Analysis
-
max time kernel
123s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
ffb17d0fbfbfea4a52585168dbbd2655_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffb17d0fbfbfea4a52585168dbbd2655_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffb17d0fbfbfea4a52585168dbbd2655_JaffaCakes118.html
-
Size
463KB
-
MD5
ffb17d0fbfbfea4a52585168dbbd2655
-
SHA1
de0c08359469c0514c10dbbe1b379e0d0eae2b9b
-
SHA256
419d2464c0d255c5619c6b544f76e81838696902ba5d6506cb71f5bb7cc93171
-
SHA512
37ba833b21954fd01ccd9470a2d7fa3f6082f488cb429b05519f96987adca75e457d4e686ff5cf548946698ab3e0f8ee474716bd305def8688feb1e185402eb9
-
SSDEEP
6144:SWsMYod+X3oI+YCBQFsMYod+X3oI+Y8sMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X335d+X305d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79B82491-7ECC-11EF-BF4D-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000122f369980d42fd8234048397e0f44b352a6ce42c1a4aa25da62c727666e7da3000000000e8000000002000020000000eef508313e4f6f847b00f9b684534920c68f669bc187e060478c01b74df259669000000010e61678aa9a94c38b76b5b9b915fc50f08f9207b52d7f3e2e2d3ddc05cac78ac4f5a342ce1ad6308ff8a67efa42faffd76f6a13fa2414e0fc67d798a340ed2936d73a61c1eb4f3536b28089958fe864ac02dc079d0abd6938e570bc00dca1746dd134d580d3937113a6747bc2e2d82c57ad9cb278e5ed24daa1f9a6d605738cd253b9fe047f8103917282f71f58c0fb400000002575c246c8b88b7cd2d1f53ecd4a0bf3911729aa126d3fc89775ebb8a343db38e2506ed7adedb372fbc31616452f81c012c29b6cc1dba3d19aaf85cbaebcea7d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433822085" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000a73b3bf0a5b10a1301b5e013f4817efda51ccc19a7ec2a80f6c2e0232e75cccf000000000e8000000002000020000000d4c42bdb9673d05bc0e5f4799fd55b2c20ce6d0819fa495bebb48f31da0e3c6620000000ac0ba8df40552c6614c9ac3c11d580d6be58637f89f6c637cc7d548e5a8fab2e400000003d204666a30976a6ef4fccd40375ba28116938757ac770524f421f7f5447eba37c51ede9ff3f4a82c5afd7bdac4681a52f928bd989de8215ced7686eed6e1ea6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04f4854d912db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1716 2540 iexplore.exe 30 PID 2540 wrote to memory of 1716 2540 iexplore.exe 30 PID 2540 wrote to memory of 1716 2540 iexplore.exe 30 PID 2540 wrote to memory of 1716 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffb17d0fbfbfea4a52585168dbbd2655_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a08935c9317cd8717395ff511551143
SHA1f2a806a1dde43914854cc7d92f7f6edaa4363742
SHA256cbe4e80dd6395f8ffc83b12787f1af7ddc1a014b9819f6a614a2620db18990a6
SHA5125f9a4b43ad84aa2ea71d22235179713e151b4428872074b17bd0ed1c32c96861b580e68bbcf5a758d4ffeb1e4e8b1f8257ed645f53e01a0ee1c1e0c60a70293d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478eb979d0fd881cf2d27646058dd544
SHA14cc083dd11894f907076c6e8af8e20260e09c547
SHA256f582a1d0f11bd0bbd127b60665205d9d4e1cc6eb521e2747331838e750cc277e
SHA51221fb12a902d0d89dc46b1f5f31d1d2ae696a6782879289c177013602acb52b82e5002a3d13c913aa799ecb87af0d50ddbe9052d03330ee87425703fcbb7848a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba06d925689983bffa13dc1d418fcba
SHA193790ab76301bca35cac5d510dfe5b3db64e6ff3
SHA256c477de59f141ac0bbd3b73061a2440c3f86170debb9d5682b39431328f7ab76e
SHA51214842f3252a111881c2b8913cf2043efd7d57a12a932e5ace73730590f09fdec3244fc70810d012333f8f2580e538ffbcb2ae5dfa6b77167a862f1c17001d40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e678e4caf038573121b0e98f48ad40fd
SHA1d865a500d78e3f2ba3f64f063803c1ebe737f1a9
SHA256879f48e1f7ba96bcf33047cad3ab52d1e03e4442f123713469a9c18404676b02
SHA512ad3220b9d09458d3f8131b38e04e11fb9c60849e05683b7467ad9a15cfadb4b4cf5491419c7b4c7f688493d36ed14cdfe506d98a4cad601c9706de9cc0f8912b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3286054782519eee5aed45246647fc3
SHA1b8e4cf6eb1a76eeff782917bde811ac25a6712ad
SHA25601d87f4adc6c0f4ed6a45c4a443e58688ee39d815b7bda0bb3bca02c221486cd
SHA51231e3da125a97b0643707d4b6428ff821111b4c085674553882c5131da5e634f1dd9417469deadd2f266cf48afa68848fb02dababbc61cb20f170fcfdab10cfec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f1a1933b61b0d7e3014c8dc1221ab2
SHA1a0d41bcd2adb438012dfe38fc13a2dc54ef206ca
SHA256cce45a6a9b1a4915cdc09a2acf9cfb5fd0ba306555a0d0efbac01e7139d7cd0c
