Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
ff97043b234e16bc988ca6d5e8002910_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff97043b234e16bc988ca6d5e8002910_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff97043b234e16bc988ca6d5e8002910_JaffaCakes118.html
-
Size
2KB
-
MD5
ff97043b234e16bc988ca6d5e8002910
-
SHA1
44d9df031b47b742a9ec47908867fc052cf4a12a
-
SHA256
975ad7ce85a57349b7be9cde11526f00dab43f89819cab7a4805903e8f18e342
-
SHA512
d4704f7b8f834eda49bf2952d6a72d942d4a78a83ce84c2f707127ff49b8df6cc38c789502ddc31699f72b60fbb7de663a975a2d2c85789d43f688c79b3194a3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433818456" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60965ddcd012db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a9845150a81fa76262e138a05ac745fc79a22c65d4c3698bba1dc5f5fb132c70000000000e80000000020000200000002b02b2a8a6744d3627ce505892bc753958533906fefd653188f93da6c66e989920000000f3b51192bf78568c41defa157ae7ec71aeea7e5be2137df5fe202bc19a35f015400000000d09b3523d518497483a4d361a76b6ffe782821a9037fb5235cb67e964151bc298a5e2be6426e1d20ab7401943b60f7e514194563915f1978341af53cbfc99f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07E3C481-7EC4-11EF-A0FF-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2800 2648 iexplore.exe 30 PID 2648 wrote to memory of 2800 2648 iexplore.exe 30 PID 2648 wrote to memory of 2800 2648 iexplore.exe 30 PID 2648 wrote to memory of 2800 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff97043b234e16bc988ca6d5e8002910_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3d929dc7e4b499b39e4bf7e5133daa
SHA123dfde933faa604a34b2e8ebe8be81503a7ed6b6
SHA25671654fe08898d1ffd956649a2093a1cbed54ccecfafaff3d1f2a2595c2745d35
SHA512eefab8d1da022da812a37cd61ae2bfef1923b7fb004839c1a62d9cefafa958e4a469cb0f53eb705489ea357fd5447ee3036729b29ec8f77303454b1842b4d763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d30dc4e9f70b83b431f3f7f6d4bf274c
SHA15c8a2a8639b9d1b6f9b6d277549c302d61b6b553
SHA256d27bc4cbcabc08e896f883620c39959ed7c37ea21977b6330ceb9d2aeb1cd2d7
SHA512673a6aea0c978393462d31a5c8ff48d0aed5caea65acf46bba38058368db49932437f6330bb6ce2311f8dfe06385ec4ca264176d5d46a67988d4c60952f04123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da78f6d8dfca4238b8e29a63e5952fd4
SHA1d6db9ebfa8ac0b3ee92c4bdd77c26ea38d089269
SHA25664a08b6e07cb7934e7b200994d9f9ef77cf24e80bc0038122c1284e93a752511
SHA5128132de9986afc2c1d5ce978683bbf0eca0ce8c145ecf9fff53ef301c27db13fcb21d48ffaa748fecac64b844093c1bffe30058fe10b43a5d18595c16a592769a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354afc5d176e744fc754e9f094837749
SHA1d260f26b64c66ba043f6916c285b535d5f2bcdce
SHA2562783c2217ba744b949c9f782a22e11e71d1343d258d03c5cd009a8149693f94e
SHA512b71edd2c9ad2435649aa4cec41ed862341aef3bf0ec12785bd1a33f55e3e653b5ca5e2affd206093af7dcb92c460722c21747d7a1cc8047eaf14edd84365bd39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972bea880027a7a7b01fea90da41a25a
SHA1052707f097c0267ce1b265b6dcfb0e5cf6e5a291
SHA25637458653a4ad90e4d157ffeef55f5fe27dd684203b7a5906bbf6ff1004aea8cb
SHA512997ed84aeecc20268c56e7238fffabe8b61c672d553e4cf93297ae1787f29cca58305107f413d75ca266c72ca08b5816b6d8751d3de61dd383d9f485116ff23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553912ffe965b6f0665222645ca826a4a
SHA13a2cfe08c86831cd4e5117d8c869756fa8b750ba
SHA25621347f8fb1a1d8291a5db1f8c6fe82a169159b97589d84ef28d494ada0d2a19e
SHA512674e9ddbcb34be4876db77cddbe03ae8c76d32bc3c7428bfb2daa84d1321add670dcad6d9335b506e0efbeaa3c46edc7b1d305f50910d687c52c080a8816a4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0fb1df0f243ded6252317ce132d96b
SHA1bdcca23409d2b0b16af112f4b1f5345086a7935c
SHA256f49773266e5ce7018e7df2628e3b89a4c6b358a1de4a1dc8a19ab91f8e8af66e
SHA512f3227bccfbcebb3e4b257f93a9ea929f9b4009a2c7ef09f3689a8dc0a4bc796ac08c33c83451f9137eb77634000777167ab3cb1b0b6ed7488e129d5b7fbd39af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b25bafa4037c4da1352f404ed2b6fcc
