Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
f5d2cb57b57ad6a51e7b2940b4d5288f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5d2cb57b57ad6a51e7b2940b4d5288f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5d2cb57b57ad6a51e7b2940b4d5288f_JaffaCakes118.html
-
Size
18KB
-
MD5
f5d2cb57b57ad6a51e7b2940b4d5288f
-
SHA1
abca860e2220ace044815592690ad7ca0a12d4e2
-
SHA256
333e9543b1494dd6628d51ffc6b0b91350a1eb44d83747a3833a379982d639b8
-
SHA512
d97990b61296e12f0f018a514a2b36352cb18b1ec68bd9952270904a4f1378d61ac368ab388de05ce40afe8174c896957e578435befb8a9a87864f643526b6bc
-
SSDEEP
192:So2T20i4vZCciZJi0aAEwRt/jIBUYrzBMCuZJV3ApqjerUcHWT9k3GgsC/aJapQv:SOaC3i0/f/jIBUeBMTJCMdJKsMah
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D166FC1-7B2A-11EF-875C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a47f702d1e213d8766a11a996c717e1898b2b7dd3ca5f633a1f2dec93db8b9ea000000000e80000000020000200000006360ef0b18df219634ade0d8ed00c77d8f0995872fb9a56adb247c108664ad6420000000fc95e74e7487bfb5aa8f2878132b30ac90546f6de0bfc384f7472c13ec73e9e94000000006124f81e68f040475bca95293c76e347d5be55ce9a30d935175271b86c903bee73b57da7829dfdaf9ea9c256002565decb4c7d850beacea53dad92d451a8817 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433422657" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2079705a370fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2428 2524 iexplore.exe 30 PID 2524 wrote to memory of 2428 2524 iexplore.exe 30 PID 2524 wrote to memory of 2428 2524 iexplore.exe 30 PID 2524 wrote to memory of 2428 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5d2cb57b57ad6a51e7b2940b4d5288f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e051af7adbab3e28adeccceadd319ad1
SHA187a21b3ca41fd40f758ef5acf25dcdc626131dd3
SHA256debe31b9617937b4c65c39a32d6184da6dad58aac605ede13ae0e408979ddad2
SHA5127ec6406c00747c2585ee4a4646d5324328ef08cbd77c37fd8a51865c2363108c537040de542f9aea56f34212fc73d8f79b9a2047d9ff1cb7ef1b89a0b63b044e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918371be09052010c6226909761d0c61
SHA1260fbbedf3ea7c3999019086bd9c75bedebea81b
SHA2566cca8cc9a01ab331ab7bf45031513a0eb8a130b6468ceda4c04e335780de1843
SHA512dc5809cddd2748a5a8d84696fd24632e19e5701da2da964ed68e67ecc1a652e45541d8142a14090e994115323903aea705052442660da7fe8818658d9e85dfb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5963be4e6086aeeaf3217dad1e1e98a07
SHA12647246796c9a6139766207e3fee5c220e5bb922
SHA256d2d0353f53fff931b4b91ec73398d32a3817b21bc17bfc18cbfc5e385b115e20
SHA51235d97cdc4a927c5e8eb495815ad9ba01ee1214a26f02801876f9547bcad13ca116ffd1fc25140d07687f2b8c7be3a727c086704c536ebc11df67177014ff48d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5911b5f504ec4e47f08474d3fcb33e7bd
SHA1e0a94c2d8ac5f2abb80751fd7e83e0bb996a5b58
SHA25600a781b779704f5b183a0da6e1f1f3895e33fde1dd3e86aad48cf5c75ee5d659
SHA512027606781a1015246fe2a63ecc8b9378ffe61360bf39fe93bd599eb70b6ef407a3ef64db2f0014993e41f19d7f6a78e80e482e1aaee0f2b35e587e51bbdc4f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c870c90e58919fa1b57517d518b704
SHA1be707d8b3f81759576aebaf330a6f3979b7e966b
SHA256a9b7f218a58ff870ef02e301348a766d1bde152f6ad90c69b928a5aefc8214bf
SHA512943b743a058e30b20c628dddf7757ff3f63f0a0ec6045d8a915dc8ab7d7e45354144e7091846a5648ca36f4cd86bd98e9351c9a78968e8d390bb7663b848a19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a478566163467d9a5d708287deea2706
SHA185c738b38cb2ab190b50a87c7ffe132b479ef285
SHA256eb5cb0f6ea4c356e5737d31ee02d767201002e99510b86a2d43af0bab7f3d2e3
SHA512e80fcf871d9206f3b196be25b07a03e595460db79f42370fe3b45257995b417fd7cde0e1117c08575801613d95008b2f440dd92b1ce81a08e804ef5cecbc4cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53722622182d12c1daf75abdee6a0685d
