Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
f6d0bf8b0aeab768daf7ed96c69faced_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6d0bf8b0aeab768daf7ed96c69faced_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6d0bf8b0aeab768daf7ed96c69faced_JaffaCakes118.html
-
Size
6KB
-
MD5
f6d0bf8b0aeab768daf7ed96c69faced
-
SHA1
ce0d2f51c03b0155d76159aabd65402d89888994
-
SHA256
d89196a1a8d3446ef2914f23e2b8ba7bc7b8702dcdaae21d6c7d6863ea4eeee4
-
SHA512
e867de977937235e3fa216443551496e8548700934ac450b1a374feb05a0c11094c4c9fd4a4bca6e3f0e4e8be9236ab519a8a849d4d96c2203cdc6a2d92e8951
-
SSDEEP
96:uzVs+ux7NPLLY1k9o84d12ef7CSTUHV/6/NcEZ7ru7f:csz7NPAYS/+4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00c19178b0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433458593" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{297964E1-7B7E-11EF-A17D-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c8016b5eba1eb8a3a989eaabf4a49573b6d62cc2b461685036bf3c9ddc76d1ef000000000e8000000002000020000000592b1b754012ecd555a90281e959a1357f645c4f502f4ec90859ee138b1149b12000000066c2e340d59109b29d80b23306b6a18a80bc8c3a489e45d963b80d4ea3d3733f40000000adbbab7ce87ce572b3e0b8b2a298df0993d229d69fa72a6aff471796e0f91547d3c83b1440e8692094602e2631cd5731e4b1bcf5d7abddd49cb080d5a0fd3c1c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2984 2260 iexplore.exe 30 PID 2260 wrote to memory of 2984 2260 iexplore.exe 30 PID 2260 wrote to memory of 2984 2260 iexplore.exe 30 PID 2260 wrote to memory of 2984 2260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6d0bf8b0aeab768daf7ed96c69faced_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aafb5a470001257dd6563a5666bf2b4
SHA13321006acb40b2785af39f37fb7c6dd51ed10df3
SHA2564bb787065aef0aafdf95cbdd87b6fcf8184c001a6823a6287580d06c13175776
SHA5127d132a9585aaf51f1e52ee772ecf4c6c5dc888fbc1d723497fef20bf81fb9a5b8418f9409e8f0a585b7fc1630c24e4c9d8fc23717312251d589560c69035aea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505ed0f70fcc6f6fdf749d3b9f813a72
SHA1a3aa1de08dd1b4a3fcd654286eb9d92cc3afebb7
SHA256115e5decaa9e3bcf1c2dc4c2a5d38330d3497d1438663edc2e05dd2132f4e970
SHA5128fd96a60c8b018ff1b91939a505f17399ec6a0654fd46f590ec6107e051886e1943ab70bca190a2da8194dbc72bd4cdf401cd08e9e7336ff49801b9eb83ddb49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671d7b7db5970efc173c9a2aebeb83e3
SHA10070dde13d16da827117f91ea92e476377474ed9
SHA256de65619c18e8184ff8ca4ce9ff3ec27bc2aac36f86a605f14ddf2a0cf27367ae
SHA5124b7d74bb5933901ed42575078eb02a79ef1e0c723addc1a39792a2ca6c863c498888b0ea3c23f20fa0ac9bb9d2c8e4e43e591ec509e6a7a96df01c5fedf38a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5defd245260216bfa1e12382a1954c160
SHA1f46c187cb80a6be692d3093d1ffe601837b6d7ec
SHA2568f37a2f3619dd0f16171970637db9879ce07a025cbd743c131df4ad1647ef4f0
SHA512f87c3bb8e00304fe44f1c8f08bf7b28b45b88d1fd343f02630ece2703810ffd0ee35a6f4e820a08bbeb37ec56df293130f35096b207cd359177ae20662805bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8147a99c419b147f7ae3af99991483
SHA18854f97335c8d4460e8bb3847e03ee9543c9cdcc
SHA25616a49bc24001f5202db0e3b9945c406affee69d1b1100c7d25bd301b8b8d17a9
SHA51228f4a69dfe8e6d665028cd2b160c9671e1392859333e0f2e17d6ecd29743158e34e610b0c6772ef925af94ed42bf0c3ec728f993020326f5a326c15cfd152ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5849a179023c78184d0df7cbd6f206d2b
SHA18c8e3a8b21046271ace1aabee70a6de8a2ee0e47
SHA2563a073b243804f828b1c082fd8a85c45e16401fa576f7896c2f103f6b53706550
SHA512d88809fadf3a2ea496b396ec373fba23a4f03316372b00612321851cb14f3f138719540eb8dc6ec5255743cd3bdd4953f39d7061494e3e747d9c8b17407aa2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563119462a190ed5eefccf0251fc3d78a
SHA1dd6a98fbeb5b98a2102c7ff0afb5f6fa6a0d323c
SHA2566ad8a0d598ddd722cfedf9b3a6f7a45f8b2b5df8e2334e788c96cfa9a111699b
SHA512b7135cc7b72dab9fc69ef6de4949556821d991caa62b3c3de49bd3895e123fa4d03b0d4564bb17bff2acc7df851cc89b67e8f6f0b088823298a3485aecc21b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b186af043aba9a60df626cf0c018a3
