Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
f6c154375145129720961dce59007bae_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6c154375145129720961dce59007bae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6c154375145129720961dce59007bae_JaffaCakes118.html
-
Size
912B
-
MD5
f6c154375145129720961dce59007bae
-
SHA1
f858d0ba8094a6eb09f9d6b8aca196e774176be7
-
SHA256
72fcb9eb52cc277c172863ebabb48600f46febad10a008440cf2d5b3c72b24d2
-
SHA512
03b36bf0736c084b94671ba59e65180c0c0e32a06c02fef09ee5f9ebc23620d6443614d18035deba4f583af29c93cef8c16613c3426de12baae5ae55dfe51270
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005f440e26726ab6f739e2a59d3ff44c5b72be7a276eec1c77a9acb2f65cf82162000000000e80000000020000200000005b9e9046bb3f96df61a934db936e0ef9818b02bbb5a79a8b91928026a3046635200000001e82373e33f2e0316576013c4188abe63a330c4982181e5ac9dd276b7d912d5140000000ff98001ba4cc54e5aa53fc4f108c4553d5900e20689c12998b74ce392ed747fc43cf1c536a9f4c780e7c39845e94d0c8290aeacb4a03a57af8ddc958985bb8da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433456078" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DC6AA21-7B78-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0184a22850fdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2668 2180 iexplore.exe 30 PID 2180 wrote to memory of 2668 2180 iexplore.exe 30 PID 2180 wrote to memory of 2668 2180 iexplore.exe 30 PID 2180 wrote to memory of 2668 2180 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6c154375145129720961dce59007bae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec14196cd0c25a246bf0da045e3b656f
SHA16574354763d3cc3cf2c480d09ee1614f09e4e885
SHA25627aaa58b93b6154692a59b3499c586300cfe8afa5767c893375a91d850bd19f9
SHA512cf6e1fa655a9116fc57410afa802fe2d344f7af5a4d7ca5ebbcbafa6704eacbf89759d739c490beb8715e6a675ed2fb4dfd8662340637cbec44010aebe456a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55263b25d55bc1f46bb88f020be058517
SHA120839b13fc61a0f331d8b45b1f7e8f11c05c31a2
SHA25631903a2211b1475355c84b2adf60f60b90329b0bda4652de80eed0492355a2df
SHA512ca24604650019ccbbc0593d0d9c00b41b08c8e104a6e5342d0a4ef31ef0e5e56eaa55733a8d574e76ff8c860e2a32bcfda2f05f05f1c571b9298abf1cb7c7749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b8921571a37d76fd19154258d8ea8f
SHA1141d49c8eb41705aed37085652b18b89e7942753
SHA25657f5eec77ff0e14b45c28fd88f320279c0c279de7d2b275fb57529eba27f2c24
SHA512cedb06ae8c7c24f6d1137622b9883afa0d4866e767b77f908b3c18b1f408d58f93eda2ebfde02d554580eaa8450952d2f53802547a6befce0efc7d6d46d1d05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5ac4874200d3d188f515f99dc94474
SHA1213f761666d3481823747b5a6456f1ca4db4e68b
SHA256131c76ac6f527a1409a507a9e532b8c2278b53891aa0bf59d7a9a56170a799c0
SHA512b1fb742a83d5cdcdb8f2f4747ccd41fef17c322499dc75c2b9d5237f95a291bffdfe578a916f17b5ffe14fc979c83f6d19afea715b9eec099894c2eeb53b5ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cff3e182da75efd34aa401d5198bcef
SHA1733d49cd2e42cbc7b6c9b6e22d1ad8b2ffcc372d
SHA256a0a58243a448c802e0d07b946d48ef29770f0819056d75d0f7db93d6101c4ca3
SHA51265ae1e4392c184b5e2a921e63776b25477a994c1730aace5f135a6a009d7837fea7f1bddfb1c39d2f1f192a172e8fbdb6178e35cae97044e8b75f53d86449806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580cf249c99b6c95660054649e2cd03c6
SHA133b83747b6724882e7db3de0a3255b6db1d7d205
SHA256830047e02ba2625d651225700d4c0f35b34dcf5d5744f880e89fedf10f4ac9f3
SHA51275dd659c6ea8f380d41148f58c48ef5dffb407d8afea948d009d66d99a45b6f0c143c3cab8a41edcba7ace03b840bd99edd64596c61ca73b3010e30ddcbb8e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a02baf9e7942cd1f40a5c5ce2c56be
SHA153a75694f199381dff0fdf11f3f83321f4bc2a12
SHA256dc6031f3e3bdd48ac58e510b46595e93ced5d91eefde4f68ce3794f84aab400d
