Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
ff0f1d27d506232d24cb1a369c0d245c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff0f1d27d506232d24cb1a369c0d245c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff0f1d27d506232d24cb1a369c0d245c_JaffaCakes118.html
-
Size
9KB
-
MD5
ff0f1d27d506232d24cb1a369c0d245c
-
SHA1
b60f14c2ab63803f4c3e5d12fb07733ed443ca8c
-
SHA256
6aae64777157bf3436fe41c854382f45904b32cf189feb8b288c17bafd777b42
-
SHA512
801de25dea41e7acb8430937c13cbf1767143ac5b332f0d08bd6c0e9a5aaf5c8b8f89023efdbf37ea62b86434a1d7e8f8a20a2d2842ee6207216edd60019ae63
-
SSDEEP
192:HyzGJu42M2ue6ngMPxMnCQFeh3+7hA7hdAgOCuElROzPPHse7:iMPxMnCsehu7q7w5CuQeB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ea8b58a5058ae64528cf058bc6c92222b822e926b0f19c615d4919ab4c551c40000000000e800000000200002000000023d8a731a2d9cf52c01a74e299608c1e9eecbd537ca236faae5f5b6c58ae08692000000021773a77e2d1bb0d77e9b6db3b083d534469c61be90da0e6e8f17ce4c8eacd8c400000006eae675d05ea3361d2c50b37cf547284711b7a11db081cfdcc6d361b4d9051fb9ba9f3e61c577283fee7b946d8455781ad64a6b002981455bca763d14ed30f90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01aaa769812db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86FF29F1-7E8B-11EF-B33F-CE9644F3BBBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433794188" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2300 1976 iexplore.exe 31 PID 1976 wrote to memory of 2300 1976 iexplore.exe 31 PID 1976 wrote to memory of 2300 1976 iexplore.exe 31 PID 1976 wrote to memory of 2300 1976 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff0f1d27d506232d24cb1a369c0d245c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513137f6dd36dad0e36618c5a5639c5f5
SHA186d5aa4f43c289f2fc89d401e4a69aa5fdcd788f
SHA256836f0b2062d868af4052d400167c65e73a6c3d1db1ce2f9cb6d5657e2e551648
SHA51230dcc56b56ed1391f0e61b817fbd8c65e6f40540d9d196bc315c4db51901ebbad2aaac005e15aaecd2109dcbc3312488a89ed12e0752ae6c241c9a620daf117c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1df56e28983f92a7c97c2b74878752
SHA135bdf44f2689e52e12ac0db7f7faffe50d070b75
SHA256afe5f5e96e06e63d4583c04445ed498e90952e1413c21c67344a20a235fd41be
SHA51205696d8334556a2a1f5f0e8c3cae9c75dfdb6b3dff6b87bb4366ff360486cae66c8c5ff8e1efb8785bee712af688a63c6b43593f22d988d849fbf52936c1ac72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526d627f56538465171d15c357744006
SHA1180047e8161c6e6dc282a836ef950ad2efe1f66f
SHA256d4147935462a70e265059e4fdf4000c51095e48c675a003fcc8882e968ef18ba
SHA51213c9280872705a26ae0b7092017b8c21fdb31b1cdd7a5f2abb2ebc2e34f203d79f73b9e0c2198d5631f7be7a7722fa138293b62ca72f831f57e50365f8727b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6046aff19f3277bf91018325a6b805
SHA146da79f02ca92a3502dd054c9900ba7b35e9724d
SHA25601eaaaaeda77a57b6ac6dc4e5dee781ebba0326f31ee7a6c207928f576d545e6
SHA512569b3d90460b3c7a315305929c89b4fd708180cc5fc4b65e11436b06f28e541f1ec4f79acdc208ed9635c61135951952a3bd61af2003bd1b59059fd6f17f12be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e38b5ddc7cdca5b9fa530b00d7f569
SHA1068688dab1a71d3eda24df9f3185e76c8d0e9d26
SHA2569cdb325ce4388b9a5190bbcf74a619d92fb7ffb163586290408d35eb0cedb5c4
SHA5122aeb4ab95e25626bfb5b1a27753b4872fd84a5f6cef5cafe69b9c7eb56d8a15893950f14ffc29e947dd4f52f1530927e4737435300c820ab90845f5f2ce81eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530fee2b5e95250ea978e99a0badf30b4
SHA16c5a1a83af70e9ea6c77c6ebaee32e07fd78849a
SHA2564434828398778d56cf04c45a13327cb87324b74851634d6efc49e4117d94a411
SHA512188ab3a32f094e7b9851e740861c7bdfc3d7c090c89c16fde42583d029bdf55ff3fcc159b6f8069e18474571e50bf37b1c27a0df1bfea1b05082c6e0aed9bc50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83633d7111cacb48c838d32d368c6ce
SHA1d9119e734e8515721a8659a3111435115b4ff6ce
SHA256a61ad732df94e6b23d9682606ed369c484da4acb87abf3191e318ab82879a596
SHA512e860932912b16628a8f295c878e830f8d1427f99296ee5885757c0d8d17a7c38ee1b86ecb44633efbb48ecf46a76eb4e0e55032ea3c90449133b10d9873bb3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557269552c43c356d19bc0867332cbc43
