Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 05:29
Static task
static1
Behavioral task
behavioral1
Sample
f9cdac01a700ba922a2153de75652f35_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9cdac01a700ba922a2153de75652f35_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9cdac01a700ba922a2153de75652f35_JaffaCakes118.html
-
Size
1KB
-
MD5
f9cdac01a700ba922a2153de75652f35
-
SHA1
578900df3ebfb070fb08248c525535f22c133b1c
-
SHA256
9755202a708cb5568a0f0d843a222cc2c3ba555c818dcc71e358c1c215c54046
-
SHA512
6188a6c1e6774da42785cbe72bee1e31818d43a70b1ac189a9ac0b60fb0f6f57cd763e1ccd8f03747d17ed768649f8e5136b0af4f5fc1ac6f1fe0e583ecc021a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79814D91-7C91-11EF-9E99-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d2c0519e10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433576841" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000004b93c203992f982fd60ad3a02479d0ec69751d7916fd89d8ee03add5642d55b3000000000e80000000020000200000001b264e2579802d6407a507f8f76c2a962870518154da492de452228818b64fa6200000004c30d55723cdc1a1a0686fcbf3d7239053303c6953e50ce7120b3ded556ad3dc40000000f308b870bcfe32bbb5ca9b0fb07d8150262206f27bd0403ca007ebaaed93198bb68832f332c8a0195d06760d315d73850ae0c5d81b9b55cc30c1b5ccd19ee5cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2220 2960 iexplore.exe 29 PID 2960 wrote to memory of 2220 2960 iexplore.exe 29 PID 2960 wrote to memory of 2220 2960 iexplore.exe 29 PID 2960 wrote to memory of 2220 2960 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9cdac01a700ba922a2153de75652f35_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53580ee2403b77eda91612559b63c0a
SHA146cf2a9ddd7aaa38981e820f5898b0f0c7d51f58
SHA256b68ebe244884b825f25e6d4d7b8e751c65370bd620b7807a0a2716b16b64cc91
SHA51254089a741494e69c1061be8b6490b77d1840cd49f4bd3b206d771954ebe0bb0ff73f8997b9bb8dc909cbbf62b8edf1c24d17468fa68681d3c580dc6a17558dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54191705d1679d3438703dded50e1c2cb
SHA13d972f93d29d4c9a3f802403f99be9ed571938ca
SHA256104bb5a91a1466a78089b3dd42016a16fa82967db378f653a2cdbb19d82e8ac7
SHA512910b8d1bc6a460308fd0e86e2c93abb162ff4e33257adb6cb7b9cb42a2166a68565e67124ae8ed8db873908f91c6ff3044a6d7a42e66389de6e1f2fcf505aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb87dcdd281f1e2f6000dceb7525aeb
SHA1ef505c867fd6b1e30b83b04ac065aec9ec402395
SHA2567c8421fc2f4b49d94f76ee4c69177c3aadd2b80d182a263b4c04fa637b81fb9f
SHA512d16d381dab7ade135963334e4b527e41a1cc129344d53a8aacc9ab7f0d9a81aca14bd9877e8de9601e481bc2765987fac9a676d7c060631c76e2be228429f0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab8be12cf80c8fef470129d67159ea4
SHA1badfb2f81560a93c7ece8718f87c912cb03fd786
SHA256c9a529de1f56fc4484489abc87023033912c17a05f3d9cb8b3ef984d82931136
SHA512e3ed1a59927124b3ab56063f8dc84ecb27f005966d2ad14f726a8a4c1d12515dc70a2f9049d002c40d2a7088047daab2ac6e78c064e2f15239b796bf0a8e2442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa0a5ea552a066dc1671216e7ce5de3
SHA165915d414e879452dfc9178eaba2fd1bcf76aa79
SHA256c28a3351976831d77bb6a6d848573493d546bd3937abea8f4264f6350fb2f7f6
SHA512d264311880a8abca98944971835f4e56d999dc9391a6940907962c2a884c4fe1aa1b21d89ff6564d196801d04385612d273485fd0e9eaa969abeddec4863a9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56071aec715f168f70f05a416def7cacd
SHA1a5d9e03c61b7ab3d38bc8508d326976bedd5c66c
SHA2567f484b0af05953a5c424579bf42bb6e8d9314c41005089b899023c73edebc3a8
SHA512286ff70fe02b2f87d2d2c79a84bbeb08672d8e844db5be839c9055e30c8bd5a89790f04bf5ee26092a71b637f45a7ac17e7729bc1388d0a23ea5d20ba48b061d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075668593ed155eac095e3b7d8d51461
SHA187952c9ccfd8d7bea0fad0881ed6c5bf05804e80
SHA25640aab2d6a33b7cb6acf181575090232fe244c1afee511663df4c73ad824bf743
SHA512cfd60ec1d63a5b2d5e0b8526894d7990d9abcbcd69441116331714e8c4b2e62bd342ca2d6363541fbb0b156a293ec377b62c60eb42909a4e4da0db4f7d5abb27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4681290486230795a6e8b3f37dc2240
