Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
ff42506ac9714e3d5191e0035669a883_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff42506ac9714e3d5191e0035669a883_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff42506ac9714e3d5191e0035669a883_JaffaCakes118.html
-
Size
4KB
-
MD5
ff42506ac9714e3d5191e0035669a883
-
SHA1
2fca059a631137a40819967f94e4e3e783ea4838
-
SHA256
1d94af345e86d0950680728ace6818a3453a351477556651f7e96e144a56bfbb
-
SHA512
c1cda01cf4e4c14d153de3eb778874c4e30ef951eedb2cf36158952bb27b6c13209be8c2a338e7c8c5f98d970f0c36adcdb3e93c9c129f1114fe75d52d2b7d96
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oxztd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80E9B351-7E9F-11EF-BF4D-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433802769" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003edacf3ae8ce7b468a7645b4f8ff0321463818b9c9f2abc2873ab86e1f9411eb000000000e8000000002000020000000fd6a8b8e0ab37c15b5a91549b597c58ce0eac94f3b29644a1c808100869caef2200000001f6456d9ede8e1db67d24079c72bcc21a82fed74b50646c5e00c50218e4e97474000000021b29120e7f63a13de564fc013a11b9949e9a5e12ca5fbdb39aade4da59398c00a8e24d587a0ab54ae8f8ef28a6d3803f15af1fee21b6fd90e00a29849718ef0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ffd655ac12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2336 2060 iexplore.exe 30 PID 2060 wrote to memory of 2336 2060 iexplore.exe 30 PID 2060 wrote to memory of 2336 2060 iexplore.exe 30 PID 2060 wrote to memory of 2336 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff42506ac9714e3d5191e0035669a883_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7124d418c25dcbdd76931e8c7b0c222
SHA1e85efed62250cbed77ff3c8818f08734153a3543
SHA256e88d795ab65f06eeac66aab12353376792721ca33a73478c280a5974949a90c4
SHA512b72519a54334d19e486cd9e5f5b622a5e91de944489939a6fae389397ceed43d05ce6481aa743915956c84214d715db2fc99be33decf758e289ae30e91a6d7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66f2918499166915f25a071a34356ab
SHA1202919e1219708ca7f2480c9e857c23a2b6445fb
SHA2560846c8642f30e2ac7321401542d313424d558566eb7b5399227814fffd34a513
SHA512a13f7a73629e7763cea29fb2f1ea5a032ebb6fde73b87d9831a00faad8328a256922747e87808108f205f3fadeecc68bbf1b90335a9c6c93b47dfd0416d43cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babf5f064e0788921fac09db96574187
SHA14f935a319a4aa51d8f4989544eb8c6ba9339b7c3
SHA256c330d0fea97a0ee1e03e910e90b759d9036b69f7c713913ab86c73bfcc2e6882
SHA512c87cf857c56c43d71a5f58cdd01c86a60795a6b260653ca1c2de144e24c0b6947c5cc53e921a56738a017f233478036cd55143a5e16f9e5248301c2972b246db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562716b11a5c9b3dd90b6275453906312
SHA1452911163ad8e12b496e95bf73c5ddda368aaf2d
SHA25690e73996e2af114e64c84ad628dcb7c8e5360820a28f5657951b9f7c982a5c83
SHA5123d5d202f3404c8b47e4ab9efbb1182eea292113c46244ce8f6b0bf5d72c5eca9a4001b0059db55313d91bc1a4a98f2cf4e28de0d9bba65495da1ae0355de5a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b0abfc7dfaaac09ce5e61a6e856e74
SHA11d7edce4f4d4dd17198196a3abf50aee5592dd8f
SHA256e7253c0e4e94e9148948fcc7d9272c4926c5b6318ffbc0dcfa8248121970ccb6
SHA512dbacc53fce9765e9a9714b81825e779f26bd24430b45ae9bcc68ed1520398f1beebbeae791cb1ea77301796f6d442834ed00e8674464c929258fae7750ad8a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066111a7e9181dd019396266121e547b
SHA1db30ceef4812209afb1ba23485755d68279acdc0
SHA256623c74c43fd440efc20c08d657c734104311134512c696bfa369e2a8dbd5ab61
SHA5126ab9bc858daeb55a8861088ffa94fc9cce35988b27af43fbb17ad037eb82f63cf356f7694c0ee6994f2bf44efff84737377a58efd6bb8bdb9b62b64d354e6868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f032dd0b02825dd3372931f192d122aa
SHA16d554198b636e9b84bbc54a91d037871fdbeefbc
SHA256094c1e62c0fd88d9b7ccccf9f4fff1ba3907cab913e38781d8a7e6d0f1a8d121
SHA512cd68414b668fe7f908c101b4d854fb38d475542b0830e0236818e1b6a9ee805e82df06236fb0e784bafb515c6b21d77f2440d09ffda0122dbf02d02bc4d41b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97e0a9291f13a6348959fb2ae90bd7d