SHA169535c10bd37b72fe49517e005c83329b46cbdf4
SHA2565d3411aaf51cd7040b5aac70ca13d767bd0130cb19a470da97b8cc9697498061
SHA512cc71db5dccde42a5e28d19cd0f2c4716d76f8c0dbc851bb1bbe9637a3749f52e637313b774e31553f763c4bc96787ef8279a7081e9107f6436221106f3971448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b0e739eb900f07b2416714e88e9391
SHA175a0cb50a1a439d590b693d79e41f700461e44aa
SHA256b21d093815e44a3e5e4cfe7bab81d696ab32625f405e9309ce9989fff577c0a1
SHA512e4235dd7beed4fca23c256e0c6669a5d4196b971d95084eb708e2360dd5c5434346706d2fff12a9d768ce6ea5c58025a4c5108e8971bf281a4ce2ad3dc991ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce4ee8cac064a581d2a51346b6930e9
SHA130ebe2a2572474ede8094d9af3ab1bf8144a2e57
SHA256535c159f45196863b2c160a85282e9313e44d13aaf3f08c62234bbbb413b9dc0
SHA512e867131999d1a7cd4b2f2bd9ddf66380fdb82dbe7016098ed3d4e585dadc6748009b9b701c0be42b7da33e5864038cc0f3c9641d35c37df3aa9a89ece7797711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992115ffd002b8db51975eb965ebbd08
SHA1b41fffda7b25c5b0398c2ded817564f94d7065b0
SHA25680d522bfa0fadc2d7d701c8a37440c793643d045a811aa18568e59f684993ca4
SHA512cc900a05ca587c7be9457bbf332495727706c66f3e97b9db86aabaf453d9a3fdd82b5580e7e2af54bad80e54ad8995d70d292bfb1745fcd07c117af38610862c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea1d99cb031cf5af857f9c6d3bfe1ec
SHA131f8d77c39df3a9608a434c110744bfc91b3aff3
SHA256852b8cdfc037e310883270e26873430bf5f933c8313ae8aa7fc00177e08a78f8
SHA512df61d61e7cd729c9d10b4596279867325d87333b95f57f99abe1bcbf549e254162e88001bd4d67e8eec995d4de77b6a8c9d15f049df10a51e2ebbd7ae60b30d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6eb57f188b471303d51a3dafe75ab72
SHA1581294caab1ba93d9e547f3966407df4867add82
SHA256be7879e76837cb3d6f69579e393c874d602b4da2eeb01d26b17e7a592940bd39
SHA512fc3c3897c57e309f94e034f20a24a5cd0a4b93475639ee58cb7d9be0f87b9ca3b91d619f9393377336e216589f1cb32c141284569dac39ef92842c9c505472e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07bcfa425b49edb10be102fa2d68bf9
SHA1554d263c1cf22c475b63710c855430643db16940
SHA256a6f2cecb967af92cd8973a4152312dbc4fe3ee8a9c79f1a610fce8c7636b87f8
SHA5121fe134bd80c88bcf2267d80191dc391e1099fafb965678cb38ab76d554408d6db23d63c63e9bc11daea7dc7fa526dbbe65043fd79a343462e408235ed00fdf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51853909ff4189dfc8a41d7facce26217
SHA185e3359dc145c2b11e63eba889a86f1df03a65cd
SHA25664c0072a92bf52d156ea0fde3e0e08465be7ec93c35671be21e0139318dd8825
SHA51214bb3a3270dd08da6ea7e481750b528c8bf8b0e0638b003a56f433c4cdef2fba5c4e5dd55846cf2043555670cf025b90b72d3087e694926a88c21d8b6aa5833d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384e86331f9c17be2fc14b1393b5f20e
SHA1aeeb94e997018c877a1e8ea7e5e4b09779b7427b
SHA256231f6a9b0de00161d38f86a82c57328743b6a1acda5e232b29dfa600279ce758
SHA5123f4cfae278bee92880143178405136963d8145f2ca0dde6947d3163fe5df9ca787f8d72089a033f5147e638f7adaff530c311dba23c8160fcfa258a1174e9bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff81a903c88f40b1e531b63efe1c961
SHA1717b07582f8de38727f2fc257ca09452d53a6acd
SHA256eab5b82fe927d0329bd3a7fa0ee9b146f302f427e350fd2cf1b0b6cf204d6d45
SHA51282a8dc40a7a68dbdcf208e8011402c04becf279e393aa83be613e0e0a436fb8f721b27078aaee3a3a8124140770cf30f03aab4c6a789dba5819a1d9c5a6389e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79f0817080fdb436c6d1bded5050c2f
SHA130cddd0c2db87080ec3f10a5b97f9cef92aa44da
SHA256a9f18d8a005976260313605b54daf42f9ac7b91a74f75e0b9a6d3b2603358e4c
SHA512da3bd607b31eabaae71f897dad8ef330bf1ff864de25acd7240dceb7fff5424b9ec38a63372ed585ad533198c57b9a6c0b8b5f9ea5f15f59ef691bed5b29c500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb523b588c5db7b9d367cefb7da16582
SHA1bd8efc0dd86befba17a852c3266d849877d938ee
SHA25620d1bad2d9762199ea8ceaac855d8f999cfef4080e8fb8b5eb845e69581113fe
SHA5127ae56cb8d3bc8ff2d916fdb9a68b0d2d6de6af4cfa8f9b79f97eb1afc6c850c088b9d8ba9561db6a870eaac75c91ddeead8627951aa5f415d89be2c0a006da48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b