Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
ff4ea0cf5d7c6821b9b97d86a9adb3b1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff4ea0cf5d7c6821b9b97d86a9adb3b1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff4ea0cf5d7c6821b9b97d86a9adb3b1_JaffaCakes118.html
-
Size
9KB
-
MD5
ff4ea0cf5d7c6821b9b97d86a9adb3b1
-
SHA1
26c500d48daf0f7bcbdb74c2e929c8c1c4b196a3
-
SHA256
68963d89d09f291f021f0a05aa5ff8298075b9dfe5185ef5d936e111a7af8f52
-
SHA512
be838d6ac767ec1e09e8e3cbee12d742a507328aa067203042790fc9d8dab5632dae7007830b0761517ae903676fa702ff95afecdc9d6439e84ba158e1d68507
-
SSDEEP
192:SI0rIkaniqEAQeUeXf+6VqlpoAj/9zmCI:SI0EkVGP+6VqlpL1KCI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ab60b4b012db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433804645" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DFE829F1-7EA3-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000c187b589f4486c4a9ab9e19e59cefe4f0e969d0d18a70ce5586ecd829f286825000000000e800000000200002000000059a58e40443c37df2d338315afd0ef06dbe0aabd24526853460351a1cad26ec420000000205f757a9f0cd764e1927d0e510323c88ded48b4e160ae96596b7a186f9b0632400000009842eeb8801272277bdfaee6e8977f23db2a0cb9656da6e76cb3124cd2910e0b87667137f918d15df38a23de8bf044f1f8fa72f48cb9e7b5c7d9da7f701e6468 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1876 1908 iexplore.exe 30 PID 1908 wrote to memory of 1876 1908 iexplore.exe 30 PID 1908 wrote to memory of 1876 1908 iexplore.exe 30 PID 1908 wrote to memory of 1876 1908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff4ea0cf5d7c6821b9b97d86a9adb3b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5426bbc778d90516920619a8b9cef0b33
SHA12bde31df50e88809672ae8b0ed816e7bb4ce2e6c
SHA25638526dd9d9e4b90e8195e5886428cc11bbfc5387c591b2ec59f4cabd8bdb4633
SHA512d1d859b5a4b668454344b4fb2b23a6b8e192ba8529bbb0c99a905f6b4917c795c8ea0e66f0554027652276325e15c859d6bd3d0cae7f0ea5f53c07a9374a5d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3927cfe2dec86c176b83c58e7524ce
SHA1a04d7450db0e63d4dd6bd80fc74ae536b5391c58
SHA25644099137419e05da7238b4f74e9c947be3ac3ffc5bafb26d373462cf17e34f6b
SHA512c25115e45ee91612c6bcf04df92216f37edcb51406184bc58494dd074d52f72317fbb990d71cbb6fc326f4649458b1bcff581146ca88e709db31d3640a50b6a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50daf313a3d89d1b48b987577f15417db
SHA19141c561a5a8afc618ea75c97a9cb375268b9be0
SHA256bfe666b0fcfd2002b9d25b28ed4ac8baf8d682419ca18f011c1a9eefea0665d0
SHA5125c0dfab5028a65dcd246084bce8100503024f6ce5afcb716da43a49562810fb0b06b620f7940811b1274143be1e04a17a00bac4f589171beec8d1a5d645d3ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2720ed8282d71df75551e8c150e73ba
SHA17a1a903afa30ec33de1099b478c4bed97984b09a
SHA25692a0ff72a2a8cd3f7af63998a63a794b373c5a91b7125a60dd7cd6229cbdfd66
SHA512bb3926b72ad69ceef7e71238375d4e9b3692cb556c0805c39ca42318526174a738f53608003e876a76f39fb5bbd5326893e7f268022c21cf22d279bf2453c542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa1c5da0b024f8cacbd6cd6be7acf07
SHA1303d31f380e39bff6419b55c5714f64e204186c4
SHA256d2908a3047a08aa86219e6fdd1143ed8491ab7921220cbfafc49575d1fdac6b8
SHA512d05568244f216adc3f9bd8cdb699a2c1f5590258de49778c5a243637ca78890054ebdd723593e2cc11165173bcde200e158f9095efd8c9d195a592573642a3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea94cb09940f0e9627d00c1744f8766
SHA1f28556450703cae558af15770787d4c1943af978
SHA256944b4efca22773e7b65d9244909422299389b2d18bc9280ab32548a4971475a1
SHA5129ecb47dcfb6b91ac42bf3a1852331a055e2a30ef773d6dd0390c7ff5763124cf0ec239f8138fb588b52ff7a35a52cc2c37396c7a51ea542677f2449ecb047082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543213a7faad792d8221645084e376c99
SHA1ae4bc9f6e36b3ccea9ade2c36abae37422c89a4c
SHA256cd319be8f76a20c01be51d36ea58b135d2332379a8c1f13cad4a8ff9a95a936c
SHA512e975df6d112b281704d5996e49f82c8f9eb0ed4abb3ed2be7807e71be3bdaa3bbb3f341a8ac3c26327f18bc5fd0debb66418d130e1f966fea39ac5b43963dfa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52319c7db363b5b460d0abfb02e9712be
