Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
f5e6da3b8d541820cd45602eef00ce70_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5e6da3b8d541820cd45602eef00ce70_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5e6da3b8d541820cd45602eef00ce70_JaffaCakes118.html
-
Size
6KB
-
MD5
f5e6da3b8d541820cd45602eef00ce70
-
SHA1
5c4cbaeaccb9ff3c7e3a717f0175202361070114
-
SHA256
c89bbf4916913dc7be673ca8659d08bf62d745e28a2c1d74517866a5e52018e2
-
SHA512
a19abfb9e55fb140214842207fdc23a98ed461d0d99c88c1e65d147302f8bea92fae3d11b43877876e8fad1ceab0bde3987713fed289712d4b3d90f056fefa01
-
SSDEEP
192:Gt9xKQFgTMjtGAFmbsRACVqQsZrGwCpT1G:ZAvwqpU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000000fc636d2aa9f566898871952314654b964055611dfa4e3a76453bf65f0841605000000000e8000000002000020000000d058e37659e9a911035872120b366a7ed9143ac58f720a3c9534eb8060119d2a200000004740630b5f77aa5da06ba44f80a201143322898211676a83afe75d7eee52ec574000000063abb3c39daadb07920353cac9e2c3b327faf16bc11db7673d9cc9913877554ae72b335d96d8b1c5784c8575c3e3bd348ba8fe875d00a2cc47cf143ad140f04c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04e8d783d0fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433425299" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4150B81-7B30-11EF-AD39-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2816 2084 iexplore.exe 31 PID 2084 wrote to memory of 2816 2084 iexplore.exe 31 PID 2084 wrote to memory of 2816 2084 iexplore.exe 31 PID 2084 wrote to memory of 2816 2084 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5e6da3b8d541820cd45602eef00ce70_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b391cc2cc534dc6c8e4c1f82b87e6855
SHA14265aebe110065b4a2cb061d03f6933c1a9f20b8
SHA256bc02f299eb99a3cb2ad2351e593dbef9cd1bf35a471ba7ed1bc2f587cfbee37c
SHA5122cee9692f158d3c10fdf269bd39a1c8784f1735eb06393a1b5a4c18d2f2a03f8022d07ce056d209d0ae32ace0d7004f66b9d578c9bcd14e1bb6c9dde64d59bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65fc275e8ce613852876d6e8a5e65e3
SHA19eab331891ea57e3808169641c7edf853cc17cb1
SHA25645f3e4aebd40849542b50733ff51701d1716d06b795e8c1776f6b986b41ef10a
SHA512ce3926c4d702aa2c28b8d790a70883aa9845b964cf5714a469b65079e9542f1302f379e8bc449dcb85d30e349ce3d6ed388c17bccd189056c761af34c9c9abdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54859a4da5d533e7c2d4682e1efbdde57
SHA16e50746243d9455c35fa2519df882285d2d29978
SHA2567438641bbcc55b8fd32703c9b1151242402260adffd7dba1102948ef0ce1107a
SHA51246fa20091454dcf7cc3203b283e93a389df2119e0134af98651a1b374a7cf1f677a1aa599ab680f4ce6c19341f2a1f8e7451a2abb96cc7236dff8727e8fb8988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571cf2f5911e002e3f0df6d6417c65e74
SHA174153b4b49df19b15fe7530f96f5166b16500234
SHA256e0e5334c3069a85b75a3137eded23b0565cee46ab24aebdc7bf26e5418d94a3a
SHA5123a5575b02b71416cdf08332195203f630174f363fc8009f4e6d9203a20886c7e12d6f89d82af98189cf03559ec446a8ddc171ba871081b21db168b0a6beb06ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518eea6e905610db84f603fdf93feb75c
SHA1b74876813132ea8bee95925b795bd85b7f89c80e
SHA25643dbb84e203169ef89a09c858069e657ed2c99244ce6e65a52d69e7c0bcbfe95
SHA5125616cccdb6dd9891eefa0a405d8c0a1ea4a73871441b8edcafa7714bc516e52e6de19721f785e364a84f254f55619cf4a71af88cbc1220231c6544ab483cb156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ed89635aa0950c1b9a6fcceac8fb8d
SHA1c91c4d7368ed055faf76d23cecac366e2418e5ca
SHA2561cec1b3ca874a13d4452dc5521536e273313708331039378557cb8a8fa6c4dcb
SHA512e5895115a15a79054303c2b45ba4904f2227219f68f7ae0e9b23a4b4506deb261667afcff1443d3f634a6b3e69415b21872f3626fdce9854b712cc4d10eaa589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec36002a15eba5e1163fa1a6718072d7
SHA17171b7526084c3e5a442a2bb271e35faa931d3f5
SHA256602612d47a5912698fa94a09de563596b39b2f361d90e5b8c51495c49690e82e
SHA512025d00dfb0baee375fbecdc1b3fec00c4d1ab58ed771a628cb2625caceebf9cd3afa6579bc6853a107134ff80635414fc4bf830b31245b3ffd7a986db2598416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918f9a03785278215f92f544dba5cfa7