SHA181730a851b560557b69892f790ed73b2e164a314
SHA25636e0c8b86a5bc5fe67a2e22d841e522c8a6a6d7948e50f84c351828c41d32655
SHA512fe69c831807c4552025d108a06d871ce6adf481fa82f9d769b5e13f85d557c5b53c45b53f7121b407d912eab3f3ed0c3176cdd8f871b5f3106daf2a51d3e5de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356d6d78b889ef47fea4aaa723ac6304
SHA1f962076fe1cfacfe1768aea922eb77fc8c2f2f8d
SHA2568128a813be412ae5e9ece67f6b6b6ccdd9f425ea0191fa31fabd37885a7cbd4e
SHA51222527be926e29c8ec9db67a8f94a843328b5cb7a831edae1fe8af6e379c7bbacbf3f9726c50eb8c87213034c848e8af1ee216701f685dca2d802ce1df97bbe82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce107d4e6cf7ce3654885179c608767
SHA155ede5956d64aad7e4800170c6c5f504abd10dff
SHA2564f8da6f74594805e92e9bc00d9b73e7eb9a8817b7ca31215b3b433f4002152b9
SHA5122699e455d929f893ec1690e810ff87d89ed6ebdf3f16e812c4a56530649fbb1ca6ac1986fd666b4ea5de25f00e5c4b13ef0911f418f0c36037fa61f0fd86faf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f285ba6f2fb08c06042bf390cdd034
SHA12af806c56402b1f300d53bded3e4691867dc688f
SHA256a6a57de8b75382e021fe1683615cd52c1c86d122210684c8c2d442da1cca83db
SHA5123bc5d64a9369396ca2c505c333909c5d13c3c3c799e11993d44879f97591d27df518ede2db6db4466ee18c4852ed43d263e65f15627151b67af31fb4bab2a7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5899c9960cedb672ab6ce11c28b51ec39
SHA18a6fa3ce70f0a1035a892e9af823eaeaf0e9df63
SHA2568e95f5cebf1523d4f1f8c7c012b21b7940ce0581fa8ac8ca2f16c626414b6c9b
SHA51250506421331298395db83b0bd53b83f91ce2ef1d3fdd9fd6e7040ebbe714230198f20ced14aa7d522b4ee5b6e8c0f318cf11cef0f8d4e116f929cf4c1d30dcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160dfea7956a20df29b01fb5fc32aeab
SHA1be228a819669206084109561718058fc989c2a85
SHA256d9e4e11c6bd5ea904fa0b955f9c657e3b704d7d5eb6fef3c7917177505456df2
SHA51251e9f9f4a3845ce46898f9f91352af117f96a83a1cf2357dcb87afac3a0c1b9513e19697c026b7bc4214eb285f5cd15dea0dbb8982f015282a0ae0b68fd321df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd8f7c7eed609bc71c016e44045701c
SHA148ce10a7e2487d02857e77fef9aff7ddc1053d8a
SHA25686907cbd0fd55d685551872c6fe8461a55a8dda0cdd64f87b47eba8255cbb305
SHA5121feeb9a9480133a0775d220d6f496309ed7f1a7b77034f51d88010a0b5ae3c3ad1213bbadff50099e569b8503a1b278e64ec02dd73c5575ab34603885c883f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d5cde22e60a2feb8672fbaa0ae3c44
SHA10e673f3d0a1aea9dfc5bafc575acf37230000ec4
SHA2567944a63c68976ec78db3237a8d12be6d18e99282a2758157be8603b14480da57
SHA5128c793bc3b59be2bd0c589d07098829ebeb4627d87ca655aa6ebfdea989c1cb88baaf306092668f3b4a6a98784ae78f19c72929310d123b698246a478900a07f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c597cf1820bee481e8947836b1d02b
SHA1bb50bc9ea88eafbe9724640ca489b3efbf1ce7c4
SHA25616f30977546541697e3b7042b45d4f1addea52fac5df63b084c4ae3f13c90418
SHA5120c6939809ce2afb37208ab86b9e256670c4e16ebce6dd8996879bf418f4539552ab5f5464bbee82b9e041d73dbf360bd4511b356d61876786ffdb3356a221af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518038598cb2c6f43a31e8d2479a2ce55
SHA1365f0956339dacfeb2c773a114c00d6e8b84180a
SHA256336b1849b3ea626270c4d2b743503ad3d326b3aa8764b4a50423a003ba0c5dc6
SHA5129cf23e123712b775ff26ef92d865c7122a6309f08445fbfcdf4ea598795f2dba0696122d5a61a1ca3994fb5d54f47103fd922026e03857f2a0bd61ea70f79292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154c4d2c7094245855a2b1ff8cabcdcf
SHA1937293e2aaeae2a85fe9adc6c1aca562db157f1a
SHA2567c84a3dca9a8acc0816b7715d9ed842ec6cc2e4f900951db1b604df79186d3e8
SHA512b26cbdd0d1f1e25986197f52453317be5b636c22b89a6ecc59aab35353474d102ea1bb2232a8bf3449b6a349569ad3b6fa3d1aa28a1883907ef59f37b9685cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5667b17161621565877f25595abcdf
SHA17d23aceb990bed954efe28ad7df3299006014d29
SHA2564aff1501254cbc4604b1b04df67924bc0b247d1c8e45fa3027a1dfb07b1431c2
SHA512214e0efb11d80d98a7c87dfbeb5c4ad5577efde15a1789adf459c6680bebe5328f6fc8e5ad50a95349d3b87232d6e2e5ee900825e39e4fb787592069a89be0ef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b