Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 06:40
Static task
static1
Behavioral task
behavioral1
Sample
f9ea63c862d4b58f39dc2ac43dc935db_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9ea63c862d4b58f39dc2ac43dc935db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9ea63c862d4b58f39dc2ac43dc935db_JaffaCakes118.html
-
Size
46KB
-
MD5
f9ea63c862d4b58f39dc2ac43dc935db
-
SHA1
d92ee9f4978994cd3dc5ff356b90513ab58dfd45
-
SHA256
57d2d9bdb76dac20f19d923d572d817c87ea0a6a13221809cb7bcdd13184ba99
-
SHA512
d7dff4cd643a0bfb418c4b568bf01eb3375572d524f157f68a44e2815cab222589d5f8072807bd920accb80c3f54d8bca21204e0846d497080ef37803db56f95
-
SSDEEP
768:esJE13JcDxyHHHZyloJio+1J02odPhYUjuS92y2C4SA:F9DIHH5gSx+1J02odPh12y94SA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72641741-7C9B-11EF-A528-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000001d203a27e3764892a55579a954d2b04fcf2bd2c61619fe5e8d59d2ffac7046cf000000000e8000000002000020000000ea645783e5110ca55b6919c354464b8f2b594e25086ab28401e0e90538841b8920000000bfa597b923a767cc889ea100e768540b69ee0f9af7ef28a5c2e89fb98349ef5540000000bd4462f780c6f7aaeb0b1c067d511b0054b093282a6e9d1dea1b8553fd42e40bd8a20be9553bc822e1fe7d7728682a4c7cbce1ec3269250391b5f9139a2c914e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433581123" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0aa554aa810db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3028 2232 iexplore.exe 30 PID 2232 wrote to memory of 3028 2232 iexplore.exe 30 PID 2232 wrote to memory of 3028 2232 iexplore.exe 30 PID 2232 wrote to memory of 3028 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9ea63c862d4b58f39dc2ac43dc935db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34782995da17ad2accbaf4f8a77d5c0
SHA1053b0c54ebc57f050c6a690491aa8c5e74fdb6c8
SHA256bb0f441102be1d9bbf0f12ad4016b1301c8b75f8edcbd91ef5ab7608e5d2ae65
SHA5126b6bd5b07831577fd791a9506b69efb001699c862c1134b5b213ab759f5cee667f339f7d9a1161f138626e0ebbf833ad647c1996137bf94ef2ce34436ad27e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538cb4993900cdb435b9e69d98877840
SHA1055d816c844cea7e906979b0acecf51e297e1b7f
SHA2564a02de1fad6cac895b9617d6b9c40d28fb8fdf93c3494df0db9d23f4fc9e2cdc
SHA51237321a84fd08ef1df96a8c5e20d467a8ef6fde74444a8356a8023bf9398a99de23578e480d582d1fb48176f93ef302e9cf0f3201e1cbadba2b2d0eefdc47f344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb67bfecfd852f42be244c4f2b5b96c
SHA1dd84431a5a276386045b15f498085cf232882b9b
SHA256ccaafb052d493d72791f9c25feab00e4343ffb8d60a2a10e7d5d59c619e37941
SHA5121b2f75545ece523c3dd1c14151058c754cc3541dd6b889492b089a98c729d62ebe3a779ac03ea5b4ee96af2b92f5ced486bf9a7186614278cdc8257fdcea3204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb600d815f150a4c63812a887faf1f8
SHA12fd5cf7248802ff037bdd412c185c57bf6438485
SHA2561d48869ab591c3790f25c79f4e5ac774de65c704c374aae4f6cf5b18c0fe411a
SHA5120b099de75a81340bb6a736ba4cd230b70b909920d83e1dada4feade0c4d3b719eb442fb0f70058dcd25b79d0cc6f52bf35458465ac821a588ae659405e50bc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535f44c7bc4ec9e173c7c2353c5348acd
SHA1a5858c9be5698c49542d8dcdcc9a4b0e049c1fea
SHA2561864b25fc26cb393620516d1a4118d206a88cf8a4bd411f9e3e114ad2e139e40
SHA512a56b2c1dca7a6a1e84e416142d9dd9461f033f3288780ab6ff8f0260c87bf0d28a47c5b5562b8bfb1966db8d0f34cbf7eff2a4db3a41069c91708ccf3cb35311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103c9cb832a1ce0c87290aefd2dcc0af
SHA1fb7129dc9d7caf6b68e65421b8996d2cab6b09ec
SHA25689c4844ed488c2f8163ecf56655847a85a9ec5ede4b1e7e08c02260c7e5b61a5
SHA512779a7188070cfbcea74c764691b204ee4ea6fda6dafeab9ef5f3420dd115a5f72de845e4ce05770590e68e40eb8db0d0227fe7137951bcb265c83979e25b8b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d0ee3e3641b3c4c68b2f05143808344
SHA1132b24ad5dcf25359a63733445e5b5ae02e3c113
SHA2569af7a576f3cd572de90b1905e9c7f45caca96ae5805cb442d88c9b272cff9b67
SHA5123fdbe10e099a0a5c9161714b0bbd9d672e0f7de1b31e94ec82dc9a166664bf08d1b5135e762f607be95db25ed0628f990b9380668ab0256ff6e1f5deee0f67d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf0dd57a94689c27f8c1ddf6db8773b
SHA10d27d3fbb2d8f91f8ff1628ab1f8709af469355b
SHA256e66f84d7cbdc79334ac0706e1227f5297223a2f029aa17b492d29296f23d3e02
