Analysis
-
max time kernel
139s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
f9e4fc862140146ed873028661adb3ac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9e4fc862140146ed873028661adb3ac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9e4fc862140146ed873028661adb3ac_JaffaCakes118.html
-
Size
39KB
-
MD5
f9e4fc862140146ed873028661adb3ac
-
SHA1
c9295004911ab315e3b1f23f57c36a3f37f27f67
-
SHA256
776fd121ad1e8dceb48a2f9a946f51d29db2ba72c7a030a26431b43a5b2107ae
-
SHA512
eb4b005418a845cfde34375918fce1f4c14fb8145ccbd56e7cb2091551f1b46572c2e6132b7c837086abc156398c2bb7c4fc2669daff8be18a7410ebef745952
-
SSDEEP
384:lqWGWdtqiunS+tHwaMwvKrwGOqw7xyAxKMx5vAxKr6xkAxKkxLeAxKrwtOpwF8re:lvdKiivFBSdI1oWxOPdb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433580346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3E41101-7C99-11EF-8C8D-7E918DD97D05} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a9ffb8a610db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f34b8fb34114853fcc3aa8e57cf0bff839bf4326173f047274c83b46203ba917000000000e8000000002000020000000144a69ea17adefae93f7717978fb03dc5475a02a60c5806c6f4c3eee7da2d09220000000fd186d133ac43bac09e3142ff297e7cc56da34a4ff07ad640f0382d9da219ac8400000008cae82a87dba72277e479f8b7c85336bfcd0cae799f9ddaed6a1b3473f93674f66f5e50bc467f6db2f60c3c553415287319d9ef498638f2fb7064afe8baa8e03 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 560 IEXPLORE.EXE 560 IEXPLORE.EXE 560 IEXPLORE.EXE 560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 560 2480 iexplore.exe 31 PID 2480 wrote to memory of 560 2480 iexplore.exe 31 PID 2480 wrote to memory of 560 2480 iexplore.exe 31 PID 2480 wrote to memory of 560 2480 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9e4fc862140146ed873028661adb3ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50527e069ddf95980f4f9fe133e9a5320
SHA1e97f265a9154b204e87cbc44200b6b45c57fcfbc
SHA256b9172a794891bbd9467d30755da5eb6f47a951789129cc4ad3e25d9479c1579e
SHA51265e8fef4c10e3bd2348c13cd7206f33dde5d172fd5a587174d914e04ad10a7750d84b1fe2540e10730f2ea76e3103fd22471506e935d0984574491deed7d2e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c439a061621f640080d6bf4b026a32
SHA18cc1d656c82134ccab6646cc0fd3f3c3c0760845
SHA256de2f4feee7911c77a049c663e8bc3ad394180469f072bd2a3807334b7d130a23
SHA5127bf3ef877339fdb15c83c84f67b9a79334fd0df4d0904064c616f2eacb86275f0afdfc4089ce23c317611665241699a47226ab8cdd894290e4ce23422df4f9da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57865eb155668d17e10e25d49306898aa
SHA10994655d9d9bc860e0aac20fe394b37925e58766
SHA256ab34efbace3c4c7cc800e41b4e8101c38ab4d37ef134e794f4111a03cdea5ab1
SHA5123436a287ae26641015c4e27392b960c45e705c4adb43a4bd8b7452e46b6f481253173c921cda281cc950811e4939fc67e724aae41c96c9c24f7ee3302d26e0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b80fa9716329c9ff932c8b6df10e13
SHA1898c63f32c17b87b7d56f49253d3c502dc1a4b54
SHA25682e84b343844793a0dfdc9b2b1d0a6588a1d3cb541f4b2510067ff9f2cca3367
SHA512654838c074ce77cc0385e8aae2a96121f2d0632d85ee0be45dacdc4417958ef2c248fae99dd8da689abb9b6fefffb97758b24adaef9161bf17b4cb6b63a2c15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec879b9002dabd2c9826b4b678895f91
SHA15e6a0b53600164f9f5ec4670782c408d96aa0c5d
SHA2569eaf28f2dad19a6b69fdc290fced3e460be2750a2df72534516328c8a1fd56e9
SHA51200dd87055da81d647e29e5da62af56fba5588529c1c59e1fcd4388e2028f7c7dcf78196c270e4233308889fe6c9041313143e373eb1a6129c2049a20a95cd055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556af8cc9257b258b8e23f87072101bcf
SHA1a5ab83913754cb7af0eac23bb9247fa05be9cb1f
SHA25656fd4e5b137737221b00190fc1f5b3beec4adceea598c05774cc204582319795
SHA51226b31b6ee681d0f3709e5c3c2035e3f1b1a1ca649b579d74b0d98a5248fcb4fa959ef0f2b59a36aeda15fb2b9ed18daaae698df998fb001ccb1a2da55626d84f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e5348f45e5bf19c170c9dae0d3a6e6
SHA19562e033e1dc59771e5c52ebdb0288d3dceb670e
SHA256a5ba50a032ab4c5e217f629ed6c31cc509fcc1469ad6a751731fa2ac9fe7a667
SHA512ed8e22c5a532e391d66671d7e5a257590ea8a454fa9cb6162c736725256f6da97a84a0b2bd6910427368b441530c7f19b06ab857a387553f66b57859f1dd3de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024fcb2230ed6e569bca406fc416c19a
