Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
ff3641474a29840e465ab47fa2330dcb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ff3641474a29840e465ab47fa2330dcb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff3641474a29840e465ab47fa2330dcb_JaffaCakes118.html
-
Size
3KB
-
MD5
ff3641474a29840e465ab47fa2330dcb
-
SHA1
3359919d3c73336971e2121199dd73db2f01dcf3
-
SHA256
22620b12fd8be44b6c64cd1baacc0f8ee80b40f91d43031752a466e5db65c787
-
SHA512
8f7a7d0768b4dd4132c39bbb8f15eb44627c3ed71dc1a2db7244a13b1837bda83091c94222fd960ec6a68c7b396f2ac329799e63edfc390b38dda09e9779e9c2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d747af0582f9045c389dcdcb811be0763465d29d127bcb986946abf0bf8c2953000000000e8000000002000020000000f6f7e390e7e7c689bed5e0b3a39e1b53de563cae8e46ade8ad7ab35268b694bf2000000038c24455977dc1d7154652db23454dc2aa4a5a048fd295d8b4a05633f9aee43140000000f166020fe6803fc1c5eada6b4e822283fc31d558117628773c4e987ec6af1fd1de6a79ea196bb2092d08b5083cd3b4c4ff2ca19fb5bb20fdb5a4eaf1a77ba108 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10bf88ffa412db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29322E51-7E98-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433799614" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1884 3032 iexplore.exe 31 PID 3032 wrote to memory of 1884 3032 iexplore.exe 31 PID 3032 wrote to memory of 1884 3032 iexplore.exe 31 PID 3032 wrote to memory of 1884 3032 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff3641474a29840e465ab47fa2330dcb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512480838545a7c5f521187af7464ec91
SHA186bef22e0e57a2d7405cd5d67de760846ad873ac
SHA256ad33242acd2542c547b881809fb0e6bf5ed05fa714fe27233bef4461715c0cd2
SHA5129155015114de9f1444a7350bd727157762a707902a6aff4792ca8aa184d8630a476d903e055d84a3c6404648b6fde52cf77c2e2618c2c7ce84286dbf7aea9cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90780599acc623e393b51d5fb805188
SHA179d27fbf47c7e07c8ec2e602e172c27aafeba566
SHA256756e7bf219f6e377627e678e43be9d1be71241a5b172ace29c80bceb3cb78407
SHA5127839f2040d2dea7670b097d078ad962ca206767dc68650374d1a75589e8bd87da3a1a68ac964c753a76cbd85151bf15d8696e3e42383b9c1a04d845c6c42cc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8235d2e2870a96639b123cbcbbaf25a
SHA1b5fd1292bc505d33556ec96cb4a38c83596e5d55
SHA256fe34ffa02eb6fcab17c5631957d16488d8bf55a8693c235c575b584865ab548e
SHA51247f8a40c92464d47a3cfdb105f784556d745f987764da8ccbc74f2584be6295e5f2d61d03dc8f01e5a35a02801c7e216a1c067d36c0188a082e450fa8312c680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075da162a468055fddb4a99d667fe514
SHA16c9037fc2ff67f42f87d23ee238b18afd784dbe3
SHA2566142e71e02ff0279aed25128d9fb99cc88aa760df8680121f53a82c1e0b43a43
SHA5127c97895049c9a156a2cd8ba2f1d9da074e6fb733b68c3d8dc16f45dfc12408191145f7e392d8edc7b30bd69736c91a65daf673ae4df1ca4ea417dcfd858a7349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59238e67c8ad4a0ebdbdc5fa84494164c
SHA1c63637d69371d9732bb7b44abab6399e32154307
SHA2566f966649f8230475864d72b8421d3aa0970c0b9070fd6af98bdc0daed22b2f02
SHA5129bb93d39b04359f0b78c57a41e161022fdaf29fc35320b90363c668c51565f3e0ef2905c269ae977bb67cf0978a6b65b6dec7783edb0072d83e8d1b4be86a67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9f78f0b04856933bcdb01a26ef37ee
SHA1f01d93b21bf1b615c0eef83e84cc199fee348171
SHA2567698ce3fb949ef502198b086b407c71375d1c90b800557510563a488d779af8c
SHA512818e65a43e9b252b2e296fe7741710dda7f7069b81ffca28734dc5e1ebebe326351773db9629e195cbf2b8d55d2377438d4743207aab007814abf7900c459d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520105ff210ebef6ba09f765d00d7cb0d
SHA157c3aecc1785aa50e91e072c6f865eab38eaf18b
SHA25665348fa8fcb1c59d4ad9dc9e5f78de931f199b52dcc67c9831e2b1bd7f8f8a11
SHA512733d1abdbe2f0d888d8d8d591bb7347174c7ef2b48ad385f2f31246bdd962afb8c93c2518ad584014a50703e989b1b2b5f655265f34961adc7997478200620ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50467bc7d229b1903755c077fea6dc1d5
