Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
ff72af909001c1028f16e121466368f8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff72af909001c1028f16e121466368f8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff72af909001c1028f16e121466368f8_JaffaCakes118.html
-
Size
81KB
-
MD5
ff72af909001c1028f16e121466368f8
-
SHA1
0f7c559606019d36f095b4e1fc972d714b6378d4
-
SHA256
26781959559c594d7b684377cad7a03d08540b69394bdd33aba88dbb8823d06e
-
SHA512
5a3fd469fd853f7bea99333e569d179e3278b4997ab8506f2d103fa7e11dc2e1688b70aa888f3b14e63238194a28c8fb5596d6d2e8a1dd18972726c9131c5ee2
-
SSDEEP
768:O4OfDjyi7t8D6F0K6oQVLdNYcT+RpFjlKCk9y3Ek:BbK6VLdNdKRpplKT80k
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a067a53bc312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433812598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000ca3ca2df3274c57cb86a257e6d9091c26a18a1aaefe2bbef222f3664475700e9000000000e8000000002000020000000a5af0c4c9f2a3cb9cbeeddad292ae7dba9abb389db840a108f0c2cb0aef5989d200000008cf1fd99ccf263f1c968aa1f17ea9aad5b6d45f8440f7d7b78828657b1aab75a40000000a522ef960ecfc3c8d8ec91ccae93bbef8b43c8820926d22e68792e98c16899710e9f73d4177a66eddc795b8a13e075ae51ec8a6271310a9071d46d51984bd765 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{644751F1-7EB6-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1652 2204 iexplore.exe 28 PID 2204 wrote to memory of 1652 2204 iexplore.exe 28 PID 2204 wrote to memory of 1652 2204 iexplore.exe 28 PID 2204 wrote to memory of 1652 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff72af909001c1028f16e121466368f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57739fd3d61fd6971cbb09920740013a2
SHA1650bf59f410f96c52c9c722b0acf629065a0d56b
SHA256bb3d59b0c0a8d6ff88d92097d98f57aaff95b4f643fbb880cc400b94f9cc4647
SHA512d93ff5786ba31afd53a1cea320d18c8a4c9af448b42c2f149a3a9c4cc8fdfc5c3f93f36270fcc0ecc017f6caed282e1e550375c7554ca43f7447a2059a93eb0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3421917a327263d823faeff3d08dce7
SHA1be874018df79647f473dcd738bb24b21d8f557a0
SHA256ba51cdada6d2ead3fb1aa179868eb8246e11407355fb80dc3b59359ec38cfedf
SHA512e129bb2ff56ca670e5a1242a12b9d2f8d0569e3d81d45f3b0547362496c10ac76a80990154097ed281a1059530afb63d95c74518a434dd29c3caf0f3a3efd187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5359caddcbdb64bdb15f19023c9cc12e0
SHA1ee28f1b3a7bb069684e28ed9199a7200ad126a99
SHA2568aae3e375757dc5132a19d237ab72be5c4e205ddf10d1a71fb2772cbb9cfe23c
SHA5128ad4287ae0bb2ce96baa39db7fb804b59ae6a236e5b2550c3ee8d19dcbaf6dcd3e084f208e075467939b5255a391e7656afaafef327c642ef83d9cd1ee6a77ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdfefb86da7a1bbef86fd13d1dabfe09
SHA110011422df721fe2ca8e86905a02d89d6925dda9
SHA256a1d8497722446c74e518dc8bbdfe70d5ff7e8cf17b22cfd85b6bb4648f34a61b
SHA512231b0bf9f7765619c5c457e05af38fa980aff169ae9e9118beaa9e7e4a78c47dcc707a5413ed4d2b43254ed7cd9f4ae70cdc088578a774001ea18ddb314d2976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f34e66aaf75a728374db8369f9402f2
SHA18ac916d060421992731717f003817154bae99188
SHA256a507b063f4e6f0245d940af94c057363080ff153b9a26d672f5654e6e4ea1a86
SHA512c7e72fceb98913d44dfb174254f43b583fa96bab37ff25c6700ef2be10453afae9fbe34b54b18a0529f57ff9e48c8d15bf64984b603f5d7fc961131d003397a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587af91df368a9ace461eab60446c5dc4
SHA1f662e0c6ba696feeda0adeed34ca94f616804b30
SHA2565b996e7bd0405f95b6096f4abb1386587378748ee348c6912bda4422345446d1
SHA512d2adda822eac84b4017263de977729a0d9385ad7bdc7401fe1bca75afb40817bdb3d772daad4f94829ad1734ac38e2cde7bfb7ab2bea379ea541e0cfec38e297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b190e893ad35a8e6d0e2af2e2df4b53
