Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
f6921556b36dfc85ef28c88ab217b5a9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6921556b36dfc85ef28c88ab217b5a9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6921556b36dfc85ef28c88ab217b5a9_JaffaCakes118.html
-
Size
460KB
-
MD5
f6921556b36dfc85ef28c88ab217b5a9
-
SHA1
da0e8ce02b1213dafdcfa5354c3834ef6ad0e203
-
SHA256
d30ac7dfba3cb374a2a2a78953ad1ca6f4ef956bda8c0a350e767aa610600e4d
-
SHA512
20e6a9e6a1d4addd00903bec142ed5fb55856e0f92936f79994c3e18894fadf126509cacb4617ae7a4852be95a0532b7c40bc34a3bf9df8529999e581a4da729
-
SSDEEP
6144:SNsMYod+X3oI+YisMYod+X3oI+YXsMYod+X3oI+YLsMYod+X3oI+YQ:U5d+X365d+X315d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e556b6750fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433449445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC33CBE1-7B68-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000009a0bf167ca48a51d8ad7a45a5347d6015344b1ce28bfb6357358208f57b1a7fe000000000e80000000020000200000006ddcdc5d25d78a54822712f8f7a78abea2b2673423598a741579210ebc862db1200000008a6bd7248e64fcc6b432a716cb6e4f0592a0c740b45725e6cd3f984000dc710740000000f31dc3de8a6b0d30d0ff56c46b3606c799a0edd238d8b78b7b6f0b2e8c2c7dffadcaf6285c41a080f1b864bd8c9bf2c64fd5dfa5b0a8f9d51fe4e922c499e09b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2380 2484 iexplore.exe 30 PID 2484 wrote to memory of 2380 2484 iexplore.exe 30 PID 2484 wrote to memory of 2380 2484 iexplore.exe 30 PID 2484 wrote to memory of 2380 2484 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6921556b36dfc85ef28c88ab217b5a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058b6e0124a14fdb82a591d8310d544a
SHA1bd85d9f72e5aebd299ac7037d76e78628d2be84f
SHA256decc0493d274fc9b59d6bdade9cc22eec01ca02f5caed28e7e173df0500bc639
SHA51272f3d5e65d96de129cff4f260ad2bb51d4f14c4da5fc44f6e79eb7a1c9eff14e314b1c870c68158248b7f3a4a45c6163b219609afe52e6fa6c4f8be449c2be38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441522c9f48efcc016f14ab6ed24e688
SHA1c735694d4765bcf24416cf718a881c748b21de0b
SHA256d8ebd25a55784bf1bcfa17bd7155ad8ae38216203c8225ddaa0e95e3fc27d3b8
SHA51285820c7c9de9550e516f6c0c0c26666ab2e6bbef4b19e2be33d840fcf7ca9c3f4e0ad7b50b7e15b328b18b16624fa0ff2ef86c308ed2959dc2219fee7a6a801f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b3c2703c38870b1cd5ec5ffe2dc1a9
SHA1c126920979ea93890224202a815ab57ce06cfcac
SHA25642b01a67014ffb9a55f06b6d5e9410ea7172af03abdb974e4ef6b9d56bac8d94
SHA5125ab4dc84519f927188367e8e26a53ff0ab2b8e127e3c7366022f5c51068f366a4f18c5780087a96ce2f80a992abf70ff3fa2cf6af9db354f41b29fbc6cc3fee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5456ab99a1b77f53339020b0a806fbeff
SHA1d50ebbe4bd8181c463953325dd8c731f20acb014
SHA256dd163f3f6b71cfc256e2b9c59f8fbf11b925b8761a816011ac5ab3474dba4a54
SHA512dfd70f73c097b535ad9da5600a558323227d47c09ff56abcf36618036c5a617ccd6bbcd16c8ad8f678e2bed64e67fd4a4ab752e629b4f9dd41c775a129fd82fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec6c581888023a6afbc485417f3b553
SHA18bbe0da110adf89f454f0e0122be660b02395697
SHA256e81f1c2daaf772f41ac77cc7fef6797a937c41515f5e6ea757d871994129fab5
SHA5129d24f6d6e9b6637d4fa8693280aa59f8bb040c10ae31e0f3dffa76fc6022c062fdf81b42cf0329cc8876fb5a0231df70f00bf5a25f3d19d040d9ff5d74876eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1458cb61f032633e69b1e5a66000439
SHA120c84997b139b0558bcd4847ad9140510af166ef
SHA2567f0db8942a5445c4cf8928aa9989e114b55f2386a3445776362201e8bf1a5a3e
SHA51260ab804aef4dd47dc0393e92cde7d4b04391a62c0a50aa0128333e343d955582ecd8042cf46a7bff9182df8d1fa7392077c537558ee9123c39af948b8d0229cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb6cb4636a807c714ddd951eccd5ccd
SHA1ccc7332f41f4fedaff0979aae92285ef0e2b24ff
SHA2565ced70f35af24718364fbb95d22cd616468f47449e32f6674412f1ebf9efe576
SHA5120686870e3e62243d4be79202286a9e2322012c8fa3194b713ed53f2fe4ab0903d001bcb0351f743f3802dd1c880a20af099b237d7643b2c7745f49d12a221036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58202233cb124b212448d8dee6e9b4a10