SHA161cec44b039924b490a14a34e58cc048e167c000
SHA256b810a744036a85d6a8ae4734c33dc247d3f7c1ce1a2a7814093e1b340cfbafc6
SHA512accd33af53f0d2e10d87be0c7033d73e1f68daa529aeefb28bab130e852a5dc609273082a44f398f265879caf489edae38d1487c1ec4fbb0c21801847f7e2d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cefca500bb7d81e759af8d131be822f
SHA1ef705f8c9dd536d8ad492eacf6ebb2832041c672
SHA2561b442514fd90e5f4f029669c3f9a81004c1a32e0fe11768f11f47f559432d7e7
SHA512aad6cc58c45d689b496f6ca0ef77947f04a137df7a5524c5cdb6ee82f7efd2bbb2a3d77428245a8c0bdbd0deed5cc82ba476c7dca7436de970f157ed3fa0bc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538eb09fc4f6c0898fa7380fb1033728f
SHA196cc91433fc4a47430e8b29163f72426447ab0d3
SHA2567ea8f02285ed6dcbb5492299e0484c8d79e2cf3d49240df453107dffc0751019
SHA5125bf2460891cf90b6469e657ea4be52060bc210d635bb1e523507a08e9d9619cbf829ca08232667c7183e93df6ded52d7faa70183ae2a767d0ddaa4c7c38e71b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7bd5b7de84d9b6e20e5a949e6b393c
SHA19dd5e0297012e7620cb50890cd81215f5251dca0
SHA256d819bdad09e1607fb209fdf7b4281d32bf10a7f9a5177fd9c8ca66b79e121638
SHA51204a087adc9c159b2a14481536d876348e51bbbb3f4f8c949e03192d8efb8887f83451368cdaf9a6100bf4eec55667e7fda571e24f7b8c1c11f842790d1220ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5800f573bc45415ec137d370b9cfaf8d7
SHA1862a819f474b53e66bf771a6c73d83d8c2873dbb
SHA256c38eb2f7f1cff16e1200ce3614939bc8718323958a03504472b584d76b4cde39
SHA512a1664aa77bcaea4802d9430a19fa5e33dbadced74a1de0da21578582903f7130f7ac836102b5ea0fc6d3227c9556628622eb024ec7bd499fa2526be71bdb656f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5e2820e2f3155051ef0e01633315ba
SHA197a5bd7d8fa3037f2a11d676565643e3fe0355ed
SHA256463a9178b02eab7f4e7546944b02f88d637289d13aa3320a7fe77d8ef23df2f6
SHA512fce17039bb361eed67fd4fdc3d44005a7189f758f43a0ddef04ebaf12a422437c1957c90f76d129ae44bf5d353c2283826a6146edad59dfef4b7d2369bd6ee6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726038cfeccfe772b270d6741203478f
SHA1d15207a2121c968030bbb99d5d27c1890b714020
SHA2567d9659d616bbc2914cf7e1e9c83fb570689f984d0aa4159571fb6bd8713a8b70
SHA5127b78df566b005bfd3c5636a92d96236c6783d28b5446e02871947b85ad36b7a23d0e22e0c5bf4ff4e82a6fb6863b8dfc045ceb75a52aaf47b2e006ca109939db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e825bdd93c7031d3ae0dc12cc7d941
SHA1287a01ccd825a048c22550b6ac05a1c2e3f52cc9
SHA256133f3920c8afc97ca3e158970f18a9245965ff9c373c04ded3c7a4ea2111cd58
SHA512cb568a30802fc6c442e37e5e40565aa810c336adc8b63cf029b50c791dc9b9c10a87b758f40cf24f26a921393c4077fb35549305d7e9affb33f48128080c2d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c9ddbf51635af31ab161c26e5f5daa
SHA1c2f50edc8bfd25e392d1eb6c150f5dc950f31714
SHA256e6306f4ecd1db2eb3c2d3d69dbb3efe3b8f3bbce74c4f38b6a7d721ddaddc16a
SHA512c07eddb7dd8ecf88d1e96ff24ff620f7cf0742d9efc903cd61109e451d7547fecbaa63e871e4e265b1867a8852cef4682a74274c1c1ee02002656939980cf97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1f6778a1a3e75811c6647a5657c868
SHA120a4640882086f44614d83300fc7ea251de7f264
SHA2569273d12ff7d25fa92791f187c3925c1943fa251f493ac0b65aeeb52e4e1e159b
SHA512f444f972c41d91c1c2345dcc9c2d46595ebef8104eedb8f3e982ef0ced9b485c095482fe8f50ca76d73e0cde2c94987f62d2b02412c3c895e8146d0656c7bfc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f410f8ed38135e2b3b2517605a5eb51
SHA1d81bbee0b76497585ddc7f39f83059795f4a03f5
SHA256760b1758dce33592106a68ec1b40c81cf133a789e1254a24b109dbbb046ccf70
SHA5128dd86b5cca1208c204f1748e17eed7fae14a2ea50a58a3427be18148714442c305f5e9e705cad3f59a5ddef80c58db69f0d1d231f77f31ceab1fce0814d9a5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763a29a9986d0fb5a27242af9e7c5de2
SHA1655c0b89d3fa7021db57b0525129d27dae3b49b3
SHA256acb1ad296de12c906f4eb6080e23f67458397aea7ced930f826f0a2be18a81c2
SHA51206f922e6aba11f185319ca88454781b0506170f4ce12581c6d94b0c05a9262cd4776429bb1be9ee1d443e4295076e463ad64e133010136b9e36733c6979d2964
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b