Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
ff66f919a2c6aac51f0c106d332eeb50_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff66f919a2c6aac51f0c106d332eeb50_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff66f919a2c6aac51f0c106d332eeb50_JaffaCakes118.html
-
Size
1KB
-
MD5
ff66f919a2c6aac51f0c106d332eeb50
-
SHA1
3957a9f2cc41a234edec17d2edc0fddebcf21c28
-
SHA256
0caa6d5189db9e7203c80880e2ba9ea257dafda752c256bb2065f8a23dec72df
-
SHA512
6fe89da71246f788f746875f0d34be99905369bb10d9953c452decb8db1f081766c6528ac96347eec3d4878037056f4fa05eda0d3d30befe983d7762602befa7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000eca525137b8702fe43de363e7497cb4fb06e5b2e944f5ea3dd79428f61647b09000000000e80000000020000200000006b14dca26265cf1833e9fa98d6ca5624de99eb8c3b460ff8ef3aae60d6ac3a0d900000000a07fcd6b4e73a5b7e3b97cf6ca7f3a99a9462f03ee12c323a563d8ba7a96cea7c130d549eb3823039793748b7b22fab7d824db044982b5811d92512c2fbba30788fc6d3759ba6fd8f02032a96159547f92c812c19afca72c41ff7ff99e331cab5dbf31da77c78de39db29f8115f3e9e7d1d7f655774108593208e3a5aabf8d5f7932f67afc9b6604adb2561f3212eed4000000061b85fd594299d0ec2d0b24e8a37bd35bdce9d84e333883f0c86d908cb37a4c75c3ccc21fc59228438b3643e34c449af673f47e17c0e519f16a587852a2fb29c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433810941" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0dbef5fbf12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000020629cc45ffee4d6fd83833b372635a7e99c4393aba41d1ff54ef6ad4eef16af000000000e8000000002000020000000bba0a16ef3cbf558f2fd2843d98720243fef3fd6f3570c3744e0a98e64074ced20000000eaa3df263c7f50d5c001001af9a118b1ff6f58cafd4f8ee5e8fc1c7689a9270440000000f6e0d14ff9aa0155abffcdb4c2c739d86bb62cbdfee880e226353bdfe6f5f34052a38af4414ed8bc02ec5634739efa2856a93827b1c2bd597054c7d7a1b862ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{893BD931-7EB2-11EF-BA28-E699F793024F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2316 1984 iexplore.exe 30 PID 1984 wrote to memory of 2316 1984 iexplore.exe 30 PID 1984 wrote to memory of 2316 1984 iexplore.exe 30 PID 1984 wrote to memory of 2316 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff66f919a2c6aac51f0c106d332eeb50_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edcf993efe678a9f48ca9fed53ab487d
SHA1761dd60bac1f6f311dabfc9e6838382d5703392d
SHA256a30f3a85753fae9437dc604ed8efb4732f7b40e3792cca2ebf07fda071d1dc78
SHA512d4e4a7c4b64118b8f6c6b6c9434cbe7460c8cf90b6c675ac5ba7a9f2ba6610cfdaeac23cce2951ffb9f843d677921abd194704aa47bda305bc3a5b2c741b5e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff3d54b6832dba46f41bf115605f9ac
SHA1be3f457c05d89950f80f8ab345917e9ce234f63c
SHA2562fe3d51a8a5b0862cb02da86d6424e34f6dd16cfae076853558ba017e7d371c4
SHA5129f2b1caed813302c96d82edf2c4e093a6fa70628cd45a6fecf41426381a04210f96985ae7eb69f14adb170ff3f1dbf23fac069f2cce18a23107fd0c27ba38ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca3ba3cefe586b513b1ca8eaf63dd169
SHA1fca75a3da6858b22a2a8ccd17ef523e08999da21
SHA2563411b2668a949aa1317df7e7565563905b465491fe6110cbd7ddfd3ed3d51b8e
SHA51258cab454f05a82d7e1d503f62fa514f7a1b5cfa6b6dc3fccef582c4a96532cdf1cbe0a72d16618d920bf5569768c47879b2f338eb8df32a84070081fa58cc4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509ef86bee6ade9aa7c026e59288b81cc
SHA1f01832f27dee2940be755adb15c6b1acef41c943
SHA2567dea03bed2a6976bb12de799f56e7fd971f2d553a58108f0768164949be71eae
SHA512960596dc3621fcd54b54e4f6f79d6fd6fbfc0ed646da6afc7d97cda7c0929936749c683b2b60764db97a562381af88ffa88958a92ca5c7abcac68007eede6bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0edf2301f25fe1d0857844d377c13d7
SHA14927aeaf8e173521e8f8475bad952345904db694
SHA2568a806a6480cf19d694beb75d029f3110869a4aa03ec9303f9a88ace6e34467d2
SHA51241107ff4ddfdb2cab708818d42d6db8d6b12b8ae548d618cbe6652e41505acee0fbec58d024c44a242c0fcb042f5170b31621327a5d81351a08ac3f4b8329ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54797728012233addf1d77c05892182d9
SHA118f3ed8d1cf9adf388811e01c53c3e10cee73143
SHA256596134840e96b5be4238aa8a1fead807d3e27beb3ed5efe0044d644444177523
SHA512d026f7de326d24a32295038c459d6695d47f80b423e436922914b1a175e6b18290c042f0dd3135cdaa29ff54580fbbcf4e0f4bc1481a124cd56a71e5119d4419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48556222e085b456f9cfa41cb586706
SHA1072e24ee5967b84e91265ee9e7ed076a403b645b
