Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
ff5572b874ac6d13e0c88931fc95d3dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff5572b874ac6d13e0c88931fc95d3dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff5572b874ac6d13e0c88931fc95d3dc_JaffaCakes118.html
-
Size
53KB
-
MD5
ff5572b874ac6d13e0c88931fc95d3dc
-
SHA1
b8654654f02a27592fd8999de8a319b16c6878c7
-
SHA256
5ba3ac8cf5fa79e8b8e052f9f82a29284415bb80af2d30efb83af7b36198f852
-
SHA512
d2adb84542d59ad0f9165cf16a2a810cc70237c4c26c2a299783727416c23bd4af9412942c4efc7f6df54d979fd0ed318023309f0cfc78c2ca516a6a783ebb7e
-
SSDEEP
1536:CkgUiIakTqGivi+PyU+runlYu63Nj+q5VyvR0w2AzTICbb1oj/t9M/dNwIUTDmD5:CkgUiIakTqGivi+PyU+runlYu63Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FF2C5A1-7EA6-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000009a31f79589a39a8673603fa753e31725725bed486573aa2bf3bad38c818454a1000000000e80000000020000200000002c8ac004d43e5a408ea17a087da2499a8e945f0b180eb766fed75a10f76764b620000000b30bb9296a95e6e09a4ebbb2054d3f2a01aff4a2b69f46f40232164361a3694c40000000a7be81255ed1295c16573d1755bb3f5afeda4c53dad5864b7b61a28a9ebcd5d98bc5799f5d133a51a9d69cefc30e26f6e97279dc721784b4833b5fca4b2e09fb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d9b125b312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433805692" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2676 2776 iexplore.exe 30 PID 2776 wrote to memory of 2676 2776 iexplore.exe 30 PID 2776 wrote to memory of 2676 2776 iexplore.exe 30 PID 2776 wrote to memory of 2676 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff5572b874ac6d13e0c88931fc95d3dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543458c3dee897831bcbdd7ddb84b3d3a
SHA176d2f3a5feb8eaeb679787a2627d447c488acb54
SHA2560c91fe6e5e77350fe336e52f4876566cc040de92bcf76246c58c17a287131583
SHA5126f6124daa3a4e414d54c160af681841f3c28b529caf8bd4496667eed791ff7f4c9b3346fec3b4861aab1dbf411c6ec7bff59100ec84861c1fa0c82b7df5d2112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7fcfa6c57eccff28c8ad812232fccf
SHA1f0043ca28cfc826bdddaa487d232a6c49b33a12b
SHA256f92905a3bfd499e25adcb963fa3e1cc3fdb5bec0c2027233a2f9b1adf4e2202a
SHA5125afcb09e7f0711aec316a34d531841b715655ac775782e6749639d5a0be8973cd4bad58ed0b6b303cb2a7a51dced670bf7b74fcc92aab1fdcc9e9cbe52d84f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3224c4aec12ece2ccffef186677981
SHA15c47b3af18e5140a5d3a4a0f9a0f30d200275816
SHA25649938a1f703692e2522444644d8cbd3fa64e7d3aed722f5b543f3701398ee0ab
SHA5121a7af266b3ae210c59444f7932e6480fa24560cbe31380d4294391f9db0db428e9e49792646d5229e175c23cce1e9e04a5fb851b24b39184c44dea27aa8f2508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c84415390bd7063064a00b26d647fd5
SHA11e00aa9ec8feb51ef8dbc9096cf2b35e50d866fe
SHA2560881cbcc05d7d39162bd5b0a09c914f63e6f17b5d265a7df7be2fe9ea42c8471
SHA51288d070dcda79fddb95a0c7ce21ac12b5a6f227f498d2770630aca68b22c7e8df541563532f96c8f5d7a07a061a9a4ac589be3e1a7b5b287132ca77ab88a7cd6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b450d83f370383cd6b04ecf98c688b16
SHA13e168364936f285dac9747730c3ec91c0167b7d6
SHA2564784b12ca0346c0779b1d83974fbf291368d123232f5c726fc04638b32ff2a4f
SHA5125c2c6453cdd1f9a9ac7ecfa74dc77f37ba1ab5643efac727468b84df6a35d8e5d9aac8544f81aae48658fe56af669c8218b8b702cc2048a81fa5b1e0ca494112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfeb2c5dcd293b9711241e264ee7ddb6
SHA1f02b6a0bd2f1915908d8ac8818c943e1aabdbfb9
SHA256a0babafb1760f2e9c6eb8c2cbd8bfc5e5b29a771a04efe229af703834f9cc2c0
SHA5124af3557dda6858811b1c358f92f24bbbe343c37fa3e942ea513fc2df4bcc2822b7f91192870fe026ab1df25dec8ea3a585591669324932e93ccf885c122bc170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d46a6e87a556d25a1259d4a032c4607
SHA15ff74d3ca99f52539d6265eac3f8f3ee22baef54
SHA256fbcb8b626b98d554c552eda841c885f3e17ab363e899548f19019dd71f7cecf5
