Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
f6d848e30938d1d3d86725a4940d23d3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6d848e30938d1d3d86725a4940d23d3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6d848e30938d1d3d86725a4940d23d3_JaffaCakes118.html
-
Size
4KB
-
MD5
f6d848e30938d1d3d86725a4940d23d3
-
SHA1
2d3fa98f39aa2e7cb1ce4bcea20dd90004501a0a
-
SHA256
3463ce0ee27bae26b2db06e55cd46e2238b326ea9f076d16bf2abc727732558f
-
SHA512
eaf0c07215d10f5ff0803bd4e8f3a501b067a6fe00f1ef85ddb7c322312e75e5a0719dfbc76999b769c54daf2eeddac52be9375bf53b33ad72c70d8c34cd77bf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oMPx62yY:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008258d618448ca8af411e051970f86881f423fbf27cad130dadd1e000a2cee0c7000000000e8000000002000020000000fe98f11e9165217d3f6b7bfeb7eeba312465424a2a7663c4344c6216975c019a200000009368dae1e2b63fbab4db605e6b23682dade32d235bce18da4a2f24bb578f9456400000008abdf4fe9b5674e8f0ca02514419d77fefe68971fa564a23413a8441c9c2d969d50487ebbf59621c77f214ff8a34e3b6ff566b7c19eeffd9b39ed4de7e23c199 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b25e868d0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433459681" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1ED0E61-7B80-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2748 2364 iexplore.exe 30 PID 2364 wrote to memory of 2748 2364 iexplore.exe 30 PID 2364 wrote to memory of 2748 2364 iexplore.exe 30 PID 2364 wrote to memory of 2748 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6d848e30938d1d3d86725a4940d23d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b0794c6cf01eff81cd266e30a3d7f2
SHA10de7246086d6128771819f30f600f7bf6b558a83
SHA256e027bb7dda8baea9a293c6755711e7fe6377b1cc4b08c07d025f97101ff4641a
SHA512d19217071a1d14555b95f9063bbc6443084d8f0d67c395fea0a26aa71a92ca16ae7d3a68d796ef4afc25f8175f5b07ab844bae9a682b4e7b0c0dba8e5d7f05e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9af1d3e61b3a211ebf365cdecba678a
SHA1467ba2f787364749cf8898fd8d1118d5c2ab53d3
SHA2560fa72fbc0ac6f8cc0eb8f387164854f7f7e702c927c9578c5c44ebcb25ef4dcd
SHA5127d93a3992fe1dcf7f74dde58720ac4d49d2ea92ea2864fbadd16a379a4f18dcd0b0f20f9228e49989a4e965436ab42fd4139be59b9ac409cabf4ff685eeb439b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584e7ba171e46e433490d15edddecb0b5
SHA108cd67e474ce303cce596251f1d0d0a7f1fe4d28
SHA2567939d8f180ead831008dff8ea170b2b744207e43faf3f0df2ce3279854ad6b8b
SHA512523f3eaa8ab7cffbc7acd3d53c4dfad3a61d245e452fff1e156124ab0ca8b5fc5336f3e1525025aa7b37f7da75f66823ed18f52d7b6b1baf1bef0ae3057cc776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167ae2f91158341e15a4adc3e1391fd3
SHA1468a15ff2069dc3746c82f37bb61d85de10d80d3
SHA256ed8ca8fbf571d329f82421b040d6cc64762c12db7cfd27403ddc67c8fd2d7425
SHA5126882e2b3ffa785cedf77079db56e35a093858caedaff559005cdae6b7190ae9759984202bdfdf0936cfb4666aabbcb0147acdf21719b23bba972053b9683f14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6d09c5dcf303f992241ed9fecdef6e
SHA1ebfd94d01a324897a7b9b173556bee09cbc0fc20
SHA2566d53253861c084d5d90cdd3f15d0efcfffa70a14cf34e8d6c440621e85bfb36a
SHA51265bbc0c21794a08c793646c855927499d286178522d2888f95c27e41604601d5023d368d3bb9774f47568cd3cf4690d95fd60e2b3f609ef460c0a49425569cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53930bb72f2a8881da609ca967e504a53
SHA16b5e0670c68bc21dc6e8de8c429e3ba042db6967
SHA256f2f63bd0a7152297cb425815bc694917d95a5e67f14e042a1655a4f9b0d2618e
SHA512b707c41ae3b80c67374451b68e51b2ba158c85517ea47440d9f388745904fee03c2d34788dba39a2be935d08472936ff4d6d89dc9de7e4b2f4e830f0d5841b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03bdbc1037e6f2119f3a3c7958c4e83
SHA12c8ae6236936df972882a27ff8928072aa863502
SHA25685e6b71b261ca9714804282ba82c392844bb3155e5642fed84ddaa4b01f8fdc8
SHA5129dfe324c93f66b8f0758ed6e2f8fedfe212f4f46e875f60a61e6d1875f5c8dd917c8ad6944d489f97a3eca4016f7f4ff5f7b6f6eebf47c7b45c43ef853f9ba52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d926e169caaec1c921d0ffc02a5f11a0
