Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
ffbcc0ac43a6e50909e851b306914402_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffbcc0ac43a6e50909e851b306914402_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ffbcc0ac43a6e50909e851b306914402_JaffaCakes118.html
-
Size
40KB
-
MD5
ffbcc0ac43a6e50909e851b306914402
-
SHA1
16ec049cc02d913ea20e4085f20cb12fa981f01c
-
SHA256
f770aced84384cdfd9b1aa633a3ec6f50eacafe2e503299bf56dee9b84b43390
-
SHA512
a2542916277eb86532fcb8905c31010c179dfd969c41582afffe19a31f33f8d06b2715f776580b9387690c978c4b4f656419975c02dca282260461d84f01aa67
-
SSDEEP
768:6ppGh0OQHoY0EFV40MnA1in0h0OffeyOmdy4dS32SBmQPsTKwPXu5G0KTwPJOqpT:6ppG2MSmovHGdPKxM0h7kxAlyBOKr4Gd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2010f2badd12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E511FF51-7ED0-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433823981" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000010c831b4b2545726a9be617668464b7247772f199da86702b162ec7a8023abb2000000000e8000000002000020000000c22da6e716f20f4af7d726b53444a193e66e55a2a449ddcee01a55c92f123762200000008b5747890d6a285d908b0eb798c68a6e993f96e90b77ea29d6590fd2e7b747a240000000c211c1aa184c35b6cb167387912ac069635dba6c9790256ada69d0874bcafaadf6b43a8874f872d1d39cc7b68d47d9110ce53765fbfd40b14a853aedb7ecb756 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1120 iexplore.exe 1120 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2188 1120 iexplore.exe 28 PID 1120 wrote to memory of 2188 1120 iexplore.exe 28 PID 1120 wrote to memory of 2188 1120 iexplore.exe 28 PID 1120 wrote to memory of 2188 1120 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffbcc0ac43a6e50909e851b306914402_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294b029365ae5ba755ee8758662a1083
SHA1667bf650d4df233bd777f7cf85b9b8d5703812b1
SHA256eac978f81139b8ee7958e1e15d2759b5a50babb80320ba10cd05c37bb6883c89
SHA512de4645a2ebade649c7b3ecfb7a835556171ca971d617b527568df03d6a15891ec4332846c24db334b30d7577661305c1cc1654e2507e3f65756377bb4b872484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538cc44165a9198b4fc2652c3d6d21c7b
SHA1226f3536898608039dc4fac03851efa50463602d
SHA2568e9b17de321aa3b5a54060ad50e548393c71279ed80d98d73a5679b1faea7ab7
SHA512eae74de54f32370cc49a15454f30d1176fdb487f3cf321e10cb70c27981b1a74f3e7b462c23373c00ff3309fbc54815902da80eb1e8af3eda91fe0e12520f9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598136bd2f047dca5917ef6105c3b7ebd
SHA12af4770f16d11f424e5c17e84cff9a9b6003ef4a
SHA2560e0b43d4ab88e29a8e09545d201d6f819e767546dee30d151b292a43a87826e5
SHA5125a50712fb1f60d97c886e1d0f46c250ae8f4a39846eb634c91c5a3a53581a858700f0843f48607618fe4b49d90eda3149124a324328a7c83ceda0828dd560f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4660caf17582281614d8e502d33333e
SHA1615002842c6e97b5232ba2832aaf9630cf619c13
SHA256d2f26c108ad054b4691bd9e179312fe3137d72820ef317fa8f5c91760f5e6f98
SHA512df7c15ff9fc4ee4156d120545f8bb3244c26775a02cd6c05fdf9414795f57ff2f388e75756e08bb42d8f9b1cdd1e66d909792373a2dd69401a0da2fcb4e5d5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0bbc94a209825f48a9b5dd1fba273e4
SHA1b6a54c1ca1c63a7fee9bfda5ae32a081daf08fa8
SHA2562d68ea6fd84fda254095f31e385e4dbf615ba40604de67caa6fed127d18d7d1b
SHA51268542275f9e3fe2268ee83d596b8ba45c5f5c02912ce8488c02a71811c7592799c433d81bfb6c473ae23fdc30e0e71de993bde909c3db75ef51b9ced33cde8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bd7e93130c30b74e1709f92cc20b15b