SHA512c5eecb6f34ad8387a95c3d693a5f0e4989a0731f1cc21cdbf9cb8e432714d970ca79f61a873a325e59e4b72828123bf6354985df22d1bf95ca4f13533237b9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56413817da6993ac6cbfb02785031ae86
SHA15aa3f2211a013b36fdd07595b48b23c9d43c26a2
SHA25615caa39b91a521e78927a111ad5dd48cbd2012d7492b2aab067a91797f5348f5
SHA512f83aa6098fb353eb730f1611f396c81ef34268fcb49ee28e70106493ed0b27be4867dd3594aaf2b35c38fa45be5340cd160ba28d20a0a03ef857ed48dcc694db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7911cb51def0d5d71533226ec99757
SHA104dfeeccda24b87df13fe4298a19b2b2d289c018
SHA256af1da3f676bede4001cf7240561d30e91c46ca4b0a0a349a8703d3b153a51818
SHA5125ecd2e92655e6988d878bec29a37d4cbc562ce7c24aec9d1f979ef02428f4fc2c6923c3fb2d49ca4841556b086870eff9d0105a87bec7e83ac5bc99a7a8c2dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5882e58e231a0f23c9f50ba81ffe9f5b0
SHA17d77e7b86faa88439839d95b4e332c58461c95b2
SHA256cd9a663615470f49cf007556a3f126f31bf44faa8cc2fda3aa21840f9f57f264
SHA512b997e13aab1277b73887e24db8121c92d02b1f0331030e5e8fd70adac11499cc2be6ca2237cea95ab61315616be1760e57a767569d4f24bd500945010fdcbc53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577126e90dc5ab8a084d178ac43a9d0ed
SHA1509a592fdbfa812122c06831b97cee7e4dbf9cce
SHA256d3c00179d8f52fe5ba11f437cecb8228946177808a216fa62e101e459f72e4ee
SHA512e6bd3f707e32c799862484349087acf4b79c1322fe42894136af3c3856985066a003293434f1acbea6414a085307f9c25847b232d7b4c7c69569f14744eb0331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c46404365d1c68af619a83f1663d63e
SHA1837ba710099edb269e112aea04879f8d9daf04a4
SHA2560edcf4eaaf429c723d092381a6bc61622ddc4830a4185c9dfc6531f99077bf15
SHA512244ddff85b4e710c7c891eb4b37bc66eb2c3fd62c22761e6bc854e3945780de5cd4a6919cdbacd71fef09949c333be900b1bcd0ecc6c6d2a91a73d53798e75b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f851a852b26ac110fd53a4438d4cc38
SHA1c18a6857c8aeb57a91d8ba00177139cfc0fb691c
SHA256011f4b609ab650e36f4c27d08541e66d6a7bef6b080270ea838bcde0b34c605c
SHA5125fa253a02e427a7b8601c5a46a953e0c8c0c46f4fcd6996c0aab47460e1e3d25ec39d64712a371176d6fba219ec84af741001373ed0df4ac3301a59077a5845e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b236b47c156b921bfe047d3163de9d
SHA1d3ef2b0d309769cdb06bb52c44ffc44f71c5acc4
SHA256847d727c7ed6cd0b46408c22710b6ce35cd53f166a8105bb1d53fdd6672fdfcf
SHA512dac33551ddf1fc4d0872705776c47a0728f872196556850b8e2d9d5a93aff06e1c7212701fe2f78932e3e69410aaf6daee76ead91a3f0181e90b8bf52bebc27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5195114f35191bc56098a5e333a27d4db
SHA1f0e946983e61e3c68402380225edf745f7c27516
SHA256d000811a5795b75b5471aa9ceec2535501112a13cd6848e48cbfa714faea0123
SHA512fd39f3d58bdd56bd980080e61c1c46629ce25763795c5be92684cdf453c7e1edbcfb6fec090d69182fd6b932bdaafda41a28470ef2535e37362f1ae0ec1dd662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b296f41f6a0798c87252418b4a6606d3
SHA1a3363cd66af541f88ef34da7c353fdc7435a85c7
SHA25691d3c8f1fce4ed610ea7c4f22edcf5dc3eff2fe038f71f079eee42bb0ba37e8c
SHA512622041f16c1961e6929f7c38b1a59f9a1a1e80b9324bc3fa23e712b13b1c7a9b785bb696e14694f54cfb8c200051166e633e4b5310abee76db5211da15ae98cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c086de1d52a6aee0ab3c8ef1247aaf
SHA1136f1a8f350a92d09038fb5d333559854d859122
SHA25665c1163e826d317475b43ba12936fdc3d44d17b9d7abae8b07430ea895e38f10
SHA5128a868fd3c6aab90c238d34538688cf52b6c3bf950040c445c7528174421504be7a7e248584fdabeb1f52168782bc643bc322680d519cbb53199dc6865182d3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eeb92ad3bee92a2c0aa95398915e145
SHA13d5e4cf4eaa0f1dd1be66f23f0afa69189765826
SHA2565afbc112cf14ae35e68b02e3613f5efefcf2463cc9316e54961aebf5f083c025
SHA5122f3a5fd75e751e8b7a6c0e93ee998e421af33ed69ec1e79b36d8b8ec8d249b9f363b1ad3a88a6d797fe451f12958787ab756af8cf7a7988c474aa0779c7b6c86
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b