Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
f9d0cd8e2be844a4ee5359262fa20271_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9d0cd8e2be844a4ee5359262fa20271_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9d0cd8e2be844a4ee5359262fa20271_JaffaCakes118.html
-
Size
14KB
-
MD5
f9d0cd8e2be844a4ee5359262fa20271
-
SHA1
9700107deeaddb400dc522868ca8aa7093b0e87f
-
SHA256
43922d246021b2af186b1ea1451080043ecba760a21e212a6b26ed0b6021224c
-
SHA512
cd4315e3aad5da0f20631a9ba624be52d4655ca27c82b76a80d0220aff5b7ad68cddee7fe7a9c5a7e04094cfcb66c605fb2acc597fb31558d22f12156eb7a06e
-
SSDEEP
384:2yMyebhl9R9L9gY9F92j9z2Ol9AByfIyE52qDV8pRz0GxF:xjebhl9R9L9gY9F9Q96AwVFG7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433577317" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95DDC031-7C92-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000aa56c1efb8ed982ad9d53e9d772bc9baeea0ca4c5916c21381b311a70755a19d000000000e800000000200002000000091376cd2894bd18606e9252b727fc9fecb62b560d3375b8350fbc2e34646f56820000000a3c81b2865dd093203487277dd8a1285d586ff783ac24e57dd7c6cb1283ea4854000000020fb0fde57a49432bbe34f1076157e811f207de15f3a3711687b0b465a1f9ee87011c1cd83a50368cbbac7500e514d76cda36489e6d666864672ae22c0611f11 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00d43a99f10db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2792 3044 iexplore.exe 30 PID 3044 wrote to memory of 2792 3044 iexplore.exe 30 PID 3044 wrote to memory of 2792 3044 iexplore.exe 30 PID 3044 wrote to memory of 2792 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9d0cd8e2be844a4ee5359262fa20271_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450fdecfc2e96e3157f5e7d8eb4cae17
SHA19635310407fe90e86dce7b6d4fbae27759db5f19
SHA256dbb4dda3270d4b6b7ca769e8912219f0c424b37d0533b800973def627e756386
SHA51240e9dcbd596b09c63d66ff3213382ea4513e5cca0228211e1834c67195ef6bee3252e1cfd20d914d28647d2bef362f7cc9aeda2a0f6a1e7fa57daa7eebe01a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a49a4dbd344b1139ca93011d8afd08
SHA12fe2839ac81d19757b074820f1f33c8167d187ef
SHA25632e9f54a14daebb33d739e492bc5e280fe6ab716e2c507172492624e157a23b6
SHA51213545ed223a8de2660522825d5a4f9380e66418f43d8caf7158c9fffb714eaa59df0f14b39ed6e61c4a8d87cdc48366b704cef7c3f4033ade8c689a534690d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f341a6ad06a45b70c08d4440bb4cfa
SHA1a0f73454be676c60284689abbefb68c71389cd9c
SHA256703992fa46dbe8a2942bb1e0462f1bcb17c114a2806f4288a36b5d3f9bb76ca1
SHA5126e50cabd498acc07b490e2cde055728b1b5538273bad49359b94d2a05a6847c2bcbf1be7a93cdd0db9718c55028fe9ae696f479905723b8f7a39689d5e0258e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ad3d2a1943cd21ba5ae9dd25d42fa6
SHA119d6aa56bd5b654e1407d1f041e4d727ae6debfe
SHA256a5b5d9f2f926ec2f32379cdac478b092fcfd5ec2541dadcc38dcbf5c055963fd
SHA51236d8440aa26fc464855199e00bf6a477f0bb3c49478a38d1ceeb22c52b09cae0e349a8b6ad9490c9858a68745a68b5986f002e07a6e6356980ae5310e97b1977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149ce333b14bd58d16bd8a54be6df1fd
SHA13ab6ab49705051131c4659a590d4f1b1bec618e1
SHA256d503ffdfc5f54dd92dfd8e887b12bf33f25a577716fbdcec696a5753c224d706
SHA512c25f4bf4586bab7039444fa7c3a39ca6d4377b3b461514285fad33c26f43537bc0a6e7bed61437720dbb52df12c0f84adb658d0dd86288470e53d8b0d2b718a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa04b3d58e4f4476333d61993ad52cd1
SHA1e1e1d367484e3046afbbf7f3b4a40c03406ae802
SHA2560d4c6068ee0e38a962f39ead92da35267b7878b248879600b15f3a24ae834343
SHA5125907c154a8831e7df480a6f0f8529450e7fd4fafc597fee7301a12d17dbe76c03a73bf71b6d1230401cfd09189e1316d8922fcbb605eb15a3769966337765cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58652884d2eadac6e39bc4aa1893f70bc
SHA1a1519120d3b9daf8c2b5f3d1fb4e6deed723d54e
SHA2568e7e6f68d942124ec2466ef5dd1b2330c6508dad9ea49d373e20706228118933
SHA51282c4b92203e7f1625079cb3c968638d34cee2243dde3e0fbdbfd9bb3dfc9458adae9806ac773707664306b26e1ef0e2a49cb66ed879ba0da8e49b1b92d8b415c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d1f431b1cbeda0c1e14e76cd5bf828
