Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
ff93c2f9e665b5569877734cbcd13e27_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff93c2f9e665b5569877734cbcd13e27_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff93c2f9e665b5569877734cbcd13e27_JaffaCakes118.html
-
Size
31KB
-
MD5
ff93c2f9e665b5569877734cbcd13e27
-
SHA1
cf4f71a4cb6ef39fafc7b075c78a830bb47f6b3f
-
SHA256
f9070fc97a2b0e23b87d5e21f4c4fb3ec0631e0b3317804be76ff0f9f044c334
-
SHA512
6988187a2908830b9c40dc6ad63a2a3c2fc90240796d566fd921baace9e75879adc94e2f00fe574412663e9b0b240d79fea86f6a4e4b465e5b76b70223c540cf
-
SSDEEP
192:VWCk3GDG7GSFGNGeWqGUpGtqhy7ub5n0enQjxn5Q/vnQiemNnxnQOkEntdxnQTbX:ACk3GDG7GaGNG9qG8GtRQ/SWSzSQ/jwC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{156CA191-7EC3-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433818051" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03dcbeacf12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f11befd50ba97f1c3f90e1e86af2c5214dac9703217146533756c84e7b55f311000000000e80000000020000200000005ec0eaed8f20721742bbf755d6f4c591a6a7556ee6a4192b055fe7fb9e35adf420000000b6d9ce3b7937f0c3eef6e3c68f387eeac1c1d81104b4e348dbc5bc728b121d564000000044133654843c0018204c14f21c9606a9f1e57905c3f0a415f208d2eb650350bc289f566240bb612d66b2692b8d94ec61e6be3c57488691dd351bfa9c951f737e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2668 2692 iexplore.exe 30 PID 2692 wrote to memory of 2668 2692 iexplore.exe 30 PID 2692 wrote to memory of 2668 2692 iexplore.exe 30 PID 2692 wrote to memory of 2668 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff93c2f9e665b5569877734cbcd13e27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba60068cb1e413d9e94b70810ecd4522
SHA10017021b1556070ad8aa0f6fdc06bbc7c0d63d55
SHA2562207e5789357fd51e39dbaebd38c106cea91496eedf32a8d2ab044758ac23997
SHA512244e1cae4d42bb147f35e5ddc0ced84e62281bdb5361fbaec2ac1dea93cfb9b4ab785fe103c3bf270c6bd61fd2a3b95920bd31637b4411809ed5309259b6c689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5281c9fc31c31f011f02f4b4000724d56
SHA1c51829f33dfd9396adcdd28201ced9961d1267a1
SHA25626467873e74d00289f96aaab89150b7c93462dc14f22fac8b17dd4c9f4ab9c7b
SHA512abad89d31149279aaecdec39713fb23253dfd4628b70f0dd1db77639df42b58497ebc20025af70281f4074363962a652d5a8dc2f3f75bd1c66237bcec3819740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500f707745b6a9582d6cb06afdb33ff7
SHA18e4937f94094873a2f4b7f03ddd5f6759ebc2f06
SHA256484a754beb0e797eb50f4231f50d2e032a40a338373378e80e306fdd25a66b70
SHA512a6c98bb32ac32d0ffa9c9111b260e0f61da882af6d8b545d999cbd636188a694d0cb3bf1ed6601fc13f00f33b684200c3b270069c3c3a6a80523a7035b3ee033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56480b27c9330e8aa43ee1c78c69a6a46
SHA1a743585003b19c2273b72c610f4341d45942f5df
SHA25662e4f0af03c601cca5d7979ea3705a77f3f94482f27699c8d4ecde2fe1dfa1b9
SHA512574221abb43be47d5cbe662ab8816fe40c566e858f94f29402603560ee5f64bf3e2a08b4058efa6ad996baabd308f29273001f1ce702cfa7aecb5b47cbcb2f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ee090186f7894061c9a17cb0a9c8b5
SHA12ec2db326da71eba625bd1df61dd1ef52bec6aac
SHA2562c5017d8fd8b30066482dae7ba2d549ef49acd8588486baea36dff8173a6a71c
SHA5129dd87ca5039e26bcc2fcd155ea8698211a13bbacd5fc9cc060d6e46214f6268d157703f787b1a2a9e3b6832bf233f1d7fc662e13e4f8b1a7f618190ed5ef9abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e111bef65acf38f149fc864c762a9cb
SHA1285e3b341066c19197bb9c8dc907ad9137d062b7
SHA2561717f0004c7bc18ae19479d7d87b0847f80773bd10bd6cbc2f4503f145d00d3e
SHA512b021c81356d88529669b8f1ddaba681768a3d6aca4564d1097cf13efd90cff1440b3b31cf29b5acff5deb4ae6c61cd6474c739a6cb8caa162e6e995419dd8276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d26499bc19a7c647d862f64e87440fe
SHA149877f52aa62ea3ef6398ff20db07bcc058adb34
SHA2569448ce016b71b31d8595b6e4c7d36890e66849372e8a40e5dcab93e108ef53c3
