Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
f5fdce182d478e9f916ae4901c913f9e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f5fdce182d478e9f916ae4901c913f9e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5fdce182d478e9f916ae4901c913f9e_JaffaCakes118.html
-
Size
6KB
-
MD5
f5fdce182d478e9f916ae4901c913f9e
-
SHA1
a225efeac3dfd24e677935e015fafbbdebd15f49
-
SHA256
4857af7835a90a1bb3eb0f32276b43ec7775a91d962b43d15f75f6787485c3a4
-
SHA512
410c8cd8c284a38668d3a8d4b0350a3426d2fde2eb92e5465a08dbb6dac25a6559494aa682137666ab9fb32a833dc52f280126e7547b89f83b47cda24c7452c1
-
SSDEEP
96:uzVs+ux7RqLLY1k9o84d12ef7CSTUs3cEZ7ru7f:csz7RqAYS/xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0730f9d440fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433428363" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000010828c025e75b1950858a7a445ea78e455c4267ee2825545a25bdeaf99503bb9000000000e8000000002000020000000fa7884b2ab14ee225498bef20660c62737dbcb0de02bdafc5a5c061f40aae21420000000244f5df9863e55241ba681c07616345543bb246b8226b29b078404555fd8cabb40000000f9ca606e584f3363d523b140283d339fecdd0f91f4a59c4716157d52e1b112fb99dca4b1999d9c64dd67f6732117dd063727e71d3ff069b7e9940127a89f710c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C662CC21-7B37-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1580 1660 iexplore.exe 28 PID 1660 wrote to memory of 1580 1660 iexplore.exe 28 PID 1660 wrote to memory of 1580 1660 iexplore.exe 28 PID 1660 wrote to memory of 1580 1660 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5fdce182d478e9f916ae4901c913f9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e66c156dd9701304b5f41bacb0ba7bb
SHA16600fb9cb940677c3f0d5ad94486eb5f507e3df6
SHA256937e0607ee2bcd707f2e031108e9d35aa37af5c26540df40e83539390b0f3415
SHA51284cdad6f2c80a6565371365f9c2dcbf30fc1895f4cdb6daae9eacb2313e140a2d6e0922eb30cf381455c16c28eca5e83cb73244271416faf2eb064bfbf30be99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ee7259d4422e6ded1722db1b65b4ee
SHA1de0c95e9c39a138453a40e38598b5fe4601e2fbe
SHA256034842f1bcbc668b169f1e01c8ff0397acf9ed9821d66cd32ff35361df961293
SHA5126abd72f6559854a2dd422ad14d17ff7881136a270fb395c4788a17c2c0cbd1b9b50644ed9bc4fd6147af9db2c91410a00256ab97c66266d7ca48631b97310a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51beea9efd96067ca2fab0bd72ea43ff7
SHA1581f518035cf85d2c483242589196c0a350ccbec
SHA25691d0b1fc296701a919a2e1631e2eec19b6997df8f6fbc8036c8d5d0121b55bbe
SHA51205b8b96d43e3dfec7d283154cf049bb3c437001f23af989c4662712c3edacc61e3352484735e1c6a2b65c8b717ffb61c1940a144e43f9f46cb037b60c9bb7e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1377070daa8504d702dc58f437a81d8
SHA101a1d71f84abaf32f576adfa1681833f8b8feaa7
SHA256d0b9369694176f8059f132c1d2287fcc5f4ed69f9f65661fb50d75c0ebe31ef0
SHA512463304e9db8fd2efb9ace33d5b5bd8e7d2ab96510c6e823802830425da095f54bc2d415e1af8da496aac740cca5933dfe7414566f90a6021a49e265ea046adb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5cd88dc9d32dea27f5df04ecf52b9f
SHA10bff4255e54d9c4f0bf54e486acf32d44756d515
SHA256bc7491f7ce6720e7d0c09459cf05b02d6422783da11bda88ea87731612fafa0c
SHA512c17dd0a706da67ac110813050b7e9ef21287720cd456cd31ae3e427161d8cf2093ebffeb182533bd48ec557469f93b153e83d944cee94373f3e1916421b07129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1058ff83d4a0c96dbfa1e585c08f0c
SHA13e10ce14cdc74caae329ffa9198db6ad1ef6b7a5
SHA256b141bc75cce5fd9f54722c6dcacb3abbe5961563a8e0a5155da25372812ad5ee
SHA512120f0b57577c580b0a53593d51f479499ac9bd887b99cb32761fe5bed20e57be6224f6dcbb54c7f7ace9397b333708a267d3dc44ca6ac816b0cf6c9ff4da833c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efe2647c21acc8cd861dca55ab6ee23
SHA16d2d2d7474e04049d61a7998dd99dbef3edec70b
SHA256b3b804f103e8fcf2f6a38218566b73e23a0245a5536c12bc187421ab89b2afdc
SHA512837be2f6d112566e9f08de5c537f045f22df6c7747cb90ef609069418a80d0119fd0bada2944b8b73e0635e72eeddc0aa03e4a51f7ee6c8de24f2d013c708d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6f294c62e741bf9ea3de10f1eaedc5