SHA512fba3e15d5f3476f8578052b74ade0e7b2adfd68b1309fb97c7e61f0ae6e4e8d65a4eb87c478b9fe572e3cd3d7bf9f9e91eaf0928f8c0140868b59fe3d71cfdd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ed2fffbd634551635af0bd075eab61
SHA17b1c67d17884efd2c820be8fc8507c839c7c2d20
SHA256ed0d2c79a0f8872d35095ac37dd9e2eaced7aa05ffb96e64a8150301e3941531
SHA512ac322a134a36c45b07d8518db281b4993c1a59cfb83c626871378184b03d0e15a655baaad526db02fc10aa091d96780c187541aa2e1b0b0083476bcde03c9c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53772885353fd5da3d5fae098e500a6dd
SHA1a4eab1181e70dc53861c32f3c5eeb7ad6e70293a
SHA25663a8971e5538cc395c5ac506deb387890401278bf3b0a68cfee9c60de543178e
SHA5121d24c2db906b056492aeae802e1d2b0ac24144acd2adca12c2dc8aa6823e5b17e6a82f2b82823736b684decc86f9befb7cef244bc33833a7b038b3093d82caf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d5c956f798d13930afe885ae28ec92
SHA106452208597eeaa4f64e3a88b3cc2931149c835f
SHA256c215b60224cf1629e0afb4b2be8b1f62d481957e3bce0c7f80f7a9ca4a6b4f25
SHA512130be37cc1239aa1489339acc217b9f63394f2b63d36dc4b6faa2780e5cc05587acc33175f53c2b81848d346c4b9cf737ec63bfd22c4f54d1d9499d44e18650e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa90aacc85da56332235a9f4caf51145
SHA183305bb7c434f8830bb8c88995fa8f297228558e
SHA256275d3ef2f85214b9f3097a85e4ba8a72d40640a8585d190c23b0716ed03d9051
SHA5124b753ffbbbbbd1450ffda6515b47bf64f5abab09217f4905f76ecff5fc0fece97f95a2ad38d357b7a80393dc638faf7dc711ac01d28de558c2a7b12148077931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5a3129f35ad901d6aaa5be5789693a
SHA144fc814e0d443200354da92ced5aa613468344c9
SHA256fb32b30cd70f4af8e01e0636c67db79d3a0011cf0c18885b55ffeaf412810d7c
SHA512ea42282b5c87d3a752431690b491604b956f4ce4c0ec0758b8978cb418a01808f7156e86dec1a1ef38fd48ca9c1900d419f1c1ee065aa9f9199c775e6b46003b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58858757c97afa69c8fcd0ee2ebc83216
SHA166b4982ceb0b376ecc7fbd7f109aa95596e4df37
SHA25600a402cd2a287b03625e5944ca3612e302341990d8e3e74a8ba1f8117c6623f4
SHA51244dc55a043c89d5ca2f9f2576406026d16ce362448186367dcca4070aec92a07f8ff81b9d4920f4a66481887fc2d47fa45083f7a49d6d8b1443484d1987b4f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58e9fed44ff6431ebfdb79f768369cd
SHA1bab23cca692eb0c21e580bf582ddd613012f6c7b
SHA256341f871b7429322b7c5dc80883bcd13c47a9b5b1eb89a09f565ccddd0bc83a54
SHA512471d9449eeb0952f5ba8cf3e8e1be4a3c27cce04f072d0b481fe4e8d9c6c13a2e29ece791e5a9e3f62903d71c43d9bb0ebb0aaeb8c9d863db553cc6a5ad44d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a61735272d280568eb6346e8d0656b
SHA1404e644f7c6d7a7185f2af4e3771463bb9cca71b
SHA2566605379423e0497d13705222d6ad9ef28092dd6175b306958f635cbdb4c5586a
SHA5122bebf503dda8820c186bd05dc778d2292ed4d51114bd64ddc144a4b4b73780a2520d49409cbc3c967193797f4b83922953ffd8dee7a38e597387f946ad34c139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a0c7917b2a7d0851358cbd17ae2aab
SHA185fcbe4a222140f48f2840a20f1c0be88c5b27e9
SHA256262f4335488313b96e915b655da0b5bb3c8a842221731bea5bc5c38e09a5c281
SHA512d20b901bceb13185e5420b5c759cdc7856ec0a723b11694602fa4c5fdce1336f20de25c2ed459de02c2249ad53bf14c2e9e868a4dffe455a3527ad5af2694146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59268a645d86857e47715af91fa4ad34a
SHA12787ff63ed346166ba7aa4684c97448d2185c0b7
SHA256225dc6425a8fb54ceff5571ffa2a7b00cb8248be3ed54866eadb2767857e8092
SHA512692fb2f335986da26a1bc95f93f91f041fc1075c0c5b15892ebdab35e0c5ac09f7b23823e1cd076f6693a9a329e9df1deb0ab1d0c91d52e996ac7dfe2fadb7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518dc55a4cd83f33f7809057bbb20fa3e
SHA1d342877068b12341fea069cfbf804151203eb201
SHA2563f3d252b8bea9801e696dd3af2b03ca111d553024b902b3ad2feddddcf9322b4
SHA512e2e391587ee412e9fbf2153e5057ed9c80e22866c593a1fbcb49310dc89a7825dac041937f4831aefc38625e1c41e3fc25603f89370e842d9558d674081460ed
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b