcba1c44b9dbf950ace42668fe00d22f83c25dd06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980bdcc801a13461923507c3a5edc379
SHA15b45e77ba04ddff15d3ba2051baff18ce6d8fb0d
SHA256473691ef6e70104d32e9f5c1027ede4673290501c0b9adc89a333bf8f272d10e
SHA512d6fdd2fabb9404ffb1b540370a3b7050518fd55c9cbf1de92b3751e0dfed30760418b6398bc598f92dc37fe8902c41d68c9dd0cc9a7b693e00370bc317fd5b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff5a6074ce9a83bb4378eba303c0852
SHA167df1043e8ba397345dbd7655607fb17364b03ea
SHA2566b9ed8210bca790dac84641d385dc39ff6ad45448bc5f33bc3895326b859537f
SHA512bcf38e11502aa67227e551c504d67ea19b891291e080191233a66d6e16526cdc45b5b92dc3d8aeb6fa5d2b9aff19d6cbc16489b1ce549daa5e3d7243a8f96774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8b27588a0533a2016b178c15c74b5d
SHA1b1708a0482a6fb761146768a448c4c16277a2795
SHA25689ebd54597fbc95ec9b5e6d8ad23d424281d67d91a620d12408291a700f201d8
SHA51223977240adf2e5533faf0536143d554ff015819d26f5a1acc3bb8fb6f3272c62561c9d31a4a9a7ba61e767cc563ef8c7d256be723753307d823d88e8fc4133c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d75d3137ee313f1fc744a304149e800
SHA124484ba9b14729ab076f8ff13c614049ea3ef1d3
SHA25655e71722ff1a6cf82b86543c93b3c10e421e7d96d4bf5577b04ee00da8029c54
SHA512c3ca027cf49a72ad9605c0fd3aa70bcab2535e6f7d70954e8b6e5425549eb2ab031ebaf3a5f328a6d41dd5bb34b887fcc9566ee14254fd471a59e104847baa81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9eae46bfbf068b22bbb23e67b370aa
SHA1b16f99ffe046f6e738a9a27083997e15c2960829
SHA2568aae5a424ee13108fc6828f5417aa94683d16f4383e1661698b0770daf3733b5
SHA512d8055d77189d8937f690df4b38b217af501feb1a75124446c407e33e73d0fe468e323438b189cd98ce7103e8e4c94cae35a0f3ace488b285a38c8695a51b15a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d685480e9d94e5b14097f370196906d
SHA1a1020cb4d33e648065fac34b4fc1ec02da73a9d0
SHA2560685deb347cba5a8f2be008f365f46df9f8359178e74346c4badb1e77f523ec5
SHA5129c4f66c7a3d95d188adedcc39c369872db0f503cfc7b4b3f8c297ccea35e058ade5c17520f323c4c003b1c288b114b2b2909c20dd033a18fd4b49fae9c5d8a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52593392a530f6defe0c2de54b475aa16
SHA1657eae4dc5cc2e321a81525bcb81ed29871adba1
SHA2564e2c08fbaea4434c968a065c73bdd5f40740cbe27efa0a8bc0692993f3af1717
SHA51268acde166d8b1ce26d19a7b470dfb0c8bbbb5db48992a867a0876a60408a61764e5e73459abeb3f42dca0d6256cc271634612e3f465ab698e3d417b7cb48fe63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6c920b9d4e0b0a0859dca9fb2c4e78
SHA1b0d7c421e6c6eaaba521ea518aeb5fc372900a81
SHA256e89aee43d1d3aa2075d158e91569d66b0719fc89b16ed54ee084c16fd9294f23
SHA51201c9dcbe0545c85754d23b7461e53fad743c1dde8d039088c73c77ab9d6a9973f0f6084a20962a04f9f206480405cca1cee7121f4a30630eee9786a5caab2bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7df84c6c5f1e0fe8189fc05764e3c7
SHA17d3cf12f603f3d96a2001014d5e598b996bd0ae5
SHA256dc3cf2926787f7b0b476501c1138d92fd6370996dfdbf733b112d5324401a7dc
SHA5128f7994abe4c032192339229ff56a0e713a905de8977a52315db9c21e144390ec94af866998a71edb2c97e4b469bb1f2d00c13812c4903c978987921d9f170cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5894f65eea597b51f8ca557d74a16820a
SHA1cc6422d2aece15fe9006ef642622f825301e747c
SHA256cc642cfd9373bbfb8e03d4991e500cb123c6a92c3573829a838d4c95acf9f828
SHA512649b01e8a106d989ec41be9d274b34faede477c3d18eb907ce011fb3ba0e4053196659ef8ad093de0cb802e460b3a3db47526f95b837e061b0a75269db8cdd5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a498b4c34ca3a7c96cfdff51ac20c4ca
SHA1fe5912a450f579aacae2027585b3b91b46792773
SHA2569a4667b739fd6ff2bac63b3d291c712196c79b5459d3d49d626b5dd381017435
SHA512decc0c6f9c5847114ba3f21c0c2d8cb8e9cf3df937c8a208ceec8f489fa3b8cec9c98316f59ba84449ced4f9780b59e2fbd151db617e4d732e8556966bdd562a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8b2d09bd4a42e5106c5940df60d1a56
SHA1858b4a984a5cf826f10f6a8aa5960cce786d7f2a
SHA256a1d9fe8e3a0f19112bfa7040b5969296d546bd77f59c8a9c4a7668b9fbac8eb9
SHA5126e65b92d16629d4954c63ae0b23e13533e589bd9b2ac35028706d32ae1fe71076875b139bfd4c010b04dba77a8df3252deaaa9e7885b6a78b1e11b4c165377c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d4571d2a27e42a74d41452debc852e
SHA1c6f3b3cf7a16ecb638a2c6dfd07a0cb14b43d3e6
SHA2569af03b8988e268f3ab6cbf257585154943f3b037b8856c0a195a641c909147f8
SHA51294d31f47f5fd6e4990c487b45ddeb02dbe1d1a538476b94b9c3818b0b91cf228a6a662696254d9b89ab7f2a08186167a2c975d47bcbdcc0e12f0cd9471daccae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b