Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
f9a61a415732fa3d466e94bc3e21cfb6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9a61a415732fa3d466e94bc3e21cfb6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9a61a415732fa3d466e94bc3e21cfb6_JaffaCakes118.html
-
Size
26KB
-
MD5
f9a61a415732fa3d466e94bc3e21cfb6
-
SHA1
475309d004fd6dfa55182fe3e98c67d05e0f06d8
-
SHA256
1c41977fe1332f80e4695d340fe4b9e99bd824bf136e75369503f81a6a047146
-
SHA512
07d54d43b9e8c6d5cfe113072dffe4e5dbb66842a8e565793a0921ecb164b42d93739f77950e654d02f01ab3d092b006c20ccde33597fcaeabd2f0c0fe32f3f6
-
SSDEEP
384:4+QfPFd9QZBC7mOdMEeBKfpC5IgSnbmFe7Acgh6nakJvAgo0i5A6Pd:Zcd9QZBC7mOdMEbpC5I9nC4JIP0i5tPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DFBF36D1-7C82-11EF-9B14-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433570569" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000c939eb7e0775d27e6bc23c46a7d123011081c1bfda4f8b9643ed9148519dae82000000000e80000000020000200000006258be95b4a795712885c4d2700b016151ee1bafa7919376a5e3ebfda538b80020000000a7f6569165be8bc66d91bb157ed3642b2720983b8d1c2ff52e53ad8878d0a721400000007176984091453a8ec99cca6dff0cddf6557d4d703a5298e32dfbbf2c887ce101d86e9fdef937d0b72268ababf6106be178851ca6f9bd1b46f4433ee8c435b013 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b083d4b68f10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 276 iexplore.exe 276 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 276 wrote to memory of 1228 276 iexplore.exe 31 PID 276 wrote to memory of 1228 276 iexplore.exe 31 PID 276 wrote to memory of 1228 276 iexplore.exe 31 PID 276 wrote to memory of 1228 276 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9a61a415732fa3d466e94bc3e21cfb6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5882b3260253384a0e0c00d2fb3b55b6a
SHA19d8da4aee8649c71297cdbf169d9a9fa690e89be
SHA2563d7f2f8e97acb19925dd1431a08ff9d92416a461f7e8c2405b5aae82cdce520f
SHA5129239ecfe1cc245c5ca0c9513bba494aecc4d5bca916395d266e907fa9e59ee9c3c7894bb3917596db8069296134fe2e3e79f3309aac420131c7cdc01becaaafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162644bb932aae8dfe247ce83c93efaa
SHA11158f6815d3d0af6224ea2a2fbf60b65aab6545e
SHA2569c673720d6e23ba09b0599658553947c0c992a392255e0a9cc446d941dff6938
SHA512d8f58bfdd42f6ac72f427f72acd6b62251f884af6594c61e67c814782e2e7cffab984f44fd3d568db164cf35d567cce1589032be449fbd6402982b4e1f08b240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f1567a15d18256bc2f1279a54cf1e6
SHA144a80afa3c2327cf1d87d7a86ab4443e3ab2f5a3
SHA2564321be217fdce3a26869365c2f0e6ee3083d5dd295fa775774acd84abc03262d
SHA512e4c63aded6c384e05dbdb024d90b844aa457b18ba2e6612c97738c51b037117fd50d2c91c137a8b60ebe1044c30d8a2c1fe45227b3f1954a100d941da534b587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8502c7d5db519c45b02d4cdc2b75be1
SHA1e5be9bf62a35099bff28401669430fe4234476b0
SHA256ddc4a8d509073f29ba530b5c10dbfed95f05143a988da0cb4c9c1eab1c53a4ce
SHA512e6d118ad4111f78708cfc70db85de6d1d05187e997a3c301e5a9cac26de8edcdff0a99497de01c1b7e0599974bf7497d0ac58c7c564ca9a5368b7fc7f7ea9bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5b96b6d400667e1a594e884c0773f7
SHA141e42e47238ee18022dd19aa405e0463f8b5f1fe
SHA256af7695baab2ca16be4d04c4bb19f8834b99f68bf0dfcbc206e1b13aff6c8e267
SHA51284fcdbe51e2fadfd0940848392ed795aadfe1e1fca88e49c0d794d4f54e4b5adc59ba826bed221753cbd90bd520872dbadac193db9b95c6f1b1627f698f04ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bbd5f878f70cf715907e6158bf81f29
SHA189b0b5f97ff816c2dddf4f8d741f83f26cbe9299
SHA25620790287e3e68173ad88d1967f5e8a459664fbf68a0e2b0437305b26f027b152
SHA5122f7d3ba95a0bcb62d92bcec57652e561d41ff4081f35e66902e65f09d52d2b5eed7865024dee04ab489c11a937084db0fcce023c6a96c5403817a7d55eb506b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc2c9fc14e13de51e906615bd421839b
SHA1997cb0f6fd8be50869d5be39e9bb44e395adb205
SHA256e46df442be11836c15de63e70ecfbdcddc4b82a3ced41b94ced48c4eb8e9ba9f
