Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
ff3736048d624ae2b049c736644a25bd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff3736048d624ae2b049c736644a25bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff3736048d624ae2b049c736644a25bd_JaffaCakes118.html
-
Size
52KB
-
MD5
ff3736048d624ae2b049c736644a25bd
-
SHA1
e0acc7a3675e1077865eded93afe71709ca00e0b
-
SHA256
269549fa4770f16d157cdcd14267a7bc68616ec2dde9b45852d51fef46cda0ec
-
SHA512
a5109b109a299bf4349853e92ac6857e305ae63ec23907112d6046a77fc2dcd62b0f33e14feaad243431ca228d0c6e7bbec274d28c058b5e6e5c33464b1e619c
-
SSDEEP
768:Svztrv4wXw98zFiKyJQz0/XNO1WcIkzC3/eKOcV:SvzJv4wXwOzUKyizkINI66/eKOcV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92B457E1-7E98-11EF-A7A5-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433799790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000098fa1438d4002c27f47792bdff06c54d3dc4a0e5f4a3ed6d6893848c08a4be8b000000000e8000000002000020000000de13854591d3f130d77080c7418be031efbd28fa1c8eb697e62fe44a2c6de9602000000004bf143f9875b7c50cd0744e9d4605f3e3b11df6cd1bef5859fde402bf914a0940000000d2028e0240311d9be2a033d8332afc46557e47243bc83cda4d4930dda4ae5aeb8bb74b772d0a95c384d5c5ff68166a58d59f37d670538d99ddaeac700065281f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40063d83a512db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1872 iexplore.exe 1872 iexplore.exe 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1628 1872 iexplore.exe 30 PID 1872 wrote to memory of 1628 1872 iexplore.exe 30 PID 1872 wrote to memory of 1628 1872 iexplore.exe 30 PID 1872 wrote to memory of 1628 1872 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff3736048d624ae2b049c736644a25bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c5175d68ce6712bf78957c4cc520ae0
SHA1970c2e2331edd710cc6f3a05083bd3c39f6fb2c1
SHA2565f34afd605e47bf2c4014aaeaaeaf6d4bc0c0859c932c24493979be31df8c429
SHA5123014724ccfe03cc972902bd6e28a92de42f63d5a37406fce1bb5ed6c6b9bacaef1c33787f9afaf13f284cb0c4c1b4c2544ddae54a3898839b171d637667eb608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a91835aaedb122b3920747fd6eff42
SHA1bf44602acf7552b4142849bd3e50420251de8f7e
SHA2569e0defed30cf56a75ad5084a56188d4c70e2e70323c506ef214c00e16596b6fd
SHA512913b489eec6f38daf0974e2d2c13a01dceba1b846de2d967671639cfc8728dc6b1fc54354360f05d967bc17578f3687405c8809ec2a0c2241e187fdb4ce21e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c40d71f8bf62fd4581405298da08b93c
SHA1d616ba15a6afed43f17f1b7d4eaec562fdb17c84
SHA256aaf29bc18d2fbcc9763356c744eb481d6ab6153a34ffacc1564604b5759df62d
SHA5120f007402ced5524aa17603af5ce63beac212a666c1517c54816acef584ef083cdf3d4f86ccbc8a5955a573a62e06cc0ba6027984490ce0406b1d2234efc07bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57250f2e40944b2abd6969d584263ad97
SHA196ac6d9f27035384d5fcc7de5023a8af98e3c702
SHA2568dbaaeeea8ceebe9ece1abd551df8b93219c633534df53b47e5cc1cabebba648
SHA512f03b7c0d74ad0f97ab98724371f960a1e7f9ba59bdd060e26af73fe1b25c31b025f3b82326fea225581df26ab2fdf0dccbf126b365758d39613f9ba00b385080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62a4daf5e564c623292cbf22ffc2839
SHA18dfcabbdf3476b8a90b3be1392c0c4b4fecc6b57
SHA2565d6e14955167106ea69fe17094f0ae986e74c02efc8fe058a7cd72d4175904c1
SHA512d655b2b9c70b047608b81a816360a9e33b5bf9043b9401bff5fcacd06bb106a99a7ef7c1624dbd32f9e79b63667e72a81a6f174eed18067f86afd0e73bb927da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e58c6711f4822caa6f5981a4bed5590
SHA1de52ff90b658ca345954885d635a3e6239fb37cc
SHA2560ca215d9df9a14fad3125d9a235c700a639e4fa207096287665027cb87a10d8f
SHA5128ba8c7c11e1cdf32a4e3c1d434e33cb8d57690cfdf2aee02528399488e45299012406cae6b9a0b81d865b602460eb0bc74e947295ba8393c7b3f8abdb3f7edeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572cad034ebc8b4eebd6f630e64c557d9
SHA13b4ce53fab70a5497dd4c53f532a46971a83530d
SHA256f3f0f52388e64130d677f5c375abe4e0d53dfb2021d12d0af47fa1cf722942a2
SHA512f3012b851cda62e3932f59111c5ea08a83de8cfab15045ef10cadbc0403882c4a6505baf81d4cf1ef4971a272aabdfedb0267a1d54063bd8bca87f55fe8f071d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c29740235ae8c8e1b835f6702e6be3d
