Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
f983562998caacfe02896c539b8508de_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f983562998caacfe02896c539b8508de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f983562998caacfe02896c539b8508de_JaffaCakes118.html
-
Size
32KB
-
MD5
f983562998caacfe02896c539b8508de
-
SHA1
cc36eaa8c9c7beb5d33f13a68cba86c71352f549
-
SHA256
6e181db17b9dc715dd2771bdf50bbd86c89b564e37463bf57987acd52d16ff0e
-
SHA512
ef613a455006ebd9ba38e3cd1986410f192733847d46c3b5ae9e93dfd1712d0dbe9ef71e650b2e21b8b6ffaff92706d272e526307c570a15b62cccef4635109b
-
SSDEEP
384:F+8KMnR7g+XlVC+WaxpjbEntTUMfBY5p7/Lj:FjRtXlJHp7/Lj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d014003d8210db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433564782" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000002bef7230d55d1d943ef1ba39d7614e34ff45fd5124824d0beef89aca4e0f9613000000000e8000000002000020000000f6bad139482945dbae2e733c5731a4bbbec13c010ecbade1b449da5254d7266720000000ad692603232beb1c4e6e641518b2146fac6a6bf5e05ba994db1bc0be46d549824000000088c3b05f9e4be7c9c5c3c8951cd1c2a8c5d68c0aaefa2b82fa48ffa8735c02b245c5e950e4b0e1a5daab34287cddb15d89fc4e64113b278d4b64e8a7dcc2683f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66700551-7C75-11EF-8D9B-F2BBDB1F0DCB} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 108 IEXPLORE.EXE 108 IEXPLORE.EXE 108 IEXPLORE.EXE 108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 108 2432 iexplore.exe 31 PID 2432 wrote to memory of 108 2432 iexplore.exe 31 PID 2432 wrote to memory of 108 2432 iexplore.exe 31 PID 2432 wrote to memory of 108 2432 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f983562998caacfe02896c539b8508de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a596ec5e5b1fbd39a841f6295704b19
SHA12c4590139e6c58f33e980e33618911a83226bf76
SHA2564d897ab269a8d4adbdcf060bda52b0a6d4b0cf33992d9652f2fe533e2e4ad597
SHA5125e5c52c8c4f65cb1b5fb1bd47fe2eb47e6bf178dca7b914748afafd1a6e838ee9c1ee27bcd7111208a76c639ee389a077c0095973794b5f09ea56df8894d5879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5ae46780779ca2891bc8da3fb11401
SHA198f1c1f46a048478d3da3cb6367f09507574ea7b
SHA256c29098c212c526695147869dd13a1efc9ecad1e24036d73a4fc537cc9a2bbc91
SHA512e1a1a78007f93bee11f2be759ec537de37378ca9697b408050164f5e6aaf6980de52d47a2fe03cb4e4b471c5d87c8e65db63231c6f040f9b48d7da8a071d6282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9aee4be0b6bbbe4cae908a32a4d283
SHA113409827fa1671684f913376ad3efa1cd5016487
SHA256a9aa6799185b4a55956d402b5b0fe56d61735ed13c0123f3211dc2d24c59192f
SHA512045ff6b7befdb6442f6a32f367d853ed4e69426573eddc6ce627bf4fc9bc58259e5a2f5ce0dd618b28b43fefecede1010391a8e1d982ae9ab1987a245c188699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928f670ee7cbc275ceb2b19ae645fab8
SHA15e56e1e8f0ddc36435986c6fc754c6d7dc8b8bf0
SHA256b329b50483b61e7ca58f94a67906c0c34e49a6ea1062e2823fe4e38ab8b716e9
SHA51294f6a58340105d380746aafee4d4e39a1c59effc1c79b0cc928feb925890c133a5684653c85f14d8bda5097b877034d4a28ceab33272bbbf8ac973ea8ce4ed47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e244b13d8018694cc4891295e62da8b
SHA1ec136d3f270824a02c33ca40ae9a72d941296aaf
SHA256d0813447b3d816b007593d1c52f9ec3538f1c3f4b6c04cf6e6b51e44d8744d7a
SHA51207be898491a2b2da074d1541107e42d47eb0e4cdcd784c241e6868346019b5eecc5889db0cf957c8fe33d6e50669ae254b9029999e9e6ba7dd93c64404837a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be8957e1bd689b6c9659957f77eeca0
SHA1da96afb044002683e89269ce0e881844d0195dd0
SHA256c4903120338e7555bc0e8803d8f8bd3d563e0d0fdedd7b0de9a195ece2e541b1
SHA51289808ef659f245ac141929d671b9ee1eec9a01e74be8e592da40c0e5ad5e919a2e4e4020d5b082d04b3fc58ab91e8274766d8815afd4463de7833d149cf7f4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd2ca918d2f21e4a70963983a1b34b0
SHA152e8747fecddb49f13d3ee639d7788993c8b1280
SHA256028748de315769725bf14a59f2a3dc8f12778411705a1291550f501349dbb246
SHA512d9aa97fdeed9c96a84280ef5cd517e8e820bfcb133ee280d4e22aaf81edb5a52173debd559994d1cba5e330c5b162e001b593ec13a76fc36c1d24b6493a304c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253a5f9d4016437cd4d8f134d7846866
