Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
ff92e8b211521d5a61f3468c19cc7a2d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff92e8b211521d5a61f3468c19cc7a2d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff92e8b211521d5a61f3468c19cc7a2d_JaffaCakes118.html
-
Size
24KB
-
MD5
ff92e8b211521d5a61f3468c19cc7a2d
-
SHA1
22b3f2f05b2da4c5e43fe506b4454c1c88df2213
-
SHA256
f5f01352c5a27bcb9eaa0fa90735529f3d05917ff75452381aafecd21bfa3373
-
SHA512
3f5f36898abce5c0640768c08f510fb46bad244b23622b251dac51be4936ef46ff8cc4578751d9d203d4c3763420ead3a7ba10b2f65b15f1a75805bf957d9a58
-
SSDEEP
384:zpUGFUXFH0xO3YItuqbgQWuRF9GF/mZvZ6rp+CaOk7:zpUyk0gpfbVQF/lrTy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C443A751-7EC2-11EF-808B-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433817912" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000091edc7fea9c682742032688d09bfc0eed9ad5500777eb9e48eb0cbf498dea32c000000000e8000000002000020000000118aa3a6e255bb24162c39c5e7f1905d751410a0dc0c5767a1c2ff32dd18881a200000005dfa25afec876b7061536e338e4c432fdf5a4cadd9f6a13ad38cb6f6036c08c2400000004a74946d40c7bfc91c4fc97898ab8b96023498fe970c78edb4243b4a977e80a44ca3e0f6ff76d1187ad372098c001d9a571edb3719927058af69091b034a421e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02ace98cf12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1528 2432 iexplore.exe 28 PID 2432 wrote to memory of 1528 2432 iexplore.exe 28 PID 2432 wrote to memory of 1528 2432 iexplore.exe 28 PID 2432 wrote to memory of 1528 2432 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff92e8b211521d5a61f3468c19cc7a2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf6993b1fb1e8fd85e0150517dd85ad
SHA17d8bc940c8bce9877c63bc0d3c9a5e8f65291bc0
SHA256f98eaf859a584cfce2f96159563a01d889bf53af9e8f5d06eb8655d5d6cd0ccd
SHA512e0795da03396435428f76e2317b626970d493efdc83a289ba96d660b680dc3b4a461abb3d780fd04f82835f85f07766fb448f3c27d65bb60e593f3d432738ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff601b66524e14e41687cf98746d750
SHA1baaeb295d4fe70305c0b4726e2bdecaa2f81f614
SHA256fe1e7d41d649676a881df03fe51f570e1d6fe165a31bfffd2709562f2114b234
SHA51226b1aba73da32891f3557df82d4a2c9c014112a0e7acfeeeb46eecc8992f690e22365724d3d0499246b36892ebc68475bc4f62f1d550d5045dec05d8ab702dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f9262296340343e5ce21ae9dd4e581
SHA1ee2e4fdab72ce3b1d9a66c31e754817649a97b99
SHA256abc876184b8282a71c9db485b3b2ca3f1ea187978bf329cc40fa891d9a959d28
SHA5120744f91f6aa1b19e01efdfe03370eea9a7818fe50003c0b1aad27761fe938662aa216c181e00154e8e1df4eb3350306ce60afa31aed14ef746e417306cbd4e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea00801f73c2f2c43d4f16a8ce24d40
SHA1cc7584c9fa9902606542fd5f79da818e60b61caa
SHA256060578580d0c7f6381ed64657007e521733db825720e95a3c098f31d1cc07d53
SHA51269bd348fb59bcd146b169f1980d56552d1cc84b31bf8230bc707f931835e53f6a5e5afe3a0f2036bf92f77f415077e5f24575fcbcab9f0a060889ca01cdfb889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368dfe7839dd39f0c61a7c123f809d31
SHA130634420cadd1a97eedf6f18357f3e047ca87e43
SHA256ddc248cb4acffe401c8eac1553b378498858aad97726f520ab7d7d8803b7c467
SHA512cce981b84aa9989d532038a78fe403a5b44257bd82ef38004d267fadfdc3041b55d9cb0645c9c116992174ca89cd520e1ff8460e4ef399a9f8dc89df965e905b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32d67ad952210f009ae5f47919b45ed
SHA11cde4b14e526b2b10383f2048c560a93edb5820b
SHA256a5294686742883ffb5028bb51b6cd9fae070d8788d871603a2e7e3f6649652cb
SHA51219dfc3c9a1a7b57c4da91beb87eebb415b4b9bc7a11ad6044e384d7b749b809d040cfda3afcb6513bdf48c0779ef8cc096516875effaeb5178425bf0245077ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4129a81811dfa3c1d9b118b0c71346
SHA172ebef6155e0cc527e52549e6af6b428591e4bfe
SHA256829db91e52e61ca08e10bfe2fda8e648331b2724b15e0032931303f3b0ac283f
SHA512f4a76eae5ff1ab80bb6132cc2e349d0f1e5733296c8fbb5a2fe4913da6946ff7542b179bb7250a580a4f42e6bcf7d3a1af757514d876298c8ae458b0802a86cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc8c4159cd4229cb2c22d641dcb0caf
