Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
f9fb6c66269f835190e60a54155f5474_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9fb6c66269f835190e60a54155f5474_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9fb6c66269f835190e60a54155f5474_JaffaCakes118.html
-
Size
3KB
-
MD5
f9fb6c66269f835190e60a54155f5474
-
SHA1
76f602854ebd993e47a2163a23cca2a8cf5cd6bb
-
SHA256
ae46e66a1161e4c419d4d3539f5bde9dbdcd8135a4cdb88cb40268d2e8401c07
-
SHA512
cebc3b76c372caa4ddc390b51ed0cd75347db05dd1e155ebdda678acd75df8348e7c50ed2b6e2eca65e59af39924422609d1f4b9469b91ad2d5dd3b3c8833210
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433583972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f536b7f9e886209433f257313d7213091c22074b3d266a25d10e197ffff911e3000000000e800000000200002000000081fb798835e889f978b969a4957cc3bdab988ce3b23eee9e7bc41007b286a01920000000bc085f2df9bdcbf421567c27100cc3b13b2603cb0badb8f4887cc2f3406672204000000049ffa23f96411400e4147544c6a2ad9aabe15c430a772dd95dfcab36694e87004a1d824af1fe8ec2b8a84750dbb95a5b28b40711f2eb5f89a472dffdb6f167d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c4c9e9ae10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{152291E1-7CA2-11EF-A1E2-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2692 3012 iexplore.exe 30 PID 3012 wrote to memory of 2692 3012 iexplore.exe 30 PID 3012 wrote to memory of 2692 3012 iexplore.exe 30 PID 3012 wrote to memory of 2692 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9fb6c66269f835190e60a54155f5474_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08fef523a41e787813d55d9762b3f93
SHA16a0af1d804716b39c2e309a2ab559ef8a4c44855
SHA256de7b20455446e32c59ecfcdf96b94c80c82a8c7a47fb27a0521dba20927b9cd6
SHA512c21a3d1ae2bcac5e0df226e9abfb74669d36fab04f7b9d85ba1a8a0058ce1a1fc71024959303f1d1526da4ca3f6bfc5b30d2483ba6d3307bf7c4fd1468dd60fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a555ff7678f9468c82f6c3c3aacce95
SHA182a4b4a2e010eb7ab2c6289b79b16f0643e7701f
SHA256d44213372fab95e8e9eda12c6e971c0262e957af7723f8ff349618c787849b7c
SHA512058f147e3f6e9dbca06e5bd1c38ca24b7db26465e7b09770a8ef7677df659765b720f455f27f01b344226f576f1b9ea12113f9f19b9e6138b051b86f42e1afcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac56f576063ff05bf9acddaabbccb8c
SHA18c2149c5e6bdd77f75a2a549c528bce8ec6785dd
SHA256fc75fe6061cf46e95096854a188283b4c6730e079277a8365e4047c9f4baa51b
SHA5129e13c0dc25a197ee131130882cbfa9170a75387bf4526671417d374647fe476c626e6f5322ac9b14290cd119aa97e6d8ef4354334c81c0be3daf6011dd28b03a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b7a6f8f48c7b5945e401dfc96e6b42
SHA1797d848a6aa3279bff6a09a3103047cb1f82bb5e
SHA2569920b6761fd968fafa9b8258cf316372a3280727f202a1ae2105fc6988942796
SHA512c038e2b5091b6f145b2cd96c81722ffe5ffb3e94e082c4d2fed48730b1f4820f7bb75a2d71bc218b7d010fc6b7c564ddc6f2d7e860c8ac37bb285844f2a13d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9098340c36467e8630b26cd19ec6cfe
SHA1dc3a60ceaf2e192d991950427505867bddd4515c
SHA256a74f9545a59ede6f5c5480dbea8c6773994565e50082140a20e83dd36219575b
SHA51207cd4edade77a4ae52b08dde1ce533f044771a4eb012739e9d4a9f760041c00145e52b668140f9040dbe6631c3eb5581b40136a3888b40d1365223c3248e8be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e6f1e9c99d32330d8c518a3ca60c2e
SHA1c0ec42bae1fb573bf1a1978a075703bee4192dd8
SHA2568547369aac747412673fd60bde1bb118aae5b406029c86bd6bd38a28ba4b4521
SHA5126c867433d7ed89dc17912b1dbff1b0a543b86ed1aa518dcd38ddf4a778953ab7cae1cc0defcc2e274317eba699e4b0ef3ad31fad65f140bfbbff295081af86a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53faca7b060142254328f01f8a13fe255
SHA159e428304b060511017d27a24f04e8b8d3da8484
SHA25652c6a2704a4ea77ad9beb142cb0e4a7edd4065c194a260ad729b5e654e6d65ac
