Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
f66379d05cd1044b91e9ced0bbbde504_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f66379d05cd1044b91e9ced0bbbde504_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f66379d05cd1044b91e9ced0bbbde504_JaffaCakes118.html
-
Size
69KB
-
MD5
f66379d05cd1044b91e9ced0bbbde504
-
SHA1
69c9bf70422cb96147f81c0640ab248857db9da0
-
SHA256
a96216cddd6bce6c3ff0b7390bf85abc37194181baa0bf00ee0c1e9a57ceb6a8
-
SHA512
1f3ed00a07ef58710f7e5aa9c445890eee7b91ba4ab9ff2decf834e3621cb5ca703913a16c38bfd8e7fb217f8e5d64e83376f2c61f9fc64f63fff43a3c941bd2
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sg65fT2UoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3mTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75522C01-7B59-11EF-A817-DAEE53C76889} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b6f149660fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433442830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a26d21c3413d4a674109941d5678a53d4894a512cafbb88f97c60488567c2261000000000e800000000200002000000075af0b79c2f2b6c85d4690a7cd1d2996d4d59789b44f3a1e042b04bf42cabc862000000045ab0ec63cc4a9051125239e0206a15b3235a2b1f32bca9ca2885f2b91e4b82d40000000ed8ba5b8a48750af1bcd7c96be3f9f77c53b3247f60ed1a9ef024ef4fb7d6762795e4f6ea2eacf8c3afc5c52fd54375531ae40003f5c444ec5eac637d0c7cc52 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1352 1736 iexplore.exe 29 PID 1736 wrote to memory of 1352 1736 iexplore.exe 29 PID 1736 wrote to memory of 1352 1736 iexplore.exe 29 PID 1736 wrote to memory of 1352 1736 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f66379d05cd1044b91e9ced0bbbde504_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071fb47c038b90e6a4d4b358ed53839f
SHA1b934840d472083a38bcd5dc1834805efddf4a1bb
SHA2568dc0add13a80114aadee455d71d9ddcadd9741dd8cb49477f8b0d0a21edf201a
SHA5128cda66b84a75e2149b7bfb4ac25c71fd6e6ce4fe82d8f195c66440b43d1b83c3c77e88f118009e636c43d50dc307c49c5c0d7de5345e751c2db4efa33163ebd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c5c7d436503b452e1f91652b47ff65b
SHA170c8de054861868d758a2a2f5225d540cb4dc96e
SHA2561e8f5086297ddee24c11c440d236173190f4e833a622049523d484008aa61370
SHA5126ecff442c9f62f648a0edaddc07b9e0254b8ece1299691bbe9d3ccf8235586d55b91d54d4aa672e0c349fc0429bd39af592f5949996a4b044fd6eca05138b5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55916f0e6023be8603a4d90daf12db21c
SHA1bfd99c2c86c65a9ee2706fe5ae0b1a89b6012dec
SHA256ec467902101f0676ebe32479e1b336b2b490f1c1ee77029e055bb1b56b8d39cf
SHA512445e9a521da55eff50dc26aaac1d406890c14e99b37efd456fa2a08c89368a34579a8dcfe29bda999523c47c8ed90a6e21bfe754b4397e89b8bb4c51e506a230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427694c102b9351cd6709ee90497766f
SHA19297592ec35845ec3f3e7711f288c68d978bc3f5
SHA256884672effc60ddc186697c6511eb54cc4b3c11bdb51e26a36942c3cd1e39a0e4
SHA512432c6f0f0d526b4692e69ddd097db85f23dbe0519313648852bab499a2816992a0b1666fa5bef7967fbf705233e18a5aa88694f686767e78405b3f8251fa888b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0820341a0d7f63c6cd77014c122192
SHA16aec1347132a397f5d2590e6edc47d3ba8c6f7e7
SHA25601cdc4ff0d123c56c936e3b16e7ffdfe57486e5076e107d8c8a06cea9ac9ccf8
SHA51259fac62d8f487d901115ca15e924a78802748f0dff9b7a4e0120d494de6991afba0b1d0e8ed2bb295b5249a3dc87746972a7556af69ea99acb5aeeccd4978202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52598b5823a1df4e4f27b5597d98eb903
SHA1825fd30e0692cbc4b0ccf97cedc544b75fac05aa
SHA25689dae59a3857cb429b260297f0989eab991b3a80f2a61c7f6811c44acfdb0b30
SHA5123b44c9b339e28687c416f13df81b1be363c181f6c7eb8aa87d8234b05dc22711fe6deb3b66e634a739954c0930b8cce28d7014b1297caecc0a1fc806490e1c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54afdaae849fec28b6e804dfa0ab35f8e
SHA136e54e8a78ccc921bd10ae6b0e1ff0d2d4ae2a7a
SHA25626b836b7ac31298488ce7e0a7409f28bccc3a0292bea3051753b372f6f3e3a12
SHA512a74e65c4546b772ab454c44c630fee7db1804683485c864c27c51eaeced2c71df9857db16e88133be87e708987101c8fad5a6b50b0608cedf23739260d7b0c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f3a5a65ada60fc177f2ece07b419a6