SHA1089ca8493ce118ab57b0d063a8f7fa7cd2a5198d
SHA2569f9394d3d15577656e25db90914c7aa069f02a8b94e5346fc4ca73d6746ace89
SHA5126017dc325b5402c6c2e29b9bee682fd867746d314727dfce7ee0573f76ce792613571c17d626693da656c88a213f15225fcde495a8bced78e610da2f158909fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320f8f6eef15140c7605c6effbd87efa
SHA1c6663218f05152f9a90c30c09215a858fbc2dee6
SHA256678cf0ad0f93bae40611d8f4d4408fddfe4f6a3bd72bd95b1eae3d33b2291c4c
SHA5122fb7b83551446d42f786a7764b15e0844be520499c027c90f5d8e34d4e35c19a22817aad0679724735faec866e979cc041518f1bc5ccc7eea628a11a5820bea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5091f065d6e18096b142d57607f701dba
SHA1ed7de0ebd95c74f25e6a293aaf50069ab42a37d0
SHA256c258906654187573247992c1d21a9cb816d6b6a70103ef2360feb136256413fa
SHA51225b8dc11226336db2aaccbac45d310b485f2d61eccd54aabce40633d009e3df6e5302f835707917c2efb024e20af49a899e63357501959b0dc4c7548fc3f6792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59818b6cf15a215406ae4c8f4d35540ad
SHA17c65b9425a990af29ac1d3abc834a0dfacae3494
SHA256422e160e3047c4a536bcbe5fc67d5bcb640176e7ec43472b23dcc2c68cd04818
SHA512191f6a079bfbd7890e746edbd164195db8f81180ea56b16ecbbfbb3f2c520352adb9ebac486fa483b68aa2a6cbbbce4a56b72736448e98a38695602ec406646c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380bb877eab31917ef40518c88f8dbd0
SHA15872f8cfbd9f4864a3fb62ae6c02d54c389347c0
SHA2567ab662a95a50d21c4adc9392b1d5118825ff7f89941b88a0b551a38cfdccecf5
SHA5124b5d31a9c00cffcbc1a1919085f0972740535eb876e9e3d56604529ef7b12f58c4692735c1eee7a55419af0b0bdacdc5d6f4d9af8c39d5f56c3d4d89e8cd631f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c36060b12b07fcd70ab86ff371dd56
SHA19266dbd2995a6d1a96b2682249e2b574b5932496
SHA25625f2f98384677104c82958fd630285554325526d654af8502c0dc3abd49b0551
SHA512c639459ad8f221e413067c0df7bb5c18e77e1d9e03811823258112674713ba810204a75d6bd31cb18b5c15e04e567544fd4dac420eda97a66e0163491d56401d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da604ddb85fea8626c2948bff6560621
SHA1c1e4d4a3559a03dd46d94ff781428d280f19169f
SHA25693abc4d5e6c4e3c464fee07580df74b477fc74d44322dd4d5aadbf9525a75b59
SHA512cad9fc14fcc33a549ea45de022183d40aa7cc9dd5a7130f351fa7b768bc3065497bc94b53aecb91123459882cdf19447404c25e241bd86ea572e1196cbd95b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5d533f6434262549d6e5d0e0e11517
SHA1b3bf8e1fff5afa3e9ecd41712627b2ecfced5662
SHA256a7d44053ffaa77f683aaa4835e04865d99f99d8270497f8bf5d23b4a323f8c8d
SHA512bdb032074bf0495e2e483fa13da21cd0ae18d50ac23b729768060dbe8e6cb8bda7388c9164c800d8eb941b7b6052cb17664a58e72e6cdc0fc1f60af0a51f1a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3113ec38cd35662490c9e929f0719c
SHA18a4f2467eb493b279eda54bdeaff5cc2a522da62
SHA2563c56c2392a2faaa4e7e56780771f5a7d36b05770fc28767fac9356b8219547d9
SHA512f70407cf888d080543b376e29f5e9c8c90c1f989391bfe8c4a8216caa9c042f1592115e97e9db51f53850d3428a1b8a2dd014de82033c921a1c6283634e85432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8965d57618c576091e7fa3c725d0c6
SHA15b023b5880becc099031185e5bc8b2450554e674
SHA256a10657cd5e5cc6790af252d691d4469c32a68afb7039780d932ff0d3a47378ee
SHA512479a9472e45b6146c2fc197288b6c9de54b152a598e2cf5491f1d471b74529646db1615aa5f2f95cdd3bf8773ec99a16e59d4bc3b9b804ca93e86352278d159f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568660ef59b8c7cbf9bd14b5cc6e08a77
SHA1a915c00eaa33dc13e76555dc27b5ddf64f6fbf14
SHA256e01615ad987895319c1b5d7a49a7ca800357c716fb0551ec2521cc00bde21b60
SHA5124eda6aec8ceb4d61a35a0e37dbbb56143e960f4e23f1b5a9cf59fd74b07d320212904363b58d32fc60126da3a2dde203b87c6f2c1121085ed53872ee7e392077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4b630493fc8839a40ebd52eccd361d
SHA157414c89c8ae12d037c7bbc57da98e1800ab69d8
SHA25669ebaa68c22aaa91211a4f6e78196eb31802752df7625040068b3ce6672ae17d
SHA512010c86db8b9e15a32e89e4f6b87b9377247e6b659f5e1282402cef6cdf7d22cd1da06833d00198f5aaa3eb62dffe28eba52112dd3eb0a1c2868ec1d9b7d0aa29
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b