SHA102800e1039fb59eeac5c359c7f0f38e5d5c4f25f
SHA256d8e219e0d6b981216d4da714aa48f7a9fb722ca044f8c016bf3accfd05dabc5a
SHA51225dfca9d7df4f69c707b6170246e1666abf38d7e74576ba079568b3265c19627b90d59d5fabe556969a3a1a071c587a7cdb4ff6f02a504b6feb4739aab021032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feaf5191da960f94cd46611aa9ac857d
SHA1f291144b83fd487cfc0abcad84f4a4adb04bc44d
SHA256649cb91b2a6bff0f4875e3b78370027c73e2ba3c644dd96c55fef793d1416898
SHA512ac53fca85b79d2c827efdf3c5bcd61c55627a0d10177b3df259a26e5cd520e228ca171912f2716c748636085a7dfe8632e10b7b4a9c9f0f69506058523acda7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449cb351057fb38de182c2a3e621fb71
SHA11a3c95278f6de0ba9dd1f8a6625c0f42b1077686
SHA256a82d0e8e9e05064f0020756bb6fdc9f6c2383cb67bfa2851bafdb3cd35edbd5e
SHA5121df46d6b96c63777fbfc9fc96ace2dc0f29dd7cea2690b34527a00f9c2bd86dd1b5d0aba61d020bf486d8cfb2b78ce58eaac9fca6009a68dc1513be9873171b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb37d447cd3081bd61f3adf505f698e1
SHA18130da506f3a5ac1defd2a9ddea91d4d3d3bf9a4
SHA25672b007ec9ea0f56d35d1356d644422539cfaabc343edb7687cf77db2377a007f
SHA512548034936a39278d8515df5dda839c5761abe318ab1b8bb62dbe8eebc168d4cbf0587f15b5829a4c6705a36aba135512db6aec68f280cfb6869eef71a02f5ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d32c8c5e7d43bcbd54a3f3accc0e96
SHA110bc4d1ce66e3592d931d7e2d1d02cd77bfee0be
SHA256cb1e4baff323a75a0323db65e3d5ca8ed7d51800ba12e6b5c288b5b5eb7bb7ab
SHA512f7c304e63a88be6007b62ce239f5fd6fb6b04c375b71b27d0ab90b7c0f97652be62e100ffaa6c0cdea11b58c85990037bf628c475860960bd78bdc05b815dbe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d7366c965f95c85570ee0d8c7c87c05
SHA1ea9cef2736921751dc5e3463652e3f4e19615d53
SHA2565beff50582a75f27969521c3b189907c182c919c1609adea1291af25f43e1c9d
SHA51254a15dfbc007652376384b197e81a2a32fcbb4c17d7ddf2f2d900ced52ff9198997efa4541e739c12e892f74e643d55c266823ffb8411a3c6cdca69d6aac35f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b0065057543a06d251edbd393221c0
SHA1d375e1a9c976f8378baae711ec3a1db676778bd0
SHA2564eecedd299e0fdebfce76ce03bc10ffb969f8a381fbff147b56e0b35bdf2d0b8
SHA51242cdac3d8c3bd456f8f8646760ed6aa50079a70435096ee1a4d191d12515ad965fc209ca4161c6c21648d59b1f90a3b7d17284afb0e1bb4ff433303f51194839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faebc3c96e0279647a07021ac0f0d893
SHA168faece76a98ab46a6e1f767bfd323d1db59cf84
SHA2561b94b782725154c0a66bbc4c5abfc926cb102867eb191f4d5540b4c51ccb6310
SHA512a812c3b2ea60f71238559ba77fb1d4e8b796c10ed429f4c494d73be072845d71c4f95180d8a07dd7d97e61dcfb40a3195930fc9cb7c65ca521afe08e3ffabe55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f18065c4ef673641bff8448a584716
SHA1d2b2aaa096eef2775e4335115604a155a8a1b041
SHA25614a49ce346f298be9a6d3ec343b91a5609ce5c26f34a7b68ed36f5cea4927e2a
SHA51218f0c4597a088f9829ff12dce4269a416774bed93e0a7a388c476784b148bf87d8a6874b087e0dc39a2dd76aa52aea47436fe9db5ffca4ec6cee462339420bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576613d78997e7c28243fc089b09be9eb
SHA135c2fa943db6ef5297a777145d25474bbd7916ea
SHA25693ad944632f84b5a4ed1c4953cea4efdb4b6369c071b0ca26957ea62b455f045
SHA512758f636c31bc845e526f65fa26a739bfd7c535405d41a98fce5d9c769f47ddde71885fe693599a0998cfdee8da4a622ad503a08c9c88130fa2a7e4c0951320ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef6dd55bb3991d1ad8d842e72c0b5c47
SHA1a98ce378c793ec805b455a2356d80c26de9d546c
SHA25603834f098fb9d6b2af15fa5eea1ca8eb8d64e766415749847f36a8e79553fdea
SHA5121329fa517e4dd6ba5e869e50d6195e96941ffb8ca3c1ecf1127c6c0bf5e4fcb699133049cd07e290620d4b3e9946e4d8594d388e462a7b94bdfb8833e04e5e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee9c25fa10a5082ead4afea00296fba
SHA15b35fafb9da085621982823092fa67ad529dbfbf
SHA256cdccf6272f2d33a7302e019c0691f26b101b31fb1659fb5f935ff2d00b4c20be
SHA5124f98b0b57f1c4943bc6f8ec1123ff5fa782717df5da347f429c8d3c0c4633591b38c2eda0b68e24dbcb45b8ccb3ca021a04065c7c36ce89131033b9d31c496df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b