Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
f9a65f258c323e1f7fdf613fd6d679b6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9a65f258c323e1f7fdf613fd6d679b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9a65f258c323e1f7fdf613fd6d679b6_JaffaCakes118.html
-
Size
139KB
-
MD5
f9a65f258c323e1f7fdf613fd6d679b6
-
SHA1
c570fb8c0d65d03a9d2a8a24c48831d13c5311f9
-
SHA256
76e5fafa7fd6a206e71985844db235eb66889697cc20cac6a4e1e11c4581d0f7
-
SHA512
45542b7ceb49d750369070d3cc1225f510de8eaa10d74babe72e953e0d366a930c6c452362962225fb1bd8b81628b7a41ce797fd6dca0b1ebf8e47d30a3d0244
-
SSDEEP
1536:SqZuxele3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:SqId3yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433570658" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e068a52a9010db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000be4789bcacc32b30718e33949e30c15d86c5772d440f6a5adb453b3a476c134e000000000e80000000020000200000009fddca8f9de2479612ddeda1c45c41a8feeec1def3f9dec4a135cf04ca00583b20000000ff4e6adce755d03fe73be5e26a36972ec9943253176c50e250d18090c12947e6400000007f8533f1696771865dda7f76026712f230eaf4897cbee41f84a8142690fd3b7a7f2aaa5d7370ede5b7f132c67dc7eca1756f61efa97e8818ae174e589a70b637 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{139E05D1-7C83-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2704 1956 iexplore.exe 29 PID 1956 wrote to memory of 2704 1956 iexplore.exe 29 PID 1956 wrote to memory of 2704 1956 iexplore.exe 29 PID 1956 wrote to memory of 2704 1956 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9a65f258c323e1f7fdf613fd6d679b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51013d0bbe28409c1d03c2d7141c7814a
SHA136a7ea9dbc439b505ddc34f8d98243654669fe30
SHA256e8a7f731388c3006b2d6ba305a11692793d1f2c958c0ab11a71fb81942014e8a
SHA512d2420b61a46ca06552463db68230b6c99decf49be7ab4a0993e1a29cdcc372db9cabe58705c0d1ecb9c6220f09285d642cd468882cd4a0715df29be616df3ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b72a8412f8c1c3da79e07882ec20d0
SHA19d00b3369370684191c3a63b8ab30434b8c231e3
SHA256455122675a6295a539789f10b3f87355e3a9428eff13b580d50bd7d91828ade7
SHA512cf696de8b93e20d2074df71b92a7f80c41d1203441849380d9a6c14a850f5d723a076f717e988b15af9563b35b50ed4cae0866389029551748f4a2013b63143e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545aaa86460a92308432495334364f6a7
SHA1f13c6b57f5be821b4f530133304051288e3e59a1
SHA256bd16b07411e0165b6b2825c1067eddd671bc9b3046ed49ec3976beee0f44ac39
SHA5124fa84e7ec6e20b64bcd59360363bed8c5671b6dfc8cddb4577cfee8ed869364120a8050ae0c0d9899b89ef9330c40bec24427aaa5676ce3d83cccaa405fe3300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59386e025810f968e98a6fceb250d8b8e
SHA165b9fb787305aa029b30cc51b7f3d03f561233af
SHA25673c19fff5fb23d7e37ecea8a22404af5b530116f77a6a4a36ec357c094babcf6
SHA512364381a82b48bee3ece4398f605540c1d1ad874cd1020ef25bd04526155e85bfb593c5a26995dd397aeafcd98680deb53e8a126b37a14e99dfbaac376420beff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4f191b0e0cd3f58b6bde48a55e910c
SHA19e54943769e17da6dfb143c2615b896209b72905
SHA256e0ee60a7680ec9e2bb506e6ffd79946a40ff5cb077875b8dd5991fd45732a9ad
SHA512abfa06770bdd40e68c7a9f25968a97332a130e536d92690586abf6dd2d5e3489858dc8da69b0e7f5bd2a26f1229843046962b44bb03008a49708f31865f094fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d95510cc59dcf72a109226f7eee354ae
SHA1b8c8d08dbe251b74c0c491fe960452946b89bd5d
SHA25671bd80365979e164a0c0b09bb2876bdacae9bf2a112d740522fbcb067b9a3bbe
SHA512d5aed6722b1276fda9ac1c15fbe81f871373687f950894a42d85d5ed839b81b75dd08646cf60f7c30b08a546928ba121c77e00da4c2fc2ec81c7a55baa60034f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1d32dba5c1923696af12c746fb952f