SHA1d0d29d095f58fb1d76d8a8a99952157780e535bb
SHA2569e994b54f8c7213a5d67fccaa9951c883fcef53ddbfa7173aadf565889d640d1
SHA5121c6ee146844259cc679a8c6538734980b3d19aa89f80166599a62ef841a21e906ba9f7a3912a60d270d960d96dd58fe9251a34896984e37184a13f62af272f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb7cbdb443280bc3352f081f6893fbd
SHA161154ab3c1a848da608f8f54df8929db47394576
SHA25659e5d1908c2ba595c7b74d09dadbe76541bf224ff3e41868513e5b3b7bdb69d9
SHA512973db14e75bd7c644d42cb8ae38d1c106392014e45da0bd2915dc837c9b0c4cbe21610aed34d85d88a4867fb5301ad342110e24f91105a2fc5ed5c88bb3d2686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6481bf404612da4c0a327fdea03fca1
SHA11146427efc326fd4aab02662d69c1e8de366ad92
SHA256ad19cd0212e5f6cab1aca2cfc989df285ba1feb9bc71092ffd80a28cdb9e8dc2
SHA51201359d1840c995979ecf6d346612e1bff9dc2883210caebbc55c2525665c2e92195fcdf92c523d64d50c720000fb0a5d16a40b5d8e2c193a9a0444baa41b2f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab806fd16b54bae385b1a31433881e03
SHA11b8d6e5a586cf4da777c2e93670be89fff49c356
SHA2564913c17af41893ae641161d8d2981c0bc1268083c24ae6aeea4aadff021df420
SHA512720a311ebfce9bd4098471eedbc0cd8331d6abe552dade2ecfa249fd8aee0e7d57e104185ca3b55b6c375bd3d0c990096a71db4688fda1eed6e690e75488b2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54839115b4a2d47d99a26e2cacc28be1a
SHA1de0f50c96209d47650164bb70e9124a1c26d4965
SHA2560be0d28f18bde73dbd72623e4790ccfcd4607216c188a86eee5e012acb25b8ad
SHA5126b2c823c7176b98dd7511e328c307f5fd9ac317d42668ebe36fd572d1148079640c38523ee5a2d61cdc1fcec16ac51b90e8076c942a108afb9cb0d0e66837368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca663a3ee31d767d693c3460d154c8d
SHA1ef18d2509a30a6140af2788d76886c368f9a2e2b
SHA256551c57d53e9877f256f7ce9df013e0cfbce86faf92b10924092356bf287cd50d
SHA512a6a9209a85ffb438b27efbef39779b9d00e70f1e2bf193b952d826d446cfa40ccb625ef122b42a2ee96f544d18c7c9758c19b604a7f4feaa2a2fb135cde9a2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ebcefd6358661e53424af6da54f95e3
SHA1b5edfac55677d77fe0ee41e61c43498282254ee9
SHA25621b1751a4382244fc73c1bcf289ae550bcf6bbc85a1f9058b034857c25e1cb5b
SHA5125cd8be314c98f72e244c013c56ce19350e4080d239879920505023031ed7ddce98e28d9ec181e93bc2f5ef14406308128898a36d7876c806c75a52b4f8a149cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f028bebee542bfb94263f660cde395b
SHA1d3ae1a33b275a4e53f4c49ac60cc423b7f8fbbd6
SHA256156f09827b5da7602f984b2edac795f8c73d84ee10942ff61a0217ab11561bc3
SHA512c14707df7c6c87890d3ca1e3d9eae60c8025d45bac540463dcc4704c09c9785eb4d99e6ebe0e3eda38f92b2d9f726d83920568dd2f960f661511dda357cacd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9b12d2086466513c91179c347bba11
SHA13dfe848d337116f064c6915c9c8564856e8b38ac
SHA2561b56525fcadaa85b7ce324928c304b97cb2891ca6f281df40f4ea4deb9969938
SHA5127f634032fc4cca91c4619cc4d5b4e2262819a5454436f62312b1a5d266ad4148838e601ac2f4abe454aa27bd205c4d29438cec881cf3502e87816a4b6b384dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce152e57d0040ade13eb1837b5ce93e
SHA167487717e004a7f9a4d7e1698ad363a047f775fe
SHA25613341ad5e827877d649cd835f6656c1b2e0c106413cede586c8109541a84b0b6
SHA5123d8b18769036dc75e15c1ddd5dc64f262cb8b5c7f2d06c8ac030d1e19bf6d6feb27496256690687208622b7796aa0d387fca3c5672e396821a82bfdb3183535b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864368c1ec91b678e635c8f3e83d9e26
SHA12045701b13738c4be0626af80b4d8406dc3b46f2
SHA25697b39d9825028e890b084d6a406b1476f21b70dca1ea24471ae4de903cd3bb78
SHA512b71e0fc596015b2db5c8c9ed6da5118901fe35442d9f11382ebadd604a90ea67eeb3b01f25d22cb789a4c23abb6007ee055a3b7895cfc0d3e64ed8c3c615caa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbd69f6da77e7ad509f3cc6345a400f8
SHA16a83c227888b51490348b4fdb6c589df7e2473b6
SHA256f4c1e7e0a3bdc3709dd066848cc2113181fd89fa4b125a7938ac3054619a39e3
SHA5126c658d7317bed2387570ec2a664e828aa5a7c6bf4730a07c8ca1d6a6d249abd133425797b8a3fbc426d08f1a891d00deab4356f1aba8cd6e0f24e529d4685df0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b