Analysis
-
max time kernel
138s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
f9a03e59c52b7912a57421ae63a16a1e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f9a03e59c52b7912a57421ae63a16a1e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9a03e59c52b7912a57421ae63a16a1e_JaffaCakes118.html
-
Size
218KB
-
MD5
f9a03e59c52b7912a57421ae63a16a1e
-
SHA1
40c13ddf83a28c420e80ee64c38c93fcc4b3997c
-
SHA256
a5a0ae7e3a468d13971b73b99327c521d052abf339aaff3389f397cfc7d3e829
-
SHA512
672aaeecdc2a47a34f8aa9a8c6bad73c2bf67d60881cf0153ffd36cd7d1e553ecbe0b5f0004300250d238885bae92ba8f36ab0e1bff4ce0b74d4192bc8f3a92d
-
SSDEEP
3072:SNIeLZIwVe/qpxkDyfkMY+BES09JXAnyrZalI+YQ:SaeLZJVe/3msMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433569617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a2f2bd8d10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8DFC4B1-7C80-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000293b32ec8d1d0062c8e9aaad6e155237c227024b4e79eb8f67a4aa79a22e27ec000000000e8000000002000020000000858902208e9de28b1522011073e07f6a3da9fec5ca33c5a8fc099344a0749f56200000009a88a4cfcbc225c6e6b0734043758e13cc10dc34514d5f9ac80ae65734f4fefb40000000f51e54d80402708bd140c9b886e928c9d5c0367d634683ff2c787037aff9dbb5d625c5c3339645046f22d2ec486b2b43e2fc02b28d835eb3ee5ac690461a4669 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2152 1760 iexplore.exe 30 PID 1760 wrote to memory of 2152 1760 iexplore.exe 30 PID 1760 wrote to memory of 2152 1760 iexplore.exe 30 PID 1760 wrote to memory of 2152 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9a03e59c52b7912a57421ae63a16a1e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999f23ee1df183bae4aa6a14dbba913b
SHA17f8a779bb93dc7897ece9bea1de5863f40d3c991
SHA2566ec7134b4ec12cae6a2867f56bb5e6fd076a6bddf1299e0c10e2f162af50b6e5
SHA5125cafd1de8a28b385e3f5b4efc66bd2f12708d93cbd73819af54b9b526b79e678ade2c653c56e17d36f27d6fb6c4f6f90ff993eb1eb88222d4a80e111fdfceb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5466ac9342f5548bd86a0bc0164a31abe
SHA19eebb257e1b2fbb649f34cfce12b13dac09bf7b9
SHA25687dec3dab6140fcdad775ceecab07f1a8e385d440a4d3f6292549a837462e3de
SHA512f2784f73c7f212ef1c1ddea5b0aff7e8e4f9f8557568885d92455305548ed5a8ea0e6798664b4a3d65ddfd8396608a29bc01a79cfec2676ecb006bf67cc86cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501f19ad5ef1ea184c9ee463773a8ec8
SHA1756e39b04b00a1f7792fc902815a4af584dab366
SHA2568cdab48b48cdc62d030edbb7a481f14b3be0266683dd1dc25793d88f61489d56
SHA512dc5be655f402767544c18f7500560aced3c75b73405264388e363468ee04d39dc22067110d1ea8246d9e2424e3f13f9f0d7c1a330e6e7e76580b8c3cda3a7ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58cb5295261c488aeed54e7f0f31d6a
SHA18fb4101305c7ee9bda53bee6c4d9300eb4a8c364
SHA2560dcfea242bad5eb5e1fa20a59905e52e8379e02bd7cd2d8c268355618e19bc40
SHA512ab38df646ea43a31faca3c519957c4ee51649e2878e01653688fddd63de2b0ab37daff1347b861b3415c943426eb6493859f387ba302c7a2a639b3b7293738d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed6f7d4b80274600b81d02269691451
SHA15a8a2abf4e078a57eecffc5fe7db959890b01f29
SHA256b3d95a14e9a78308b01d7de05ac019677b0f1861a4b6fde06125ca65f985beb9
SHA51285ccc76de6b7f2cebe3dd49bdd0b0487b383d0c95671a0685c412cd6829347124b80026a4ea06ddba580690afc217649cc73ce37ca2c25eb259f1e351fbbb033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057a3e9a9a3159477f1a98656429c851
SHA10ca82e5d4922c7aa304597095dea512bbb0a144f
SHA2567d19e97de71f0b1f8c092601c067cf61f0cc57ba5960bd07bb6a08da288ea8df
SHA512e18ee109a76103761729f3e38b9ea2b118ebf01f7e63e66750b11cee35b857ce426929411aeb9617bfa6a4b7e532427e0cb1d27ac6037759f03398637073dcce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a3c923a7f3359805746163d8e5136a