SHA51213ae23a570825bc6badfb243f82896ee995f15c3f9d2e5671f1d71a0ce325b0e177b0bf85f5136041282ba4d325dd47d607b5fc720a9ff08810f1abf53643dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517dfa63a2d7d2f57743db0b1d2a3f93b
SHA1ea0eb45b10333109224ca57cccc55ee2890d13d8
SHA25609bdd234a5ffba47b0c9e6dab374fb4427244515e91396bd920fba23c03dce68
SHA512c045ae474e856a1777b66d384d46102215d086b5fb7e6f78e73d77723386c5f2f850256dc3cd324c90b2f7a942aeb2b1641ad47fb6b912bdcc45e93630afab91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0256a87eac66d8d29d6badb5ec165e
SHA14b7997f087289cb3a6fe89f349bb39f3de3690aa
SHA2569ba974e9b8c2feafae64f4d134e00fd21157831a51c696182af4feb1a7adbb15
SHA512b0c0602794fc261d0956b1875f68959904029cbac54a051f1abb694aabf29744a4d73bdb9d40ea80b293eef1427ca47e3f88713a3a6e59bc622ac14778b1a2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9e6ddaa9f23ca1c927a5f4ba8d82e0
SHA1e271f38d20e86c09be31c49aa63559f69628228a
SHA256cd648d26630b7135cdb0d3a70da2c273aab127b55b0724e189e3babd73236eab
SHA51297797f710fd79afd457b99bd418169d39ff6bde7e1acd400833af3457b7181a47016878340effe2ca96441b106cebbde5f91e95ebcfcf0320b8d81f2b1b6fc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58560ff775df412aca57314f11122ba91
SHA1bc7066d01cc222b8bec18ee790ba87a02a302b7f
SHA256eb06ade53341a889253cc5cdc6891e356306c917f38a6e28595be92a8b91a579
SHA512f94d6dc33e9bc5aa2649a6603ea1c95b3ab822ed3ec33d454795112135ff2be0cc1b1ffa7f083ebc53d4bca9dfa4c9bd920c2d5193ab45ceeccdceac755aaa82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e1d6a1cdf23643484b4a51d2950075
SHA11bae7e92fcd726a0a9d9306068b87831daf3c394
SHA25643dc9e35987e88770ac700c38b8311d64aa8d95c30aba4d1dd5eb2edc1e2682a
SHA512b0960c60d2215aa50bdd29c3de1d66e230528a42432ef7dd6c6024e8556e059968410b1e800edff0f7ced2d4a1323ea19828e6b3601f2e5d1c79f42a4669bc15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005f9e4098056bc6bf47d005feb6e7e5
SHA11e28eabd46c5f5b22b75e1a448e8ff4fd309fa45
SHA256870fc90651af6c59944ed67527bb5badc23ceb35f16cac09c90e61413fb28453
SHA5124cf75ce907f91086009230ec0262fdd812de83037ef5613d7fd91149a4d70bf9f6fd6c149c3ce246a29feac2c5dc93f51e17926eb854e50efefcb42257848040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad578f98e2b4ef3908cd5ff24ef7b11
SHA1f9139fc1d8e3fcefffcbdda38f31dbb0886fcb69
SHA256410bdb0c9fd02f51819a3e6d0b48285899d5621666bf747128001beaf2554ab9
SHA512e99a1e48c17127ce1e1d38650dfcb0ba55df8f72c2b29fc227ff680e510724d4aff403e082de86323d4a231b2fc8e17c13cfb9d938cbe88343941d3f268ce749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c5d2a6a3377d94489e1e783a28e1a32
SHA1b1126530c180656e6e13e1b1bf78702dc7ee10f4
SHA256ae66011f4a2d6d520fe81b55b4e784be728ebe7734b94d7362b335cf80ae1680
SHA5122f27ec1dfab05fc80682aed63b7052eaa477b5e18b745a9007840dc2bc6ea3f63b2c1ccfa4d4ffa0709a76e8b5283fea9d2a858ef8e5f033d1663bd9cf836db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd2d8f3498df2e6b92f1324b84d1fdd
SHA1f844680687329e2e0b11e4e076e8cffcc1506ebc
SHA2566c06e41a885f998a8dbaf20b15aa83e5bceecfb9d90153e7fcbc3765393951ef
SHA512ded6beed252613f0a020f5a57f30360338ae295a981c9a874e1f53aa31d40dcb24873be9f0838d6d476663f48e7619f273fa490faa6efd2bf0fcf7c461eeb8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6311a3dd9afaaa4a54024401eb9b5b7
SHA11f01d6e4bc0832854c0fa69de5da890ca6af86fa
SHA2563c536fbd917df21975a115cd3f0dac96068c5228356355ece5822ea6fd705538
SHA512b7e617761e14fc6e2a583c79194d70520c3132223be17dcd8a9df62324198168a04e8d4cecef097cb49d23caaca23215192c383e62ca2a931257ad51279edc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e996526d3a49f17c11d774c164ce513
SHA1f4cdb380c48028cae1e244fa8c753459ea5ad546
SHA256ddbeb4b43eef50367444c0afa11bed7ed374fc2d39633e0181a5dec6e0f85f1d
SHA512868102bb6156036b9a23d60e55eea9e05b7afe5238f63bad10c4006c959311c7e1021e7c9879c6247d5a204f2121570138d062421ef203483f0fa73be26d0fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e026be13fb8f49bc593d823fb841efba
SHA139ec1bcc354f9c20585f0e64ca1c8d66b8420ad3
SHA256f3ce2afacd7bb35a88a8ae00971e017112e26e2e996856d0563224f93ec72049
SHA51233a0f6193e1db4fbab86f4c3ea930318a29f4c32c1d1ea2587630ccf626021d7e8dcbab6781bb46938977e347007908a76388208f2c5596ee03f74476dc69d55
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b