Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
f6d1b0bd6aae33ed0dee4d58c5360a13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6d1b0bd6aae33ed0dee4d58c5360a13_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6d1b0bd6aae33ed0dee4d58c5360a13_JaffaCakes118.html
-
Size
11KB
-
MD5
f6d1b0bd6aae33ed0dee4d58c5360a13
-
SHA1
2f7f5b65f7d0935a722af7b9460fd491509e9ceb
-
SHA256
1712291a01b52c539802a4606b74bfd3276b1aadb55038121f4152061f289a8a
-
SHA512
dfe2747efb3d7ec20fbc9c466d5b6fbb471b5210946bc6e900871e92f423c95d12d28a94dc17a386475265db8a2c13bf009f5e928a7c6d5c01e460be5c89f956
-
SSDEEP
192:2ValIsr0r57M3xMT8R/w1wvqa1bAuBuLbdU8d:salIcIQ3xn/ggbAguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433458739" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b041cd788b0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FE73001-7B7E-11EF-B729-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000cc39fee1556c25cd0bebbf47da84b956bd024ddbbe6be42300696d018b146ba4000000000e80000000020000200000003be6ef82b7e6177b268f0dd4a4fc50afda6e49d577774362f384514cf195bfcb200000009e088c8a2f46630d0b12ef7429a411d77e0267f8bcc7d0aab744ccb71c2515ad4000000051c49208a906777517832bc71dbd45b985324b4a42b6e71071e84e9d9980940dac1703966adad3dc47e60616b9ef93aece95e748cb0ec9692b2240c166112688 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1764 1984 iexplore.exe 30 PID 1984 wrote to memory of 1764 1984 iexplore.exe 30 PID 1984 wrote to memory of 1764 1984 iexplore.exe 30 PID 1984 wrote to memory of 1764 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6d1b0bd6aae33ed0dee4d58c5360a13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff7d3022082239a45609a1879bb0495
SHA16667679e43fd5c39d1f0bc2c2898d56e7de51b51
SHA2565f4cef05d11d59f2a683a1128b92ff16111e3d37e555ce4a6e4059905ea068d4
SHA512e98ff6ba8b9624de7eb09bd2b3a9d7116705a915f1c8f1d2730ce4345c000fb50096abff024e1170005e22a38caba331832712390fedebeea443e31cd85b4074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad38f6cafd70ac9e9116da180bc831d
SHA1ad3e6008b53b5b119295f666d5cea4709949da19
SHA25642e7b61661e4f46e8b9e1b50c634714e4c59c6fa1ccb90d0b2accb5ef5f0ccf8
SHA512539c1e5716a5cd9ece2ef19074bb63d6f9b4d84e928d13af168aab36509ccb662d4956accf14ec48a0bec48efae67645261fbdc7fabe6408730465ec5f41ae25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ac302396ace6172f3cd0acbc765ef6
SHA144e767c4249cc4af6f2226c4acbcf1cc02a38be3
SHA256f2dcf515804fc3dd418c3c5634b307fc342bfebf2509b089c9249392804c9ad0
SHA5120a0e71cf7047317d3331da1824519a31719c0345e9b2a4bcb0bb703b50f45aba2d32df2b24e6d925506bad796f2f11998ae2464c1cbc3b85f04269da0747807d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f22df59cd821ecfd09f2775873fe51
SHA104fd0c117bb3f3bd5ff69fa55c5cc9a87b2ec151
SHA2563bdd4d38aedb88fef7c5ae5109bc91f512135d63a7b9b0e776aa71af515d9971
SHA512e54b577c14deb88abae319b645a540148ea7ee626a35884c87351fd19e588709e5744a293771aa2964e21e3b467aeff6dffb02428a709ea02217f38cd1faa358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d29281207056bbd02697eab2e30c045
SHA1555eb87e2fee8078a87c23034204c513f8a18a9b
SHA25661273db7eb25f5615c7c6126f42d8d3268beeae36f289e007a606868595eb867
SHA512e116c080192a32f8ec6bce0cfa2bbba02fd5d4898fcd84280e6754ecff6244cbaab701419ddcfe167972beb5bc85d9f7aca643ae2ffb5b09268b748a7f399729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a34e96709d1747e6d9a198300c273f2
SHA1f412e354ceecce6f1efcfeb9a7b310e127e29872
SHA256f0389e9763ce7cd36b1a872adc6753b81231e14679a93e6e47e1de2d8989479d
SHA5123cdb440591d785ca709a5a11c531fcafa9c8c3709398e1fb51bd47694360872a8d24986409a59d9e45ed09dc2e30b5375bf2bd6e7a259fb45026dbf69fb3a112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511bd531a6e266e262f6056b9ec10d4c8
SHA1b2834bf2056f5ea2c6a2ab05180ae66a0f8ef571
SHA256fbe45fa63a8663ab3632e4f247f2181b7dc9dc679e8178cd4b2eb55885e5c90e
SHA5129635c2f6a0954e9dfda867b8c33798ad5cd89b8b19c3291160ff8af80a2fd0d0a3ba054120e1f746e6fc274b1520bacb9f858aa66d3db97c988bdcc18afdff06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a856c447d5b53d3e238b1b5f226373
