Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
ff34231ab7011f4fa07f2668dd46a9dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff34231ab7011f4fa07f2668dd46a9dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff34231ab7011f4fa07f2668dd46a9dc_JaffaCakes118.html
-
Size
14KB
-
MD5
ff34231ab7011f4fa07f2668dd46a9dc
-
SHA1
ec349dad9e1ac913d0c9ab5633fdf629144fed9e
-
SHA256
41637bb93806a7ace94c8a5fa44f9a92e59b625a3173a0c2f097d3104092337e
-
SHA512
4d8bd7cd7d46fd934428ce41fa111c1cd4b3a950d48c49d04651255d47384a3830e528ecc61e95ecb1d661b4ecf50830901f82d8b6ee8716491409a9d5404221
-
SSDEEP
384:9EhyFe2NZWzqw476KJzb2xJfrJ4CoSXcWFa7m9BEjFGyG:9Ei+JJXEC9WGyG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6001f92aa412db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54601071-7E97-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a5ed3f29ebe470cefb6166fe015e778b0c460a3edddad07aa0cb9cce67e7d928000000000e8000000002000020000000d7545a9b90001d9439fca4a1d7dc531ebe916944a38dbbfbdf818ba0476d2d1f20000000aa42a2560b1760c07e82ee9468130129a82d092c020368d407adc29c3961658040000000ae1a2e4b9ec5978b4c2ee97d75638f8121c93b150b7847b93819c3c64774d40aa95d9a3184382d5fa0f0e585cec00d4e8077386d9c13c7e38099cb080627c756 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433799256" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2400 1928 iexplore.exe 30 PID 1928 wrote to memory of 2400 1928 iexplore.exe 30 PID 1928 wrote to memory of 2400 1928 iexplore.exe 30 PID 1928 wrote to memory of 2400 1928 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff34231ab7011f4fa07f2668dd46a9dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f484b5c645e8caf2d245baa7cd694e
SHA12a4f124aacf18f777f728f0059b0f8d39399b2bb
SHA256810ddfb110cefd8d864521296babc13fbab7f1e6417d7cb9b98fbfbb7ef228e3
SHA5126d29e6029158f4e8bb77b8abc3de4c5c46ca100e2b524c93ef42c05614e70a2fc05b54199517c99b62757784d340b0d3977480eefb0c756c891451925b533d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a79c81c6eb6dad24732576cb25dbd3
SHA1474ea5c0b8dc7ef0bc812503c36f2a7b2507741d
SHA2564e0c91d302fda02a30d2b056caeb308fa79b12215b17a3b35569dee2fdb5b0cc
SHA51200f7b67917a2c3f6dc8f08a1f6992c5435fc71e26793cef864c9041d6298e50e1546b2571ae218da8ee0e1ed39018d8b4aed28a18fa495223fdc49fa2e1ceeb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59528c5d57844866ccfe4903e9beddad4
SHA1a8d31bd50a7d1d81c6a51a300a0f401be38d1375
SHA256943c74fc90ef211116c6fc09d9dc452d10fbc889499a2d8122cd325d49bf9222
SHA5126b6fea5f31dbdf86911da738f90cfc9d0fa849c4996a94b256ada54d5e1b866366cafa84064a02311cb39cc6b890ac2922501ac7b6fc3bf87299912c64196ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a8844042e5a336570a1a87951e48fa7
SHA1402a634d1cea5c3298aeac0247d709386cf85da4
SHA25651db2c30b96a2b2c3f8a7857771c4816dc5e7da7237a2fc55cf0ae7eb76137e7
SHA512d5e9358ad556f3473cd01475c0b7f2a14a28c45b3d53c6e7b49dbf2071c928df972d27cf5a0c4d1774a798f72cbbbb67f7dc05d88f998eda241f6d8ae24eee40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511fc5e16c3a461707f21be9bc4d38552
SHA18e2b25b835625aec4891f5f4654a4450f2a14c4c
SHA256b4f086aa3f12225d0b6d08eb43aac05ed2581f3be91c1e50b8f94f76d049481c
SHA5126623a886f5ac916484d0e8db881514c5a02535ea0f7da683301dc369ea6790313a5e61e80d5477ee5c6387963e308c7eb4edfe489697ea690c87fc39f83f60d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254bc5034ac65e84e324f460ecfbc425
SHA13b8bb9a3d93affb440793450523d04ffff664854
SHA256ba4468e5863582d9d4c675e767b6a4e0f5f3e7b222ec146dc6b39050c681685b
SHA5125204952370eb1c77bc26085cb6a96ec99a86ab8210d6cd5abb2298adf9d5190c79d3e7b3774c9c801b3fe38f6c3a9a238b53220f5b1c1825699ff773e797854a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c322dcf70d0a3ce468c13749abdbde90
SHA1a19dfdbe4733bd34dc3c96759d5ce7a2a28948e7
SHA256dac4f6373054bb8e029178f7f1c95b32b5168044ad68499ae866d7a726909c59
SHA512d6d979753f296a20754cae5da2b6aee91ef5af4502daa140994db457877080bb7c247e39d6bf0fbcf6ea8a3f0465a066e1a12b9e21df00ab771716b1fe59cdcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d46d98ba70dec129f3e14299e54f66a
