Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
ff0d80e766e030fafe228f5328c4d1b6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff0d80e766e030fafe228f5328c4d1b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff0d80e766e030fafe228f5328c4d1b6_JaffaCakes118.html
-
Size
174KB
-
MD5
ff0d80e766e030fafe228f5328c4d1b6
-
SHA1
dbf009c6b600abbfcbefca42aab9b0051acbc388
-
SHA256
54d639fe342764183390c5f2332c7b9e21d681b731cb91a97e3b06d6554bf3c8
-
SHA512
4b045b571ff5c6a91358715cd1775b65d38a84462ae0e96280217fe904bc537628b54beb4908d4db54d18afea5f8ddd70825831c59dc220a63e938bcbcef542d
-
SSDEEP
3072:SXLuTrvPE58s1nqCYSnRS9e7DNAGqb7vD6zlZ+g8V8RwOYVHyCXfbigyfkMY+BEu:Sbu/vPE58s1nqCYSnRS9e7DNAGqb7vDA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008fe01d7d46dd60dcbd82c164167c5c218fe332d3a4f9a391c53069b3034b4a7b000000000e8000000002000020000000942dab2b36cc4aab0849ef7761848b1167d898057b3075768950b88866a632b22000000030ce0b5a261788cdc9d1e90a704b0b0d84dd88fb454155556ea9f2c4dac6af3b40000000ff53caa904e5c85f66164a0b6676a5e2dc28225c18aebb2d811d5f6d86b90f1a779658c6091cf0fdaa167af057d7729e5428a37ddf76b500df24f6b4fd8f2362 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08AB59C1-7E8B-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433793976" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05f501c9812db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2764 2644 iexplore.exe 30 PID 2644 wrote to memory of 2764 2644 iexplore.exe 30 PID 2644 wrote to memory of 2764 2644 iexplore.exe 30 PID 2644 wrote to memory of 2764 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff0d80e766e030fafe228f5328c4d1b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcdd78cea3ee7a950018c6de039096af
SHA19b19ea2358ba65d486a00468ffa913c22eca84ef
SHA2565ddf71b407ff5fe61c6bceab660059dd573de017656c3426e39a70b46b70862f
SHA5129fc14fc35347f92591d0b787652858f1a10b36cb7a361c36018a6526c86b7e7ba524577c2b438bb6f274f471591d6f6a730d7a04098295c0a4d8c94b9436c3cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ca3af480db697eb8d875f8b824bd58
SHA12f999e305c151824101e4fa0316fe15a3a9ae681
SHA2568e6e31beb52e9a1e9a0d440dfc31affad9fa9ce1b5a4a446d1693e41dbadb0be
SHA512a60419e703d6bdb24a98bdb9666b5c97ab2d53258751f6b3d5b9e13ab65bbe75e5e529942375ca8a0c8b55ae6fcfca162c18c54fdca71bc99b708ca161f20eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c17b6d3a204e28e55c26eb339c4dce8
SHA1055752c3e8a8cbef1ba725712d046804ca2e3489
SHA2568980c3468627241eaca34ccf3686b02337a0e9e60d50a5ef677456fa69057b61
SHA5120fc9ae519e269dab419e496450d140a967338499797065f575b1e8ff8272f9cc70ad78968b1b5a4c6b9e006a1d20107535e3020c634a507b08cc4cd616a834d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e66558c84461c79853b3346728bb6e
SHA1c89569e21194eb4d1d720b006f0b68aab9862bad
SHA256af758a8a8796abd26abff197053206c25f0def9a35229d0f9270a0aad97a9abe
SHA512dbddea9a74107aa679153f20d305daef6b66e73f40ba08dc2ec6f5d481c86567ff630aad965047148266bf17631e4c0bf8d0ca006ce08621486f3c478ee78adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d134a29e208623af9a769cd6221fee
SHA1c634d1e3deaafa9ea91122fd1439c1f7ff668e4b
SHA256509fbb6c78582655058d287ce3cd2cdca24c39e09335adea249e7548d4479490
SHA5128fc039f76a522f38cd619ddb2ef08a788c4da65ef8f90c1c0fe04c19c10e827d29091aae59a771aaf7d3f237eac6963268ed388d228f50582468a3a291a4471c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9fce398d14dfda623121aa743ee7d6
SHA11a6000ef58347d045bd3314fbee9945b86cfc697
SHA256e478f64283bae3ba6c36621fe62d6598bec23d9a355ec9fdb2ec82ae83d0f9be
SHA51296308e8d459d6f13bb4dcfe1815aec70a49dc92692f61748b795ec180db58386e031bfb078f77dbca8500697480cf8a2517e3b8d7809c27979cd140ffea744c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48a032353cd8a3c159e5e9504297618
SHA161151a192838aed9c1070711b8a9672f5d749339
SHA25617610f9417abc571292bdb85c6427638f0ff91ea46ccdcd89cbc3528c1aa89a7