SHA1d404f2c4078084f29700c01c6ee999db2d7b0017
SHA25674854805e6a4a2d093385e1f91205aa2427d1d9be9188c1672782113a63312d6
SHA512b507bba000a58af8eef62d9caac08e63afb5fa9ff9caa98bdbe588e1cdf131055eb58148322d603e3b270a1b7afb89829cef0740113b0d0fb6dc6dc16fa976d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d26c72b3d9e86234350369abb8553f
SHA1c4cb8a5142d33a9464522d3e4d1012df41db7e39
SHA256f9515ae054fded0685802471c7826e7e5a9d66fa02b72be0275d1b12be0ae8b4
SHA5124a48b6fb576351d4a623e848770d457fee80e15d706f3ad57858ea2a1086d40e3eb5f2ee66f8cbaf39208c34c836b141b9ba43705af5c9e6eeef4df96828ddca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fffd41a1c2d282fd0a7c3134f89f79e4
SHA193d28b4346aaa71ae82f002686d1e890e929a318
SHA256785c5f398930796b4f63c2601c60a9371d19cc807180a490ca8659848e35db9a
SHA512446656ad188fa0e602a74a579da90339f4dcf9e44a88657cf164b423403e6b3403c289c550c039414a175524c5d565f437e6f0d33a6642a82141c40c80a28d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd44ca6b4b44685b13eb2c6212f794aa
SHA1ef5084b1039e34a70f10dd0f5781f1d3a855b1a9
SHA256f0e3da93c914ceb84ff98af0317f853a7d6efa7b4d1efeb246f01bd198230a95
SHA5128e2289051a89694b203adf7be496091130d0e752f0d05979cafa389b59cb0556a79a33a9b765babbb0ba90664bbff2d19a3313b26c84d4198ef13a6d0252391f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66de1a12dee3b49eb85defea0a3baae
SHA192b5f95e4b045ac7c1f92253f35f98fc235d03ab
SHA25620b60150d9c28f4e79b32b92adb954cbffd20ca4f71aa2c5a100c1860b5bd9fd
SHA51225d412dd5acd77289507986e55893cb85cbddc16afc862913bc3b44f7fa0ed170b73d63852245a232dcae336a77cf60ebe00a1905b4fb9b07d22e41504b8f9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef3b9cfa241a753d155585bc961b9e7
SHA118e987dfe6b43241127daf5e8657f396b4e2f57f
SHA256340bd0eb69197f52f4de25918d5a88d4e7d00f1776bb07ff863adc60f90e83cb
SHA512e293bfbf7f5e46ab026d6ed58fa92e5ad6b744837c70586f063f10bf7f787534b02c09af7beabb52f9544bd979445b807f8e00e9aaef948d96d996c164d2499d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56157ada1b2e4d8101019cfef61caae20
SHA15563d037a2d0ee160a4a23888f998de30323f45b
SHA256b67beb64a9cbbca538c12fa6d27bd06281046de5f8ca194fcd5240e71b6c956d
SHA512bbf75a7e8e86b311877599d3408e910ca602101aa65e923732b9db68bc3c500e3e8dd3dc6712633726fa91b5b0cd72360d03a0c1813020884f3f8da54c2abccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d1fd461de800ee25db8dea67bc8c16
SHA10e477374c94f4a99cb1d52b07f734be97fce3491
SHA256a096674025dbae6a68346616d3fc3f60991b87edc617598d76f37586c6b49d09
SHA512d49f26383b3fdd30dbe81894f161174e0a264b0bd90295d61e76b50ddf64a9edcd689cf2c20572482ea2e9e1bae8fad23ac20c05649b7ff2d8a0d1eb2ddf4469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55984a29745b115c2d9df8c8754e2aaf7
SHA1fd87da3196ca37ef98f437c4b2573a1fb1b0f463
SHA25683941d77977142de6f02ece49a541d130a47b27c82d86c0e7c85e4300cafe254
SHA5123694880df7fd6543fd172a712bec9dc41eb135fcc6592a2cf5c40b3596ae0934bad3a290446349753a3f82c4a276cf9986ba9953f422ec2972e5dcc141d2cd1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5adecd3c62c09f809e068d32376ac1
SHA153e481b35518ec8fe05b02a54ec4a44ed7a35106
SHA25626494c96f92530253d29c27f3b1ae133a806807a96b8d0994a3b76f81f3c2501
SHA5122f8729b7f08e64c19add9dc3e568dabbb45eaf1bb1012ca278b35d41731b3aba3739c694e5da2063a321b511c5515f1b8bcd21b5ca9368f4d7a48894769fecd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba350824c7a960db65c0a11376e4d99
SHA1e44fa5defd27ab77b36b01623f5704734abc37e3
SHA2569bcd0d0e6002fc663820e619d07fb25419b022d979a051ed0af8fdbee7ecc81e
SHA512b18a8c4a4d1f5ffadb44c596f30745b0ae2a1ea8b501fca96aa83c7941c874bc0da59ad66b49881a3ac46547513adacb985d8ab6ad295588c8e7e6263662f96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807e82fc808fe10d1159f4ff69de9eda
SHA11f4bad794ac1e47222f218ac6debf5834b75cd05
SHA2565b03f6826eabc01c5d40426f77d43516e3c139cc39a0be3181536be7584a3939
SHA512c0cf2f09ca6e9d57e54c6fb928d5b13e51b40a8731945db0fce9ad854761868d5273bcb6a26a878ad2004505b8b19dd3d4613df1b29c7767eb2b625ca09c2ba5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b