Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
ff90cabd6b04a43f6f0c591448a80d04_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff90cabd6b04a43f6f0c591448a80d04_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff90cabd6b04a43f6f0c591448a80d04_JaffaCakes118.html
-
Size
54KB
-
MD5
ff90cabd6b04a43f6f0c591448a80d04
-
SHA1
9176e7105689aecb60b49ea1ef5cf5ff73a74863
-
SHA256
df71590bbb2724e68805962dd48eec2824a5d5e095e2584ae216269c17b89a37
-
SHA512
491f3a552faeb8d550292f7081fa44309bd2379e35e2c9e5fb3ef2de661c868adf06a838f9712fb2c4a4c358012990f968eb55cd749bf143e011feb42de4174c
-
SSDEEP
768:UXdxjA2lwst+hSTuw59SH29U1l82PYljNjwOkXdxl:UXdx8pY+huuw3SHk2l1PYljNjw7Xdxl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e4f8face12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E5E6C9B1-7EC1-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000036e2006e230239f7efcdf8dcacae793212b9812ab0f8b2d73998b0345369f2f3000000000e80000000020000200000004efd39aa5a5279c9df7180f6140bbd7c75e70b39d9a4c41bd8303426ea9230b8200000007eb505da3e052e19ce423113a51b95af4091bf34b13672bec08ffcf6081c302e40000000394caf260461760c60254f34a77d574db7c1dcdd739f5b5ce32990b647fab715897434d54d56c7433a05fcfbe13955c06b561b3e0f24ee4f2da7a92f99e5226d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433817539" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2368 2408 iexplore.exe 31 PID 2408 wrote to memory of 2368 2408 iexplore.exe 31 PID 2408 wrote to memory of 2368 2408 iexplore.exe 31 PID 2408 wrote to memory of 2368 2408 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff90cabd6b04a43f6f0c591448a80d04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519171fdc34e94f24ffa93bbcbac2f43d
SHA1ef5408f4ef9716292ce86fe4626428b287f33a9f
SHA25693fd60713168f9e8c7bf26cffe42cbefb50a3d1ac7ac567a917ccbcb62d88cf1
SHA5127b4ad09f9b8b4128594bb0ae090871801a743fd13a6629c12a7e7ffa288828f38e661787ecf4e01e0fa730b4790821ec8d03734471c2038e31805d11b1231fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce323722b1a5d15408ea33e34b3cd75
SHA1b7bc74844c78b96941f252a0cd17f62e39116755
SHA256f89d484653dc8dbcb70e324f639af67861d5437bf3253868fca841e45556ad59
SHA512506298a1e1a130ee15c09cdb4d992201630162b14f6f2ef29b3c838dbc48790e3793d7022d2f4268b78c8c2c6787032300c606173c18b5a5b44b07fe26bb0556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528362d0c89c8a45a2a966ab9e42ab0a6
SHA1a5897ecaedc5b56eb29dc9eb941966429c107a1c
SHA256576c69f42e4fb0d18c573dfb71d332c67467afe3f4921b2e8ebc029bfe7985ba
SHA5120a1c1eb5b0961fa8c4691fdfb1d298e3bfee2781e2e71d841857a81d8837bb419a64eeb23d61fcc0c37699d5c92d8699dfbbe016c4b86e15a3b8ae5a01f1b482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0382ffe737877cb54e66bf12f2fdd8
SHA16016dc319d70defac4be98aeab416cadf3011a5a
SHA256b1f099b0326d550e48a7ed8c6efd28598cf464bfbb6919d43a1aada93d3dcb5d
SHA512f332a59e235e8b3d62cbfa58e3bc598d860f87c615c4f8e9f30b66d6e4da7669fd6db53febedd1da2afdd8df0ac3953a4c244233c22a95f363f88aa1fac32087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ed019cdd6f7f57c90dec151f51e7fb
SHA1049cefb34b9c51883108a61395e4b0ff7bbfd7f9
SHA25694da9b3dfdc1029cd36c4361d09566b179f5c5375a0826333318c035c42b59a6
SHA512579c4114aa23597716170c0e7f872d9f469b308487ebf3cd6abacf7150b276cff8b20099bd1b93af0f092bd326fb67a83cb684ff8b9d072c474ffe18c0a25e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab35663716315c6f34b568bdeacec1e8
SHA17eed6103af84179dcf382f28397347420597dd7f
SHA256d9d90b823b872d43101ed5e11c3cc935549a03c2754b78324c874118ac500ce9
SHA512869817c1fe06430e8fafe80e6ccfcc1ae65cb7db083d636c47cf370ec992e1c15e1da71b3b6ea8abe60342a5a4903e22fb638b8a81dab18da9b921ea36797408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53417a7085e75e2031412dd1a62566263
SHA1cc2595dab56bb79c20bd6aa8c08012b2a0290deb
SHA256201fe278bf9cbd7b075d57744b5d5d2317902b2f0533e8286112f739a460e0d5
SHA5127b7dc3ce0da6d8c736a2c9bd370de07fb2ac3b37e0d2de042520ba12a80a2b078f580c300d60076207f73949e8149639bb6562625feabb3dfc0a55cfe0df54c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb683dd298df581ae8ba5d27caa6245