SHA1ba228af2d0e2af300c269427912c2e49c18da479
SHA256a92b3822523ee2f55add6dc329cb75004e9dea9e6ed776c0d0b7db14a633da4b
SHA5125a416212af9fca94623bc3d8bda39f276381416df74ca0d36fa23ae4c1af43fa09331fa8743cc3551459069c39686469c27060811843758e404738fa384f3f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c6b1c9ab63008b5e140fa775335fa7
SHA10e0d1c4db7a23928f99ed4c49559a56e8625adce
SHA2569d114ab84957dbcc59c4b9d7efc9e8609fe6fef04def7d032f9b28846d863433
SHA5128212c944b3388d9a422399931869ca74bb82f83ae21c7cfad71169ae5139a72a157bd403f3d68f11b80c5b8165993d225dd28119285998d28ceffc7695e268f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97661fe74b0c85fbf479cd9aa0e76d0
SHA15b49234a8a1759ba1d70f7e4bcf0fbeef30e2c20
SHA25613b25e0570c50adc59deea0254522bdab32e8d76e9c0ad17785a8e11e87e6fc2
SHA51248cea7d7919cb3ce0d681e09d1e00a361b5acfa2fe0fc7074a892652837bd5dcbe83327eb668af50fd8e1af028f185927be065d622dc1b82b9e87e7a8ff3536c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c21ccd1350f70575ebfd18f248d2e7e
SHA15ff92b6c343ac26ae82df4d371ea5efe41d3b1e4
SHA25686bd9f24bb5f5f4d9c536d6cd0a712e5b1d2258b9be44ba6f8a0722e50bbffc3
SHA5127b841b0ea8674d516699b1cb7a454b868b52c8cab9cb78fee0e0b28e5bdbec12b7f2ff9c762cd502ce9715d1c71853d257575c6a8dfba789ed8fa191dde882eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccee4c899f93f099acf130d8e24820e5
SHA154094b3cdb8953d8a68e94b4a98d74bbc1968868
SHA2562898f71e565e9d770672b5eea6f059a651ca213e2de1efcdfcfe54b2a9b81c27
SHA51216d0bfaa7863ab1f15bb7226b321f341eeef603e9636c3a21eabb277460b23ee4f63a43f8fe96ec1a95d7f90d32091900788b63df1230450413e337cf4659030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3d6dc99b8a51f81d013736fd7c939f
SHA15e9d49ed307c0a332d2e72a22b54a65ca0672f31
SHA256148ebacc671d23e76df3ff0ec467d0d1e401d7278565e5846e2fcf5cdfcccc70
SHA512ad2c5996358b857fbdfae4f3520b591295a4d73e950bed6550d462876f8804f9306dec78458b850b56cf3b7e90810c7bfaf6cd85bcde6f3e6eb161c051e410b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec2ce436e02b4ec492dedb62abfb084
SHA16fcd2e2b990404db6d01382cdc6b43ab379c8406
SHA2562085b7d2bedb6ee7c5dc402203eb41992d7c8b30c9cb7e79b10cf8683a6cc621
SHA512a897e48e5b61a5cb7fe4fbd25d56eb31f7056a0388a456ada51188e574f4a29fe2edf3a61890e2a972abdc2719721b4ca138fcea9f04926326e6312f1d910cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391d1ed1d78e4a00f7a49781975d5e05
SHA1ebed9c85c3a23b90d8fb72d7f9d40f82ab3d1b86
SHA256d4dc28c3fdfdf8c354710b49454ebb4b7b100900b7890191a4c33e68b4983bff
SHA512e007359468d1d0db1db486f68d24d8bafe7b8c9ecaba2c06a73c7637ee66cc09167f1e1219ef594a9fb6a804c25f55e694c82435b20c6574558ecfa94465e699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618827731e6734cc72e1fba91fc53c85
SHA1012bbda8661784f5a86dec4652e736a0891bb708
SHA25627dce009bc527bf76fb3ea0d44dabeefd3f0bb234d19b298802f7ee402a680f7
SHA512b9ebfd0c1cb317f57b5cd7292a8ae92766e32aa31f62cb6b16c1bc250327202b5858a72ce2ed851905d2a41a16d9268465ec19e9da6e9d2642c021df6a96c46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4445ba0731a90ccd4426b67e27b5ff2
SHA12aad4b830a15928092900c13dec54907e47885af
SHA256740277644ff49b103cbd751486aaf974adf4973d50396219d24ed307c0bb325f
SHA51293b565374016ba4fba8ee35d16602c18ccd9be377282b4d7547a52d9a99f635bdb67eea143d2ac937103630fd4acf29908f0106967d62ef5df98885a6e4e1780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741cd2f54dc5b5f5535be94ed2123f2b
SHA1ec56d349969c7ab09eb3ea90fbeaff0ff4e61ea7
SHA256bc5e8bc2b2de7d4d438b0262e8a0b681044111836dc0db2c313deb2e451f3f95
SHA5124a948c7ce18bf7f27fbfd3da264cc1dcf37c6d227356c3571dc2d9ff78230afd3b369c2719c11f9af6f06267e5ef3a264263cea7a74a441869487bd23c6420a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85b10c2d34b27d6830bb76f62408992
SHA1c661aaf8e953c1c29f7a242825c2315eb2147688
SHA256206e1e8ed0d971bf2536ac56a7120897038cbc3b502c428f3950c30d952d41b3
SHA512969bd0971caa6d58e1e72d20b72ce2a2c68b9faec1fc25b3224bf27d52e81239bd1bfa966488fd3f4cc2c8be060f1ba0dfa1e3b2d123c7c82793e30024bf3e32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b