SHA169d52cc1762cda4fb243e1a97b274847282c6a09
SHA256f7881403de744201a9e8362daedc3be7d43ad7d12af50181b821fabe46cb29b1
SHA512949bbc85d90ff8e5f1079b9b8d0da83974eaacdf452ebd97da835b2233118bace1fdd6f5677fa4bf8ce063c04c1a164eb9893729090982e80c80a3a5f283224e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee00783ede5393de0c986fd413a7b96c
SHA17bfba34b4ffa06a3f18a7b2571df269f53b91da3
SHA25669372524ae080bc445041b9ee8bc7ede16932ffc42d341a1dd53d926a5ce6329
SHA512cdd980399a6c3fcd8b65088f4157132a7a79301544af7e2111e2e86381590e03fb27a26411ebcfd03e555fee941f72dc4af61ad9733324747833e0b953640762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac12fd4e4a4d2ab3b99c179534ea309
SHA1a03ebb28c8f831a70e10dd6f54f3a32536f133ee
SHA256a263c0f6d492976facf48de6483093e37ad233029e42484ae57b6333e66b3aee
SHA5125ef55d0fac663c85539b880a15f2e5f198fd84e06fbd42c90be8f3cbcb73827b830b2e560a7a42dc9377b1503f542792003b98ea0e1e91c3dbf5c89a259e2571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf3286c9395917288b372dfd7e307f2b
SHA1601175480682323be60857fdedcbbf12099b08ed
SHA2560a495742ddd37bf828ce4757ae6cf631f1f41829cde0cc29bfbc01cca5ebf89b
SHA5121021efc42a5414d1ebc4d55d15fb067439d427ce6048f9bf68f0d0a8c94fd0af6a78059698eeb8efffa84fadaa7954d47376838448a714e77d8767a2b26539a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210f916b9a5f6167f5c1a1e2ce0e725f
SHA1076d92c6004b210dbb81607376766f35a88b944e
SHA2564495e774ac284289aef6ac2ffe40496d1732a0b70c45b05fbfb4781767217951
SHA5123d3121c68b803a4d65b1a09f713094e7e82a1293a5ab32f0e808d887e58460fb5366e819c768d661e99e164175d82a6465ad37869826d5007e5d37d91d349af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f90b8137fb25b69d4ece21a57befa759
SHA1268d950dffe078f41e85c350478e75cc7541630d
SHA256cf1c270fe7ab0595b024b862f607c9cf7f5e7e5dbbdcdbb208064755da49ed17
SHA51249a3da9c6cf145af9664bf0b1029ba47c3d10ed6595333bbb2e9ad602474c74c7d41506fe6ec7589cd54e3a20f8ab8b235da5948e1213c6a0457601b6bcd4418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55138b0d1e869cb09a5de39811c1b69f3
SHA1cdb1d4e0327e4ddab395febbcdcbb9f62bedc013
SHA2563bfc2f58d07b8483459f38b70b3b5358a569e8cf72820b885397856efce0cfe6
SHA51252d439b232b0597046fe1dcb8a26b505c9cf8ec47fcac89f6d218cf43d7d5be1f8e9948223711e5074050fb992e43d208672c0b7c0d47c6a88665353eea68ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d616c8a05510d3931785b422dc9b1c1
SHA12d9d63f377a14e4ba2ee6a2ed3c77fc688aaf7d2
SHA256c6cdab4005626fee5f9ce091707ac66853b1bd05604d12555d99cb44ff19f836
SHA5121b090d826b296a86db8738764e1118aa4ad70412f2f471dad75808efe674b021b961730e8498669cfca920d1dc9724fc24f8be73db8ecfbbdc850f82d8019078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f662b7784198a4e8a1e17dbab997768d
SHA12224c340ffaa45e973e63e3ce4561b8acfebc708
SHA256b36ac00d540ba3a5ea62c36e630e083fe80a069a19223c1c6b3c3369c9bd7ad2
SHA512984d7aa2fc1fdf61de73518d5e12065787da207bf0c284a1a21382d695ab1b3fdd393f53637b6fc75424a23e7f899d355b5be00c975a01d131e91379521a223d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4dd92d702303ec96ff3c86c8556ba01
SHA165df675ada12381e52eb44f1e1a12549eb729b6c
SHA25649556a4d479a51461dcebc03395e0d44b5aaf4fe0fc2f3116e3de1fbbc004330
SHA5121fece2f4f0d5d10cc17583179c8547ed0c4e9cd78f3eb1b925ae3902cef47bd823f57d0531697aea28cf95ef6b539fa3cfee7c6b7f9e5c03eed00e430b34c8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafb3e729fc7504faaa80002fabfb90a
SHA1d3f934916d17118bb9745f7dc4cd8f9272c07511
SHA25681b044c4a9833724035e3232a6485f49b8a0af515fb2f6231ebebbd1d0141d59
SHA512f614ee21e8e99e4a496e8aafb3b2958c8e9767bb535d8a63c789f5e96ed21e57d2253bb1cd46d4ae90b278526c131c4bc9f0b45ca8f04d706f9b3bc41ad05912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d9917e5efdca5d0499dc2210dd3960
SHA111aaa6c5f10c0227b61a1f9cac934f237f506323
SHA2564451a07fbd618bfd9f39c8f9a1184a73cc1f73fbf9a11f382644a0b4fac992bd
SHA512727cf2b119b6e8368b31fc5c6c4b61105a380c3fd4e4bbb7d0504e841d849824ec06e59dc775de95f23bc43f0fdbae3600690fcb2faf8f8ba7d84cfc7d2c8677
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b