Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
f6cd197cf9b8d39b7802f18c179f6c34_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f6cd197cf9b8d39b7802f18c179f6c34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6cd197cf9b8d39b7802f18c179f6c34_JaffaCakes118.html
-
Size
26KB
-
MD5
f6cd197cf9b8d39b7802f18c179f6c34
-
SHA1
f34149a36d3de1041c700e5cb7ed45624ed428a4
-
SHA256
851a0fc8bf9822beb272896c70851385307743b816cd7cb57ed3217fcc4227d0
-
SHA512
626feac63b04b1adf926c373fe9c9ef7aff19bcd773f10c14651118803fa574bf2f7de52e8c219c3d96c6fd1f7663e153fef5191a7e66f8f7350d1f0aad6407e
-
SSDEEP
192:uqqn30b5nSmnQjxn5Q/BnQiesNn7nQOkEnt7znQTbnRnQuCJVevo7NtrFo+NzQ4Y:nUQ/GygcweOv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB8DD5B1-7B7C-11EF-B856-666B6675A85F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0511ba1890fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000011e250747f92aa0cce6247a114650c11bee87a0df92e932943171e8b9e205f82000000000e8000000002000020000000fab06f32e21b8bc9a8fccea864b8b861886a9ac86d4d405c3ef2dd0e5f65837920000000f2dfc054aae73798420fe95d75e872beb4d88b45d8a93e37e72e599d2d463d75400000007e8032ae043cf17f5aea127ed283ea02054320faf78ae170231e23a2aab84ab4e00b0976f18c47dcac9b09f157d62bfa2f2f9fc5994755b5c012dd62e84921da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433458006" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2304 1744 iexplore.exe 29 PID 1744 wrote to memory of 2304 1744 iexplore.exe 29 PID 1744 wrote to memory of 2304 1744 iexplore.exe 29 PID 1744 wrote to memory of 2304 1744 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6cd197cf9b8d39b7802f18c179f6c34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314db5c15697e671c1f93fc9543da73f
SHA144216708e7aa36044046c1e0c667b426ea0bffa6
SHA256589160509634409af3b9f731a3b5b13e5c6c7ae854b4ebec84899465ebbdb079
SHA5122dc423bef28ad26665bdb30ed591681a41bc162b705fb6f5d8ce756b48294b2ab2d7a22a242f63ce01a3b43e445e737bdfc43405fe36d96d12ee98c51899a24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f496e431a4d5cd719142965c713d150
SHA15dd48134f38a6f6e847834f34b05e5c8eb32dc60
SHA256ed77210de2b8a7576d721ec4cd5511acb9db1c14b60e9e8bc0c1f7e5bcdcf3d8
SHA5129f16755360195f9a7c6c1652c573bb5ffaba438a8e662929b5c07ae0372c4aa8438e8eb5126ce296126a83e60961f7139f4f61f0b4b2cd3f8e3168b8e666e9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057408d4bf07cf6e02e850367ee4c6ac
SHA134a339117872046f11554c99cae97df80080ec1f
SHA2567454983a0f2b3f037ec4ac4d42fb62af3e6725789a9e2422125708dec343bc30
SHA512f7553944402b73b3d7361066c8f88024a3cef2d6a29d9b48e274c7ab0ccb6a26f34877cb8add6d8782673659a78ba8ddc35c5e8926db7e10a4c0550c388269a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480487b98737d5da8462d7cb4d46895b
SHA12e01ab4ed208a700be22f6c96c33c0d020cfdc35
SHA256db3626c2720267497f9c7508a1f98086fb42fb0240c0e7c554fd801be1dc1ad9
SHA51216b76606eded92c07c5094854f1f0241f452091475012d6b3677c2c6e6066647b941c3e59b3e80ab9dbaf918ca8e73cb5ecc995069f66fe755685631bacc56a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548460b06ca440e02fd20846dcebeba30
SHA15b14068638b813167738d3b6a263bac4bc7b979f
SHA256582421516fed5cd4c47018fa288f62e1b078cb30fd0e10803d48ca698e0b971a
SHA51234267ffc565a1ee41c68a442303196def17af8f4572425426a1d3d9fc66593042c1150c3f27c74e814d8c83891d0f2bee5f6894faca1b91dc1ca4a6e7ec34b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526f68459cbc2de4b7fdbe503fdc423c
SHA1359e6ee04f8cfb1244040ad793c0ceacb669b6b1
SHA256b418cc4d7d2044af24e1be4fc50c65fefa072521b91ec8784f0baa9deb154738
SHA512cc5924c7b476f1ce3f9805c0aedcb989c93a42941a940cf41261597ac73879c24b98b7817483ac7d2727c52b74247dfae7f57097df0ae52743c9cfcdcd085a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533da322e97b60b518ac7a7d37fb14084
SHA18f1efc8d3b86f2d722f1be29acb6f0a3261846dd
SHA256e70a1b8ae1bd995a9fcace6e82354f702c0a7f9de0b12e9226c22aa826340024
