Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
f9b6891cc9962362a1114a439de3c412_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9b6891cc9962362a1114a439de3c412_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9b6891cc9962362a1114a439de3c412_JaffaCakes118.html
-
Size
79KB
-
MD5
f9b6891cc9962362a1114a439de3c412
-
SHA1
ce54c9ff3173c3b6d3fd8c7a66bc7e2a289206f4
-
SHA256
02c366e0d0d6af7d9ad742c099514448a0dbb30faa7fe24369c5bba893dc9c75
-
SHA512
b350e96f4282317a77acf2072a400f572fff2d3a2799ee20cdd967d672da8ba8c9a53fe1ae71876841cb701bafcd84a134dd0997eef67d2ea3db3e0692928040
-
SSDEEP
1536:J3xWPPVZeooopugWwTzNen0tbrga94hcuNnQC:JhWPPVUcpDWwTzNUq4hcuZX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903860809610db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABA0AB21-7C89-11EF-9FF1-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000021834e72a60e99623f216e080c46d29149d289a9dc412c60618a2b491e31eded000000000e8000000002000020000000688809d4d0f5d38e8b449468e3514e4cfae6bc9c0bea63c8e9fc4e6b54abeaa620000000c24d98c3b42fcbf5b4ea04c1bc47541648ed81ab4e91e4114e5f87fde10ea25e40000000021b379d55c9bdff5319de563e3d7e913967f852a9ea6629b97fd8e31d92002281f54309a05a293d07b2c94665397921ed4416e97538cc0060119fae46b6a5cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433573488" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2360 1504 iexplore.exe 30 PID 1504 wrote to memory of 2360 1504 iexplore.exe 30 PID 1504 wrote to memory of 2360 1504 iexplore.exe 30 PID 1504 wrote to memory of 2360 1504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9b6891cc9962362a1114a439de3c412_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c0a27e2409c48fe3f6e85232c93b780
SHA149b94a7dad507dd782ff9473a8ae8e9c5c1e3f8b
SHA256ce21fcaaacdd8b6ae799d85fef6dd0749eba1db326f7f9cf3b0d7a96467b3da5
SHA512b08b7974b85555913c200634b6c8243dc36df13ff4b5624104a0457ba82c9fca1261423d667de736b2fda3fef1dc520afe2f24938504c78c4500c5e9bb8608de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7edc92ba544e2c34a993fc765d2a04
SHA1427f0b6498161952363b089b83db21d6e4d09bf8
SHA256348c51bb209672fbe2adfc22512d69c98e1b36d4da2e9f107eaaaf1331723468
SHA512e85deeff0d9bb184f8f646cdd353f6aba4293394239c6843846fa9dc58ba47aa3a45fca6e7e86bd87b4ae97f6d6d6b608a4cb5e0bf4e5b7ecbf8daee9191100b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551da783b3f5ca7f1e2ab2797d1246949
SHA1c62ad1db1057c96b932d065935466aab40cdd7a4
SHA2565a0db1e5cbea92d4e43e1aaf81905dbe1d5dc893578a1a92c2f61d66defd5d4f
SHA512b14bb7861944407a79917e463a8ad8cc08366491590e39f36f725926a76285d02c608a86dae29f06a7609d8547cb2edeeeb6f1d395d1cd4a4dda3af9bd6c5605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e9e51bde3e9a3b2fb46926b335d831
SHA1172abbfae32ba39db68de1de959e9e8ab0cd3ffa
SHA256b66d0326ff39cf675850733d2acfd6b9c036e944a9c98b739bfa35061725fc15
SHA512d0661521895f78fc29bad108f6d1f23f7c6769ad74ae5f4cd2132fcaa2a825dc97ad597fbb9f53cfe640d5bee2c17334f957749dae92bd1735022c80e4be7c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f628f716ddbced528ad11c0a98a624e0
SHA19d951c26dcb704894260dbb324891ca207119b09
SHA2561d0efdc20b9d4b7bfd0e9747750993cf99b794024f2f7de1b0760720095386ea
SHA5124e7162291096696e90cb76a625eb7b90d235a53eb0d850c0dd78712633dbca20f8f418f9d887e3013b74296f9b016c991fca71c813501478fcbd4a19ac963a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54781d9fa39bd5f67f075ce766fd0299d
SHA1d4208f2e58771e9dc355cc8b137add7dcae746cb
SHA256295746964ca6096be0dc0953719ddb37de94e00d13ee76139666b7b540eab6a1
SHA5126757d0060805e8af710cb1ad508828e26ff111d13ce202cc33824bdd5f65962d158d9b75f73c6590b4ce7bdfae2c95a548cae4473c002e423dd5e74e91a33e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de61c876ab6917b25932c1e7a90438e9
SHA1db0a0b56c2e09c3f22eab1538d04cbb3d411bd06
SHA2566217fb7e27d57b437e6ab29934ff59ddd5b1cc4c8eda7314d353695da129f934
SHA512936f82e9adafb39dcfce0cdb6eced05666202f555147bf1a2217a73962f7f3bb6731b2a9fc1d743389ee6747925acdf76398b4989a6aac756024d473c5564249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560941b7d3b843b247bf529a9f57aad8d