SHA512a99ddab61939e0b988c747143aaa05846c6925d5bf636d9e245785224d755f1c0de9a6e1c8fa010ec71ec0361e4034bf5248274d27471dec339431ed90fb12f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1d62b9ad052b5869d4259768fe68b6
SHA132d04d51f1b246422b321a699fcb8e9e9e6ef78d
SHA256057f74782f192aba6f2708cc2b453d98796a395430573ece7ef49bf88f38a227
SHA512a9f56dfa13f5fa3f24082c93c896ee11b6414e1e7429cc7783816893f5e012d38c928a1fcd9f84a6e5a5df11f29474849942b2ef5c6b5d901a36c1e55c87b632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5132e9fb6e411f55ca4b943f3f93ff62f
SHA1dfed0c910ba5ec4391070fb2297f6e15d2866522
SHA256d8198b53b538438fdbb0b8e337c105e8b7a3d27fb24ebf38a17e681448f202fd
SHA512a9ff981998b928b5095989c17a78d8624b6f347052cc9ba845e5c5493a4fca7110f9695a146f3f6daa783ae5e5a42a0797a8cedf40856cfdc9ff6c25cbe72b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b62e38b34db76aefc567d4598c24e32
SHA13374015b3cbb63e555290d372d87d1f5335d2422
SHA2565700cfc83e7bab8ece4455003bce16fcd6ac8917b3b48544ecb6782f23f61364
SHA512c67458148332270b3d5e233530979c91389178ae552b199538f136fb2edafe4319753773aad9cc9a4b491cd5b71de2bc15dae22a112092d3f60e89d5e448bb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff37dbf8338e4845684f82006532202
SHA1a66c748269842a5129304a9afc980c62761a0f1d
SHA2564f41c3ccf9de30918f59ceb5282cb3162ab43a4becd1d53a6f7a3965bf33dc8e
SHA5122eef2c27eada23b279b5a3f56a18931d1cfe190e40e2ebcdc6a36c63b8d39439cabb73c5f4fb02a9829631a15bcfb7fe9a1b6c0f82c7fec9429e53dac0509501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162d2d0baf6a85047dc9c97bc2f0f918
SHA196e866785c0c1c0cdc25e53623b927f30e1892f7
SHA2562ec259a3bfc801ec8d5df8c6a0df080b9fa4377cf8806d89566fd0a71fe2cc37
SHA512d0fe11e3444702a3db4184c53518b54d41ed0e0f6c1efc23a7386cc7089f7103509ae67f55170ff9f00fbb2fcab0386885ba236d3e768f59dfd57cc7ab982164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59003293197e1bd48f78d290f42f8e97a
SHA1293d1a50cab7930eff94b8707677c82bbc881f56
SHA2565ce4280e02eddc86c76004800b10342d96b70b8ac26ba43a223af83530eee42c
SHA5125d81c29b5bf6765d9b20eafe2214656cd0060beb1be26eccf263f0d9ea54f191921c80f0cc9bf66afdf71ee56ebd71ee98b54017b8106479b67c46a52b51f877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56209b20ba7fefbb9e2969990cfa5cb8f
SHA149dfc4c3f371abc6e711de5d7d1d14b82f53c059
SHA2561c64eee7203d1b10165123fa85e14650deab290aadbbf6a8842f72f114918510
SHA512d698692c7766ec92e72d4a9d3403040644b78bf460a40e103bc4f4cc19b6b28be5edef0c8ab56befe9aee81bbae88e5c3951dbf5d5909da50d2ba88b10ff2bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082f1e51527c11addb9fa37a52ff90a0
SHA1b4642eaafd29add9f0fb86b11ff83cea305eb24b
SHA256cda327cb9f10cd3532cb1017a0b8f9113ddc33d9aa73e43b19f4ea4d2dea6d25
SHA512f58f6847a50f7f8cb14936460026dd9a573050b168910922df2d0b5aa4e29c968472e6bdc426266c907f9e5c05d126cbcb3ea70a17f3559dcb092997ff11e4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488697eff389bb648c9ccc96661a2108
SHA132a5543ca3d890770f9b1781c3c60a6c119e1e98
SHA2564143e52738694437290ecc6c38a766904478470c886c0146a257e2d8c0767ecf
SHA51254d5d00d4d52fe178609ab66bd03b1d57c4adab001fc5738cdccd28127bfd1beede9f2b5a8bdf5c7259694f7bfdc5a8aaff13d80916b30398334c0e2708c9d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02a4fa41840c32bada213b707001dda
SHA1e95bf7d3e25311e8eaf6be3248314cf503d3ab69
SHA256d696432b0e40b1bd89da2143467032d97f985e100ce18f078b671222d5bb74f7
SHA512758fef876d912349f90848a35a9262e161aa3cf24b28b6c158733fcb4baab47d4302f1bf9a5d7fbe69f7ede101a2e441ca90692e42b376d704989088bcabae03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29de14d4fcb844a71b02c308e00fe98
SHA15ac8da78f0485be44305583a41ac1d2d08f86fee
SHA256b366893a2bf7ef4883da385dc5b899150d4cc125f70dc39637db352f556386ab
SHA512fdea2783897b43fb3e514999be73a7aac8662827e075f0b917e45a1335959dd6e3e2807e60f50711967efee27206472a1652baa5ff32895e63dac283270a578b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b