SHA5127e6c18a6832db736f092ad994379f3e152503860007df540877a9489ee370d567d8e496b401d2b61db458ddb77d49e9b6e15560e10d4b38bc4fe7c9084dd5beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf0d81eea9fec7ba59f41907e2f5d72
SHA1352f363186c7d2385b9e6803b3ba9d68cdf874a7
SHA256cc398604606855bcc1079bc283519aaf01ea7de0c8e28c77e699d1c1800f7878
SHA512b75ef1205ba84d6fc373d33d5866e7c01d7cfa8ac2d02051c01d3cf62f92624ec215520909fddb10ff9e640a2e290026cb5db2ea63a415307bfe76dd4b2e2b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9d3d87582dcdb88df2597a1f11c6e9
SHA14885808bf361ba96778d34a7d0d85bb35291a901
SHA25687745d39dd08da731701bdf7274907fbf958e9cf44a531b75bd01c6d13b110e6
SHA512a686a702b8b487b13698a5937ddb03652a55d88a2abc69ec847e5c146656ce8cfc4e06668a2c2623d6cf9837dd05614e927552e7bd8c71bd70dc3485eb6996ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0755ff3d8dc51cd96fbe6f1dd643c0e
SHA19139bb6c9034b9c48eba8e9492f251821a079f3b
SHA2561e84ea8200d5534665ec3e4689d776f7a91900400f66697e9d343e0a0ff96fba
SHA512de7579447be8afa59f7a70ca8829b1482e83c5c6cd2024250378250581b2a2e136726d55fa715daa9580fc472a1261ede4e2b62ebe080c6e5dfabe23d4793665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd29a66ab516fb21db59bdc74504221
SHA1dd24f1cadc81dd7ada4cb936182f625e785fe0b2
SHA25681ec3d78b421986dce25ac853998fd4f1f6626b0f021760329b39d22dbb8a1cd
SHA5128983f5d23b661b64133c326b518377c27697c03d9a4e4b81df6edb84ced7b408d21d95b1aa441b7ece7d4859358748dd95a27d462c7e541d785d49a42e02e2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92dbf011ad17a21dadca194dff435f0
SHA186b92abf562edec24f62de80ed00be7b931590f7
SHA256ff831f031ab5970566da04903d54194caf7a324aab24e19c9770372c88d81285
SHA5127813fa8536079b15421edecf71c94bb0b5d17873e117dbe559a6d92226dca7887b4900388c36502e8e9a762d6c672bf1ae711d9eae05911f47622e1bf90aa2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea026e626262c54cec4928377e2d445
SHA1e0f7206cef7c512fff7d38a1c0b08e40a0e9bd6e
SHA256053b01abbd3db74da8dfd7014a2daf0788a4f0a20dd42cc59627de6d74e0e591
SHA5121150cec976c152161f35f6a7ecb3cdbaf2bc52bf02c73d4e5d9904e045f80d048de36f518205be329c69e6250a0132baaff55f63ffbc6b0c8d32d7b98e6f6ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5792292a478c70f5fc2fe161b5c8ef46e
SHA12cf01851704ba5fccd90770e6e709b4eab708cab
SHA2560b5d8f55328a22844170091aae368cef411d82713f0ab718107aa0def81d61ea
SHA5124f5e2a5b15c5e4be3db01cdb78c1e0d91fd314164db0c8ec7a0e9e6f2ad21cdbd0e47f6d0555a716467b859efe3e05fae98bbee9b95009f11f5b470c2bdece8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513cb0a98e9f306b6810ba86e024168df
SHA154f78d6037e0f027dceef773d12e47528a77b2f1
SHA256338dbef2cee910680fa68a40b303fc991e518a5811522b7dad105557015b3d79
SHA51236c0e1add860e65fcd7035b8774f506253dd330dd4053b4f8b2fff91a81abc2fb3eba5b04b9ef6bdb1e24d78cb882dc604929809c9fadc773ec4e1825dbf494a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550bc52a7ab60df12895fdd0f618f8e1
SHA17a624e27d7dc03d49025625c333bc582619f73ee
SHA256b62664357f79cb1ecbb7520de9f68d18e4c711e93df05bf304a336d9d8f4188d
SHA512049a9470dd391b64260faba66c357daca6208130ff580764077c79167a188b0956b68b682015038a2958286b1c5d8e8793cfd827a4a60401d794faa5f0dd47db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb954b613146555bcc719fb48d3a8cc7
SHA1b3c06327eeabdd078cb5dfd4e13936ddf36853f0
SHA25673e44f3d7e891414f0df810c326cb5968d3ef937a871d88654bca417b63940a3
SHA51263b9c279b8e62abd199e64eab42e5b7593e16890f21653f01d00cd9c518b45ab1202ff3f3f49600e75cda131b30964b0d54f57fdc5cff8c36fedc8c4558c714d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578871267f328b4161a953e0b5dedeb62
SHA10efe9bf8894aaf4a4ec5c51f678dab0d0543f491
SHA2569e6dd7c3a233a53433b1a47ca60615179f3c6127c7fa22470a90541875a2f66e
SHA512165105b7f56fb16628a06ff599c7a92765cfcfb5149ad7ecd71759490f5b9a2088b46d11e89dacf429617f9968c981eefbdd707fcc2ab6119172f37b72478ac0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b