Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
ff6f0185fdc7e9c6d4b4530e2834bb31_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff6f0185fdc7e9c6d4b4530e2834bb31_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff6f0185fdc7e9c6d4b4530e2834bb31_JaffaCakes118.html
-
Size
6KB
-
MD5
ff6f0185fdc7e9c6d4b4530e2834bb31
-
SHA1
3dfc205e6c6b8314b9f53b593a804e3c1009d0e5
-
SHA256
92616ea73ab985cc0324d2088d7e4f034100713014c9f0ac1adfd1fbfb4b0a51
-
SHA512
0e12e62a19dcc7e47d6459af6001bb02fd9b056c2d5ba3d8e9f9367e53354887d1f0d259a17e29f5cfa9fe32c29f582929695ed52bea0c94b81110796a016f3c
-
SSDEEP
96:uzVs+ux7m6LLY1k9o84d12ef7CSTUrZcEZ7ru7f:csz7m6AYS/+b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09a4c11c212db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433812099" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000e7262b7d802194de11e05a43bd3a1da571efc019f48957e99c3cad633b5a8b9f000000000e8000000002000020000000eb75bb7001745f4b854293db83ebd6c53ce81fd082fa0c9e0331162f1bd8a25e9000000073834c575b90c47ddc1e2416aa8d73c4a4c1dbcdca602d005919161ae86a13b60dd04380b4f1fdd3eac0674ea87dd7ad4c241696a4a8929d449df12332d8c7b5a0a412060efbde6b3e975e6f37e8d5f9db4531ce3cce53298fdea47a4907616f0a8c13dd27360fb9c610569a79fedd6879dfe7f53d706eb8caced66385f215da03a92e4d635d96fd6a1e2c18f199d6da4000000095d6c31f8648859b76171170c19dc15f5b9a75ca536e9b25b12d65088c3825af06a54de3dae70d9770524cd720156a31db21aecc2ccc5bacbb70c5205d760136 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3ACF76F1-7EB5-11EF-BC08-7A9F8CACAEA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000c1e929fe16f18bdbbb918c2faa089d3eb1173102af6310bc7e7893766d5060ad000000000e8000000002000020000000c401ee849f4c96ecfe839f2bab392fb0ce39d8ae949c09f4d12a70c5a98b7d7220000000552b042c4f0baef0209f6787593a644be210b1a2af6695c717af2c57941ce92240000000e908fed7ad6bc392b202a5f854da1f366a92831f525a2234192d5c3271b602550f0cbcf0630ee5dec7ab9289c885a69e4d08c20d0728e9266420684e94744bfc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2512 2296 iexplore.exe 30 PID 2296 wrote to memory of 2512 2296 iexplore.exe 30 PID 2296 wrote to memory of 2512 2296 iexplore.exe 30 PID 2296 wrote to memory of 2512 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff6f0185fdc7e9c6d4b4530e2834bb31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec10ccf62198ba1d5137fdabbfd8ef0
SHA155182b49c19fb265a6bf2031ab56480e5c8883c0
SHA256b8aa1271693d3b7cd0b6c55978fe1efaf9a9b0234edb6cb05aade71277fe62b1
SHA5127d12f6e758465a9f48652549052add71ed6a5fe486efb23a2c9f4b9327c691a9c412d765b07ab85ccbf32167e2a81db70911027595ec02abfe8267b836183539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594699821804356be61c9a69883596ecf
SHA1b196d87f9864ddefec3dd54ebd3fd741c4a94a35
SHA25696340a5484e57e294a4b4c12b4a11da37b64cef29797ee3f443794317fe89857
SHA5123b881ebd76248e0f64e385ba96d3c9efc18161bece2e82977099ec3eedde3e46badc507710687719d42a19adbd4df93d140ffe41949eae17b038326ae0f76a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebeac43c53f0692fa8269285f618815f
SHA19bad43ef9df2db439778401baeece392a08c37b0
SHA2568d644219d87595a720cdc4e73eb7dfdaa1147facfd7d35a2084467dbd5d885e4
SHA512ba345d152dd3c9f696eec3b0ff485332b50cf943e672b53a088eb31b8118cd66955959e3411d6c5680dd36429f6784b220fde68501c366137d0ba5e58a73b72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af9847b91b9716fe57c34d1d6bbec674
SHA11ddd5736d47483fec95852098cfbf889a6512978
SHA2566f20edebd96139926e0cc81236a62db77cd9b0663bea29bdbbcc2b625e5b1a61
SHA5123cec2e23262eec321e9b657d26e3a14caddaeb5ba952377dd05a26d4d03135456ac34bb53aca53d56c2d6045a8ea6b2581b2c1b8e5411c7ff4f098b029b8d64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539642eaa2aec97b795ec4be703e4c247
SHA1a71f9b1da41d93c52735c9f8b8a0a38d977ba63a
SHA256a2dac5178f697c50c31fe2492c4e2e96c160a9aa820fc308d3151bc12dc6e955
SHA512dfb4b0d775c9b7ed0d75a9011a227e0589dae23e52c5ec6de323f8afc0db8c97c980b78bde35a337dafd20a48095ff03232ea1d3626a014891fb9928d9529c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51daba06715ad24b745c91a2371ddc053
SHA13830dcab284a4613721135fc60caf2b4659c9f55
SHA256bc4022cc393b9812d305a9285d34a6fada18b3a2d22e8e25b8f3f70e2963c85f
