Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
f988d3cd601d263b5d511d91db9f870f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f988d3cd601d263b5d511d91db9f870f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f988d3cd601d263b5d511d91db9f870f_JaffaCakes118.html
-
Size
57KB
-
MD5
f988d3cd601d263b5d511d91db9f870f
-
SHA1
8bf757a5275cf8ac8da362dc0da2cd7ef4a132ff
-
SHA256
2f2448dde8feea8c4fe7cdf1c3ce93a699f80d8dcb7fe934a4d539a6787e8332
-
SHA512
aa628b5cbe5dcef49fabbcb1f3e02f582c304abee9b80a8323488732c7ce03bf866da049c47c5fe4631dc8aa22b55334d8da9b301acd630ca2a14550299ee1a5
-
SSDEEP
1536:gQZBCCOdd0IxCP625rAQBxZRpW/u0JsMlc8YhwmqQt8EOwuGz1PD+R+GwEmfZwYd:gk2D0IxM5rAQBxZRpW/u0JsMlcRhwmqU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cb36c28410db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000af66c71eadee60d455fe6ab1c62cf7a95f1780575fa2d71d857991e332129b7d000000000e80000000020000200000005427ecfdd3bf44d012c178c96d1809f8ce7acf944fb1c1adbb935c402cd4b36f200000009192b927d05f86e7923934722cdcf2fe578387925cabc24fa4caae7d0f7af0294000000000d6effeddba9f3540bcabebb9591d8bef575901f8e44bd2ea43e4335e64473a88ef26b58a1078eff8425c8bc054b3b0b763dd8d5c17003cafdaa5bd92ef7ede iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433565863" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB5530E1-7C77-11EF-8C85-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2400 2548 iexplore.exe 30 PID 2548 wrote to memory of 2400 2548 iexplore.exe 30 PID 2548 wrote to memory of 2400 2548 iexplore.exe 30 PID 2548 wrote to memory of 2400 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f988d3cd601d263b5d511d91db9f870f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b609aa06a86a871552f9877b8ea101
SHA1735674f8f499f2cfb398a49e5ed8dc1e414373b2
SHA25622fb3cf52bbfad79acd7749e030bc3f891418bae1921fea0b88482f5e5e97387
SHA5129ace1396f8cfbf3f7c0a06c3f4b89a8e7ce5bf4f3db4d5041d71a49c753dcb3936dc72104a7cf85450a6ac3c267ea184c7fdc7dffb70f4cfc6242251bd1e8cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f542a6cf179b538ab91fc79cada458a9
SHA187a116aacabf994f18c19c04dd62d05937e543be
SHA2560c2c5e1ea04f58439f29def4b44906e880a32fb191feb3aedfa3a5c7900f0404
SHA512bf3da3223dbca2c17edbc9c82470bc2da70d76116f6cb6fa5eb05af41529ebd0a4cb9afa1d2b0f4f6211810b88569a52dd6053f4628edf8a4e5e1d06a83d0140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ab4620f87b8ca0ffb7b2d926a92e0f
SHA14bc17fee78cdc12599ecb36447734b63e5260308
SHA256b0317989a7b4db56a52dfd838d820e3fe6c20a03e1bd015b9eda11a0c6610475
SHA51272c8c2d9a9000621d1254e81c3b1edecd4594c1fff49caef57e304dda85aed49c408862c399a9b893485fd57179e8b114b4922706f7a0fe6d3595f4dcee9348f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d7e9cf290b0810ed67b84febb954a70
SHA1e7a263fa12f51869f16e10dd991d41701c6cef5f
SHA256c2056c5a2a1a83070023d794edbdc1dfb63d67d7440e84766ce4b4b533157228
SHA512da7441d1413ace4a19f71096158defea03d063dc5209f1b31cedf8df8cdd1f631a388ae66a9f91417e74971565af84582250b7a3cfd1b9d5fa2b1a9de2b2d51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a274f9dfb3134a7faeb90e5b8fc3a7
SHA1f5dbe98f5dbceb541fb100c72c02189b9935a8e2
SHA25686c8a8b5d1489d2a21061fe6d824d1204a4d0e0643df14136ee820906fbd47cc
SHA512909dbbfa077d4a2de6cea873b74ea657927bec113ed80d26f9c9bd0242b64bab61145f3bf6983a60483a836d439586cb00cbfa675b371eb6924e5868248909be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cebd6abb15dde69853820fcf53e3484
SHA136058ca55160326d9a01bcbedb141d3975e1030e
SHA256477f9d86dc16a70dc244ab151425e630aca20fb097cad41ac8bee35105a34dfa
SHA5125457937c15c1c57fe2bf5f25d05bb83487f47e12da2c77a016b5726f48902309f210f447955f8cf92381a66238a7c9009a23953542e8a6e2cbbc4aaae4e0ea27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec31a251937c408c94dde3beb9a352e
SHA1e906dbe6210627c9ecc82835b00bf591f6faee7a
SHA2564c60c525a28696fbe38255c81dcaf7753abdeb601c76427e8162d22b0d81ef0f
SHA512ed3d89bc8a990cf697f611014c55ea3bab25ce319838914add24b7e0c686eba9cba1143c5a1fb6d429de08489a6acb332fbe9a1525efd122dd4ddff13e1941bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4d846cdb8c26e3b48a8797c0df23a9