SHA14224e18fae381fd39c074a73dd75c4ed0c53cda2
SHA256c6ce4d9e8a56dbd0082ddffcc6b9115738033a45eaa100f66b7630f9108b6d29
SHA5122770aec76f09d401496c4593d9158859d3f1b0731e6f43103eb33222b7a91a706cee7089d3936a1bb64645939c941cd4a4a61f170105a0b9457ff79954f3f2a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efaf1b48804ecec14eb05c772129d51
SHA1e4e72eb8c2bd341945154f4dd06f4302b1d192ad
SHA2567332ac696bec694a24d3fc79a5bf2bc4a6d47e830cda8f09ab8e829fff2bce11
SHA512ca42dd615320786aa28d90a4237deebd25c07c3c327b7b727b3d4c772df9b29cdb5838555669b7b519264d3bafd79e1891e1baa9aa76e36b8288c46d981621c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca886f46ee991af53ae1f56598d1442
SHA199e95c3bfa7e5d8b84ab37d9c5aa33a76026f402
SHA2563e89777883d38d9520f3f2eb7b2c97bcf55026b77e4a0915944f4be6e213d86b
SHA512384d10341e70f72d9382c4d4e18dc786a4d7fad44423755a7839efa2c055433514b5720d8d774b43fd27654503899ca04df2208600813eef6a47696c26a7f0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ebf0cb4d1b015e321d8e2f0118e049
SHA1520963234b781b9bf66aa5463787d71532025cef
SHA2567525c20edf3ef9f8f830654f954b7344066f87e99ad61e4cd4444534620d80db
SHA51218ba1f47b7fc97ab52b5b57e62d17960602364b7d9c0775da53348bc2df0378a8597898c9a711863ef8dc3f24751f8c88cb80b4d4e870f5a0afc1aa7762d668a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf415a0f486b64ed44c22879aba3d6f0
SHA1196d82328659399203bde1e370de0dbc95298ae8
SHA2562f5b7924204a2ab3be3fcadd38be608363c4c975a43681e43674a072041dcf06
SHA512749f2133b2d157d9b17ee237aab6ede2968d23e2a5eb7fe039932f7d327c79f2547921dc170e3a69b461cee3b29a32690e3d3f4acfd01ac79abc2693896004d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d35290434c4696dfb863bc0416eee5
SHA1c57b8447165fd4a3992c3f0b3eb301f523bcc5ad
SHA25659fd57a1b828441b9d5fb9f36632b58fcded6c4d4ebf5360acf234d1eb902067
SHA5129fdc260b0a4f3352fc9e12caad54d2dae6564805e8a2f5ba9287fd71db4b685f3d54a6deb438c00ea6bc170186eb9739e24c3d08799a6513664cba61ec3e341f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db031c78c2d03ba8a61e48fd62ed9401
SHA1eef5abf062d7fa5a30d8b73582339c1fce6aa628
SHA256ff484c2224b44599d1a3dcbd67dbae3329b7748a22d7cc614e482b67158237dc
SHA51240a4663e6665b7b4566e9188319e112960b77bbf7d4bcfff52712e11fa5930647f6ce7bff8272fbeeaf788dfcfe3a488b98db0bbd2836396b897531c4b2ff0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591956f802a4390abea3f5486b00bdf1e
SHA1ec74d6fe1c441e3e942de80d1b9a0f355f5c9377
SHA256c97283f8fc49bb9d9baf0c8deff95f3bf9d92701194af9da4f5aef645dbc94e8
SHA5121525b69d7f479795b9b5e63fb2d6b3530c72d26f7abc347ae0ca4d34b3dfc3b6dae704a52fb8d91dc259dcbd3ed0d10ff47e31c6e96b9bee2d0b060570b34031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538bedb725b784aba1205a0b566a6dde9
SHA1fdb6549426a9caff96a0fc74731fa5e8d99f664f
SHA2563317bc4978ecf17791bc65f7f0b058b2f871af912939abb87fec1c09d8d3218e
SHA5123697951a33d243aa5bc0f5748f147388eaa7a896e2457ead80d0c44bf535ea6576190d22458af3d1c78ed1d0e332e916d48adb9f7ae60c31d519343fb0a87240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba843ee76669c6f660f2240cffe940d1
SHA14bf46739d2d139ff7b877122ae7435cec0786093
SHA2563d67670c96cacd6efdb46653be111f92fffbab552b08ff0a1597b3a580fe7140
SHA51279503a8fc9678ea928362c24ad3915727b6eef2644a751cd190245b3aeb1027eb7c3c6e824ed474cba800e8d226f9d6a6e521a7c879a5f92d1142b17d63c5aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b159e483860f09784d615301fb4f3dbd
SHA1e868444b72dd07907adfd56c7365ed57d883065b
SHA2565ccd81c024ab2640d4d7ba147376a3256583c072f1fcf592f1d72151377f7efa
SHA51274ce453be2dc73d95d47851981672123eee35c3689387ed11fdfb21cd2311d7df40e43869c8e0fee9ed7a037f98463716b40691d9cfd2c5ad237728db775094b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59feda64be4f8ddde072f5d7a406b1aaf
SHA1e83185571091d5b6495a6e3deabde92693500a7e
SHA25674987ee3dc90eff19e699c29dd25bfe6013a3cf8cf4508c94ce5465e0d834c73
SHA512efa2ae148911af73b5161dad00e43905670a97b9c233d2f898f4bbf11a3ac726572206d29e2e9e818e1a9432ed5db9c3c93daf68a5f3129aa324ce58ed9d6ffe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b