SHA512566ffcf680a9dfe0401f398510c1fdbce5e61040ca7274c142c3c5a7ff2c978969efdf3d25e352eaf681cc63c8a76fc038054528d212221efb6e7f8865d85101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb789b1508da5884a9a0951080d35f1
SHA1c1cdcb3b3a17aff45762844f6cdc960c2679d82c
SHA2566519c399f6eec388475949b363d037e1fcb19c32fee2f1e28000f0f52cbb41ec
SHA512603bba02e0586e5720116e002bec7229ffc4b444102a5347e5a78f1bfed2f3881434f760646997936b900f960d8341309bdfc83cfa702667d76c8eed4dda83e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9a9eec9e721cf44350e512b0f319ce
SHA18e6661e4c847d557ba8c33b7db085d027e13f4e8
SHA256bd005f4a97d42168a887cdb48c980af1666559943a09174f8d3ec35fc3922fd8
SHA51283875c54bfd4505fb52ba944d229e26eae8bf08ed4116dddf503b47d50d15b3486ccf9dc10903f105616fd5d341c5d7198d43b1b9a7c9c3a1228bc7d831720f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf4995f36a9353fe634f309ae1c554bf
SHA13f0519f7d06a26c7f91dc6757650496b4523bc62
SHA256fcdd14f2bd09e620f71a3278956b69cae5a26b01bcd83689df11524cce0bdeaa
SHA512520fa27c731a20528f31ae56285d0d9a7e6a1c38bf8e6b394b565a26dbbd148087570e1f052d118661990876d64fdd1509240f2e90ceff5fea2b50780c3cff9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57373a00a821a5813c83b311c22564a1c
SHA153227ae85c4fbcfc4fabaa3beb798fc5f41cf489
SHA2565ac39de69e2cf4bbc94f2a02829c27512e27cae56bc6e5c43ac8065bf65972db
SHA51214af2f745def4eff8280edd4a91a210828f0b778054fde9f93cd70b7df8d3979c9e2233086ab958bd84b73396293424e21ff982936192ef53a28a3f1534d4c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be1d677a434e241c24ba0b4a4a1559a
SHA1be4d847615249f202ead23044b56f28925a44dbe
SHA256b2625296553e1fcbfdc94855c5e2b4c23f72616f7c3a2c947b10058f69dcecb1
SHA512877f51b57854b8c6526e677a327c906183d19c07d1824c4fb7248b1970e2bc686817e51857654969c3cb447a44aa94873521fcec2f5232866b58867a78d42c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be65a3e525cb981d650e1fbe87f1b3b8
SHA1c259a88c3f27e88037c303d9ee03e3cc7fef5370
SHA256865986890d16142d863f596020de0d07755b85e98443b78a6345196b4c1a9f44
SHA512983057e6f8d922410e80b6641529fdce65cce6f75ca1aba4de8aa75161d2fbc725f1102204c0056f242c967e3741ad72fe2428cc47cf3c5e031e6a4168a65291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534edde2d77da3895bc2c2918bd323357
SHA1603d047d14e3ea80b354306e4eb458b5ba236057
SHA2567e8c765e1e7afc9fc797af65ec37e01217ef06429d890e940323918e4258a50d
SHA5121f0131643d32ecf19c80cf1f606107f981c90b437306f39f9f18a51aa56ecc77377aad493d497d52456567e3085450625dee4aae0416805cfcd1ac4c2e0639e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55967e81d5054261ac847b02b4d304b1f
SHA1e9a5996c485ef2ed84d1e9d4ea36fe4a6d2bb19f
SHA2563424827f59bdc0d9024ce6af14e54fdf1fb684daf3dc2a9daed6fb24dba3136a
SHA512daff8b65daa5a973e6f95aea2e93a4b47cbc8b7a25dd29e591cd36dc63e984f13686d065037df5d02909233a317ffbb74fd3f74c354957369e4c23fc015874f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dcbb1d81fff3278f9e819a563274a9b
SHA1493043b4cdeba49f7f035b6c9893615a6ebbd5fc
SHA25631a0ec8b4e54e8313e56cde0743fcbca2ade18b4760c7ae9175f49be3e3279e7
SHA512da8fbfd9abff655babd1d6dda5986a9b0b6f9fe7d73bc2acd922286637d55bd1269eb52affe020b5f190e358a9fa2bc7155f957c41f152bb3d3be2d4fc9dd6c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57339e237bafe864568d4013888db50b6
SHA1398b12b521be1649ce87e2550777214dfa5e6fe7
SHA256d35e4d1f4f3b7978bd67fbcb369e9f9118e06d458299e9d2c27d8318beb8ab80
SHA51283b1d75047e2de521b79a6c875852aa672e39814ed355fdc64567e355d1ce204f06a5ffbecfcb873834e74887c335f444825d34b23c40f5dcc2ecbf0872145a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a30951a6eaec9b0d86fa5e7c79ee90
SHA1cfc309ffedb1a913c496b5d2a02a9a0f9f29e4ac
SHA25674ef3b3465148441b666f26fc44dc95a3a61e02812c618b7852ef06df350e394
SHA512b5475d8c0f9cc1f8395c3ed4418cb21a27e97321873020e398cc8244318c06377916edd20fbf4911c3a319dfeee1bc535998fe9c1bf9ee4df78420b561dc1f9d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b