SHA18b8d02fe82c057f073c75b8cb09eb416ea333347
SHA2562c37ee7a6b9e1e68552a622131d9ddeed0251c73727befe558182163749a1f59
SHA5127619b0de075e0c3c9facb64a43f156bbaa01ca7987c6536816dabf4f3bd0d10177280de1124d0787293c2c60032d2947819a553db55bba75babfeb2f61325054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538aba085393b254df1dc760aa797ae3a
SHA11f5084cc3930af973b07776905236b45489d9af6
SHA256fd969f18e84548cb13e08c6015790b676017195a179775fb5117d6b55ec7ba61
SHA512cf27ee143440626ba2ab1c7d38749663c51e19e2fca214232632689807af9a206fd06e200bd81c9e76a89fda9539de936e954dbcc83b97adc1fbc8738c797513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5fa5493529a9fd230bacf3482c59b01
SHA15c0a913c892e9964d02bd8bfbb734516e52b3d2c
SHA256d440a51f7ec97f38472bcbff049ecd022228f8e3418380a69d49293b6b7b4f91
SHA512c021d87719886dbe6f4f72086aea523a0cac13eb05c166775c180dd8ad9c17288da30e84a89ce0d55028772ffa6d1f65f95bd4bf8c4f8756430167d2954c8afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3987541e29b622d18a8e57479b2e862
SHA11f7cb8f259e9b69472c9de921a8daac215fbe25b
SHA256b56fed0b6814f20ab631b7d7663b6dc2d66dd351f6ce73c4751e752cad73eb02
SHA512333707851b2d6713b2b88ac4bf33eabbc0fb2f9f5ce2064ed04d4b5f9eeda233a1830df15a40d130fde50cd2af238c1d9be68e0aa6045edcdc737f277f42b7f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc3cc32c7fa5e51f5d1d9a9deccb309
SHA1df48909f4d61eda2554557878b9e14c715b7cf26
SHA256c2de6a5e559ebe7a48892a37b465f8a78b5871949dbda5f05311e417895238f5
SHA51236ed8a23bd384a4efeaf9c6c6112dba2244bfb211ad362e622138f02adb848d64f049e97568d5bf21e86e5df13af4c94e4bf2065ecf3cddcfa97d63126b9537f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cdaec5d4110275898f39b665c189308
SHA14a0e65eccce61b84783455aea149166ccc45eb6f
SHA256c24a3d0eaaacda43dde4c14831112fa49ef61a77cf72fb2522956d514a937536
SHA512b00b7566ca96d204db6274df97bf33967d30c7d2f7f7afc988c1bfdf0ce022df2dedc3710563eb89f92274c75ac59f2a104e8e5b47e1c8e7c6384f702baff6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690726652cd62627661cc69d87aac236
SHA1e2c4b04bbeb2d762a904c9c3cebb03e46dc1c507
SHA256e233df9268d767d811c6db8bcd30a41c3f9b28e8b00842288d7f90e5b8e7808a
SHA512ad2249fadaa3f82975ec269e7af9142817cd12793fc1e8894d7b8894fcfc6887e2f0995c5a76f4dd62ec1024c58a7b5a56ef51bf2bcae2b2fc0e59b2ebefbe43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e994e30ff476bd320eb503b4bae54306
SHA1f56a03a9bacd0a026c992bd679738b3d26264a02
SHA256a51db672971c61341bef85a72be2d1f6c27db2620fc6bb640976177fe83367f9
SHA5126d94cadc91d781e7f2979048575c23bbd3e18019ca31c8e86a13503632d5e9873338fcf86eee47b25e01bee5404c3b76a15b0e007eefad01972a5bde68620060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5399198a0348523b446a007e3d720b14d
SHA1be8362bbf0e45394c97a25770fd06c2a785434a3
SHA256e6f0b260d5ed127713fc4302846659de41e36d47f7b7e61bb09c524775d2323c
SHA512d22afe593398b653e4457c9705e00d107f17cf412c3bf3a902862d0d41b64f875e7e7a75dcaeb97d22c2fe45bf06c8003e67523372c9eb2f96a73de20944a17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0226ce7a4861521c2e2d4c18c8be972
SHA1ace700c94c15b5d6854a7121eacf12f0ea96ffe9
SHA25605b250934e1c606bc0d2d6393899e569804bcbe04a1b5f5c84933489a1bf9667
SHA5123d75aae68a0da73145e79b93e1109df199862a497c811c399d480633c986e382467caacdf9413b03e42725736b2b1610ef6f1e35715f2f534f9ea1a9e985e79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fbe34bda0e2df8659185f8a97d0a91
SHA1d413177db9f72802f5392d0d9b9c7e9b470fab29
SHA256c669120c3c878138d9d7abfd53fafff3d748ca52e2a7ae2915b9e07de2ad5102
SHA5129bed570f9b629eda9a4fdf9467b3d3bbfb19196a477a22d4de6ecb3a772e79fc5d095048e22775d414ed81aa77c1f6732d1d9ca05b73c64ab5bb084966ae5a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a27d5583ac036820a440c83942626fe
SHA145d6f2a6232d995140bc728985f2f9c871648371
SHA256aa771145fc9e32a248d0b115337d62f91ad3e9de171a26e4a242c6cfe5200e79
SHA512fb99a7101271991da0a0ea9b52d1031d931aa1ff178753ed65d1843c972889ebb1348ff11d34307fda629339f2c550ac6c98b8bd6af836baa3ad23577a084bd8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b