SHA512099e83e05c73b2c414dcd11c72b68da143faea6b02817c53a66d75e0869bdb2d8ff7365e5249ff1305aa020cd60c906fa03fc14b8cd896e71a283aa5f6c85e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592079b7d541604d5f2e4b67a57d4d46f
SHA1ae0b5452a7023ba1363def3e02935a0ae48072ab
SHA256edd24e89ba0576c92f5df716f9ee1f59c790ea1e3338565878b42933eb6dcb84
SHA512931c58501344792f26debef7b589f54343bd6f501f73516f0a5b23030ac6d09ce6997f7648ab1b91b5a24fbb54fd39b9165a64c9db3d6d0b300c98e12311d3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578a5b4943ecfa62a474c120ed1351fcc
SHA133b30d04a72f43189edc00f66effac905b69d206
SHA2568e53811fe7577743949f8f9fd63d1a229e58ae8563e7b92cc2d6388fa3e1bbde
SHA512cd4bbcc910f584fd8e278703f5002ac9c3371843f565d346b40e4129acbbf205df61929777a3b9445295bfa76107c287b018275f326877615fd21f6d11c52863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd31cc608146af310c53f8fd98ece946
SHA14e70abb034ac8851581862e87ef3bb005bd48bba
SHA256e3cd4e7ae948fadb6fd8a004f2c16192241192c28b63046480a6502f91e5a6af
SHA512d1af65307b1cc5eeadc7100fb05980fe60e747c207d7ff8e4dbc8fa74af9ac7cc93d868686ee395967a2041ac1f8add4a4c0eccf09f51fa8529a7b02b47c356a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6d63a160eb5d4accf957d0a1a5a212
SHA1e196f8c60adfae8df9fdc8f870f1e9ff7faef68c
SHA256cd4d4b305d0d743e9d2755a91c45a411de1d8072f86896252417cc6692f04fb2
SHA51217de9d3c1d6187d050f679b066e8a691820eb0ca5de91411003ade07c1c208218c695a60ff5f72705bf0451ea6a0ffa9b9ebab5afa2f41bad1b0bf1030806afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565fdee5d4bfe3c4cf334c64ffa918829
SHA157ae256f598a4b919be83fbe0935ece11fd0d02f
SHA25606c926bb262090976a8f2ef7984764b670c5be2d9d2ae5735fd66e777e088953
SHA51264961d0184474001dd6a40e70a0155a6852a280eec5ba522071ddd19add8998075ae93eb9384d753f742416376af0e97a5b21cbe8f6988da2c7d2aa4d39567cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb9bf72c01138371204a1a931c34879
SHA1f9bd7327753633c9c4f48b77824658c2bab8171e
SHA256a8a55989c9feaa160b9cb616f859bf9bd323ce096d308b5d6bbdb3e35518aaa4
SHA5126ba8101a1090f612cc5773fb6d1379ce7997db96df0482ec0cc2549156983a18f752d64b932edf6686ea107646fd3bb551d4bc38e035e6057d592d29b5acb60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0061d164adecc911f0f0654a4aa982
SHA1737b262b8952569233563ec8c2d4deb917fc525a
SHA256267e6c058ffb58ddd714f3caebab3eee9a9b9e69e3c535b2fd129c4117cc3db9
SHA5129c810bcb2c138fa70700b0c841ee2ac8c97571a98c388fe8adcc721369f401ba4400b15b7b27d55f2a7f1a02039e3b48ab844397f7a29a45157e770e021ad431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc33ccc0095504d5411a3064bbb2db2
SHA1127ef9496f681bc4086432524539ee93ba086b47
SHA2566b88fa584b8562ff9271de32a219992733bd4e4627e6c30d13ba0d6fba77e4e7
SHA512f80f367330b9ffd45ff502b4a5b6d3b75d3779743bf827a6942ff261d724b2c826fe5a17d5ff427f45d9588b0e066262b01e9a3ecf22e262264846c3bb3667e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e7257b2007a9aae86d4a9475270373
SHA1db9831dee2c3317da02298354df01013e52ba417
SHA256c6df9c83298fc29d89afc5f6377a8f0496a9c6f5455d3f2b41bb965ed6b74cc4
SHA5128818b127ceb239c04f59d4c2f47d5ce78346f45bb2ba282bb3911f157e247a5e5a6e08d67a6529170d55f08f0b026edc539e41f1e9cee0e1710a4b665b3c9638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f774bbf1396e25055d0bbb34c08f30
SHA122ecf77236ed8a291a6f0fc1d8cec78afb199c0a
SHA256ea6d17b3394a5a49214bea9a1ab036f62743cad14bc286e129bb223840f3cf7c
SHA512d066ec1a43c8b8d6538eff666f60244bf5374d7820d23cbdb33433d9cb4e4dd7fb6412a9fe92f913ed8fb3710e9430d296150b545a5e9c72f00bad7088feb371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5375afb3e0293b6ea184a8d63c757f0
SHA1ae633f043efbf0732555901b1e339effb6515dff
SHA256d7bc76dcbb4c938bc01f083b8387ec03062f711a4df35a21cc42e2744028d237
SHA5129e2a6e1ecffda71e3df117bda2356df14a59e376f1576c983c73611d89c871c2de0024f72179a4f21aa1930e102086dc5ec4380a9af589e072d092933dd56bb1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b