SHA124a2040f3dce6267dc7c56c59a0a4362000d853a
SHA256219216db0490828e61ae213e2d2d2e766c8175984176c907a7d9663e33a12e56
SHA512f5618577814b3766cfc3b7e8b4d500e77fc1ea132b3d1e7ac3adc6cf296d49fc287f12808f30ad75b2ec5eaddf2fd3bff9c361883134fc891cb981893dd847ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577cb6fe022bd733110f818ccffd95551
SHA19a0b21d42eaa74860a76f06c7e10e33d28b3b949
SHA2560d45513d87bc29c78a2935a5de8cb6c9229d6ea22261eeb2119af37b51ee81ab
SHA5126727b2e8de959d6ccc9fa1f9a50927de392b4b92e62926104edb3614355a48e4389540ee3df14f31327d6e223799b2e3a0608efb6e2d3f03f60cc25540290e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504df2123b0f89ae4c8fa3ac7baa23508
SHA159763d1cdc9ae4de2968fd01c9cd78acd8593930
SHA256ec8b2e011e9e7ddc1204a19cb63219feaef5a987be2584060aec4c74e5e8c210
SHA512497411c678498783f276be87a1ccdf02264567dc51e50d274bde908bb4a7f6930cf2f2a6a8574c329ea771070971857af30459788ab5cb06788535ff672b2f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a6bd2d47a551f82354a63cfd90dd40
SHA1e67b74921317c61047b66af1d011330ead87c4c5
SHA256fad4f6ea36551e691aea77b646173373fabed0fb641ca044d484b2c8978acbc9
SHA5123732fdc1b50a904aaa75c290db9c97618e8ae075e32a4bdadc18576e43e3df87c081983ef13e43847f1ad97bc5eac2ad5a6d2c07665296521e5b977a9247ddd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986afe2b3d6fdb2238966c72e94cb79f
SHA1e3bbee31e4973a291f8544f31edf2cd53a34db6f
SHA2562af44ba9cfbdfd4eec50a7f5a985404dbdbe3c0ab3990493cdd0cc76f32a2763
SHA5129e5eed660dac23f52fdef3d38524fcbc6aac82a79034e2109825ec489cf6258a5c1cb8b2105e6857ccad7a23fb1a3334b084d90bb16f1d7bf9b4d6444d2689ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579920d3ff1d4e8f866a88d9ae832a384
SHA1cf90613ce774b9c46aa3c53ab10364d1bc2609ce
SHA256b0d454c3db4a4cc251675849400ccc4877152fa2f3d5130c7599d41eb07e3947
SHA5124d9950cb47360eea33afa40486be3be17f44efff6cdd8777d1599be279f0ff165b4cfdc7f9b1dac870d432bc694eb0e6c46a9b26456428c1aa559d6c3ee7af07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f2a62e6acd85c5fe09bba5883599da
SHA180318653fbc05af1bf3022a978cdb84c3cf89ef4
SHA2560d29de2f0357a4fa159e11f4f4da7a92c26be2a3c46cdc7e7a5cc34bba3afd96
SHA5124885dacd4124716ad1f8fdac26dffccdf0d1aa2bb0806d62833cd569c8328389e0e467e327b6cdd995434fa5275913594f37f458d39b38a3885f28c6638b500b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f77ac4c5e9c3288aaab8a83c3a15d21c
SHA13502c07834d094cdc53f18a66501d0ab8fa2b6f4
SHA25683a47b1a7a953cb75add5c1370e665cc2e9305ce5d161a200d96175ebf0ce0ad
SHA5127d6231cc3ca8e1f77d18b3e9ced34a990cd855093d6e5c3c2429daa92ef17cd72f713c52ffafa04b99ab057cbf30c4bbede168e8f7972b6e55f3f3a3748525ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf833ca1609a4b2cb9f4df30677cb699
SHA1345bdec8608d50ae0461ca6367520e784f444c5b
SHA256f2c80db53d37f92591d4c92d66b6a002ba302c45faadca7fcebf508aeb610219
SHA512241ab9b0d10d803d86703058b8582f28969bfdd9e8595d325de17a16c5292851f5c1dd9276b9bcd9ec49763ee4b5d5f68cb0ddf3ab3a09766d425c89d8104207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b42d34aad2f489e838116d39f1a201
SHA1b52bfc8e49821b748647039fe5f731697cda71df
SHA2563662a6b63d6ef45fedc84c1922d129a88e9a9ad631c56a69019b1160ca7320f3
SHA512fcbbdacf130a4784d77e1e8b18ef4918b3a5886d897e63916def964dcb51b1d8d313de88eefdeb92a19822632bc8cfc6260f6cb2cd77560e2259b098418d1ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2de3cdb5700ec3a5724f2ce1f35829a
SHA16065089a88e63d6ee901091823b3cc6ce609ca02
SHA2567b0a66881c8dc72783ab34041c1c467304345c7a1a2ca766f14b3f0977e1eed8
SHA512c0641b178c8c59b9cd2c3a1b0dd3e1f7aa717396ed3721dc4d81fd90edb13be9f30d5b201d1b6962c918db82b93d52424e0e5bea8b392c7edfe7c12e9ce0a61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5611f915a749dcea998b3c0b00353569b
SHA192551f76709e6609ba075d1ce2747e4e3be86f53
SHA256b3439dcb540e8b102d091eac2b4debd8a58ad8a18c89c64f8c399674dae8bef1
SHA5127c8c17dda929a72a3250fd0747ee4a3026021d9ed92d851d9d8c9991d80fa7dd374d670ec86c399e0046907f24974b5d75ceb28c954feaad4549fefcc611daac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b