Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
ff2ae67660b6859d6f748901583abb57_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff2ae67660b6859d6f748901583abb57_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff2ae67660b6859d6f748901583abb57_JaffaCakes118.html
-
Size
9KB
-
MD5
ff2ae67660b6859d6f748901583abb57
-
SHA1
59065c8e72045be45e640dee0773ee099ccd8eea
-
SHA256
f2ddac25e88ae3b34f5eac9bb7bd1578f1d42ba0475c66cad41897eb86534252
-
SHA512
b19cc7aaf49b5118de6e899c5373b886cb63740b41dd5a5acbcac36fbc130f07c843765586fafc2bd691c527afa9c2aa77182bab1cd61192ec47bc45338ff89c
-
SSDEEP
192:+hngNaC4RuRd0yNtIg6pQv0yfouaTRrC7D2AX5sB454:+BZyn6pQv0ywua9rUD2AX5x54
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433798014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000a6722fdf7e8f96a3875f015616f5e7872e36a28f0f999b8c20756bfbcbcd5353000000000e8000000002000020000000288285f2bac29ef30168ab320ea8bead328d8175fe4c2fc4d24d1a6582ef274d20000000dbdc9f9dde493f99241800e5da942d58fe0f30df0361b8a7fdff519d613ebbad4000000002da826f6af64e6719da1aad5264a5370c09d5bd4e5602dcc27982b4666793f319d8d9014a67ba2a11f19febf78ddf4045c7bfb0a36bf3d281373e6ff14daa26 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60400344a112db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F87D841-7E94-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2872 2704 iexplore.exe 31 PID 2704 wrote to memory of 2872 2704 iexplore.exe 31 PID 2704 wrote to memory of 2872 2704 iexplore.exe 31 PID 2704 wrote to memory of 2872 2704 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff2ae67660b6859d6f748901583abb57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59975796dfe466a1520224fe92c8aa1fa
SHA13beb4b010fca1db09e74f942fc78173639503fb7
SHA2561a90dd310c0a660f8bd93cbed9705077af90ef9410f533fd600d7bb9c1b6a2d3
SHA5129a3ae8250415a16c21596845aa40f9c5fc19243954bfd73f1d91e9dc3f7bb5ad64e5596055c74351f3d409f8c9b9c9ba4c2f56bb54b39745d60aba20124e0f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c8a8fba260f9f1034cf08b50bddf1b
SHA1034a461474d2a24e50732ec014c4d1fe878ebd54
SHA256529ac21b8c2deb794b8c2e92ef848c3e058c1ecd32db14d3aa1bd3223d20160c
SHA512a62e11de8f3111b8bf91d9755146d255cb48d6561765eaaa5881693a0ac9aa56458acc1f63c397327adbcf2bdcf0d0f8e92f5de6695fa49048b3a2290e305970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55045ba73533b5b66fbe3f2639c9005e5
SHA1509cca065cd28669d9d1290ee7c28a710ae0407d
SHA256ed4b7a625d52edbb218c7c8ad77a2777283246cdd275aaa26fd555e2eb369c72
SHA51265e6898611eb7c5ec697a1f3206e1dd7b44fc2ffa22f210b16d4e9e5f0f9594d95ae3fccdc79fa7668d5fe5232818672bb377f0c4ee8a1d0e14831d20092930d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ad9a66feb767cc67e9914d73cdfeb1
SHA1a5162604a4e85a16465c9cab95ce3f59d53692ce
SHA2561e1722907fdf17f7518db27f829af40c25d84a944d687a222c4175f1a015c80d
SHA5128e6191459dac42a69a8e34984911eb933851255473ed3dcc0ee6261a96ef4773cdbafa23e5ddf3cd1cfb726626757d510e2d3988c3ec4cee6327d318f8bd9079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9a86757315714831f32749d828b67f
SHA1a41ca940eb30fca49aa105e58c4427f2f9e326fb
SHA2561465ad3be46788238e3247c1dc65572fd0fe4632082a89975454ba7189eaf02d
SHA51274fc397a20f0ec0bf709b346d3f7ada4958fd4a88fa75a642d0cb2773f99d639a3725414c881eccb1f86a8fe4db2470c59771622d325f775ea88b53d05869709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cc8998eaa7f4b5c9f40fdd291b8f90
SHA1496ae288353e0fff4b5134e8b59801542468d165
SHA25626baec6fdc9b27c3090ed72ba0c29941fb1d9b5285de2bf1c13e944431f29b32
SHA512f68af16babec399c3182f501205b096f0e7ebab49b1a4526fedd916c6289c3fcce30cffa06c9b9445aeb87e97abfa60a8ec0e2ea4d9cf785b4ef708de4c0a224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0fb5e437b95c1bef3f2a21c0225340a
SHA127de6a44a9f1214fa65e68333c0295334bf5fb40
SHA256119ef86f23c92c8e7f23b25069e0e964e1d319e999b194db770e0948e6063aca
SHA5128626940624a5fccf6fc26ede127666f761e68c4caf2038de6520666908bbcad9308f028e1321254a2b773a26516d816b39d38c1ba8f0dd2ee4e00db83f345f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592aa85326eff0d5ed60d269fdeb5f1d9
SHA1c133a19a1b0a031ef3da42a0708287eae61ab99e
SHA256f03b8174b172d5491d6ec9a2efc50037c126889eb0a201ea556b9253db8b5e4f
SHA512fb6fdc313979145ab9bbc98f1cc205d1fa55414838408d7f99082ff4de0f4e3054c646ca6453752bbbdbc4ca59e6d47a7edd302bebfb0cfd9f9ddd2a30942b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f0c8732a9395686692c98c2f793812
SHA1b4af894dbe6a9744413405ebaaca792fa2a3d54a
SHA256759379ab73055753fdc682afc33812f47c2afbe97e74f7dd6e27de0ae1259c27
SHA512bd49d39abcdb12028a291b469caaf95b1aa1643208dd28d546aaa72f70d0e229fae867c35ba8671ec76e61a11cd6b744fa0db82d46fd30012c27e9a095b16556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec15ce1d6b836c6d38e5889f30162d1
SHA1497d286d89e1fbd1e253f3e1e9ba3404eac47854
SHA256cbb5fc74d4c2ce73a6f07fca9c4b04a9906c142ef550cc5f16ca572740f1f343
SHA5120a778f87e23ba0b35790cf08839c6da08ebfd67bbf2c124a646b4264b5ebbb9a1131ce7552e48355324f847ac3697a2b0f3ee7020416bc7dd7fcd74007b31a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183cab660471cf930fbfc6e3549dd5ef
SHA11b513153caf737bf2e82958b8c0a2c3518000c4f
SHA2565ffc8498f5156fcf996e25a49298f32530ceb1422ecd31c0185f3fc528f9a79b
SHA512739020acb0a777321bf4f7ee24107fd57f71a41b136440b54b1515fb479eccb380d4ca8050f9ade34e8311f327d69908728fd60f15c610da6ff6085da8104bb3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b