SHA14cd31812b475fd59c64eb311d2a84557cf6e671d
SHA2567a1a08be04de951274992401a7674cf8361617eb0c7fd8c4bb9b6614ebae5fe4
SHA512c67e5f4a18a399cfd46656de02d6f692df3b380c11ca02ce6e8f6f0d162d241e8a84c9c2889cadb898b59e8eebf8a00d807294b25b774f2dacf026ead9899a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65f4656ee452bc7862d3341b67cea84
SHA17ccb3f72aa57c48726cd6d68c5737a6f201225bd
SHA256d710272352f304a9aabb4d1c48bbcf8f134b3646171ee44c081345d7aa0121d8
SHA512ef95d93bd959b23546476342bf09d37e9e92b915105de11058ff85f11fa1ee410c9475e6e57d79f1fbfddf27d21ba209af8af755e8af3453defd4335a707a6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59268e1194df8036262d3319ac95cf6f3
SHA122a1b230981315e1868225fa75f27f52ecce615d
SHA256da9526756441416fe0fb94e925e03c8fcab82a33b6adca8eb8d10aa6cf6e3963
SHA5123ce3e6f9f2d6cfe983dc80769cf9e8830101d46fcbd70ca5a582ba40105969a21558cfdb9b7a8a37c4aa3085dd7023543f96a497ef23aa2f62713995f7e255a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d334f54a5a5bbe80df41c8f310eee2
SHA11b604acee6e4458adc250d345753ae1e193cbc76
SHA256c73afa684f7777e44892bfd290e54b7a8dc9e4cc3f99e0c617e0a2e5d94f2b01
SHA51212cdc6e84dbdb0fbae1be79c856faa0ae63ee484e3fe9648cd57196cd8d13f54bcb897adf1e5effc016b27518cb2992f577d420d5e19e8c44c4b1129cd0b2c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070ee08d95cf53d5de607d9b50ca71e2
SHA103e903e1e325f10e281c6e15852c40474604f615
SHA256556cbc2fa50d685ef2bc5345bd88d12ae60709395645da4cc737c9cd6c01193c
SHA51261687f609d99afee61b9ac9c5b1ff7318ad391fe0f4308167a52dd5602f2549e6fb4c5dd18144c8d0f46ba33fea5e513d13c75020627a4f7a6e3167652991810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1613856a6a3756ab2cdfa0313a3d122
SHA120379521504d74ad5924a5b8368ddaa3e8cf136c
SHA2560266fd0672665ec436d3902bb047cafd25615276ac87dcfd3f81a2e310c90ed2
SHA51298d7d9fa9afeaa9ac5c8603f548d7f500219e9119e57896092f312b50d5ea0d8f732b19effb5900c2f1d0319622d068d9ff743ea86f53c8ce75d17ef80281826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e80453b28086c26622272a869041c7b
SHA1325c32ec823f364425e8d8573886c715412389a6
SHA256d4626988d04d2b059a194ed811b3e2661e5dc09e59dbc57d3fb0de1c6063805d
SHA512e814f692aae21c6d21cdb807d2e5b9bb34719db0085fb0c52b6c1b056a11cf22b1fa53bca07daeae7044959f85bc9a06328f96436a3484ed45df9abf868f3edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c719ad676700bf32752033d7adc1c448
SHA14ff07bb0fb1ae38af4693173e64ed2416958c96e
SHA256b1af5d563296e789fafcffec3ee446a14d026e5ccc87c53838657687cec4cf94
SHA512d2e374705c8726fa2fad14cb8d5c292f8bbaf3e181c661bd8a65eb98d0ada6382d7caf35bf867271405dfe39b55e7a594926634b4aabfe6214b533626bcbb5c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c337bcc26656a3f2f658e72c7c67c9
SHA100ea9abf9a12c58a851e651fd861368b991487d5
SHA25606e1b1bed73a6dcfc572372d99070da7c1a60f9dbf32cacced0bd587fe90168b
SHA512dcce1d0b0c810fcb8bbe0fcbc13ace8b6fd5a8ba5d97571f5736bf036235c8be30590c24622a771723928965cfaf8203dc6e6bd68e9b862ef89b5b0ddfa3204b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd89e22545e9a528296bc08860d6e03
SHA189a0dfc97f98dd30cd640c4b0d34f9bb93db74bf
SHA25618c1e1704bdd1ade1cf16ba2cdee1ed3312b724965f3091ae96a01c7d53b4395
SHA5129e8384dc2ac2bb9d4c01b187a8d1f388db71ab9eaf045454ffdd106c083fe16546c8d4580e3d781d73551a8b5772e17a044e47861851802755d970afb2f01b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b33fbe26130c71cedd363c6b75ba6a9
SHA191ea790dfb2da2b736f81fcaba6d2f95827e4769
SHA256703ac55ce29051a73228c58393dd340284e268251fb7c367d0caa1cea945239d
SHA5125b0cc3dfbd18d4191494bdf632a674dd7e70b824f7c4faffa939a92be409fc3cbbfef9d982172eedf6f6489c575c75a493dad3864ac069f41869463ad6bf0078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517066654f0991cfacd23c89366fae16f
SHA122ba082cc6f9e0c010708f1942fd902884297a82
SHA256ba9df9f179f0b024a55d57b1743632aac169dbd07d4c4feb84ff5e60057275e2
SHA5123bec8fc18caba991caabc58935fac935a1f57f83f5c0237c8c8500a67a82246565a301de5a0794ff0fc66e24da6f81b33a08893d810d20fbce6b342716b57ccf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b