SHA15a63debcd6fc23590e55219be8c88153c01bbbe5
SHA256911fb53728f1879df4d491c272535f056b7dcaafe8aa8df4677c073dc5ead143
SHA512c100cc27abc339ec0aea5b21e49a13677eb75d71e0dbbdefe827924d54e50e19c1bed6511fcd1a32eb80d84f0133f39b7ab6a6ae3ffa785cbc5b326086a1a41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27f2612eba2c85e6d1deb2e4443e01d
SHA1c011260c596b5da49873b90c8456b9adb2d7245f
SHA256ad70254b59fad7d3abfad07e413a0b71b3a65ca6fc5a0c4360853c3fec60f880
SHA512a07af43352d30195dc869d9662f5c6c1f67ba60d39122bfd8e9bab13d993badbf732e7cfe72477b28cff45ab832478da0edb1786c20ba92578367eb1d74a03f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533970b321e4104a3a4ec1e2f96f5b629
SHA1c4e3b4cbe188b95a4d8321c6ccc17617f18b9701
SHA25672d0bb3e38a7cb04872df2d3004e8243620c7a90d029856ca6ab7ad73022a4a4
SHA512805f2b1825e9cdd6698d115be91f9e14cd246dc78302f4e20419a5b60c1df72398043c6bd365c964aa2879bfb052797a51a65a219df2ee27fa7f9d3701654f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d96879756392ee860aee6cb733def34
SHA1807f04fc23454ace67cfe5c16fe673d1cace83e7
SHA2567c4619232d47539e96b4a26f3909f1d6aeb88b624e580115b9fd7bb52e2257c7
SHA5121e46fbb99e0f806e96b9994ec0e2287eb20c6f6da269ff35bd7d99071786e4ceed131b52ead2c910350cf9dce2c30591a2c27efb01bf31422e11d35110f92687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa224d362be30150df8f16702877c8d1
SHA1f61ef5ce984bcbc72e589302c780fade4a8cbef3
SHA2565f271392beb20a4235171a0ac7092d24300ff026e134269ee3f2d3857cf779ad
SHA512692328d2333773b17877ba47f0fbe698a84a1d74246b8a0f59993b941917a8e27ca6a2941baf091685fc704428db25cf9a09a73dc5449daf77af89d8bc5f3a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524755c997efde10732aeef1ea926e0cb
SHA15abbb1ac8fafe7e2ce36dd70c958844797cf1321
SHA256689bf492e2debb0f0ac67be9c079970bbe3c37b59c2d990fb61941c5cb5f1c7b
SHA5122276905a321178090621c181b77ddd99867be31680a6cefdec347b4172361d3f7185650c0d33b9b13cece71a83f6c484cfd83e45fef9c23e0686012c9182ea02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdef8f76c3eb4fce2e7e429b7054fa3f
SHA1634eff08c46edf82a4eb693e15e56c9d11cb5a05
SHA2569ad16900713a30f34de76567c72f3591b70b9a2a8ab3c92044519b465f9db70f
SHA5129319e98c1a645982f628d25d0a2d0be252b2335dfbf5e75036d61dc6836fcb2172567acebd9719f5b3c0c978206b22c7caf99e5560edff4f5526c5fa96e6a927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545722cbd0117ae03a17e0d0382daa93f
SHA15d6bfc842466b36ef3de79fd292589e561f9e39c
SHA25616fca4dbf09ac14b081bbe3600a85b4d3412900c127e752a355ee4cb7a7f5c38
SHA512c07cd6d0f49089399a1fdfc5ab751aa897b00e4940d9c69ca3bca70e98092aca145546103f8c6479948f51c60efeeb89fbf8f27bec6335f879a73036775b373d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0be17b639765178d697e42fe6d5b223
SHA16648dae8b4f3f29d8683dda8449378aad8ba545e
SHA256584768f76c42b015c5a21cc027856fa0aa4446c1515f586a1c52e27d35244532
SHA5120fa44b8b38b4654f8888c10ad0e3283e196cd28040646ff4adccd771928256b4e695a3f94a6dcdda15620236b977cea33264229a67a844cb89aae5d80a80f1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2a15fa8c6f28c41bda9c5cbadac5e86
SHA1b8b19ab73efb81d4ab7642d4e95bc54b20c655e5
SHA2563e55e939f9b2073b4c7f80a9f91a9f737766e8a14d1faf67cebec799cab94acd
SHA512c4e10bd93d9cf0a6d7e1e98ba053a2169a55fb98ca03e3478bf866fa564d4d7e6a230acc67b7614632663c7ab91037a1c50b285cae9930777598c173a6371cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d681161d01fd50d3334c8981c4f943
SHA146bc70a8e692cf0981595925c2f255ceccaa83bd
SHA256e3b2e5b42f6e775581ca4187ceab38e090654cb9079485b9db67b951a3e9b104
SHA5126b29ab2fb292566a7f386652856ed020452c4170d4a74ebce482da8820ce6aef93e8acb154956ad38899fbbaf063b2091ffe43ca0ecdc60c710f9019885b36e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52b92be0f5e679ed8658ae84ae21192
SHA1d7c6b4f7b21b8a36d4214d40516ecd198cd3362d
SHA256b9e0f4b629debeb23ba01946848b11367eff5f73e5f210042849e244b91d68e4
SHA51229dac9d55f851a0bbc2dff9864152dd486cb89127e60ea3c076ac0cf7409d7fd8eb0bf700b9342f26e087b9baf01b1036800c3b57f4dd08a253c22efe7896f46
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b