Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
f5d45ec6bed51d808c5cf79530090b29_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5d45ec6bed51d808c5cf79530090b29_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5d45ec6bed51d808c5cf79530090b29_JaffaCakes118.html
-
Size
11KB
-
MD5
f5d45ec6bed51d808c5cf79530090b29
-
SHA1
a506184650415f55c5323865bfc79e49aa02c814
-
SHA256
7d43872847abae943a3561fc75472ad89e7e42908bf66ab62bc679aae9dee7e1
-
SHA512
7d6c0f917e215a715e2fc003824de36d4a2fa0a78f078d65b4663a1d5e37b94e4d7dd9650a7bc8c08ce0495356233759e0db6645f2f5ca3ca2d921d7d6a237f1
-
SSDEEP
96:uzVs+ux7haLLY1k9o84d12ef7CSTU3wGT/kmDp6PU+85WuI+BBmmTiyuIBBB/RuM:csz7haAYS/ugS3VMmOR2wE+P7PHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c058b9e1370fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000035d582c67cf4a0ed4d90dd8f7844a1fb79729b3a691ad483788a87f10684ea10000000000e80000000020000200000002761f64a23c88c6eba54e98ad1b2e1b4576de4f82b6a1df9f99af1d5d24efe3420000000b70dd7c6d8de78dc81bc1d334779140110b0750d0909fb274f4f2609c8bb9d8840000000ba1bf772d31dd69cf59716368101950df9774f2f3c9a4f0ef4b849921d3b7718f456006bf1f71c898b897213d2d9c22018240c7c769d477fbd7d63ee53175dce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433422894" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B31B581-7B2B-11EF-B59A-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2004 2324 iexplore.exe 31 PID 2324 wrote to memory of 2004 2324 iexplore.exe 31 PID 2324 wrote to memory of 2004 2324 iexplore.exe 31 PID 2324 wrote to memory of 2004 2324 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5d45ec6bed51d808c5cf79530090b29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50370013c8db881c6241535b071275304
SHA1720ba63c1c5047032ec68907ff2ecc4237b3b5bc
SHA256781fb29a9d7b8d713a373d9c927f4d5552644876ce9b1986d55850d8448683be
SHA5124bbd8b4903fd83343da11fe79dcb3546e3614d8f3cbec58e3810392f71b0c4b31773f3746190a2a5c39067db2025dcb1807d7641925de166f5055543fbb7e42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70f3c58fd36b04c2bb45872dba6f09b
SHA12239100346aedc08790ccee33629d9f43ffe57d6
SHA256d87936dec254fa45880c02a1496518c2a40c8686d2ad94cf06b347b79ebc03cf
SHA512739662e174bcc3d3fdea80457e525dec7dfe74af01f4b004b15abb06458dbb12bb58a8d59e2d91ce0078f67d05c9b27e00007647b9272604e8af4685db9aa3d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaec62f138fdd6909a49d17050b04123
SHA109f923e600bf87faae3a32c2726891e0423d1f3d
SHA256bee4fb1105838b6b170435b9bc08c4bbef35ea96e3d58b47f86b4cf53b8ef2bc
SHA512a9f175070c74e4ed404726d35d7b9544cf129be17da8adb4bc0f59a34d1d5d78b88aa584917557e5e41553e698b70a88b8479d382c20a89ef00fd4685a49a6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4baf2320f82ce1e44e33937744d8823
SHA1554e575a1ea89420b219cd8f612c2561e6ab9439
SHA256f51735d6f17075d408e9dd1360a63b4d4e5afde74706c756e98dfbf9daaf39fa
SHA5126615306cb20ab5232531c41e2d348bd534f5c02819f9c183ceadddc6fcc75c090361cba7e4bfbe99b1dbf19f67f90957485da01e293f3c52e8d3bb4cd1355952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520342227ee1637a555b5867ecf37caa9
SHA1213acb12b70edf252361a6a47e14527ce259a267
SHA25692b106bf52744a49e588056042e4dda881d9853337975614f45be9e16b14347f
SHA5123ce4f2d4f1d40545becb7814d406679d5b506295130e8700265a6be0e2c8bfcfe5b1c6f3ecee836dac122d5c5b6a95b3dc574909d2b60209136ae241419f055a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b143ad117b1f907751dc89270ab29091
SHA10d054ac0eb1f9e45656d70d8826f6e2cee71afe3
SHA256a45058e9b0ec3f658b61947e78ca8991fbd5ff940935a46aa22988c38b3c5e5a
SHA512e5d718c2504df78fcbcad8fb90b63e8071e2ee2ae4f2c75f1cc4936362c4cf5e667d5a0b022d68b214d2e99e09656aa35d4236aaa1934583344cc8227584135e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee377dbf881f06ac474520c5f481ead7
SHA1cc744ff81ff8ba56c59690367fc37d6cae7660b9
SHA2567cd95dbcffa45ba72db4fc12c9d7fe4cba02cf31ce5d8d3fa94eb32d7f931379
SHA512f2c33ff9cd186f625d26141fe5a5374d9bc84598ae09f74a77a57f9ef568624f103b1ad1000b3655e75faed9f7e709dde4940c9482a252fb521dd56a8b84cb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827240f22dde2d60a19f59e9aa23e843