SHA1a1ad672744792f1148d04e60239f38969dec1591
SHA2568c76ef554248fde6296f32b4679930bab1d09c7776a62c0cf54d51bafa475582
SHA512db736e8db7fa8363e8a4b18f90736c20083f1373476d1d87aea305a10c68849d3cbd7d5254f66a3e209c81554ae87abc23a8eec335844525dd6ad0c9c0976780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564bbb76ca453a546126c12c4667a1bf9
SHA1852c83ca2e2a359688ffde2115d00879dd0dbe2d
SHA256252f955cc6acb48c8d294d63148d1bbe1f873d1892936250efb92826d7561e40
SHA512c3260e4fbec4d7779264ce92a077c939ffb6acd3618a3d1abad24d6b0b82ec0d735da30f407da2238d597a515592c821ce21a5b6a22b5a0f95f0838cd8e91406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368b972d7b78b55f486173ed494ba329
SHA14556d7836ff8fc2f88acc6878c7ff9f1ef7f302f
SHA2560820391ce08101f65e95ce6011174d055f1133c3b2e9867e8a093d011e498164
SHA512304252fddc0ed478a80bf17c1d51feee7961fe79ebba38b138d85aea046317a8bfde44ac262aa25ba8e72c3ea1673e0fb2c2ef45f05ad5bab729734d8b5a9167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a99491dfe58bf6da9d9ddf479533ab
SHA1b6facc77d8224995a015363421478b68fbfbb241
SHA2569238e58f117626a05b5c6dcfed51b944439858646bf9024925ed6fc834310bfa
SHA512c26fecf1ab655d97f307580384068b6718e8a59d168c63393addcb574e137d4ee24f057ae0258866bdfaa0c85bb02c235abafcc40d8d3cb3cfe1844275b3aa2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161b2f115e707ceae588169e9c6a5150
SHA10b4557af34e5baf420c822dbcf5d36ce1901b4d5
SHA2567713fef2daa706fa42086695950aba5f82f1f963dcefdeced8374abdcab34773
SHA51214aecc49031eb34361576be262a4a4b2fd82789ab0b5fcb2472e46d03197eeb2f1e24038e06173531de12fd1faa9b7bfa86742ab8517a79d9c04ea896fe3050a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12ab90b22545654ac95f762faefb185
SHA1870c7775bd3cb268e9f378fe7220210b630d3f0a
SHA2569e98a8b3974273892afc912b38a3f090249d20a33ca54afccabd2281c3954644
SHA512229b8d2cb1ce6d76baee6c1a9a36c0985fee1e5422b4404d99af58406edeb8a0c2932966cde88c4f1991f08bf0a3fb957fd270c256cc10fc23ca0df2f3e9976f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0984bb08df40e345b30e350067b6ecf
SHA1faac848575c090a3f7a8fc76757d7af1385b286a
SHA256161da57f0e91ef404934441a81e6eb90a4c367c2e35476f0c45a0b45303cd61e
SHA512e7e8094fc4763c5adc5c2235d16489f284a393685180f8e57ce283c6d648b3fce540a60c5adfd9eb5a23e507abfa9ff5124b5d1a5d6ed2abff9e7e0d390f59cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f522909403a32492ae756ab263acb41
SHA1f0e5b28b105b115fe271d3f737db0e3f967308ae
SHA256f87d4a1de46bd42110125fea955f78a540fa6daf64516fb7408162280c306bcb
SHA512e5ecabb4819eae533b850bc14ec4801b9b108f5cf9a292d106b907c55df2185ef3f32a6a822e5bb88696143dcc60c44f58f0b98f32645682a9f520a1377c622f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c027096307e84fa5c2ed35bcaadd3d
SHA19104581d88067a6309063a99773a41c9e99b2f48
SHA256329520aab2eecd02d961ef6b702e6812b62b3931834ffc7b49adcae500d2b7f6
SHA5120cdc8c3a38280dbb1207c93e557501b2f6813b6859eb7f0de04e5c2cf2e951f4ae714a11c626cd5433c894d7e256ac6f54ef514d62346609f17f7487182058bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9adbb23b9ee9ff2e04fb0b09327e11
SHA19225c871e39580d327c34f0f1ac68158d39f6a97
SHA256e5a4565db893cf3d27a5c74610f68a941eb80238195e739bcf37fbaab90c7294
SHA512cc5b685ac8dd5a6bc7c35395016fe85d4fbd2a9b6ca4979574e699c1f451371a3c9206956620edc81ed8dc88e64467a5cc6f3f6df0c7a88538ecb0e1dc42c0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cf69aeb42a7c571df8d9909612dc9d
SHA14a6d51246970822c30f1fc67d6a728a7147fd208
SHA256da517b0940f44aed0d619c1f3ea7d618e031fd8e361b9065ab33635d66d35e18
SHA512b0ce20a69b5e5b1a2190b413c6731bedc8a8c1d2e838a0b4c4263a9f501ffa0f61b553395c1644cbcd21a46f67e46705ad509d90bca14cb0af25bbd038a0f8d5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b