Analysis
-
max time kernel
139s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
ffa85986afd92fc54b04304479dbdebc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffa85986afd92fc54b04304479dbdebc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffa85986afd92fc54b04304479dbdebc_JaffaCakes118.html
-
Size
10KB
-
MD5
ffa85986afd92fc54b04304479dbdebc
-
SHA1
ee3be029f3207055964b18a515ae9c5b5b264722
-
SHA256
6c1e6eeb596cebf437bab97d4b23c6f11f53442fff891028f4a1353daaaf03d6
-
SHA512
417b43d7f76c23848989b52883c908aafe1d7180a6be009ed61384a53eb73c6d714dd0f444525df016c58b128aa5c3178da665101b0259d8d24cca71b45c2114
-
SSDEEP
192:SIP3l8O/Nxet+LLpbxQCX63g7bCR0SoZeaUmmd83JF:SIn1xbbQC6N0FZeaUHd83JF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000cf7ec08f27790d1ff99ca9d24019c82120f3f59eaf2494dc601db1ea6184a05000000000e8000000002000020000000da5f6a2b59dabed547a4181db0bcd7cff9a8e390dc3827317c852c16681e2c072000000035cd485e237be126ed804d51d6ad7ae75b68881f5c6e685e1706ad4f994f191940000000bd763d139712021376a4b2d3a54ae5b0a7f719cc073fdb3140272a708d1dfa5f2994d1f3eb6b7edffbcf9889443f6a3d7b1e50cd9238a93d7c8cc67186eb6581 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{374984D1-7EC9-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433820683" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01e844cd612db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffa85986afd92fc54b04304479dbdebc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8fa5b444ab22b52315baa6f4dfed78
SHA128cb96f59fece4e33d00ca7c798c4363f7080f48
SHA256b296236da5889e32e7c8e3b99b8b441e928b1a6de2916142b2d0050b943e617c
SHA5122916aef6b574f701c35bdf4cc0c0e2056ad0616c782a559cd7bc48985f1dad2c8e62dab69ec41c43d59424e751d9120fe2473dd452f90b66a4048e5242d76fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcab0a12b4c9a3055c14d3d3b3cf78c9
SHA1d0bfece55305561a2abd22684d9aa75dfc09d253
SHA256f2055b236fcfddbf792d2293adfa1dda334ae96ebea6bfc13144b54ae7e8850c
SHA512d49c70fc79420a83380da33109e4e29e96f07cf351bfd67a5f5fea927110465397a73c5530aa74c757a61ee60ef4b64735ae4ab046aedd9e74ae090efc124004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b807bdc9611b05ab514c5a349ac248
SHA115f71c37760f8f7e60d086cd08940006a5d2d21a
SHA2566058a8c9034cc44ec2661578e8bb076cb5159af522d66d82a348987ff5e8ef7d
SHA512a1ea322876bed876ae492754f155e096e3b7cc130e2243d5df7db1ca1411df92a5e857dd32eb2e00e56770b6939b86cbdac64b5e32949fe0a9cb901ffec35988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25adf62697dea0b2a379d1fb84eee1e
SHA1baacf4c28262e6377c566a02d9f313501256c378
SHA2564e892fca7746d51bf29d26ef8d23a60aa9c9f7897ac1017bfdd5cd266e447ac9
SHA5129b9935c26f43febe0736a91231f422b5f7ac98ab923c66361d9ea3a28573af002bf264317da24cd0f20459268f86294f2fef1866321ea2c9d4eb1bd56d1e7bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5a327d25dcd06342ca6c6a8bcbe8d8
SHA118907606be9b333e8a99820150478d7c5c06a26c
SHA256dc1633471a1b3e38a617a191c805cb3ab765ab1a39eb8cbdb34e8cfd2686cc0c
SHA5122ac95c0496077b8be7652509e2ba7966c6428c3f43526a7df9e0a8ee88a26801f12e3c4a26f86189f68a1ddc6a682cf07c7c390fced5fbf8f06263bee780e066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8ac9aced0619586035e7dd5032b22e
SHA1f011de9a1d201f6e813f0a6ecf60ce193ee4746d
SHA256e68157056ce7d809aa106cbd58f9eaa4cd3eac7f84a715e37cc9b050af8099ba
SHA512d216f04846c6c5dfc8c36549b8fd6baaf6335fad17631a8b83968a66965bb8d70cee3e8df490cdafe4de721a2b036faae343dae2e9e653a16a413a10bc428a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb2efa0fb6db50b2d27815cca3fb354
SHA1e22ab0fccb82876712bc49f922510d958ae3b7a3
SHA2564f516aec54a0d21c26ee095d5a970ba619c1360dc390ea037a81c6c692cb6428
SHA512ce9aad34463d6604e2e303ab9b633b709d19baeb8a040815c986c5fc12ce83ebc145acccb43d4bd80d037de5597db244bf510c2d347f7fa87d63cd720f15ea89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ef0b0cdfffc607509aaaec22eb2572
SHA15568b1de2eb6c475625704dce4e32a321f4f1089
SHA256797747609e9994aadd65967df36506f60b033b1f7442510afa36c4f7428c1fe3
SHA512bc86207c71c26e9a6460d8994459e26fe03275d91872651f88e32c0f4021a785a884470f8efa2505dc816a1e7a33f1ebc87a50381c6bc97c2c1e424612f0a44c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6095e94b911e157028e6ff0fdc1e5c