SHA512c9c1d5e46aefb6f01771575ceb820722dfb350a0f4928a1d0d67b0affb7e04de1027273a41947ef8749dff05f7d39e66fb40705d2ba9ce4816875cb7f6b7a67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da03c9ad5f2aeeffd2783459a1c01850
SHA13539b1e0fe0ba46a7778413e37766b1256d8fcd5
SHA256c496e721c488b6c99d1bb97f87e334993e9b4a8be55bb7a4d4ed2183845b8899
SHA51240e32dbaefca5c3a0fd0e3837ca3351571552f26a7af3a2de057bbe43f9a8da43403dc476bb7c540d1800aac220a63947436498a40b13d6c520871a44d464d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4db817192dc9b6b42c6fe07ab82d2a0
SHA1a3ed3bae002c4ab2edbb5fc8c93d6725bcef79e2
SHA2561bef7cbfda61654af0f5dbd45dedc27461d457f039b681bb3c9cf722538597f9
SHA512cf43306ac9331641fa6d1e72c0d84719863bddc5f95485bd9572da3b4c7faad4f7cedad618ceb172abc83df23f94e6353df29d37e890fc7d34071092999fd960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ceac12c9fe937f29ee1bea2c6916fd
SHA1aad832b09b3d5dde751492e49ece8a6ede1d2753
SHA2568c15461cfa601b9666fbb31a5b6c6df22230c04d545b75c921451bc368969192
SHA512045f4049eb71e2476be97f4ddbe520d884f8924dd76b8a1c5bdb7533d2218ab3d74eb5f57e75f580ea7c4efaaf7eb399da80eafac6c666259e29b996948d30c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53874db1e5890468bd464275b394d316d
SHA14b65a4b3789ecf8a9aa0044cc3902d90e9a7ffa4
SHA256481ee3e1825cc73f85eaa9c2ef05f51344d4340d7577cfbfc0553410fa383e0d
SHA512be77756641319fd559aa59e3cfcb2f9082cf1f291e30451187894f7fe16300774cb00f9e72acad11fd91aa8aaae9c3383ec4ac2f002e37285d284f9b2c2a4dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb983f24011b23eadc4b7d0ab0d5aea
SHA19c5d85dd65000009a93b893f7d41a9dcbcfbf1c5
SHA2562a772f0fec20fd45e9c6c8d389a6588d5e34d98e11a383b11aa6a89c10513748
SHA512a29a96f80e439598cd704e68e9a60f8e3b52d460a601be5ade382610c74b6a2684d969f339f56c4543db4b82572509dde450dad85ce98542ebec42a0b417351b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bbfcdca92f79bf0f8042754feb31584
SHA15297bf85242b7d119a3a246d317742c3ea9792df
SHA256102c05cab20b0ded7db108d924f88d1d35e7f007531a60c6ecda3c6d05004265
SHA512beb6d1836d5363c9a1755ba024276468452749e5cad8536a536a23830a6f5aceb6b521885f928528e4f8ce595dea407bbbca43eb660dbc289d96d7afe91c1e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b10941394474a0beb02ea056d15906
SHA13c652ae29b7eb52bfb8013d258e042b4adb4b54a
SHA2568fc4f0b5271f97739d63be3e082e4a8bd664d995dfc483e1e4c6cca72604b9c0
SHA5125e9ea3d5f6359e5d11eeb822a8b704a12d94597739619676039ed9c536dc25b6f0525718a82573b9cf118ce63e66d018046bfa8c15e229e8475e46e031497606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b208811d741a25e3cfe2c3add235e31
SHA1c5292d9948688f059ae7eb3d758f3db0afd509d2
SHA2568a5ee60082f2a5cf96ed1aee23fad372975393f1436ed1969c9103a35123157b
SHA512ac4a13252a2352934441bde290ca99a84e36bfc734e796ffb36536bc6e3e92492b1f9922d9f57258c27f95d19cc2eaeb68a1c06a3f6772af6a3047fc6e2408f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d937e8ef8f4f589a4b2cc8c888b70d36
SHA103badf091561441a5caf7d816e975a0694344e21
SHA2569af77b166022a8699cfcefbfbfe5cbbfe897aebc542da5f6e58147923157289e
SHA51227caa51bf5fa92cdd753c4c557e9bc40852ce045c71715b2a1d01ff6e1a347d71cfc1fbdcd9d84ed8f2718092744545537de29ef1ec556fefcc9c2ea2d15c36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01bab1c120a90754384b33d963d06c0
SHA1caa69b6dc6d01112297e9212c9f0fb4072c2f257
SHA2560a58f9dad418ba2a38d8a13d4f17afb7f4d953d26b51208ebc13756de580ca3a
SHA5124afaebe096a5848bde5c716f63bbe3fe7e54a8bea2caec757421b7bca04135c1281dc1e620b34c6bd7ac5b9e1b3fb171b0ea532a74b2eb84e674fc0055c6a3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4fb062fd03e12a5a462b9be257d104
SHA1b6b5220736fbef5f7820ce688369e17b3a1bd2b1
SHA2565d8d1966a023c71e565ca735471ba6e71d654b7f757ac1be914eff11b69cfba7
SHA512c15b6ff5ab5e4bd9deb5d7547671571a7b176dc27d3a971d004933d64695a0b3bf8169da30f433aece4c944cb9d3ac013330d2b0508da38cc406bcbbabddda5d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b