SHA256fc2919adb5c73c893bd41efdbba5d63ce97f757c2a090d51319c08aa56a54e16
SHA512360e38c5b6023632280906af249a144b5d893e2370e9de8dd10a7b7f4e3f2e7ae93f9c07ad38bfa959f6632b4bbf5a03e783d401ab859acd6403054e76803905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598143b118725de2f44b139ffdd99dc92
SHA1f36b5bfabbe4ac7c5aab725f215289829bfc4f72
SHA256298649c1287459a33446d77ff1d26cbf31fe611009157e34f7d058506afbcca4
SHA5126c56c3053600ee65cc8d03839c1583ad793086d3b77637121f13cfdd59f6364228059eeafae7df33c9972896b92cb0051521d139661aa2960b7ba200ebdb07dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a10ff568c4a76e22717724a56dbd229
SHA1bb1a1ebbe7513792ae7be1e280b4befbbebd70b6
SHA256b94f81c3cf62291b76161799ee1a0a1b4fa3c24808c191bd1d176be59fe29ee7
SHA512074c2a17a23c281d183fd9a1c60960a2d2b0e28ec0ad3ca24da4d9144fb211c49d6992903c0ca00fb3934be292ccce60eb29cda0c8c4b4c54a5bfd26b7761fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54740e4436a4ed113b1dafef6a70072
SHA1c83e282956e2b83f5fb2a8df8c662f765e339382
SHA25638cb3cc16bce68c160de9308ebb22beabe98ef9b27a0a19b53fed434acde041f
SHA5121332be3f74d6af3391bd019639933de58ef1b00bd5157cb7ba586c954d78656be20237bd61d445e0b55917af83d76c6cfcde1a0a784acda02e2b325828cbab44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c639aa088a820d7432cc6abf5d6125
SHA1b86781b210689fac6df4aba39b00d214c017c03a
SHA256e8cc37e0dccc26086ee0ff66ca987ed84918b71ac9384891b6e2473659aa5e93
SHA5128856aebe698f12d1422ce8d7c9b4d78f41fc2f2498a8ff447aae834d2522d536d32ef6704eeba2f3460df93a0095ebad3f221cf4f643469988c39c106aaaf91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03d6b78e72b34504f5cc97d311d51af
SHA1551eea64ebd89f0e6b069b72edef450012cfad71
SHA2561a905530b00d561d6f3b5744f802bab10818bcb81145f7e1333b1b18cc1eb5bc
SHA51204a86a6805c7b0c39cd1f147ec92d935e7668f3570888123f932e3da38431bbcd8cf8d81635fd3280d14f8bfea70348b9e3e3b55ee44f0c29a833cef1df13cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e7c230bab66a037861ef2d0f4420c17
SHA1852065cb39cf387e5977e82999ccdd7d9e160e3d
SHA256404cad06f374b6a855733efc49cdf74f29c393ab2139a7057fb8d6f48f43f29e
SHA5120d506856eb8ad4ec53197a1acfb673cabbd2f5faf29de16bfabb4623ca96652884effbc7d30309d5973bc063048a83dd706c700d2dab7243b7596700bb8c05e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575ff15797f12965e362688bbf42365e2
SHA12b3997a3627146dfe4a75947fd0fdf92e3776520
SHA25673d9cdccdf6c859c2889fdbf12586079ae763017d584c1cd77150d2511555f87
SHA51205a12a9405491f9079c912e2bca39a5a20e7574f5e016bf5b4673e0ebcf998d47fa2f980e11c61d8f29e46136a49c4b0cefabe9b2d6171e1d229e159a37fdba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913221f38e1e199902e9a87ab878bea6
SHA1393174ccae68cbc505c6b95d159cdf2182b3e521
SHA2565fa1c2c9494bca4bf0c9d047ce4e45a5fdaa283c661daf0a41d4d81a0a50dda4
SHA51222fd55e63dc2a7951dfcebe56a8f40ee523f2340a58c39e151b68b49312024a725553f79d5309c007edd0f67a6487024c316c984d6066ce9a84d257dc58e8b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5affd326adf2084829108d5a2d2fae6d6
SHA11d4a32a8471b9dc582ba0739df49535ac305a967
SHA2566ef6f1ff7c1831e9cc1f2e1f9a6da17152026736aeef5ce6cc64a1190a238a60
SHA512289f49dd281afb51aaedea735b03ae2770e9c081baca0137ad56bfabaaa6baf344302f7b65e274707cbb2d7916a2e025d35766011ee07ca23936edeb9472b538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d434245e516e411b4b5fd9acdcb83097
SHA1bc9de91235bbbd6472b1e2b3186cc93f55655333
SHA256b0f7490d1fa75ce752f08340eca804e113ec05e70c4b5cef9513a776b4d5c108
SHA512231be672d89a1d11544a6dfb81a4a21e85a10068fa3469d6433ab76a128b9143e87d6b7d4cfac3d744e3bc949059e4dc16eef0e8aa76c27b0ec4e51cc6c58293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d39e8c3512b7c70c088f6b41e8efddb0
SHA1e60067b2490504f5d0b7233e8c4c7790548807ec
SHA2565b8c6fdd3fd7fb8c8c7150e918fa8debf22c6cce9363244404feffba5f224e06
SHA512015965ed1acc880555bbec09da3b6c0254e40ffeb3f57e885e73106ff8b9649dc5c3532a663b4f56c02948ff013e97b54a333bd6e08a4712dc75ca610e68ea12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adbc34e4f7dc47a3f61be45d20401729
SHA147bd31d54151be80c02168de949680076a0c325a
SHA256fa8f78b1304c7c461d86a1117981fe55e8b04c3fd43a84e292a6c9f53327a0e5
SHA5124290354cac51a9ce2df597aee19203a07b27e2293b9e3aaeb595a42eb80668249aa8945c5e624e2a8154360b09b8ff6243d60cc6447729011ee691541683310f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b