Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
f98ddeaba16acf59c39265495a9a8264_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f98ddeaba16acf59c39265495a9a8264_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f98ddeaba16acf59c39265495a9a8264_JaffaCakes118.html
-
Size
2KB
-
MD5
f98ddeaba16acf59c39265495a9a8264
-
SHA1
e9fb165e5b08c7147b748cdff3b4b6e3acc56cbc
-
SHA256
e30185efb1c4b20f44d6d28105db547d3a6e1ee46893c0736e587d8d8e286d1b
-
SHA512
4b7fb04e11c90fefd43eadc069a30b45cbb009643f35df5e3748454c4a093d02c1915a1713635f271eded5bf365b2367d40e39daae6201b50598b19a93019657
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B756D91-7C79-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808ae96f8610db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433566588" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000207848cb6d8b45e4ea9c157e0197ec4c241caf6e358576f5c2442c08bde95fdb000000000e8000000002000020000000c7c08a888ba236cb7a8704d2926c7f27dbeaff3a64d63a5dd9471a28864e03c0200000006eecd33d44fb1a9981e268bfeb6fbd4b2a2c76d3e69ac398760d52e76eeb1c0c40000000a8030681f5418e33fa2df2faa10022e387c37cea1bf6d0073e3204b4db9234247d44e5515c0158ece0e41d4aba9f7b11f2d73e61674fa36fe7053927940855db iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2868 2676 iexplore.exe 31 PID 2676 wrote to memory of 2868 2676 iexplore.exe 31 PID 2676 wrote to memory of 2868 2676 iexplore.exe 31 PID 2676 wrote to memory of 2868 2676 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f98ddeaba16acf59c39265495a9a8264_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351838bba9bf95ee22eb799526e29982
SHA1ac25bca3d26e914986bfa3b475cd144ae580dac4
SHA256eede27c3e7bd83004c2f74c065d77500a04e63e1c6ac9a4fbc920bab2007da14
SHA51262c5ce2b802a02e78dfecf4b255f8c57f92c5daa95dcb3b83ac8949403a39952744f9b745a12a257eb38121c8a4ef2cc82cdec7170e6567ac1a36b1122b28740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c748095e506bd348f75468ad9e7378ee
SHA181fb3add777ca77b05aeaddf274ac73edf30be5d
SHA2569690a3d6240cb62641533f4aa5be1003c2baeb2f29eaf1c670cbcca96a41a5fb
SHA512b0a8ffef983ecc92286e0e1288f03c26ecf7d7f3274adc524dc4b7d19a43d2bd5d5c6c8a80eae621ee3d2c65f9091f1b5ce98bd5c514ac10c0a8893eed7a3e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7b9b4d59a84076c44248a68b7162df
SHA17ab670d85f4ea672e7a9c3c264e64d69ba8a3168
SHA256688f14870b3cab7e072371cbe1441b6c24868fa9ab7330e6662c8f96b748dee5
SHA512e9f1cceef5f0d00bf1adcdcb0e6183b887b8ff5f1ec69462b6c4d3fa88ef72490bbc15f77fb63ac8a02c0be21ad2340aacd928df26cc4806b3a078eeee100d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ba87f339527a7b323a75a9808e5ba0
SHA17e128d36ce26b789fd8ab7a29c9910d045445160
SHA25657d8d230dfa1fa9fc5145ffd272879ca1990538d5556633d762ed3846061358c
SHA512e9568b6e4e1ce7ebd1bf9223d2126ccc3f09f0d8f7b7e640a2270db6a57009644267f06acc41b3e3bf156edeecaa70d47ad0a45e9c4f121507fb3d7c6f98e4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae23af73fc91886d72747ac6c2291a8
SHA18f1f1dade5574e3d0f2e944a20054b9c023be108
SHA256d79121e2b125d038063988ae590ec3baea0b42f77d25fab11cc7e4d2ed39c2ea
SHA512f5de776fd0645e59adac802c7dab4e88af7bd11cdc0f884a7c1e51d77f63582b3db6c172db7805360fce6e98a440652847ed97b7cbc44a954b9208567da3b672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abee98cdc5c73c77da9eecd1ba5e49eb
SHA139036c22bf85f8fce009a3eb6d7d33a7fb526b0b
SHA256ac115adb5b14086a926e3db7b2c2efaec6453398d1ec32551c57158323bc3b80
SHA5129cdd15cfa52765af998c512e0705c2682fa196db716219d7756ee0016c02ef8ec5468e2428bcc4c7a4dfbb4383c961fcc2977a3f04c235b10afd738ab1b39fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ea9fe9f242c10e9611b7be77ebe08c
SHA1101eabb4532fb0a2b2bb2374780500a917ccaa10
SHA256034003bdc6fc8b84b5dd096d5544f70dc641f7f9a87e5a518c5399e8cc83e23b
SHA5126155547d033b169c261ea7e4fa6af204bd1473f662fe71b6f3a530ad3cd80b44f34cadf86a2ae979258849dde14f48e302878c683fe06e7373dd76e6f53ddc4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf2ef429a08311bda4ecc7457a2c413