SHA147a449b13c00ed60bd46ea01b6809471c4e0ff28
SHA2566d6d95923d5aa45429af48fa44fce5562c296de736623a9af70337f3254efef7
SHA512454384a606a46e5fb1940f4728ef0a0f9d45ae6218a6fc8de6c956178ab7d03f82ccbc8468d5b815586363c50f1ed775fb3b7d2a5af0cef11961f0a987634b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbfaed57af1e3458ab27f5b5a70d7405
SHA15558eb4a5c48b26ee696f37d10b9ff033cf97d3e
SHA25603e16f4ac4f75249a51935a2e972c9253eeb855f71438ffec51d0a8ef0bfb89c
SHA51229d4c9513f8a88d2fa20c9d8f109b2e2d56b162742dacdbf659c94642160db82ff2998d3fd9bb2f0f2694fc32a2e483ae6500efc6b9516fe3a0eebafdc905721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52d74350318ca4ae31f325fa0d01748
SHA1b458612114b8b64cf16dad09e1f1d77c49b2de31
SHA2564e4c38ad1945785a1bfb1f491690660f389babda5285e098c48fea225e485c18
SHA5127e4c0e7be2bb593691bbb992d88d973406a0079308c79bcc18a03595ff3879138ae4c8ea3fed13f48352248eaa3d1eee0533806d76b6e4e1f067f5ee538db6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983a6c3516e33ba49d98e8f3d3acf252
SHA1cda92e34ce2cebf44613e3491b2def481420cf93
SHA2567f0ad015409e26ba49173fc3166948ed24e0bd9c661f7efa57459176f34a158b
SHA5120fb0d425596a5875d9817ce53ca186b74509db528702f8e2eec8bb51c4665e922e45e7d09ab1de95d276d62d8629fbd5eb35a6ac807c68aa8535cdfb091342c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7844119f613a4902be4d1e4220e3956
SHA1e43717327253eabe683df0bb87a35d5c9f89f845
SHA2567f5e37bf5c3c355095237fbae33b6559f6840f749653eaa5be4f42d7a8c8aa39
SHA512ab549b624aa249c0b041e706281716a86ec8070ed2f356a52467697bc2cd7147a239276cd444cb84f1e8c16ce38eda8ba3a7e91960dac379c8c6e8c2bb7916c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d850bdeb3f1f56d08141a817829efa9
SHA1d5b560e4faf0157346870be22adae9d5dd4bb1ff
SHA256a7d09128b40a3369a22d822b5dcadf0533564e29ed56fe37881d80a3026cc934
SHA5128461808c6cbe28a6a1d9d776210b10cfeb3bb25bb87605b62927622efc8ba1550453a6ca586bdd32ef6b4ad94ddd34fd31bb4f7286dcae0d9c011e15e9711d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d8124843fc20f193186cd73baa27be
SHA1222d9edced37fc41e765a8ef8d72925fa5b2c3fc
SHA256c5dd32ae9e8f1653cb8e5ea11e8ba529b444cbd37b57c84542bf055249d902ab
SHA51264309e3c3fbe3cd11c2a1b9218141f607eb85c27b6e884b1c718db54d6bc083d348fa6f6a80c76633f0d7feca53257e976f5d994d25b6cbfcec0cb61138861f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6133ee76e23dee8069d9e04cae75e31
SHA135b5036792f6dd8f2f0330d2a1fdf01a1cea4306
SHA256d22d8c616a8c00253b7c89bc246fd24001a4592adeb102f8a40b3138893bd3f0
SHA512d4344a47b7c5bd709ea5f10f2ac6622856f8f296619bb2c5f65680969c536fc5d11eec141c7c900cd99894dbf7141c6800804451c871ec339cf28cdff0340efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476ef4322929a38eacf881915c5794b4
SHA169d6853aba5a5f0e5c5746e02ce1319d3aa955f0
SHA256d52b66d5c578c9453765be16bfe3d86fa89794ed1d248dc88c285ed702e2dbe6
SHA5125b3e88d9bca8da766711b246abb478df241143f66846cdfa88b143b3aff4ac5523c1ee908320db6ba89eea906c18b97df7bcff7446a0d3eaef0d304d08e37914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b74f29358f3002e51b043603f7bc54a
SHA1a2c1d96d613d40fbc14e8253a61b311a04d5e9fd
SHA256ed282bb635221b50ea68cb705d310b6e8b8c9a06272057e1204d3531c46be64d
SHA512eff44477428434391ff5dadd570f3e54b6f89771bf30d38c407cd30a4e52610b37fa27d6062789763b467b386ac0c590876373015e3c32245770399d35a5f2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b09b376560168ac35d47a292137bb33
SHA153d8be886c193256423cc493843d609f606d2d5e
SHA256c2fc777edf3583b2b27a4192243ff1b8300842ad2364603f904ba7da0b1a6df4
SHA5124912c756d2306ae9b52ecb1ffcaf76a50e9553e7951f71ad835fa27091f94c7f56dc62f50f4f84ee78493e7b2b725d75496115d8c0fbe25484783131bb243dee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b