SHA10f8f2a0cca3fcc1bceff3d708e731672b11f81e7
SHA256965dc89378bd0eb4c8ef3e0444ca16d5cba126ff875a854fcf2d1cb7ef543d8d
SHA512cde6516e4e846c35b578f52bcdb35c578caed7c9363b0e3474f46f8b33117999c9639d7bd5f103fc58a3019093209b22392cb2c721282f0eabfbb76a3839fb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ccf67e432f1553697f401672674bd41
SHA10daa12bedf7f36793b673e20ee438c1e281b3661
SHA25661d715f88e4e82406319a8eaa1ec591a3f92ab6d162be16528b5a55664a66d20
SHA5125fea5d6cee8c97bbf0cecd99229810800b5cefe3bc6fd1afb305e65e0720ceed14334c8c34399af14b100e0f73358193f2ffe21db60bdc9ced7a3207d5881d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e9184b2e95080f04e556797ae3395f
SHA149d9d1589df3083f222eb39a29185a928a0904f3
SHA25680897ad0f33a40c24586d212dfd1c233dc48885e7d55d53f32b4ac96fca7f00e
SHA5128db155ee7b39552e2e1c265d3f5e01c7ade3c6cf34f3a737c8f43165fe0710dd18acf98093931254921c008bc21f552df42f75524cd73abf43d64e02861157ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95053a58742993bb57faec199347001
SHA16534a7deb9ad00529d221a9de236f3c0de2af7f0
SHA256cecd787ade4cc1dea148f744bea3bcb5decd4bf7b5d52d39195a96121b6c47f2
SHA5123c3579476649f245c39305ea78138b451be5a4480ad8c22f60d184fba1042b9afd0ec725763bd1abebb2d0d3a18a1635a982b0391dfaec4a3f35b51c9fff4cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562caa5780140615de0913903c2655aca
SHA110a184709bd19e14f987bf1f5b3cc328eab71863
SHA256149e5f0bd04b827ea105c0bbd77d54470a0d1e0cf56c39ac8c073050a2d6e1bb
SHA512e2de0989b7aa5ebf99dfa3113ae9d7d5f24c9c2f366ef6dd3369336be6e30407c27a069450b3d1d7308ce460d925eb057f7385994a6346fffee448ab8c3826bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f5481a5683167b8d427bb55d576974d
SHA10de2ae65bb75c20cf4065d0a9bfe6ec90db3aa6d
SHA256ca97c4a484f5c652178f0c4ccbc4caf133b56e3f21cfd9aede71ddb5a9dfa9dd
SHA512a5454526e1b854302a1fac76f6af72c4fb5552a376c9ff4a07bc54b80ca924f27dcac5d04e57f39af9cd47072f33e124b574cee0071aa3477e8279a8a0a42995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e89d9d0aab410030ef20ec8f9652a05
SHA1b83bd45affd597df0647e3b11c9c30618eda3c87
SHA2563bddb600893bdd47a7d8afeeab2ef5e7289f163a48ac6e212170d70c0a1d51e8
SHA51241a4a131d6f6dee72c61d2200fd9fee5a42e6fc577242c0ce56fc5de661d580fe06c18226d57239ca9d677889dda5a3e6165ae02a78d58db42764d40b779b602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda785b6fd74fae4b44d955907567e44
SHA11a829275103d9b3fcaa98057fa2e83f21ab9d83d
SHA2564a5e2b1fc12eb8ba15cdb114d1f093a5e13ca1b2a354b8cbc8bad595c8d780e9
SHA512ca54345d4d6a9749419af3c3912f87859ad74055f0503ac5308e6fbbc06f33318908273614956342aa4a4b88e08e9f9617e5bba29127c8be4b458d15b8937f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53502766a58b6340b6d6f076acd0c4e3b
SHA1bae580c6f481f56ad1df7ab8c5e463626f943079
SHA2568621b873ec667e256b4ca071ee52e247bd384e4688422c6a34c1e345559b252a
SHA5120baa2e35eaa104567b2d85426357ced7d5b8627745bd61cacab3e3acb41a46eee39d3ca367b75408f7befb642dc87ff5a76247c85eeb98ef21a3d437ddfda904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545bf5422d9a1efc43d5a085c8994bbf5
SHA10d82622be792e1527a2dbd2e36aaf0b73f1cf5bb
SHA256da9442d950d655f48a6044ff52d17a986bde7f94460032d37a69b29655b2b075
SHA512c75f30bdd1d552b9858acc3859e3f61a4adc7a7a19b59a3fa112e319c98fd3e3303e27d0c814fadabd9930b24261b23a59a31f6fb19105e02f4cb0816099420c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68f4053aedac76c71a4efaa386198c3
SHA18294f0b18916091b6c8803801de5e0db99864639
SHA256cf7d1ac993a4d2f4dd555dd31e69f72cd84772e39d7e152df8691c68ff9918c8
SHA512c2824b939aed5e92e8dd22e63d2d69e3db2ddd0c1dd21ebdda34cc96b8b3f683bd46d77b77b7df832c5cf7eb3b0a2b5cb9a0ce2248a823a3cc90f2043c95b394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9cba3475ecb87e5f4b0de9723a50ffc
SHA1a062bac2d35a7227d029e1e9108fccfca8d1bf7e
SHA256f72389ef70714d4f7587e6e9df8e0c2ebd002495503d0a85542d34dc7aceb88c
SHA512e5862b7a585d74b1112a843cab28ea9ed24f72f5900d64589e7a40904e4b143e8be37d2b8bb973b39446deaa4373ed4b76201877b0d9ca3ecc0771aa0601a241
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b