Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
f5fab3bd5503ba9a18b26790a616e3c5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5fab3bd5503ba9a18b26790a616e3c5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5fab3bd5503ba9a18b26790a616e3c5_JaffaCakes118.html
-
Size
18KB
-
MD5
f5fab3bd5503ba9a18b26790a616e3c5
-
SHA1
5dcd96685f511271f834dd711e052e44f0bb89c2
-
SHA256
b385e0f71b0fb9acd76e8ece7b8cf7a7a448f3272974567ef6f3b03c4fda7e84
-
SHA512
6abbe31d46e873ba01199b4fefc384a0843d544c36d0d85af110bd983021685922acdd33f4303a67bd0a3025ffa68b0818f2ec40e46b2d7a9c13ef0d84751e78
-
SSDEEP
384:S3A5Yd7ATlhpyDAxFxRqwin4FopWBMFBMbBMV5btuym7C662+Asu:S3YCR4+WCFCbC3btK1su
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502824b6430fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433427966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA4EDA91-7B36-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000074877477b961f141fd26c24f1f6e36cd3568ed3fe915a425b2b96a6acd0b4945000000000e800000000200002000000084868aa0bfebf6e781e892236c3d6fadacd977bd6e2d35626136993df9a3e582200000008504110d1e7bcf111c17a233ab772af5f22c6addc8745986d6ca913555cf9b164000000076ccb1f031527b0d16afc51b2694571bbb05afc460bc10dd1a810de71fe615f4df5454686420111ffac9f4e0ac36a1c5d66025bf225ef4e40d9e93311bf5d650 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2800 2240 iexplore.exe 31 PID 2240 wrote to memory of 2800 2240 iexplore.exe 31 PID 2240 wrote to memory of 2800 2240 iexplore.exe 31 PID 2240 wrote to memory of 2800 2240 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5fab3bd5503ba9a18b26790a616e3c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b935fd45d4e637db8779c4118be5cb6
SHA1803e096f3bdf7dc01db39838ce39c2c219a13cdd
SHA256bf90894c6765ac0589b471563ccfca6c9edb7c07d556152bb7e36e5833ca11b8
SHA51235f5cb2c11764f311ae8e90643b2ce68a90152de08ee9fa05397115302dfd53367da8316e02baf7b675f04b251ba551fb4ee309a61fec7c0202bf3ac7bb71fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f14644063398ca120f9aebf3c391633
SHA117187911f8bd26e9b68ca0820c49734b5bf12f43
SHA256131a1e6e39657de9a82c4bdfc6013aa5fe5c049f3b0cc549f1dd9e18256ecd4f
SHA512d35970e4def979461938cc67b4b52a62f22ced71a97d2a77e67c775a7d250c1b0761787934917b06ee482696ae581889706d36ff095277f9ab53b75664f55898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ced6d1354a51180ca5ffeadcc566f1
SHA1136317cb77d27f9efc02a009b5a713ef15022fb3
SHA2560fbb8eff01dbc0b545f095a0e34ef8d7f7d446bbaf389e35b2370fb107289304
SHA512e7666b93fe8af04b877318cc10203ac0891938c1220f6cc88267d548aa55586dcdb446371941df9b46b661f838eb1a01c6930d43e79967dde52c0ac2197328a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c749585d17369c2f8ecd0d3ee7ec2bc
SHA1f2c798d25b8c26c22733f2ba3c99ba59518e150d
SHA256e911690d88f12760d14e420470e26920be49dc386063c4b08361eadead72e136
SHA51221afe283274df039470139946e120faffc8104ad73ef79faaffaab376a496f66e32a8e112f25c96d78e80189cee0ad72815ef984b46d490ec2421e7aecdd53ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043ba6269d09e456dda3531f6a8d6d96
SHA118d388ad74b7dd1f96783cd6bc52f27d2f5b2ac9
SHA256ab20d5702e1ac01a5467d80ac3140c61f97f81d33b4d8cae3f3f154edcd5b406
SHA512a1c7d335248508d7b4c5682119ee7217eea56e2d54613be559f5f16c497f535a61f91a039b70543377dbb7f1dcf3d11dc7941667b1610d25e03c47a0cb1d3628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59544b1f1e2086a3deeb378a159c5ed81
SHA16ff750c59908ac182fcc0b2bc886c94664b34852
SHA256ab91e667ea19d2fa4f4969dcbec36c4b22937105b2169358af6c181faa831a49
SHA512188387870d8d5416ca030def557c672a28e293f55a83bd00b4f217e49fa41d9b9a76021310f91bb9b01c2ed09934eb03c3f5584cf584655b8c5b0686dc791a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57451749e5c77441113569c1538fe1dd3
SHA17705ce5af8b39629cbf889e0aaaf7f433f2f66f3
SHA256aa6065a18165f3f3e46080f9dcea302fb0b9c47245459134f8967b70ec0fc8e0
SHA51256f7b49618e10264c25fc4719f4d97c01793c05a8e0f06d3c41c24054b02dc1017da79b6bb6a9710b854606cdc3b45c76fdf9660c13f2588782c5e1114b99737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c5c1f105bf9220b8f0556368b831bd0