SHA18482ff14504eb45cabd61fb9c6dd7698d43bff36
SHA2566f086878227326889c345b65ee1c963c141a382b75874a4bf8ef0937be84c580
SHA512c8c4cd500e5def2bf25a149088eac6b2b87af901d47337abb7f0e355951b2933d78d2ae585294a3cfdb3ddfa4e59e820dc35df3737eed0c20f9b1caff4dbcf8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f6938e333f1ab9719f26b5aff0fb13
SHA16d73bbb1d39a6407cd38d550fd57b80d9f92ed33
SHA2566895824d5404d8c0c9eb7ab9c83fa2208bfda4ee0eb1a20acb83393fd40cf002
SHA5122c6f247578b725cf85c1bfede4c5e9c3ff7483a076f5c545ec7d68f87c22ae0d29a8fa3bcf98d3021c1ad6ec2f6a2d1c6569341512c79177e881ea6f464fcb1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586150f512a3d9db0d1a440b7802c3a67
SHA19d7b76e39195f7af63a09d11b286138fd446c51c
SHA2568d873a0069d0ed01e88d5de32761d03daf879bc3316334a23b52c07c2ffa3883
SHA512681b37d97dfea640f265a63842ec5f623ce2200e93a5f36d55c95f1af447004def3f7199dcd5558b7f68699e4f1e64d4931160f8162b60e73d0ecd886d2d920d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6be3e61fb6b8fc7edc672d416dbe24
SHA1df9acea2640b174ac7ea83b364597691eb59906e
SHA256f25c72e3a69c296b53c308ab92f4ec92cf20f2f1d89aa86606460922ac3ae9a4
SHA512036dfed922029df457b260aa74ffffe106e550a03b28e49030d61d72f6965da6502bb3f4126476d71e6e4b9da11b099a5f1deb87f55a26974991e96011a9a038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d78359185b01e9b3505882de07083cd
SHA19a29773d3ccdb60665c31a7e3c82e19ed2702517
SHA2569d5dbff4942dfe8343c053640c01328fba1b9fe7d7f78430e41a42e9b321a745
SHA512aca5be790270f2bac163903c6b538f8c310535570ac3ce105cd9f3ac6cf0440a8bd048036852a16b20bca5c4d57d72aecf92285252b92efb5d2e796c1147a8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58356b3a5f17b63be41f3daea7069728c
SHA164bb78b6e2c33e91818fd8c03863efcc0dc053e6
SHA2568894d2bcc838e84bf65a9e6ac9b8a104e1633c5fb6a25b39f910b2555c9e597a
SHA5123f38926246a3f047dace7b6a03572a0d8098e199838191ccd0309973e6ffeec948c03c3f6c12d8b5807fa68157ae077a39106c8a8dd552e5b1c8abb1cd4e1e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe36b32583f2600378756ecdcff4da7
SHA1683418298e16ba0ef710735a7dfcb2c6eb80d563
SHA25699d6d39e658ee55b041da6526990c76a2cd0d68d9589139f0e51c53a895f5dc0
SHA51270dad26027e46ffd2a4f1765b9b037491588b0d23606e20753fe3009baa666b33db99afaaa8ceeaf44989a92be47953bfcb6a8b6fcfbacece2d25bd2ea3c7ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcaca89e1de45f92a91dc987245ef5b
SHA169f61a4bf5589d50eedd979019325c3f807bf324
SHA256ed6f410e295751ee29efa94fd24ff493a8c444758ddaa9758c1bb295fffd984c
SHA512febbd03703eb7045110e91fe78e3743734d267664fd0a3b26af5d0b65ad504c69a65e810f438e2b6720d542f572c34d6e5937abc38a8c1705e9f547285d25e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b282a64d399c826411bcc693ec3cc1b
SHA1f77c7163fecbe7e55ffefde4ec35d73ce1a5a748
SHA2567f95e7c1271ef7e032b085fad56565a1ca84a6e9072d89987ba1f4ff9fc203f7
SHA5123b152c9b776c2ddcb0a45370018519e1f28296b3797305910749d3705bdd5860bd2562ea6020b7d38d42f04590ff91b51fa170b2e8f7b836e22e13b9b6726143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd27b02089a12c60cc289af2cdced2ba
SHA1e65788aa4577776fcb4a8e563b788f812497a321
SHA256763e4dc4b32bc5855b5b0d3211c74d73d284835ca333cc6ae393bdaa3b1c23dd
SHA5122f411a26989d4a5613f1bd67b2026eb973dc3b3779d47249cac288ef94c21b304b11a51fa464283ee7657c9d3cc9251bfaf98fd0107bd6cc162ba0a4a4afd022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1d3c503abd6f23fd709089a4878ee6
SHA10921fd4954d2607b66fdcaab1676f5417733dfcc
SHA256618c8f4100188f6e408a1a735266e282d8693cc3282678f3ea77e81b162919f3
SHA5129913a0c76112736097d38c022ad862a6fcf07e61a5e16376a144e281a4da86e20c375bc65e561a5a2c8f57cea70bb6d166189b9d54c2b510d3a982f2c14955f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089ae71b6f806e08ea47f7255148b8f6
SHA1b7eba4698e2617ae73964e0008e02f3dfbc75ea4
SHA25661fb340253f659041348bd9de6275d77de80a95d56c16202cb52ba424fa2dd9b
SHA5121b0c33420893418b189161efbef00fd3332ef7de3bcd1838eb41b982681650fbe80c8260d50ff7a48683a22ac61b521d154a6638253bf6b4237ed568bbf06d8d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b