SHA10e2146869076d012e855a820ba80facb50afe32a
SHA256dd832585456f641639174cea7b19ce48adfc20252fca325d5c8c66fae497ed58
SHA512d9998b70ad2b9882c8692a000d5e9727bbc11ef72e8583589b05fdcf54f8edeb7d0bec389aae3d923e38dba5a7854b52ed8b7fcd30defdeb4e920f8a4d187c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9d26b8f938da23c9cc2e165f68dd0d
SHA1aea36c10c7d255d93bbcec889fe4d06795276454
SHA256a28019fe728a5b3e1b428b669bba5880fce85bd2f5e0b538df797624eee46b67
SHA51282563fba32fc67fb2543f8f05a46a6564cae3e2c8fadfadb6986ed98551d53c8eab0d6c51274ea6245bff4334f00b01939bddc81d360e879e9c91a5d08e0d2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ed6099ec912abc3737474a04159659
SHA1fcea61148eeb181703629e6568971071be58d8ec
SHA256184d7654e946e85fb87961f84558fd527fff58da5136903267f773676f66ef0f
SHA512671d8a863c08ab9d62499fcc6f9104e2442e9dfa987469e3016ece74ab8ed67321cd52e6e8c61b2c1f79c6197b0dc866e32ece6ec51f6d1c61de3cd2f82491d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536c132430e0bea229ed4bf628a6a7ef
SHA18de3c8116ef9bfbc30f0b501027414fbfc356b1e
SHA256c6eb1d7b094c72f538d15290f6dc6a1fed2eadc5ceb8ea9e515029a47af587df
SHA51216f20b063776f94efe6476b6838668c6be70d6e7e131b2bc05826f95c239b5742ce0a1f3e2648af0368d7f8fdbca39844fa6ac02cccaf738577ea03d94f7dd62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57571a4c48de5552da79d6b13b2ab3ae0
SHA149fb3cf4307dd9a58271a8ead6de520c1e242e0b
SHA256f69fbf71f18c8e4319cc34cf3306825cd6bc9b6f16c73deba51e00967042cfbd
SHA512979b036af37360857e25c1b87daae15672067e1de6ae6725b36a845e6a02e55de86b20067a97577c93c40b10a24e627683dccf6521fbd1adbf2caa4571712aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e093b8fefd297ecd3f110087b2d8bb9
SHA1895a4bad83df840898891ec402c2a3acae796f48
SHA2563afa8a499ef45fbf1f433a660e7ebae3bf22893df10a7b4664f36e51f8be8c21
SHA51232e2a6477cd84e158c73baed43202131fafffcad6f800b7c5ac94b7e156e64ca5d84b786dfa26634ea395f16fede21ab87107a2b4cf24f8c7f74ae1ff3142b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedab0f4b677c10075a7eda51b7badb6
SHA10c326d2c9e59623e61904b868bb3bf39ccf6f475
SHA25631ac83b8d99b2b445b08a62341707c7c5e9414d9f536ff3bd70cdfdddc16cc6e
SHA5123b22d784f61a1586c4a5bdd887c3cc0c8e2a52815c9142c51dda1cc82c85d06bfdd200ebdf390b6f7e29519b20033347d4d3ac7f4b87829213f637f722829790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be07bce56a6d50840cbee571d6079c1
SHA12d2960362e4ea4f906caddda9011f1f23c6b8994
SHA256e796672bf7f7a2042a7d3df94985c713cd4646e8e2891055db7d725eccb4d453
SHA512f1509f7b9c07a69da0d83ec144ced0239925041e71f5228ab8eb0f539e7b13561e400b9a92c53ee81b36d22c2ff8ae379716b02edfaeab29534606a640b66067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4084bd9ae329f100b9ad77132c257e2
SHA1bc20d99d075ff73ceac526c74a2040da0e435159
SHA2560a8cc4ce65f193625227afebb7e040abaa14a1b123aee5d4cd74cd1cfd9fce8f
SHA512a7cd2c1590466573232f56d7ad67d9eb05870b3abba9b5ab38463f1b9c0db150929938654a4f793fa801d06a0bf6fb4639f7c15502ac787949331d873cc3cd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533bf15c1c3c350e862a24883da8f757e
SHA1d2aeecdff91b9bfff1666b45ea109d4453c6eeb6
SHA256acd1e61c07745784df884c77cd10218bf216c3eb146129be5627b94d410bf6cf
SHA5129b36c8f9d6e51026348b9e303a2f603ddadd2485f50498cb40ea67bab3001fec92e2b7ce15b771977756505ae0bf92d9dbef081f644890b541949386d4a16461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a96e5c5fb594b11010f958af7fd074e
SHA19ed2074221422e8d19acd8fc9f882644afed32c3
SHA25653cc8aef877d1ad299e6e13eb07c342c236657a94c2be822752155bc0e38d962
SHA512335d0feb540ae488b6a04695436f4e4acd5ea177779bf77ba101431c79cd7ddf8ff1ca5a3af985e2f3336f2f933734792996635d5b7714a2e778a43da0b27f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b73e40e8a3983bfaf46a913e1532eb25
SHA1edf87069b6cd196563e0e6ae36ef8441b046534c
SHA256ef3461757d4cfc78427947d2df933493927bd36634c75dcf5373407785e04e3d
SHA5121775c0f4d62598a447e5909f140221152b720fddee66f0ca953ac5b2b08a838253a4e126730d26ea7ce2494c7a3254042cef818b4d11da5771a4b21b0241744d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b