SHA51281b3cceb1487dd27ed69e055b8b3128602f2842b22c6d4a554b762516001c9bf6ee9756be9238b272ca2437c1cb27d774ba458d9c8d0b3f64d04a0535b508c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53878383cc66cf3ba38002d321d6a0d55
SHA19b3003ac6a57d4ad233e1106f92a2cd99303ac5a
SHA256fcf7ab4781c2b00c3f203b50e43f48ed0512881e7853f0b5138ee74fc549f57e
SHA51268253265ccc147d06d506cd33e31d15a67bfa84fdf32aacf7c2e50bac17203100f9d485625aacf38385fe23acb69f0a0a6a1eb009296a87a300c5d3faf37579b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efcf8d56ca9614d36cfcb75541a998b1
SHA13307479b2ea6b0cc284731789ce4ede55310e3ad
SHA256356e24ba8ba0603660721c6a7e951a3a68eddb684be9bbcff26d3bbd032a563c
SHA512f9a4fa37c4ee33a9f8e83d2a941808de7c9f4e29cd4d7dfd0e756e9d64963e85be758da6027dd2a9ee2267aa4a557ea66bc68f79d087682b973e484da2d8e90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83052a6a716f55f50dec89383dff3f5
SHA13d4afd303163ff01e551632ad6dbed2dc072f7c7
SHA25661ba766e7ad85dbca6b22a93a19418e461d5aaa438a7130bf0139ad92a4fd4ae
SHA512a1727a77a5bd25eb158051f1e948f33432c2599df2ba07f781cc281ce3ce7b6fb4115553e0b5c03b3905ef02639bee9b991aa4cacf8a5717ea8724701ec8868a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec93c951868a19f3aec0ee21923acef
SHA1707b8b8343dc5e4a82e9979a6d64ba2f8c1ccb1d
SHA2566bced408a025f1259c590390fbe09c96869800c8da849a193544e6be26a8b0d4
SHA51216a613269cbe40c068b606b495f064484e0e1bbfbe4679a3232aa124bed6ec9cf4484be66b9fe773dde179b0bd9e2f6482f8b66b515fdd6af04c71796ec45f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54977c49762e3dd12488c3a7fe4ddeac2
SHA1de81f2016f0e5b8c920d6f86f1218febf71d8ea7
SHA256bd46ad574f7be2e1adaac759a9411f146e44a9118d34c03de093157adbc92539
SHA512213c51a5be21e27c5268b459377ea103f5e79d45684823662b454e7438073a4fbbc93be8225b69769686e7cb7daeaf79c8e86e7c33ee1f230c7c13e2fb5ce031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f568ee062b87796fc24ab40498b7d348
SHA1e557db8aa44ea83a00e042add783c2eb0bbe0513
SHA256ccb15cffc396adf39976545396fc703ae12086e08ba0867c31efeb8832998d54
SHA5125ef5f6ee3e1a9df07ce646fa5d9e8f7a4423e8fe23a6ff097a5f322d96a2e90257cf942d63336be07542b88f5d8882d6324bbdbf95bdd6830045632614d38535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805536da4fdfe15921e0b1afc79aeac1
SHA1a192a06e9f1184e4843dea3f8e7991498fe402b5
SHA256c1297bf42adce1887e8a4428374d5921f40a42e38102d20df5e8ed0d78afd891
SHA512ecb8421ef0fbe569b3a6c895e21a1db4c8c87a4ea149c137253f89d0a12ce931acb45685c7b6988a5203b4e83618482325eb496f34380b923861ab1cfe49a0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471b1364b170db100409a754c03db06d
SHA11e1270a86239424bb62dd34d5ac3cef573b85c6e
SHA25651b06f1c11e30b1c9d996b83e6ac9c881a395084aa42aa132e5cd0c5c5507ec8
SHA5127918f2fa0b626f5d6464b5fc2dbc6471123c82a7b5be7209c28baab01db6fc9528a7c35d2844774d6311a319ee87d78609e58bb06054af8c43a6af0050fd8e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ca19ef3a43d644bc651640115e22aee
SHA1786354ff7d50a87cf999c24c03fa5ce3036cf726
SHA256b6bb6cabe2a4777cff0e1d34e21c03211e0f479a57df1de9b9e32c72bf97a37d
SHA512cbc15d26ca00a3a23760d62cd4008ec2aad7616b04435b194c94d03314ece8d4a20fd4a9fb607fe2a01b6ae25e4598128bbb472b915c8dc1c4032b43ef0a471c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59fa739002abba99cdf11f40b40a37c
SHA1ce1c0eeafb4c3dadf67d84769f0b755e1cdfbab6
SHA256e548efba316bb69a88435f6f3d92760613af396f4a485d4d71b58a2884231f1d
SHA5121eb9aa74212d6a9dcc2726e480661fbea8a14da428257056aa758545b13f443bdcd2f7ba6fc2b938d15dfacd2a8cde0e3ea1800bf477e0e2554bd8250d38c760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b887b3df0038a6351ae820ac739bfe15
SHA1288e4ced2dc5d5235d14ff6fe9d8fa916a57c1ca
SHA256a28212e9eed75bc77ad2ffc293a0e36bd07b898bba9cbab4b7c64674a9489944
SHA512f73fb9f1b428f9c202c7c516ad3c0446df581e9fcca5c3d4fd467b978daa388cf9b1ee1e7cbd40fe332910ecd97be329bb8ec6ef6ae2f4010448fbbd37d28227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2d37982c61351e9dfffd7632b1b3dc
SHA15f880c77efdc605dab8afb404c8617078a45347d
SHA256a79d4fbed2f7473753929a96d3a617948018f6e44895e9c43fc4d34ce39ced01
SHA51252abf340236314be900ff849fa01208693ef35be7d4ec011673505788b8962f683f47b5ef49a9b146cd81000bc9cf5afe4c2e4d7c51ae7632752d93061aa0678
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b