SHA1c912ff6dba1a7d63557cd69d3476a98d96fb68b4
SHA256a733f07025ed02d8c434f42bf91caee646cdff8f933eb0d7f220f934bd65bb3b
SHA51203226153ab7ccd092711bce1bbd1a5bcb5933675451a6d4f9f8e02aeaf11cb4f6e55627bb4c0cf0ef7eded83f8e0b82ad9db839104e8e810066a073d57fe061c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a05d89b0559c74bf13ddf1d754d8772
SHA1281ff2942575ea51a3c288837ca7f1001cedf8eb
SHA2565e59ab956baa112c57bd5a7db5d3abec86bf543fcc2bfc3f40470a46cdf194ce
SHA51240ef99d34ebcea94448d7ee7b688948f4f842e88d1ce8905ea773b96d5320e8fa73962971216a2beffb8abd01fcac35e4771862ea7674fc0a00a994f13e14e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51994d251e2208429166af5180e044743
SHA1fce333b89ba1195459bc628b5d66a5cc398e2ef6
SHA2569537dd639d3faf92c0745c3d89a18086ac7dba19cace43b6742b75e86e41ead0
SHA5127342ba4ef1d404a1fe2bb394a029fde617eedee971b09e3505e19dd98149bac5ec7194bb0b04d3ad02cebf612cb537ed9a80ad98437012e97f5d12c4dd61578b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ffea7d5ccc919aa840591e6d37366b0
SHA10950656b05d1e139e9fd18661f11554d2ea501ae
SHA25611b72f8f7bf6250007b93bd737f7875713ce4098efd297ac4624c88356cd2740
SHA512f7611e545b9033f68a1f361389a57d9486bedffbdc2eb5e7908813c078c9d4289a7fd549bfd9de572107a404939398ef284e879dbf8406592fa8cd13cee11d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd32e5379f0bbd75e6d5b852c90db489
SHA18962299eb1886c85391b51ae6b637dd1fe25ff28
SHA256439e546f4f1d6ddb6a2924fcb0a462f3fa445edf768d0a6fa07213b7739f900b
SHA51226d8d352ad58aa7464beae7cc91ee870ce3910a0a99e4a1082c95bc2c256843ba73cdcc6dbc87e9b8b120a71507b4851bedc48ebe69ec979b77cd5005cc38555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6e56c604422325f5d8534387c633a6
SHA1990f5470d9d7aa13d2cfc1d86e029f49571c47bc
SHA256e4a0495732e9df23c566c897b7d51b3979fa32ce516430531ba13687d926c546
SHA512b1057d66a6e25152720506d293fc2d12ea15b5cb07201aba8185f48e7b76b018f304b5f94eddc81b8b169179040572dad920c0feb1ae7db8c28c5f22875a42b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e8d3b628f202c095ad4a8f3f7a76fc
SHA1b0666842bd5b942262c67a46a5270d425d13bb70
SHA2560894c230e0bd893b2ecb309d59b692424430fd0c8930ffdc6dbe34e64ffa86a8
SHA51284fa15353ac15a3db768db3b8663970f77fd3bc7b6a747534db73aaca2909efbb39b3f5a9b80a0b4be52657b84f6d7413ec17815bfee5b8093c8742e871b9e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57766641c6c67142011070802896c0841
SHA1ebc5edc5cbe20e187db0dd139ca3b066d21b85d4
SHA256598da477c04f499c8b2ff30350d4bb3829e15e0bb80d1d66504b655471825a3e
SHA512572215d77e94c2b27836c480004d453d58fd4efb0a39b183c39132e1899dcea4bfcb4be9f6aa63a2e967a849f034ad10f55329b036cb8e949a1168b05af0ff9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0017ea3c704a7c15915abb6fd9e7d5
SHA10b6d977db4bb84dbf8d1acdd12d581ba3ae38bbb
SHA25646327da97a390d6cfb76c115bfc8a3c5c0059ae6760873f71f54f20de869a6bb
SHA51272cbe9c2a15daef1f9697f05dff36abea9c1f396534bf6afd4472d6d884106d8add108afa3b590c0e6ebaffa194d8f025812d6b234d5b3970b59ced5a7429ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ed975697de4d3f7eb65dbc96963205
SHA190179094acc6dfb157b016eeb47e52a9e159776e
SHA2568a6071aa2292142ece7ea99ce2bfaff8892ac3afccfa75b0e6daf296f2bc6a45
SHA5126828c1115c47ea18b891914931c35679b064f6b9d9ba2d9781f39313ff5374babbb19f86b22fe92057b42ef4f2f32110b5d7544037b39dbebc98a9ba3a6e2ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c4c8bb5446c2707161ed236e03d12b
SHA14788722421be8f9f553f874a55b043254e3a1c55
SHA256af398d4e8672c7b0d857101a7cd8badbead8b8e6514b984a902d8fef4af1f37d
SHA5125c13d3b33cd14cd6abcf01e5210320e012e031f1c4726d4e5156cf00c9698884a67838b2c7b9cb25aca4dbcdd2babfc6bb5a1702cfcb837af3c1eaf5da3f80b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b