SHA1fa2f5574fa73a3814d5e98086174f88d1bce5231
SHA2564dafd8f38694f702cadf5ccd785b82148f847b576c27f9bf3b480dc185ead8b5
SHA512519ea61672c4546ae848901f3ec4d7cbf15fc764f7d01aca3d80b9ba9590eef3b351e1370b67954e0e9cda9317a11a8c1242d32e20531be3373636a28837e7c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caaa76409550a03bf184efe823af0767
SHA12ac8188d565cfeb886bebcac6771d5fe9d3710ce
SHA256a2f70ca32149d5505043c1533d0cf24ddb033c916dbb6b7e3ee87fae6d2d03e2
SHA512d639f7f3b4ef6db82d4de8a8c6f6260524bf7a718a668343358c15b20d5efe7018fbfe8359a0f3d5e906510b189955ea4db3392def439ef521c1100a348dae69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795fd52ba878e53f474b8a0d470dc5f9
SHA1cc73f31e3d0973a33ee5c75c79276c973d367edb
SHA256af81fdd6d2867053ca2cb1dbd8999c7b7fe46088e8150f1008cdc3602c8a5b44
SHA512376ad650897bf0a84f91ba91c858f56aa25ccfc7e448025f81f1a0f1067347d747c67af53c56815260503324a681386208d95bd2bb64a584eabb3d43f20f09ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c7c9f13a1fa072fa33add8a132762c
SHA11080e604832b1569ae4f6bb4dd4a69bfc4023b59
SHA25625a3ee55fe13b2b6be7724a511651fa073f4597d3d2d9ec640d5e191fcf2db49
SHA512e6c2b73841d68de11d65b1a4d382e57693189d566732b137f8bfafe7f7580e3b5080a01e2a38d64cb140fe84c2da1a8d18a32a6d959fba631fa70adedb3f0c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2cc34b20d617690a118dabdff39494
SHA1652af8e040b31ffc2efd78a51c753a7677994378
SHA2563e637105ba0bfcaffd918b66dcead94c4f6c97bf162a78065d4c7ae731b5f953
SHA512cd2a4ad27e2121af13a5bb0507d5375f1a36df97a38fa59d55496de14fa61ae67e3aad140b47d441244105bc310e3a280755e693456193b5aa9baf74114b395d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c909093fa95d3b349fd107bc1e3108c
SHA1f610a47e78ed2bd8352bfc2757e7f66fa53f8b26
SHA2565c0abfa260095312d8752bd72b5f00126f08e62c16d337fb3839ccb61623374e
SHA512732a9ba3dcc8726206f982c533db5bfbd10ea6dee58e05db63f1b3264a9aadd43ebc8d2732baa3ced31d3288705f94b0df7d2e332b4e3088c596459618626c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6be1ea614e9cb2e4b3a10f3ac65bbaf
SHA1ba6d5d9f780ca7ad345d8656c90186cb632e83f8
SHA256cae5bdf5623d90df61b1627e32abdd9f0afc341bd357c706c700c601da3e948b
SHA5125a61768b8fadebe1b5c8b1b60a9088234e41626948665111fd16e8f336e36a26b9ccdd7575248ce731f9ec2bd5720fac491d93dc7d2b2bba1ec4d63a9bf59d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f2671639f9c78de1ea58365bf45e93
SHA12d5577363bbb89ab50edd5c52bd79d6616f483a4
SHA25616cdd53e6c2676fb75d9b2e11a6817195b2cda15b6df3ee1d7518e9de0f69ea2
SHA512ae5cc5facb26251cac13e57b1e4d6ed37d287ce4631c6197fc45978a246cb4de41ee65f375aa445752b19de40e02a91794a16584e921e4eacb70c22c67191804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20123020fc475fe4006fb5a1c7d988a
SHA1f4ab9109e612701b30467c7356f2fddbdfc755b8
SHA256fccb80e01e034d9f45f821053c9c2f02609b038601e9650fd95fe656fe711218
SHA51271d5937981d9cfc295075e70398917a3a5ef79bf737ab7fd9254d0cc1f1bfd452f2a8617a690b0f52ee8ef3b019c4a9a3fc5debc27fff3589b52ba125be1b1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d0092acc281c2f27f3bf98eef3752c
SHA1f6d02edc36ec2e32cd1f6e72af095fb17c6ef770
SHA256509045eeb03a5bb1af7aefeda7c242cb717a5060388d83a16e1db65445954cae
SHA512652f0f03c5ead68b391bc60d3a752d94b02b37bed84ce5c025145d13014e2effd3926e416e6b64fc6c85d7d01a0cac2d65707ff32da228949159d505c2197517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b150c33f52b426d760d44840119066
SHA1cf415ddb8d97afc9cbcee1c7fe64a1908def6f2d
SHA2562e21f30cfbe992f611f5c83b6654073bdac6fe30e36613cd67b75ec24a90f318
SHA51220f64f35a5eddea748cf8084486a6a68d9896019a13043cd66775bdddf2bacaf2fcd4776b060cf654b737d6f9d1a6a8729e8868a204144f0f9a787415553a8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a7054c2bc3efd289e64f5767b57183
SHA133943406118a352f05b2d75a7908929da5649a08
SHA256e0283328b3d3c78716107324f5af8c27a836fb0cc5598d3bc78f3a2e93c2f0c4
SHA512f516437cfa05f35462bf1405750100d521f3b57654b2bdf397b09d763dcb7f160e03dcaccc2c60d641835bafa426d13a2caab7148340b91daa811fc1bd7200f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b