SHA11f24a464e71c9e74230ecb4e0005303f0290ddbe
SHA256ddd8394cb966efc7d9f3d408b2d900e8ba5eff53c23e96d2b391dc5f2edf7989
SHA512081ff05cb02b10d7eb44c6d43dd6ee52e5523154d1d29056e4d4050f4a0ddc87780a3eff88fd15c88b36ee1f640df98036297f5157175dd766403f559c43d169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502505c86464f833fc80d77351f6f2769
SHA193ce6e65f84caf427c80fbcabd3f18b7446265ce
SHA25640a2dc23debe3086a265b95ff40c4fb5e81b43a7ce6f10c23e8b89fee89acd97
SHA512b2d47615ed125929ac3d02c976f682078002f50a9df0bfb6f30e88df326731920b193dfc7689501d4a884df5ec81a533bb839d2461c37c43982141b51f8b83ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ef4d0713e74496a70925cb95f8f521
SHA1f5b312ec5111410c6a2e6fc0aac11527b7c32a27
SHA256ef07796b2189c88c224c7a8bdbc8c6b742869df55649301b2a7b63b56a4e8e0d
SHA512f29017a73f79b7d33e804aa07080007178698e50dd67d63552c56831453a743dc7224c9a34905b0ef49021570a699c34a7641b9883f260450f8e05d607ba23e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f90a1a58855e1f67bd0845f85a3556
SHA19d19db02511e4bc8ea9cc6c1ad67f8e61b3cd50f
SHA25661faa7ccae6ce3466b303ff2edd85272719c10d074dd70ed3aaba026a50b52f5
SHA512dd42a906fb8cec8548a768c198b952048f1d05228fe9f2b12b7fb2bc7b7287a0b076ecb5985ce0bf4a20584ffe91f128ab7e071cf34b0d13edbed48f7a94a608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9fccc25ed54618e30c02da10a4c2eff
SHA168e7c3f49a4974a14a5bf69a4a2ffbc1552785b2
SHA256ba056f194aa35ba8a9346c8ad8e85165ef74455dc25df79f303e4e5f1bb03eff
SHA51266e13b79a5bfa743bc5da801bf9a2173ff23098b4d17e95d3859c14bc0c5a474a9790af8e5f016d4f4db5a83b432a6b32098ead5fca8ab589acbbd27327b85b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588114347eb67024027c94e170c35ed83
SHA1a747d9c60d35860654a4bb236ef99dccfd6a69fe
SHA2568e98b38b3a8b412705eecfce570d7576cc86dc6be06dce1578d060d4fcde78cd
SHA51272176b8e6d3d7864ccc04bb27c820f3c6fe24c5739e9ee5ef59cd1ed05d7865deee68420e13b7f63a458a260592f4aa9df71188115bd37f4271a95946c298f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd109e4b3b793267c7fa3d7c6db462e
SHA16af5ba8cf13c2f895b9ae68fd0ecb96b294f27da
SHA256b53af11d5d4c5c3c9bd7c61cec9a5013704b0799a4e14af04be9d5a1d2b8d603
SHA512c844dc7155a4aed3eeb07d0efb02833121b2f57a9b928a19e1e55c76e6f2f66baf9e6ea1aa911ecf829d811ecec37000528c37fb7a0666f309a8e7369f18cf9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511746e162cc162d5aa0313e37be6f2be
SHA18bca37e88f138c08f6355c66244e4c661ca9df8d
SHA256c9db59bc90fafb5cf926d6e41918b91320caf1d221aa382d8cfc94c7e2d16b37
SHA5129eeb650e56991feefb9b8dc4884d11fa928bc4df9cca28763d25cb41a62e3050d4cf7e2386865fb39dd4f3926d6dc9e998dd2ecf88f76b57be4d6c8d42fe7355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e91020418155e8d6c35a8cc66e4e5dd
SHA135249e1f9f5763b213a4ffa3665cee936bbaf2fe
SHA256023c348898fb30ac54c63d0ea73982ecd2a5ca2674b6fa7955f79549b4e4b289
SHA5125036ed30cac95f03569375dba3a7affa7e5abd63763e8185f6b5ada711435dbecda49b65d45e0d7dd75eaac5a49a1e4c2baf85b3d4c9b52fad12f5b9abcf2b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d97c17c328f56d527a62c1ed2808cc1
SHA1e6760e3d14aa9d6ca0c27d6975e4b8e311acb572
SHA25617db2fe01b77d95b5468d54e0b426b9211fe241d792af2dd03fe079338fd8f42
SHA512707604569b85d23c99932b612a102ae16c788ce542bdeebe72e29c66b7ccf7dc4f17c2206c93008bfc514a67187f9493f3a028c4e790407b532682aca0635bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8237ee1e958721f06244bd2f602e65
SHA1cffd8720a88288069f91ef4cb279e319ada399a6
SHA256eadc23321cc79005aa07a4ec6da4fe891153a0f89c965283aa903022db8467ef
SHA512a74ccff2bd8e4d62ea9f771f45692de6790e89940a9415de4a0ad886f4d09269c780e8592d1c29da0ddeab328a2e19751c7822f46de70bab98f2df395183259d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f170cc0644e67237ddebffbd6909838a
SHA1288ee7071a3569e36df5da0bfaf6c9fbd73dd189
SHA256b2c1d7d61458f482e5a22dd58a20faa6afb773deabd7048c107ffa3825179100
SHA512d7e696c5868efe688618722126f02cd0e5390443e17a513db7e4d422e9e9ea5e7ccd251c1cc3bbcbe4c7b0c450f86e852654f62ba353d5c247d32f60674c9c2e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b