SHA5128318d0f60b352bcafbe5435060b234773cf7628ee66bd9db619d5164bae36f308a16a179785cecdb0c6d1f8ac2afc107feae57bac4cab23ca7eac61aefb55e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fbe2e6618d2d3dd7e3cf20641efc302
SHA17fc81c43d4e9dc94c28acfdebe263586e94853de
SHA256d15aeea2ae9540a064e0f0be283fd0de042e67ee7f418cb64f87fde49770a1c2
SHA5123c4e3202fb8cd97235e09858a2a820182a063dfe8b19df7aa06b2c812226687d86301369a7efca44e7fa17e9fd1f763be6cd37b18df4cf70f094c29ea93c4e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02a88a21ed675a77efebbe38058c4e7
SHA125dda34aa586c711828e4a6273c29484dcc07ded
SHA2563c4dc1034c59f7ed004b071c5b5102eb60091d5e0743a2ab9971201de04b25f2
SHA512d6ddfe359882886a0a54b57c75e26bf2655cedbc815037a9c099835e2bba8ba502d707e30212bf9d943c516507926ca66f2e5b1bb9fb493c22ffd6f8923da42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a832c74d480a4d076f6ad8fe6c5fe02a
SHA176bec3450b59072730f01f79ab62b0cac30ccf78
SHA25667540c4fc55af54d240446204eb1be745af48d3ede87e39e1b58bb622bf388e0
SHA5120e285f4a6134af97971d6a30b11b206a3081f37efdee84e20e022aabdbda12a065597fecbf6b837e4e7a0d04ebae57745f66c995153b46620f402903d20e278d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e538414d4756deb58f1de641ac4a9c6
SHA16e7d2b9d9c661a10dcbd4dba4d07912b2036cd4c
SHA256c4111b3a74eb1023f5338e23904460da603c3d85e4e716103437d7719cdbf890
SHA51217c312dd099ee99507952855aab1390340f5671de5355667401da88d7667abbe7ad5c62f661c3ed77e6837b3ffff085052da8fd2d9f89ee040082e68ca24d79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faba46d18fed8ff15e6f547ecdd51e89
SHA10aaec69a735081115a74ad9c778a52e65322c207
SHA25666e4c13799c189209e53be8f576b18b17b37324d2cae8d6dd9148a9927ae6119
SHA5121603e3d5b448197ec9a48ed19bc78f47fe5ac3342c7ec3744b5f9fc2c1fabeb74273d83ddaa450639fe3fbd58fd0b53017c3aa33516722ac6ea57d060b0368af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354a11ac879f3923d0fb84b287be0ba4
SHA12a5cd51e8ac41f53b5800464b2e8ae0773d5302f
SHA256465108e622d2250955ed0ec4da029a0d0e4e2a666653594dccb3502de076307a
SHA51222dc609b05171a6e20dfcd8b793953f257374c5a1843af008e1d0d398db1f3daeeb6b8330fa1c9faa9f3621eb1a1880e165a6decdfa32c97264a98ee4578b4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cc0e9ff5998cdeffa5412bacf398fe
SHA1fd7e94b4ac32249fb89d2284a3ffedd11004b673
SHA25688eb2e9e83ef8577f39fae11a0d587c34d30c3c14db0a223a7c5485d1e18427a
SHA512f7d9e2b9771460ea0cf6e755fe803bd41312761cc08c3903d3dd877769a4258a6cf4c6e1d7ad7ac51d008ffa74ad8b2b0692c622209283eda70572943588e736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a577ef3c76013bf5adf0b0976bbc3ae
SHA17259096b14030a87c0f46ffc84610a66bb986db1
SHA256dc82996a1e094385de6af508a235bb24c04ac359c53941ce8275980e1c43cdc4
SHA512689bb9731a83f1438458359ab826177ff1d23956278d36ce1668f34219419d726a80591a8f5e8ada7476c00d8f4bf4c0585283d3567172b6e2819c45fd63bb4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a81c34433ea313c5d02772804f0e73
SHA12d4b402d739b1a98e2933940b87d1526ca6675d6
SHA256e76de53352143df6290c95aa75eae96414264d987180c134d8ff4f3711f3db75
SHA512a34705eaac79b535f0c268a628b0c0677d28d4a3cb5e77e089e841e05411450fdae1b211392ec325e25e842f7315a8264b8177f9663b40b3616e05bf89a2a6fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd7fd27eb693e1e0c1d649fa53b7ca42
SHA10d4d727942edc5182ea206f00b2f85e588968209
SHA256e2e3ccc30f8b2350f66b47afd3242bbddb691b868574cb31fbf767536e3e596f
SHA5128a71f889e1af89e55dc88e8593c7603c36b2ed31194455c070186161c7868a252a32388db3f99159e64f4fe7cf1f0a75220a65f5c99bd56fcff6b33044c2cb09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b041dbd697fb41b0b4fcf73a4f7837
SHA1418795eb06860c1703198d37e7c9e84845de0263
SHA256073de9b49fc89e7dcba01600f0fe25ed9d52c573be217771abd0a2b1d377b372
SHA512584b01292d37d2a6c0b1bf0da4acfc862e3dad61ee70024e801187ec99a65a627f46e8c42d48d1c2b799b176c2f781e203621e59cb82e81f8156158a97a8f14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd2d057aa931a9af8a308145a63bdca
SHA19ef5c68349172f32fa42c0832facc8e7cb5b21d4
SHA256dac4a18fd10d680202f8d9d578f913c1b4c0347a251e95d658b6835b6b372870
SHA512e2279fce129ea1cac389fef8637ff19462527420797a4496e83fa5507e22a893fb665b7e4291549abf784c55ea8e0cce2206c66adc2b9ff5ca2f712ab23a5a4d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b