Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
f65f6292a792540d1113f494136b9a66_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f65f6292a792540d1113f494136b9a66_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f65f6292a792540d1113f494136b9a66_JaffaCakes118.html
-
Size
4KB
-
MD5
f65f6292a792540d1113f494136b9a66
-
SHA1
7c88aee1761303e6d569266f69e53d37a15ec453
-
SHA256
d7f729c0ff76007d74a8eaf57bfcf36d0d5e847ca8fdd13ce25b8ab4bd46340e
-
SHA512
234809641bfabc408880df86f87a04d2708d0b74435f22413f18dcccf0c7644b51b8eb7dc466bdadf4bd16f6aff805394f9f17a77a0b84882685894361094a34
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8owETvKTG:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e20127650fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433442342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5291CC81-7B58-11EF-972C-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a94b80ba330e839d955d12c8b58641f393c6d40ec79bf68db7dddc7612d46011000000000e80000000020000200000003397936c86f35f4aee7dd48eac39fa3313d7a728d7ff2c26eda38ca1c5ca83e020000000a2df0d62f53f80a58d1190c46c7b1469853f3d9aafa0c6afd22ea30a1a494e45400000000c1f2e5c62df76166a35297ebed2b1d8e1e204da1442d75187613f2ee7e4b1c5c6b88ce16782cbb1a9b5242765105e45ba1dd3f6a238f839cfc2b0d53f28bc28 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2888 2648 iexplore.exe 30 PID 2648 wrote to memory of 2888 2648 iexplore.exe 30 PID 2648 wrote to memory of 2888 2648 iexplore.exe 30 PID 2648 wrote to memory of 2888 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f65f6292a792540d1113f494136b9a66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5816c3580428e3d46f7faabf754de04fe
SHA10b2e7b295fd264b58be2ade1cc2584c3c5efbbbb
SHA256ef1c70facba566f240c9098c793137d99b687f9ee406e54349e44ea8c4140233
SHA5121c8c239f02137985841e5e9e4e950e0b07c60ee0594e3fd60363c4cab9ad422900d2f2715272e673258bf79d5a14c683b0445060365278676ad0664b440db122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680627db0ce13a744bcd2f9b15c58b51
SHA1df256a247c77875baa12c621f32295a71901ac40
SHA2561a04b6e864bca09222a401596c9b11254cb49a9ad40eab04b7af46bcc3d18de3
SHA512045a0b9fdfa381045fce9126c2784be6d1244eb5f739aea30404dc1491c1f805301d9046ade2ad57b5f639c4375709addc4c572013ea36eb9315ce02b2b3188d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f233ead8bd02d621788cf6349f19b28
SHA1d9295edc6969cd7619eb3351261a1a85f40e2abb
SHA2560d0c03606eeb070090eadc764451577313fcac3ba073589799008748ccd060e1
SHA512e38b8aed91376c1b71602bb5904aae6873af146ae841cd2fa91e33d997c533912fd52be6d8bca57d387b059910fe3e64a907ce8aef4b77f4222c105f9c9fc850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b75c8253b62c68c16f45a94bbec8015
SHA1055808991b6b61df37ed7fdf2710038287f2d6f1
SHA256d0ffb477a4fcf7e216182ad5a1adeae89353d116dd676d60289013725eb2acfc
SHA51200cb1ddcb25ceb4d82989ffef8146eaa39e46169d94cf7bbbf95c95ac59362793f3f3ab63872684756892e7add74b7585c244334f6ae2b9d97984856319962dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b949534869fff4ab0aa169918a98022b
SHA1b5840a08c4c5fe00d534468b3466f9c6a77553ce
SHA256a1517fbafbb0a0d0ee62f9e6955fe2aee46ee5cc747346e2a5caba6d3ec098af
SHA51225fba08dee2b1107112a19865bb0afc8aee6959a79018539830ced7af5306788ddf0824c0c8d018ffa821f2ce9920c57d5f8e4e87ad1caca7f6482cd13dabfdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ce2a991fa0018aa71bfaa2d1266f286
SHA1afb5ebd961db195ebc06e775083e4916f2b05ee4
SHA256dd4b527673b33695b27c8c6d2e3c9001cf9fd8694c0ca5c5ea5616426565331c
SHA512a34f2b491f61b817712e3ce9355b282afd929d7db23e3a5dd4d03ad90ce22a888040093307a0bdc0f7dedc031b727e9c3609bc606e4cfc3264d8915aad5c2147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549db172419728ef5653b2a14b3448d5b
SHA11704381596d7148713b2a8d8dd7ebc60aff720f2
SHA256ae51ac72bc0e41ff93c44b4152ce4c7f9a67620c1c780bda58c9f8788a50953b
SHA512f45b7103d6e52bdae9b634785e0cb6efccbb76ce8332cb7baa90fae28071c2292a0021e894503fcbf9743f632ac47b69f60686646cda70076b2224d0eb3e7b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6112387a09444efeb385d59cef4bfa7