SHA1f35655f418dd51f0701e2a9e2b13e08f0da03f85
SHA256a1a56019640d602ea5d18ce12ed1392273b7c8933132c00cdb3cbe2cb927b29b
SHA512bf0c992d4fb614478c46e401a8a7105b0eb54c1352681a2155a84512284ce05a44997507fd045970c69dd5ec43f98d268997a06ee8312449ca7e99c47adb6391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593bf4bfaabc764673436f60b651c5028
SHA16538c2cf59591519d6f7ee17f0514d68a9bb7d5f
SHA256e2ebc0546aacf6728bf47181078df764cb512df167f57ec7abb8d8a42d24fece
SHA512d95a4b359a23f3b264abae90cabc7c6d1746aa99360d9b33244ffb7a3ec5b0d13709870c8489be995678bde46aa05f4e14db1e17e1746d3b2627d4a3c6dac56d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423cc4808c2407e6a059df565f4600bf
SHA1e4d5b0964aa128fdd6537d235cec02c848da7424
SHA2560c96b7b78630242c70e8c534ae67a14e40cbe67bef16fac517ab5b17b2051e94
SHA512ba0dec017dfa18e92fd4283bc404e552d4bbd90ba4b75636413a9914798754d653f04f0b162c5d374a50eeac90613a59829f25694764f2871c9a0eab450436f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f914c00abf314180a6fad8daea6c91a1
SHA1a5dea814b800a27c782bc7a0af53bea4089d642f
SHA2560bce93f100eb2fa87c60c2399e51cacc467fbf84095709fb0a8f66fddf314de1
SHA5121e89e092521f04a1118764c2a704d9137d25ce3049de0f95b837c389c03aa85b302754dc201810c22e5ca7ffc724b14a2313f3da2b20000814d0551fb86e81ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e300feddcd3d8f9fbc2aa5096d1c34
SHA1701d5e2be7d5223c12780433d682cf9ef1be9700
SHA2567236333f5cb38ed59190306d1dd17ac20b45a48ef00339717b574bc8caff727b
SHA5123c958d5a64714248b6b5778d6ab1264b2c942d8f3a981469278cd86244722d323d0897b2c567641847fcc10a83dacbd99ca7d438d5059361a877292d59438bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c7648eb29dbd8cfb5240d48f20ee34
SHA109d9913d2309391063a2456caa8a05450ed6a740
SHA25611bab619e8bed9235d515bf628b8acc94070d3278fa5293a5931521433549ebb
SHA51283b6a11cc7dc5b732b8eee5901396a53dbad8abcd2d1918253aa3d5aa2a1230406445c43ea0b472fdb02f1182085aee7033761b8ea19b91b67b9aed362ab9ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3fc67049dc7462e3d8dbcb79e17ebb
SHA1d0853eddc78f2471904ba2ee7232e39859eb6018
SHA2569cfeddb5e62e2b11759fd090a6ab39d26545985eff5c0af34494072d16c43fdc
SHA512f15efb91f7741758f9b2f25e09b27ea0cb91fcb698908dc17e6020fc6edf5ad5cd84662d2291a134bffa89ed03c8bd4aadf4a43954d8f63ff1ecf582b1b9a714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a6749d4116bfbeb79e7b72c7606698
SHA1ac80f0f07f1f926d9aa7a1c1793fbfcbcba245f2
SHA2560ec54a6e38679f2552f2524dcfc67f14ec61c903d1b94fd3471f80ea9d18597a
SHA512f1ac177c733d8f00ce83d73d882d0e76af201e90acbb2ff52fe12a2314310c0f8b78b19e725118def5173be851ff0f7051cafd3880ef5ac2813bdb3bbd44d67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548898014e972d686b7e1afcee2617986
SHA1ad4c7595a0e74dcb49e6218622902afd15f4e65d
SHA2561f26faf699d95e30b0a5983a4baff93964e25976666eb66a28d69bcf1e7e2f96
SHA5122988da1233c5843680a0a1fc018fc7d856fd9fbe2d76eba0f41fc19199843b1beebfcefa8daed50e83e9c370370c8a827b9993a618ab55fd2b3b76ea240847be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc82f6734766d33aa1acca43a819b013
SHA1d4195dd222a0ff50dff758f34f2bcc448ba9dec9
SHA256e396be76bf18833dacd1c9213abc877d7849cf35fc19e9f621ee09263146e4ef
SHA512adaf07a634971a094a8a61854aa77cedf144aa3524f432a5323fdfff712d65d7c2fabf9ec5c341fe5c4b2309c519c11bbb6ab1ec08ad56334de92f33cb83d08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddbf539bb49cb66c0e126b73561934c1
SHA197203b4f735b62ef176d19884602d5fc8c554c42
SHA25663370532ecbd905887eab52785a89d3a73b95204a94f4ee9288bb3250fd640a2
SHA5129a88145bb1dd77174980f54c50baab9262d8e58e081bbe5c8422a81436ea310cbc2b0d38aa0893e664b4a041e128c7b0c1bbdb81960de2ba04f416ee92d34eac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b