Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
f643fca5fea0a67acc20e9a7aaec14e0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f643fca5fea0a67acc20e9a7aaec14e0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f643fca5fea0a67acc20e9a7aaec14e0_JaffaCakes118.html
-
Size
6KB
-
MD5
f643fca5fea0a67acc20e9a7aaec14e0
-
SHA1
e1f0a04a0c2107df019b677355a124ca734f75e6
-
SHA256
c1d2ec99e23e7d8afa04978114629a219cafd61ec8678f484098fbdc38d4a226
-
SHA512
6f5b23a47cf763370b1af45a7622cc14fe3c8ce03c8c3fb969cc0eb3ce08324b220a7a8acf2eca58d69c80a6da49f8994c0b3a3d3af72ed396baf46a3d44a63d
-
SSDEEP
96:uzVs+ux7jvLLY1k9o84d12ef7CSTUJ4Y/6/NcEZ7ru7f:csz7jvAYS/q4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000006bf50fd020fc4cef2d6a548f3a63ac040ba86dd728b3166686a2862af635c390000000000e800000000200002000000022141e34d0e2bfa02528daf9ece9374d7604a29d0a3f58bb6635ea7ba9daebda20000000b05ad103554edb1c14ddbe2397fa774dcc1b28b95abda76ae2e998a258074a7a40000000b7f277a4d0e3feef1e513cb7133a02c01456bfc17cb78dfc57e26a63244429bd49e1b41b26fa65bfd3bd97442bf3c8fe1e66140b72eb93d99dafc72251e68d82 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306d01c45b0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4FADA91-7B4E-11EF-A364-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433438266" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2592 2072 iexplore.exe 30 PID 2072 wrote to memory of 2592 2072 iexplore.exe 30 PID 2072 wrote to memory of 2592 2072 iexplore.exe 30 PID 2072 wrote to memory of 2592 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f643fca5fea0a67acc20e9a7aaec14e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d2bc078d226615f7baf3b65865056a
SHA1b8cdcceff3ac45f6a8c518faccbd02d6043f413e
SHA25640b708e62adeabdd03be05e062356e8a38596c6071a892c7bb4855d7f1e573e6
SHA512f74600797fe46c066dc27c0731792a04ded33d498f8d75ec51012839980e5b53721059e2a051aefb44c92e8d3217dd518bfe011d2196160b83822fe89fb6c980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a8d0e284677acdc56392fb30ea461a
SHA1cc561b94bdfa78347b2b726711ab16d29b37e316
SHA256aff786965c6b2be33e80d7988e1bbd2bbf158e43fb05119ae5189b80f64de2e2
SHA512aaf88bb59218e06805122c3061c8d1dc34f96362a15518d8034a7b8a041e733788d74a3acbe9b9f4de883192c89d4b35b03247d5faec092efc6d0e01358b25b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0b990aeeb94eecf95d4b7d494400ce
SHA1974a93f836c9adabf437da98078110796f710fba
SHA2569f0651e11ca1679f128ebae86f4d7cd0566f0090a7b7f9db55e77dfe71415484
SHA512eaca5eb6f17700126941c258a4e335021880ecd38ca51d9b2d8f229ecff0f10fbed397084c770fc5e644ba456c73921e4e387a4e019529084829329a3c1490d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5857e41c9900eb27fa2d15957f9c8df28
SHA1edd9dd3cda2124cb28db8b4625b1854eb3f0d9b0
SHA25646398adbb48a5b5d64776c4fb7e1a56f9b5fd7f7deba371490c8451ff99b749d
SHA5129c292dd539c2e2350c18c46e7009222eea272f3a1533f46dc29e65b3b3699b25c7699dffaa6a2189e27ae94e2d1f5decda9330b6c4da7b77d709bd59e36e867d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ed750f8b0a422b45b416c14dd7d01e
SHA119852697383b50729960d60fb5c14b16168f4333
SHA2567bcfdc9caac856598269ad2c5b62e6db2bb8944a4f18ecf59f68b7944c167ff3
SHA512421b78210fcccf08a86255f1d1398adc277b29b8717f66b74788681f091b53757af7c04cbb09eaf3077fb8d519e1791ad52a7f765189ca1b7aab7723ef0e5c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49f52c25a38adee5e535dcb96951f0d
SHA1faa8d46fcd4a2f72e6d74876c92d55fd6557c45e
SHA256dd4601f7a91f3cb6a51c1680707fe440279a6a705de9ac525cf3a65393ede358
SHA5129503840300c6109415ba4d8c22f5ed609c09bb6964796dc684d3bca894ac7d024fa8d02fa9a603d0e8d4c428dbde5bc38f35b54eba80ae6c3b50895bd836b252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c5aed83a5c82e8d01161402b836140
SHA121036069373089ab408f550c12591e6059f4089a
SHA256295de2f47630bb9216a0ce2aeacc961f6402d303ffde51949493d5443db0565a
SHA512b58548eb45bfe7f2dc91cb7b6017bb715b2e9ce07cdada4ab6eb59f6caf1530598372cc3d8a3a714536473221e4585e210d1ed18ee51a179fa4ee767e958ea1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd8f1292181f7c0e4961b1b3def9fa21