SHA1add59ed7e824ce6d9e5f093c0d77a2daf5c83a8b
SHA256902f58456fc9b955d511e42c77d226c17b4f684b8dc5d4d9b75e8dae397f43f5
SHA512b9a1a0f939d258037dacb8a4c349232f4bede5fa954702059ffc2536a16693ec46e98df7fd8817cb1f5e750930128c0ec54907afb86f80fe3e12602414e396ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2df5152dd0f123a23651621873cc30e
SHA14c225c37bbcdd2ee266a2306e99d9cf3429ada9e
SHA256f17c3bd88d186a528fc916156560fb1e01869cccbad5842b07867162315e58fe
SHA5122325daa4e7e74757084840aed71c083cc0999d47989a0a1e9afdbf3fde82802a0c93bad99dcb6f8a639b68ce82d72db2ff1318ea823e245b0f57f03ffbfa51c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f1cf3e1498a07ba6db65a6e5f30b1c
SHA195c7ee6e7854961a86bf3f3d436c0d7c540ff994
SHA25639d9c40873553e7ccd8de7d08147b7e688b8d67cf63200885e91f22f120fbe6e
SHA512ce256c39a2f0c705b1d7219fd03a9e1e64d85ece0522a5002a96e2ec3ffaf60672e9bac585df9db82c715187d323f70481f4f485f5edf234e677e0aa26e6d30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55174a7f309e189da49eee4d89c1b7457
SHA1601757bec15330824965c7136c9155f7e0f4142a
SHA25671e6b82093418d5f361b533eb8c0b25e45a67f00aab8e815b202e07bc25f0596
SHA512d3fd71eafed72389771c2e48bfeed9181a7e3af5838a8da0a20c3761dbff84dcf46543fa2403793510b72c5ea1f1d623294d70e689bbea1c831d294ad6748e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54928379831cd86b5b8f0963f5e9804c0
SHA197f38e27d9ae30d409ed37db07e997064d8957fe
SHA2568ba251dfad3849115815333f27fbd8d08c4fb63d065fb9656f054c5202a2f2d9
SHA512d994612a5f39d7fdb8ba0aa30a959adab2ddd315d9f5ef616b301cc699a7881ed5a8590804be3b48a4587f1f42af08ae78ab8750eb7b92c1937fa1e0aa82b62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5176721a1ef5129a9110f44934a1a7f16
SHA1772730b210cfa3df4c23af71a5b51e0894213fee
SHA256f55d69a132a1fe5bbc8f65bfb7b9b6065b8c813166d7bd47ebbab1cba1ad72e1
SHA5129f5a79891985c104cc5737ffe00786798d64a62102a3b0c3bea0c2f52a72984fc4d2b51af26aa270a23fcb51a5bb34c73e72c66c1488e190876d58167198878c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51519dfcd80e3556fa82f914b2c47bc89
SHA1cf369abec286fb43a5e63b5323ebfe1a103747de
SHA256bf7258e23927cdd46715716290f23e9aa82059dbbb58a4c2d93c9a9fde61b175
SHA5122ac1a7ccc5626fded961e4ae30e441cc41c686fd4569bc71d654dd8799a2d6f4b7f8091350b2729ddab51b5e91ceb0e718ac1e4bdd1122d140b3d37308c3a108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b61073e272f6533a14b67c8b47e870
SHA1e111d8714c9bc6cca2cb1e9c13057517130afc52
SHA2568ea5bba10a882ce55ed163fd07ce713d91b9a16b1707d2d916c59949a25a8b20
SHA512df3912489a641b7a2ec01832823472e28e2dec432608efa21781a84b7a617aba97c8742bda64870afa26907bf083375b182b5bb7d5a6c1395a0e3fff210c4cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc016465c8d003f2ed9aa1732cbfe3af
SHA178e387f974ae5be095b1ced03a23519031db6cf3
SHA2562d6bfe9b96e2eae68fb69bef4566d64b6b70b75d28b4643a0c37f7f2fce9db35
SHA51210f06cac16ed5be91ad0c7668ada7decf065abf42ca11808e241341d008dca58cf5d3d6864f282e104fc87cf3ba56e6f1d8f986fe09803903b96c34835db15c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc7765614a8b71bcdd30502461d9651
SHA1169f9a5cd415ffa21d09e574d0cf06e634af4fe1
SHA2566b018bbe08dee03481cf74860a4ee69d6347ae9e77b16d53a201e4a2d0c40e7e
SHA51297f0e5123fee81f9e94c51f5ab8c05c0058d62ef648383c6bb4f7af3bc2fa527916aee535c37d006123b45b97f25b44f28a82afa72c18be221fc84e5aaf25552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422876c239c8a7673b5b11921dc4a4db
SHA1570c691ecdb87fae507793739d60840f0aae05d7
SHA2562dd9943f826c285d1e24d9d2d4c0c1ab43e2e98aef3e7c1e959dde966f7ab421
SHA512e7ea503df01342814298c4e373d91f2b8ed0f0c41a0f3cc1f129e18b43ca8ae8752118b9253de4daeb787bc7663d702687a37140b49c5b4c14ecc60d8827849d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecec55364c8bde27e359b892124ef8d6
SHA102aa81eebe6a9ee0e3316d0382f8115b77c29e80
SHA256161b2295ef70501776ce3e29f6566d8d093c63e3d639dbd32202c16c502adf94
SHA5124c115b8ffa5e9b3d3a8c61eab791f56a62cf570d800d630705d6b11ef67871d68298c6afa9f1d1e3092a6156f7e0e0ab6944afb13dffc0e5f8d028a061fa4815
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b