SHA1ce1730883a29f12b4696d580cdab41d6791d9e70
SHA2561d2b58fd0fd18d5a1c29015bc6f31b1aa93d5fbaaa20107d19c5e84be40dcee9
SHA51280253892039b70bf59a027c08ec17e6c5280fe6376a48f2949e600b5aa5ff998831edea983099ecbb53b84f351c164ecba869cf726ee53b6a9e2d53f582d82cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555aa01415e02d22c7a5db7965d84a845
SHA14d4e06b270026198b04cbb722490484de0c8ba2c
SHA2569c32ac30b5b6fffb3c29573d6f7771f2238721200754bc73b40e0172e9e66a2a
SHA5127cf80617e4289ee39d341b29f9be4f3c71ac7fe9fc4424acd749d58a46b1a63f4a488d41cfdc825bbc4422df214b58abed476704fa45a8251cd0289bcbd9a2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c127a27e78eae0cf808184f4ab3aeeaa
SHA17c664462e570afad165e4c0a8823fb5e617626ce
SHA256dd55aaef53bb926a9dfc395e9a8ea6a7381d96a370c6e8627fd54447773dafe1
SHA512e1cf8893e64caccff591c84f3b61a57437381843700d6acbf90e12325d95e106a8cfe0a173965144d132b3f31364cb2f341f2860d11ce1c42720a5aaade2dfe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e633c4a946e775b451e17cbb1c96fe8
SHA1a828c5016cfcfd61ef8b9e2eb41feb1acba239a2
SHA256524d439d0d9347a92b4970e111a1c24ce32cfc273051262bedf0eddc0fcaa6f1
SHA512185109be9804f190b3cc1dd5cd339eb4d246536bf0f160dfa52e0aeabdafbacdd39d5b9384da9c70863a12253198f36f619a15e807a4e7881c02e02e299911c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d128e03c5fb86cc39c536098ca51a1
SHA122d76ef75b0eec8745c491b6b529079e26330d59
SHA256ac401ab7e737638c46f91bc237fa771c6a769ceaf9aa98f7b3914d8a64766015
SHA512b9cef3632eab7437667d05353ded57a1692a40b81b8da69ada80f85b83aa81e0d70778ee169536efe72598aeb758cb9e1d82aa7d58e3686251c3c0b8ad254fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf2027eb844858fd1c7b76349e2c8da
SHA1eb9b2e50ab3b1dbd78c2412f337fcd6e77c04034
SHA256ba4ff3b20545ce9b70f23afa46517ac4666f9fb4866fa2c06d9ca02802297ea5
SHA5126fc1c954bdfb7d67e61deb9d3dacafb2ffcb91deee68b8b1a9e8ca049cae3b7270155713e13ef9f6f0d4860da86496b4424527241afad8b0f6945d26bb48a7cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c3c7eceb24728f42980ee71b6eeb9d
SHA1a8b3770091c0cec4dffa2d2c6bf4a252ea28b2a2
SHA25656bac87cdded5d78ccccc817bb95e04672796723a3a37460588ea512da7cef3c
SHA51218c592436e0279ca23de57c7d1dfc0e52eebf91e60221d4a772151014b84cb9d3858d1a4a969e1860d9a8b0727174f99997630eed490d3c35bc2985cf804631a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3b4d016f4d76f092e353824c0cd23ae
SHA1f43ebe73df2c64950c4aa66a88f554f856ee94c2
SHA256760c2ccc45a73569b07e3b46ace41f1dd8bb24288f88d7dbf7d30c8fbc9bd16e
SHA512711418a05505b83ca4f2b7f3f763468fec710a9f15dcc0952c1cee7a2e399a7ff58a1beb188de728fb395914be093333fcd18456adf9120bfd5d286657ef1525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5e412ffdceb80e209278617b6a81da
SHA1ea5d5cc1abb9ba8c48ba549adf235f2872c451e1
SHA256cfc50bb8568e3984289c477e381f218ad45bf864c2cd50868f1271ed60330ee6
SHA5122dfd665113e34ed3a2a46dab241334bae7fc4a7f6d490669c4520e96377caa2169c8f70172db363646a6532282fce3ea05c448990c162a963346181a0dc30ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d345f8fbdfddf59e546a4b047d4833ea
SHA17b3a15a18679e9272c4b9572a031038b0dbe9bd5
SHA256b4723041410108b6a89c3f823a77bea90999e666f772a7fa85a98bd2146f2963
SHA51275873684e620787f3501b4fb67e6f3f0658790d24ed2cfc9939376f5b927447bd88b854121a6d035eba681958bc2eb69fee598512f2f73dfdb727ec99b52d14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694baee24b3283315542c1670455b521
SHA148b9ed19fc4535e579bf7146339e08d9a4db5210
SHA25645b5dde27a23c8a0c571342c19def25f4b9c0cd8a79988a3654ae8eb0e3173f0
SHA512051fe0a136c5a2f99f1130056f7eefbedd44a4f722541431089cb11fdc998f1c12a165cc44d499c304a4dc273cfa113cfeb7f3862fafbf37613e9df26b1e4a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574aaa57338a619438a2226a8ccc18e79
SHA1ae262eeb5869c09872b90150c9f73b422d8d9869
SHA256855bbceb630718449269974f9b2c56a2207fe52313dba28a0a71ec647d6afa65
SHA51223b47909a04766a969bff8906f96cf38d5450656ea1c9ddd10a7d681c562206d8cd0535e843aa9b96ae24c78a4df7f6c5bb06270cafea020cb3a9a0bd9209a18
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b