SHA153d7e6989088838dd8a31eab42c17bf5ecfe3991
SHA256b60333996cd562ef272714196cd9637a6ad0c6e44e9375d93726eabbe337b06a
SHA51224637c6419aa806a65dad5a884d7ab09e883333e9ede496ca8887b1adb9f4e03d71d4ec4645ced111e459a1350c2039fb05846012e31d13c8ed2075306a89986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e85cec9eee19252357ecf591eccf65b
SHA170484cb6bbb3f6fc14c42a053d71c61448ee3e1c
SHA2566e8e3633bc7f3578eb1eb7f9f6d91aaceb8f0401c2fb560d2d08ed8a3cea5ac1
SHA512e87e4a678869c307bf96e205a48f1c9b7f8a12fbc67615b4f4dd6672d81332c6fe541a9e1a983cc611759c05ed7a7a30f0610cc561ac257a70a080813d1cb6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51234ce6671a6a9152d57951e96b16d2d
SHA1d3edf6011e3058abcc6d0b4c6f52be79da283ce1
SHA2568f1255dc270dcd01d199127e9bb19324ab4004765ad76004e37b4cac7ca8fad9
SHA5128034b327f86451f18448001593c7c6af3133cbd379d84c7597113cdb0fcb76fdf4583aaeaf7dc696882bc1f6cd9a9ae5b18b6807bb1ba76378e34e4bf2f367b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52becb20fda9acdd126e176bd3946e0d7
SHA12d672bd09b0f4ab087a143f72a4b9fce84912dac
SHA2568f97480a4d27a0ee5f5122f3253cea0163d2e58db0b777739ec780a51a614ad9
SHA5121038f423cd66b0a0e6b90f9110ffa6a5a8d674eeb0b82432fab3f3ee179e51dd95c914a2ea405d4d6160d710bd82a7d9c8d857f69835f6e878d00328aa113c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139a7ad67c971aa3ff0432473fe50659
SHA174e2abf7befeb01eb8ce4b572d52d57cee968b4f
SHA25629bc929660074c96555e646af32e336d05f41e041b15b6ba55b4c0e4cf0964d1
SHA5122ce10f43599b8a1723ded23b122c2a5c9a4a2927413284e28a71faa44852d4d978ed23a9c0c63f78b280e31c73b557818576f403f0d8a46aa53641f3ccb8c2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3703d9471e80e9f980ebb4235f8ad86
SHA135206be416c1c8c20335b490502752d903246b42
SHA2563d8131c168567f1a5989156ae5439e6795797c1e95146d3f936b8856139e2692
SHA5128404d940a4af890b5316206bb558ed11a58b2eafe788df3dbe7d9bfa41c8d4ab5b2da97175e6ab1c22106ba29c542cd3ff5b56ab0a7a3e27f9f633ceb8c92d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b96eeabc14ef4fcaa659f418bcaae9
SHA1f6cbb31ec3c57f1e4d5b80bf7371c460142fd31c
SHA256f618b75d398d43ba4442de04ede358361fe5d8c1d7f24e2bac1cb79c627bcc5d
SHA5125351fe4300db50837694a22a7de3456d3f9659a4f54ab0a4283f79a3b41a4c3152993fd29826b5ecc190574603a56c36a6f840452a98dc8666fe00bc08cba0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f08c90652c0a809efca1375c046402b
SHA1e4e3f0a8f2969b1125f7cc4d47e7a51e9758bef7
SHA2564e42c79dacc3de26ec87f3cc30458bd3cfdcd2a10f40f073272063ae3751ad48
SHA5126de0ad720a6b7495973180620c9ef9f430b0ddcbaeb9833a54b63ea77990327aa59168b9bcbffcc60dc738d44a7dc7b06b6d6b16705dd1483e0ca94b95f36498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f061efc6d339657477da76684cf83493
SHA1647e9e47e44e3d2b74bf47330f07da9edeb3cdff
SHA25689125d61c4a7c17e1e600c33545066096566b5dfcb8dc02240e76ac17413f239
SHA512e4d60a47a38981fa858d9335814b289e63f75a46c379bd04a949f99d26bad962e48500e4fbafe91c4cf25dd3dc1792ada13066ad89bf98db784d8d4aab52bd0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8b21a306a2666814c7d42c72060382
SHA1bcce1b30d8a76c427b9ba691fdb80f42cb9ec38f
SHA2567549479a47ff3311f0eeef7bdf4a999b9ddb167c4ac9d3f632f328acfe7ee133
SHA5124312d50f16a82456708b6a4a808a54221c8b55da52b4840abb2a702ab3a74aa7559c809d3bc5c28030c1654bf2c7cbd16146a8a5235829d751ea0491062117b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c20ca7f654ad2a8d13f92a6411bca4
SHA1e35ef1e598e1a8ad73dfc551e338f6e7f2329679
SHA2561d259785a135615e8d8115e853bcfb503c117f7288b866c9c5e52df5889a4a8c
SHA51297e5b7544888bc09bbaed6b39ee4a366f0bc4b3a2feab4a2ec91303f128812c00b035d79bf6703244a5ded82ae804e524ee43ef822209ecba3d9d9983825799e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b1ea9799da91ce36c45e7a62a3e367
SHA14dffca83b2d1e2f5c0e20af1acc540bef6df4699
SHA2560f1cf3a1b942ae709a0755fbab9e342c1b112cf6aa71d6c6402d6500f9cf4134
SHA512c012a385577d3464695372a2b3abd6d999b47a1863fde83ac9472632fe06faee965c410a938cf4d11dc613a08e68951b5251d88e3c6d43f22e2d2d363d51d9d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b