SHA1b164c271557b85540d7488f78d3f112a283323eb
SHA256ba955d1357f0901746c23b6f864ac52a9afe310d8b9ab610426e83803f2b1a0e
SHA5125e2e59782b111625ebb7dca058210cc9c470c5338f20789982315ba5e5a5dd0c80972e461b0066e441548efcc143b59b83386779742f3a1db9ed008e92b80d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521548affe90440676907efcfca9b63bf
SHA1576f210f65d472a7d5c03c9206e2589036bb45b6
SHA25642c87a97e46eb605ecd37c5e29a7ec6c355d0aaffd63f94e5e26d9d3a1cc27c4
SHA512a32d32ca486e50c768765e43e7c6d9e0d77d6715b0d02a5669427474574135287e389b090c4ec3cf0d31ff88c959b70df656545a1f6ed8f5c105bc71c5e655fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b200777c5e6c62c4581559a5d8ce25
SHA14c90e75869b254c54a8a84a1295279f403f55acb
SHA256afa04c7a475ddc6a80eeaeae262c4d0d1860bb5ce0e84e8835b7f174dee89cda
SHA512a7f5d2fd849a6fe9ea7eafae208372cda2a397e38843a90015d3df282b40fdd08cb4698f7858e64b80bff4f70f6a34cfc195cb9ada3c1b4d8798b354e1b4c9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7aee56c33c1bebd22eda362cab03fb3
SHA13fede3692b8f4598c7d73c665d25b5a3f8601806
SHA256faf4ddbefa02be502901d8c6719a8255129d57470afc6ab33b6fc847e69e301c
SHA5122b0f7910458e2253f24eea5295532daf3d82f342438dcd5ddeb08f259cfe8a3c5ef51e513ef208aba8242a1823632a5f571af8df43ac41448ed60bd56f7f21fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b8e7db8d6c223acad16de9308526eb
SHA19434359079ddbfcce35add76d18fa9bb66a31fa0
SHA256745700308e793af6dd74602e8f0ff70affd4866060889e82c4131e0a2c1b00aa
SHA512015db2c2e46f8bac95fc24bdf19d8e20296deb547245d029cb3de731bfa352329f5ce76c97c64ae1be45226eb026cad5516dd324021da54ac807a96983df9576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57fafa765bfaff7dbfa46a42fdb2fd0
SHA1aacd2db3c479476599d205010ca8141c20862130
SHA25610328096d54c58266e9c3072f44292027c7ff23ff1b33b716279a314ff42b250
SHA512596766b73d47afd96a91afe43ad79f7cd1efdc1dbebde6c4da405a3b68033263ac42c4e2ceea097d7d9e706e4d9ecdfd91ee79684bde2353bbae0214cb6f899b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190560e594a0b5eae517231ba64393b4
SHA169a7df41c2134a4ac58911b1a4f53daa32ebebb7
SHA25672dec76b08d5fa78bec67872e29f2df55beb1c6eb6a3faae28019d07ce444234
SHA512863ea70a27fc9bccd9730c9683d06b9a93644297e50c2d333aaae75db570d6e08ac5164da0643d6b4e7e9b24ff885852eda56ee59416e1d401c71de2311b4611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc07c4b47cad416986363da919b799eb
SHA196c1558d9d3a5f42a973b1e87c34ee906c017b9e
SHA2569b5b5be33718a4d6f4edbbbad3e55fa8b17b24bb71273ba54c7fb95f22a0d0b1
SHA512b07447744b230e37ecd331540fa5c6c46b946e55136b79de05241f617ce85f8547ba301aa1c618df92b0a0d76385ed1bc815d1ad950c405a7579abd3fc11155f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c26018affa69f031b6e417610d380462
SHA19690eb9f1aa7af19ce78a7ca92f8ca0366720494
SHA256eaad4fe6ce22a1e4590fb42e2ecc40b004991e7046b3e4887da168f2d3fe8ff2
SHA51283c8801c4b0d9fa613145a67175c6b919de7e86d30909c89b195cfaaa52bc05162e430b34d4f9e6b07fb77f186e4e0be94a483bde73b522aeb0d7664ffb196d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab97df52c318e234c5955e84502a5a7
SHA10a3100cecea17a54eb8629e6bf7bf83db20b17c2
SHA256f7f176ced7cc2c5bab2981626f9b018717d1cd0222aa40ec2fa83d46effd3f10
SHA512971158ecb4a791b85de1cc64fb6b87f4d45f8332aa72b6b2ab6de47ed02789b98d7015ddf933ee9343ba14d1dabdde326da7dcd53eca7d8b650d32d396604de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893b92c968ee8777ce993855a0954527
SHA112948a86bbaeca33003f383974e71bf24eb9a48d
SHA256f2b90a398eae290ac025f7fdd51868d4bbc982f9086af6efe87820733e68cc7e
SHA51271e15d63188491f5484aee85d71f8dc4a02d2151cb61b6fee1b30c1f882df1a183116c8132324ced9083e056050a7bc2aa4ad7553b8e8ebc9340e581051e45bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d7102a42e3bfffdbc4f850e7d40e17
SHA16b4a424cf7c4b4f23c74dc69be1af3d6e793f1a8
SHA2561361b54d8fe9d2ff5f7f92ed57993a9cf16d81821031d1c1c0c28f0ea807f57e
SHA512576dc71dab34870b07e54d39906b419ea8becc83111190c273e9b6d245770b9ff53b87390b4af28e500f08130b2886bb9d3ef7a9727cb3028efdb8e00851916f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b