SHA1fb13c41070a94b35e82f2729472f4139d965745e
SHA2563999f7629e95d01596087a6a61ea04c9638b3d2b5617dc1074bb6d43158578ec
SHA512e18dc00068384af73a55ef1af7e67cfaf94a4c104c44a2d5f5abec46f6855b77d76377f7d7824f1f39fd3d0f64376c54222bf1b532ff3b9624f9313f82775106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525679dc46d3eb5b8179ba5d59ac222cf
SHA136226b975690fa957335eae820ecb5411d818bff
SHA256e04f3bb338c1c6860796d2f83d8122265025eecf96c5bd65111a9e148b93c0d5
SHA512a13b1037046316f76e62954757af532cba7670acefe160cbfe8e1b9360706997d73fe42c0fdd7a7a2472c12cd198ece2ca6694448ffe070ecd864294a078f8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b368c58872ae1fa7a189a35201a330
SHA141eed8d6316bfe503d3ab5a81c6512cde17cda28
SHA25645d24efa78bac2b95212aa3fff87529e1ac2d7d955434da7380533e348fa459c
SHA51237f9613458789613f9c5d41bafbda2e733d452fe0d5ba922ab7c9c3dc36665b57c4543dc5372da27e99e561d8ba7e6513a41c67bad7edfb75015d9a10fd65e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f2f63108e4f6b96f6d4f3c8865932d1
SHA149e4518b12d33474a979e6ed0845c411996f99e2
SHA2560710a392f7f3ada473f200e089e6158db80c04e18572151e3afdef86040a1033
SHA512272f34d7690a0bc6581193bd7d9a73ebada1cb78a147abac6b5ccd1eb8474a13ec74db7b30e7272f0fb3132b566c856c0317e7957ebbe4e092cf96207007688c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ab4b54dd4a68df36700a95e16b1148
SHA1dc48ec661d8d37825d2dbf83f84998d046a3aaaf
SHA256cab72aa608b228462bc8c81d81727c8bfd04120cce78ce96e0f0574b6d3f5472
SHA5126b7a2e5067f5904134fe712c841428a064e6d1ee5393186839906b0c7d5c9df624b7dc0fe400b2504f47a529caa5b010fe2757494e2e829d52e7abac6b91d0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54872a7cfc1a2e8772dcba0e4c6bf5de5
SHA1b6174533c6cf063302eeccdc58975d637685d8a9
SHA25605011e5b7d963ad368e9096074d572b78572ce516dfce4b9ab7438ff5972a86b
SHA512947c6e9b5c65e5ccf3b9746109bb1dfbbfb54c5639cc1feda09e570d4985fb1a1be3258cf164a76d30aa5624e604ee416a1d6ed78f87ca8f0eb6dd353cba3b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7a5b55fd013a8e0094c2887887de2b
SHA12747dd1bd9b84153d0ca47b3d76c04910e4f64e3
SHA256daa18243059ebdbf8948fad672bcbbc525f09c9d4b86de5eedb16bf883612372
SHA51263dc2089404f5db8c73c54c5cdaf6db0806f1a42297868e9e35d9f8a94405eca0b4581178d1acfb0c94a6d97c99d94a7d89bc31249b525bb515812decb0a57dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50206764e51ab13754a663fbd1b87d39a
SHA1809e18587e8aee9064394074c084d89a6dc62c72
SHA25670bfc0c702f33d1a43caaaa806de26eb09540c81fee302e271b718f7aa09fc17
SHA5127ebeb451b092fe61acab273aa1826206cf8399b25702537b325356a2edca8417e9f4d36afa41b6c67b7f364bc4db5fba9700b51a64f01a670fb186b63f9b9e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58788228d58e749ff2c2d9f3b57361323
SHA11eb28980ca7fd0c81add51312a3b810cad3e8ead
SHA256da4c74c9fca2fcfb3676a6ae2267ea86844c21b4d319cc20724e0eacf55ddcc3
SHA5120710775d78a0c74537617c48224dfc8e0a10143d6762702dfa1253febe2c4d1e273c7625d1eca95c95e2180dcf38c39e2de4e9813cdafc479600e47f106bfaed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6abcf0c03437cf7c75f574c62377b79
SHA144fbce021826162bf82087a79fbb6e967aaaf843
SHA2566c8f15691db4a94f826ae5482329ac9cefd93f6d763c8e878364afe67b417cc2
SHA512c6d2089782dfb6b49a1206662cec3de1cd5638d5c72717c73c4f8e59bf30072b8bbebaa3d72a0354f968635888a6c06484d769005311765f86b8f7bf83184026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b38c668346996408f1888a87f43b38
SHA1db4d923c945fcded41bbbceea2049fc43c73ad25
SHA256cbfc1c026076d3c90d0df63e0c2288908303ec093d127b89596bfd73ac4c04dd
SHA51200d0a09517fbfb2f0aa56fad334a392a0b8f4b2c3501c416ae48af4fbf74cd24df60d2f628c261a47bf1713acc2bb274c47b1e7f0a7695e3de6a85904e3d07c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455fa2704b842a537909f553796ff41a
SHA1aa58376b0ec6b8a30e78bf279b6519c1d8266f96
SHA256fe9c8c993cdab34f4ec14c92ce2168d6397eae4d48063cc579c3baa472c313e8
SHA5128e2e2f1df96517e0facc9b8665359a1a683f9d3fa36d9142c3b96e70ef2407653d96866374d4a76a7ced1cd0bc1c6097df8b2cb085274c08b4f2d9077e47e4c3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b