SHA19359639c21f279a2d020117561d4fefd45c5a76a
SHA256483877042078764be56da5970e59076ad5b26770c93b8688a71610f5dc7f2279
SHA512be1fbb09416e1268613fb5123e45b81e452526ed1013e6f7c58b1f1a2a827283b3862badae91f2a3c9f579a1edd3a59f7ec41a668342474c8ebfb65acee2c167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835c97fa35d1b9be549b99f705a08575
SHA13dd68f09eb25109adfe6f9a1083bda8a829c98aa
SHA256a59ad22caabd1ce48cd512dbee60ca56519780bee1a9f31afc142a28a14a620b
SHA512ea1c7a86593193591cf7d5aea5c4a60ac5661e6ef5d2d9b19a0cf80b98a0c52559aae76442e55a572fc3b22ec0fb393405cc77660b6dda6be12e4f23ceec5ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59724fb942715ba1b4fe670d1545bf199
SHA1a1830641eb7bae7c282baeb730007138c4244273
SHA25616182aeb75a1af472165c580d2b5219c8a6954813cb7d3a7a3a0708806075f89
SHA512a8447b1a8ffd038db18a8c2484473fc30e57b456e6dcd8401ece03d134cb557b78d51a6085c5394254fa45dfd7315053a6a4c662e8c43c6c29a166d5f3954eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53363d7f1263ef47c1c465bb6c8eb59ae
SHA1fc1e3dbd2611767ccb0dff57b4a820c9c137a854
SHA2564e51abdc00958629127081b30d2c380b16c89089fa5251cf140937e6f30648fa
SHA5124a003f4b72d9889abd7a44fb12bf219ae471c80089ad419f0e83cb08d04a48894f91c6e3d7e3d71ffd97e6efe46efa86d6ec339fcd72c8c5b76cb27752e698a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfaf9110047856e6c253daa68a488c00
SHA16d7d20f69d385ff2db1b5cf9b2d94af276a167d5
SHA2560a2f02c80795835eed76f12f9644bb5e19a246d5733394f769b3d468a3c2703d
SHA51234c577fb10e102aa0a03f7db1c6d7d2d432a31128bf9c906bcd3e306098a43960d68a27683a46c90e2a43ea27a1f164a5a7c299082437a3b49f76c3cc26f68ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6081cfbe98f1772236627ca29c2c95
SHA19f9a6fcd0f6aa83d25779e01853fd3c44a902bf8
SHA25685511a5caa586395dce14bc71970639cc905f8e27048009b4d8f2d516fa25a92
SHA5122dd10c98d056e621b72008a9bc48c8841fa140c1e6619e14683b0d89295148972e1f9c0ced33b99c621be3e1e16fde2a4db324e9ae831e90a2547d0835de9f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404b567e0d4fb74abdd8be281dcea328
SHA1ed5b6eaf1bbc24ed37485a1975f61827bea33e4e
SHA256bd6d1a8f16bb5312e5360b00828c7c41e6910bf932afe1a3e1227d62d9b1ebe4
SHA5122aa07ff88063ca61e8b0067dfcd911489ec70f1e97273af73ec1ee9318c91713c4c90894e755cdc6bf4550100d360d946066cb1faff03daf538e24336c8bbe8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6bdcffb468fe2c2dc2420f3553d8749
SHA1948f465d817dcd0f59f8fff15e9872ed0fbea559
SHA25605dfd3aa3ff26bbb607dfc99b9e24baa5ad6101a579b12134afe2f5a573eef10
SHA512586a36896ee450493a8bb10be57b166c74aed57d6028cde79cb01bbbe2a61505fb754a40bbc986f4f853e763b17d87c1186e8b50ef90b6e7a2dd47424663db66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d96160c81c1eeeaad2e7a35794cbae6
SHA16b4d8bd5e97d71f44b6d7fae202031c7fb737fb3
SHA256b75550920d69f5dbf8170c8d4598d04acc1c9c26a877a50fdf1ccb0924856d5f
SHA512825f7be18e87ced690dbce861ce6ab2191acd79a5a0091029104957f37ef6b5f7c9d2a08c34ad946c0eb0e17e44af0028c78665117b1c862754b72a8fc1a5e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a180c8a8c7ac6a14a9fa52d8b38fbce9
SHA131b2165ea615fd9e043458c12c2afd6be5e356c1
SHA2566dc8706f53c64dd591523582dfb82d18807bddd5626629fe383f131650d729a9
SHA51287a786923cf72d839f9c268f9f0955625078ea93a5575d5cad77bdc3c2a27356d8cb689da870df725d0083afd3908a1aee3c3a569051916ce02ae67827a75159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9140b71bd9e6f5970ce2e810cac9fe
SHA1041a3ff65a13dbe67c5437988e4df58898c03e26
SHA256c0122d3dce447d482f04a956cdc8c559cec6c9d72d0c368651c54047071aead7
SHA512a363f96d7495b7ba9477f564e5eeee9b5e8e3563a8999486a1e95a546c6abfbbff7d0760a4320debcf624168758367d37690cef675edf968cd993f0f927d252a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f7eca44f26a8b0ac87162d5677e0c9
SHA11716a409f0620fc5d5afe26437f004ca4c98f9b9
SHA256de2ccce89f99e2422f483a670b541acec925f1e4ff4e31fc1e5ee54906ccdce6
SHA5128ee2c96f0d4b9079a1b61b31cfcf1cfbf09844675649da1311cfa42ffb1142448775dfadc60e9ae752bd64c2e973fd6b4f01c40bcca78af07ad3308bb76fa634
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b