SHA1697c392b6d05b736a3629c8ac5baad2809de1060
SHA2561357da425f948ed056af6d3441e9609cb28b066c18205bfd2dc32dcb30202394
SHA5126f8095f3895348d0d0fa9c46f5d410c24f826e3e567d82dd3355cba577570c283eddb42714e960fb1a372dd8a19225315fccd46015622f5b174e3e2e9e51bf6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b504885a77841f710ccf5823d696116
SHA155fd43fc77c2599d84d843ffcbbb664528b66b1d
SHA2563cf3648db3e8562e9807b504ea44972433bc6df88cf4d76ff2aa36e2fe814220
SHA51268af86c70f9c01a922eea1a47ccad45ffccbc0ad0db29b75210f0b1ffb846add44c0eb7d7e39d738afeca9c5cbaeda82fb1cce2a65d4fb12e2b52f6ecbc74bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd3fe89206b00bbf5ba6c6f484762c5f
SHA15aef537b4085519ec19d3cc1a45730916b70135c
SHA256b25492c2745bf3b87c329e54e8e0585bc14f0135a80510814949c98466863539
SHA512d784a8535f79b9bc5fc542198af3a276d2b461f1b5d77a046280b79fda1c507f33aee8b45c4b3f18beef3136e0f1d424b83c65d6cc78128861f72daf81033025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383941994860d787a64d072fd1194737
SHA1c8de921f6956baa04104f42f51038ddcf0d9d2bf
SHA2569bb75f6c2ba062a633aa0418e9064d90c02f5944d45ee3c5481d4760d44f77bf
SHA51297dc7b0e314f72e4506b2f99c0ec7f34b4ceafacd911b4aaa3efd706e06ad3164b74008b557b7e9127e5ba7af6b6738c5f0a1f744bfef6598cfe2691aeb93a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e251d306fb10333881595f13787c5753
SHA1521686faa46fd5026d4269dd0196ca431b21ed35
SHA25636c6e668e9b4fc76994c4210fc348e7280e7ef77570ab2c61f24a64198a528d5
SHA5126776cc02a038e43d9204b09240f389555ab31ec2d3dd81eccf9d7b77233e80771d861881c37e7e4342c6ba1402ce234bc8799f5b5133b6b30e0d9b585718c0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddaaf44a8f5e098ddbbfc453122a26e7
SHA1b28d25ad09797b6acfe1a3276acc35ce2ea14cdf
SHA256e6b714480a52c2f3862066f3bb9f78464524d8625ac7d0d35f3d683ba49e16a4
SHA51264b24a63912cd591a4450800b88fbda179f562fc07c8e4c68333672e22939b7fffbfb5730d9056027bb1d60cac73455e29309d58865efb1bf6fea1294c78dbc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56136a15b30bbd2d5a8f99c629b1c4f03
SHA195d1e3eb50293ad2082fdedd9abf5acd72041125
SHA2560188ddc9a52a3b77fbd7ce59b7938ae224cd306553f2be74895f64f86f61ecac
SHA51239ddd8cb634b113b26cc4eb1e66f9b52ba0d313dcc1b5f4ae6621c28a984177182abebc51275b154f7089887574038c9b81c9df3fdec492f5d17f14a8622e6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd3daa2d0d6c106d0ca637042fb53bf
SHA1bae9b2bfb0589574843f3522d953d91d7dc7ac8a
SHA2562fbbddc42de4f992820f90bdca9fae2e51f450e4ffcb0d393f91e464efbdf03d
SHA51263ddf5b1fbb461e8699c309bfbcf2685d056054ec49f360a439b3b0593b807033a5e8e60f1250703d33792311d710b4a389d9d79e881ff68dde55b712291bcbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1b293d6515fb0beb732b56328b3b4e
SHA191524377d6475a42f282598d166d4a6e18d2da86
SHA25607b22988b2ba7c7d20764175140d972d5ae4d2194a39e10821d6aeadc4a6f315
SHA512a1561c090dcf689a05fa3fb6bb94ac9089f468558fcf2fad92fea726d64cbc8b09db957d1a0158a282b85ad2f334254760b1581ebccfda6796f71cb8071b82b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addab2a257403af8426fc4a1aefed131
SHA1ddd428fa33116521d27c60d3a89fe117c69bdad5
SHA25640aa3eb66563adc19bbfa7ceeb6fd4adc974083e5cde2cb67d405f13b1a64fff
SHA512ed099df25a236106847963bf1a444aa9502f923b779eae29eab86c98a01bf910e4eed6ee1c885b8a2c2d0fcb1c1bdfebf1260ea2a2a6a7add04c382279c2b619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c176e32d2881abfc030789d1e2b5abf
SHA1eea7b3284bbff6ac22ce42c5f400df9f0a644d62
SHA25625b42711188c856f0649e0c478940ddccd0c4d5d7265b5f7a73949092f62f629
SHA51214cb0d45b54a3f0c9c77136acf4a5bfb30360b8a57231adc72c4a3dd34a7e799be7aa2208aa66133f2454b2260a220cdf637fc62ace95e97ebda56923abbf011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5bc9f20283f0f4e0d71bad8388d103
SHA142cc0be30334c1bea71ccc3c114cf39405341f12
SHA25609d76e92f5f8743aef8478195f9df41b56b4e66a6b93a5732c6b4c684ed8e180
SHA51285bd092e3cb30d842d944ab1c79efe3c174315470c30da7dfbbe5a6ec980d6ef49360406bdbe15e04d51a98ee32e8ef2cb62c387d449575fea5e004bb07ae470
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b