SHA1b369f145d111a5c5587e1daba9221901f9cb2b53
SHA25688aa7f0689286173240c9fe0ebcd4e1d3be48a584edb70a08b810727598db142
SHA5121151078d81c4f919ba52db9acc7bdd61fe10c737a0ea790ad472ec58a3e07cdecdd1dcb7eed6f61eb25c34c1c8575bc6762ce0c120e21ee555be529afecbcd5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ce2b6cae1541a3dee51ced5ca0d5ab
SHA19c163b3451c710535dc36aa29b3aad99a9dce822
SHA256fb8ba92f43ea25e8c27df0f94893c553ca6512606e23b6ea52a14e4481fc5e5d
SHA512843d4737a96aaafa67fde283d2b23f2e982dbb0646a8bbc83ee1e905a212339776cfdea5b82f537169e33dca346975ea7eea1c1a0ffac4a8d511297c61308c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c249b276c851b7227227f9af2efb0e5c
SHA1ce6eba7e3f66fa0e5e93d6946c5b42a0784d8b0a
SHA256e8f0e951235a0a96a45f0b1eb3443fa56066e0ad39ba2df97c579c16d8315187
SHA512a65bdb9959a5fca7eb56abe1328720933dab55a9f7da4d2a0e0c888cb853e2db6d414f621fe81885dfa123a0481ff0866c4c3d9738a53108cf4a63785425bbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5f4d4de0ef3a1f2888793a1c0bf0d1
SHA12551fac84c789232bd3a495417cf2e8499ed3fa3
SHA2560c75c290dd2ffe2d22f6441ffd7a5e37e0b39f298053d1a2b28d185c0c975779
SHA512a025d97bec37836fa50d6fa612f5757de33c9b11fbc97013b52fa913e7de533d94683060394bfed3615a3bb5a98771d2f4d12d4eb439eec338428d8253ddf97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569be72335080bafb035b20731d8fcdf6
SHA116c39f9156acea7ceb6a2798e20a4baab73529ef
SHA2565e3ace5e585bcda4cbfc3720f84616bd364f367d83c00d107b80d6a6f3266535
SHA512f60fa155560205147e3d51925e1bc780194d9ae4b4a1f4d18fec3e69108836f0f4cca73eeaa7f58bc47abe5dfb5e1a3e1732f8af763c7c4da93f4dc2e073eb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c208366547d621e47b8c4d85e3feff3
SHA139fdcea5c1f2c43f297876184c35a6bfecdeeda9
SHA256ce293dd4bdd3167cd34ad4d076696620cccbed985bc6c20c5e916166c16bc0f2
SHA512d63fde0759ee9a028afb73e64bb680735d52a50beb5c83c94b89282297f42310814ed62c27043fcbb650a1a95a7c17991075bdf5b8f302343148ab12ab14af5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e0162963edef24055893081a5d7a0f
SHA17e328233782da748f5c046b62b3266b15c6c1f0e
SHA25690f7208272d310dcd4600ae44e76f3700e2ae29d9425c6cec354f49834b9fab7
SHA512fed584deb2fda2b365e079ba56fb504fdc57ba270f80ea1c92d5673f2eb3f819b8d2fa480a776120140ce3ae073bc9e649d35ab3b489aaab7c29923ffd611c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c754fa770d5c9de56af7d70951097f6
SHA1a407fd805315efdbb583f37cd3bd11099a643e96
SHA256d5453c91f0c329ca44d261726b1a102edbe6bad7473050859d3d22a0dc63df4f
SHA5129f90c078022b57c4ae63782696c8b2181d44413414cfcba6166c51b9714e568a0545711228d9aa020fab99139c6f18688d08f547034ed9183907e1127f20ae50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044d2ddba7288fca17a04f0d1156e41f
SHA1ea42ceee892e04adb0a06eb62155772ffc4bce0a
SHA2569fe29b45168942b03f365ba8c4b0eb5dedf24e369f33c7bee68fd8e42ff5c6f1
SHA512652eddba695b21a6bd387878ecb36ca21434fcea4869c505a846228559b72254198e628ba19b1fa656d967c7ef6772eccdef7394511a03977f71cdd2ec56261d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1b88dbcfff899419fab06c0d599dcb
SHA162a1da4ae1abfa6883baa6630ea0e59a10289b11
SHA256c3d92b91aba10fa76c11904f2a5b9e9827a8796913a842ccbd415da490f4baca
SHA512c9255268a379727a74421eec374973c0c341831202f7c3ee32f2c719813071400643790c904c096faa98dfc00bffe66b6062e3c41d3b9f8e49e16a24be4e5189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca6e326b62c1251bf067de866492570
SHA148fa75ae026e1ae98bd4923b56a0c1ea7038f648
SHA256c520b03fbff2c33969d7e67d995a75cbd7059753d36521f843bc0253136491db
SHA512cf46554b9836afce4238b8947742b117a851e9c737a8e77ffd58cbf248cefb0e1bde6a153cec332a3772a4694f40e0738c0c81e36c603f4068f22bb46aeb84d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b9a71a7fadce604dc7a74bca034e6b
SHA1ff272c90fe3f888210e7ed4df70eb65c28c4c3fd
SHA25662b4976437d70752905a7359bf56848fa2c760cc4c6f4fe1e67969b37883a04b
SHA5122e458de99a4aeafba5d81428bbec7533ac4ca3e2c2fe5535716d7a9eb9dcf7bf5eff9c4dfc2c93bf648385ae049d0ce09adcb113ab63d0e9929e316013f54156
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b