SHA12392dcd27899f9f4cfa1c8cb6d7e07d10d04df35
SHA25622277f972fb4973237613abd00f31d1dc2af66e65e6242f00655ac08b346b363
SHA512ad24742157e68c98d5caef5f085efbb940f1bde8266d2d0a490475903f2f387f1d35fbea00668c074235c577c467b920c5ce5a984c3a9ea61c2f1b2f1b259667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0521bbeebafb5770ab8f91ce52a5ca
SHA188799f2e8f96221f72333ecad0c5999488571241
SHA256e871af7ac5cb70f6a234b040be21cc43189ebfe0dc630f14a3290ed60f861fe5
SHA512aab8c8d5076a8b8c44d29988d2c0a41551ddb944e6b5a0ae951de951dc2bba57e734b469ebfefd26f56cfdb3b88684cd382793f56761b6e1edce23fae526cffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf831cbd7f729beea2f195d085d65851
SHA177b6c2cd108dbd5451d5c98eb1149a32d940c8cf
SHA25645c9848eb65eb9f484746eea337674b42119c34a44f50ab57595261d92994fef
SHA512d8ebf442987c95f22b402722fd60febb8f11de6185b944cdf38b3f0b53a5ddccbb29b40c5d704c316377d7b84db849f92c28f000286b9f291470cbd5efb358e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ceb414d4d1bae7e1428dd36abf943e3
SHA1c873e6b2be5946dcde352790f5d616b0ecb286ab
SHA256a960be7176ce06a64346e4dc19f552f8aad0c4a47a1e87bdcd5c23802f2ab995
SHA512f14eea0fb14693bc4469fcbd58f9d5cc894ff94e29fee63eac1eb9cd6b3607f2d94c0c1821161cefac41b2508455f330abc2b7ef1f22fcf17c02a85be42e94cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548705fe629415ff9717a7545cbd4ad42
SHA1314618d427761f41c15f6fb11fc428adaa1cf9d6
SHA256d686ab1439858a8c8536ca7f7a3975758a875aa077b9ad63f276bc1c1c8609b7
SHA5121ac02880d0040f6c4c5bd484be39fad472419a670128acc92c0b7bf590e421df34157d3262d5a1ec00b60df5ab3c8f2eccf6e5f00416e55f485c2d7a07af69d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d73057098959bd486a341fb957bce70
SHA19cb8099cedea95e8b147b210c801b7a8f2b53b52
SHA25677611501046dbb24fc8f49be187ee3ccab9c697a4c2e02d8d788e1f06032fcf2
SHA512bc56a72a980d9a2984df9e287ec5db4396be97fa214fd79ee590e871c2155946790bc31a5fe3278791c794e32f95ffe62927b11c112aae3f2595db361c73e716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5308aa21bf1ebb3533e5f307bc0ebc1f0
SHA13f38d1af14e71b0681d711568df294992dff50b7
SHA2563e3198c030e5e9abbee2c586a7be4d529cb63dcb84c19e217325edf908f622eb
SHA512a2bdc839b2f2f971d93f1f977724e6d6f0e80d99547e05a5fb8a9cef2721508d14609b2c9193efbf9298d9a1a54cd0ab1daa85c34bd1b781668e87e27b553c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5defeb6d8903b4146be8d69dbd807c548
SHA1c535ace79e2a93645419c281bb81dde82392ab69
SHA256d62932370350917de2c9649dae85912cd617632613f59687db82b8e0f54f6b3a
SHA5126fd25176412f54926228959cae3d78e5e64644eb44bf2ba8f671d7e7b997cea0ae23e7e9a8d268997bbf02eff7109795ca134b4b99a55cfed24780657156c051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50892f5d81e55098943c4de0bf251f4dd
SHA18d91a00fc87a67cb275d80e290894a92f3ade324
SHA2560488b67e666265baa4c848f9abffd3ebc348b8b2a25e6d3a4d4147b855db3abd
SHA512bc5ac2466b84a245935a1b20a46fd5fa1b6a4eab79473f03b7a62f32bae01c15d903a5be73be7c74c1e516766559310fa6bd154fb551127f55a69afe88683f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cbb619fe0754343ae4e1c3c039901b8
SHA1c93d185838a99b52aa227eae979bdb759427cc26
SHA256b781489dc25fe371dc5ee1fb5d555dea9099db7df3f464ebb4574842cf49cefa
SHA51231947cb3246af51fe2c75c8a3ace2dcfb8c18e65adbf394f54412b6cef1ff2258730cb0aba62bbbb3abcd832ab7ff81c0de50119465e73156af6929fe52c392f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59523c39a171d818a1cf45f6ee390dd44
SHA102a73c8e2eca4c49be00e8aa3bc8309e1310497e
SHA25699cd2509dd10375aab6e2df489d2893b86831aeab9442ace8e120886e0730491
SHA512e498f03e219513790f13e18d66e68ab86ae5768320b6f67a88401f9bb9f35ae318cdbaaa5adc4e931eee4803fc78a30dcc534b0796ddf47376bebbe66133a841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf2fac3eadc55405b0ee479dec7c727
SHA1496c31eb648ef393151079cd0b01d1930acdc72e
SHA2567ba88a04506ee4779f32d048a3644ce5028f0d6b9400d4d4f86ba006228869e4
SHA51287339e409902cee7a60027d45e8471f873dadc3a0bb25f0179fb50c59bad04caafcede429e8906dc13a8516036c9a47a983b4f3cb9595d12830eabccb16bbffb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b