SHA1d1a93fd9916ac4b976b496e0da8672bb8702d35e
SHA256ed8947d68458a991c215b23c3884b0220a7df1fff16aac49eb1e3f4c6e8fbda1
SHA51299dbad2f9c50b73acca1775c21b9028ac256b76b0da0d49fd070143cab4e68519865277499d4c2ffc50f3b327bb2c987ebbece3cde1f38138999e6c1f80b99ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fede6cc29fcfb95f138822335e8646f
SHA1d4fe6324dbea590e7a08a36bd9d48fc8a34d6dd9
SHA256ba584d0eb1e52827e497828e3dee62bfb49bfe7176a492bf305d5e7b8bcd3553
SHA51233fe8f77157bf07d3e04626d82a2936f04321a3f778c49dc5944a096eaf28b6c61408a4fdc1c8ae7d507881104d61257d455fb7e6082eb4be3861e561ce15fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f445d50c1eacb30bd805e4c02ec15a7a
SHA148e8b678fec4042751d6b93838b94e08fac04fa4
SHA2562e9d8fc5aa3f79a13cbf3ed478e0ff6cce6831e035ad85570d18ecbcdf32a418
SHA5124b791a5f3964c685d3b2f5c73780b4b4474e28776d8db2fa52075b6a4e5f25d5deb51b81fbf6fbf87eaecaf64e5a2c43ac6ef6c180b83962fb849b15a432870e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3789a3eecc363e4793ee072f2704767
SHA13d7409a200b431529fa8cba323ce836dc64aad9c
SHA256d5161c9ea8ffdcef95f2688155c52899c42b85897e742c3d8c7330ae268c0d39
SHA5122693253d08cb40fb782e309fee18ba1018b4455f44b3fe0c6e56825839be7a5f3ba5718023ca0cab9e3e681462fe016a78274d36e071b86b16e048d7860512a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57898a2fc4b8b6ef2957c2ea20a5848a3
SHA1d5e1744cdf57599b10bf466e6c331bfa0b7d1c96
SHA256a5455a1ab2fb6c2b6ff2a31f1bb8459e178dd01f84e64ee3d8ec3bd23899f969
SHA51284ab8d28670a417bedeb6be3adb8d6328773f8a791b94d66fb1141e6bc1b8ef1527b80756e1a4e6a5676bffefce0353a040eae8f00499323e9799f1baae9f58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7a1bf99dac67b16c3de2428401eb22
SHA15664f283d21bdc2aa0923a508ecc281e5fbd7c1d
SHA256f7c1ac4232b05877c485cb7fa9d4130decbdade79835f54b57b5b82570e676fd
SHA51284b5e5e7f1cef6299ec367bdb1c5def008bc09f2a3c796c9c2251d026c6c7bf0003df790efa0ebb219b61c1d458c30483ba89dcb471ec8f741523d7b890835b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a9e33555252bf79a672b81b12883ed
SHA1a4cf05287681f42b98782ed2e3c59ce657ac987d
SHA256288e090b6c5b65ed14c529292ac7c518de008ba5bb7d0115e16f308a30add5f9
SHA5125bdf29f0678dff07f5f1e7d6601f3e97d2af8b64a479308d00e20b7ae62584e350110722feafe3e298ff130f931a0ef961f8be2912075648d4589c4f4e0aee08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec783c1dd3250879df2da9f2810ebe5c
SHA163d7037185dadc08a10cf11644cac74d6689c30e
SHA256440027cb46a04d347facaa3962eb253ab2fedf553fab76780bed9cb0868315a6
SHA5129e5e0c8e5afe3de20bb9c79b023419715122a12c372a527477cc48c1ff065f907d939fb2bb3dded3f12f3949d34a014ab3dee3b94fee9cec65c75c12bb0e7da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c031ee44a2c03940aab2f4cdfba593ce
SHA13ff3c7d9ebe5a12bed59bf7d550488126d2d27e5
SHA256d161b4a74a916b98d603ea842b1c75a5953b4f223c1e1afc3fe759806a70d644
SHA512034479fafb43dfae659754e0659f52b177f8332a87b8725ac260adb2b853f42a6a2cddb5da07f890fbbc0ba84dca1222c82c27cc848a4c2573d82d6fd178001d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91d59a537330894d63008fc012a80eb
SHA147fe37e8c5217baded5da28aaf2f96ba92fb2c68
SHA256b1b1b4b3c6ff4f73a7b5d433433f98254af20752519eefe17c3dbbd4b7fead1c
SHA5121f50643a87b66c1bf6e518ad759d64e27176f58985df90b0ee0cabb0f1f309889dbf9bcd24a706ad137102990656e2bb21d10cbd0f5d4bdd0ac018610ecbe8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50411bda2bd6149da7d58de5886692f7c
SHA1d071a715246040e9b98d6f5c0e36586b9045b079
SHA256517f2fbaa91b1ecd572570a730efcd4b6a00b0c3df307ba95f9cd6bf606e49bd
SHA512e3d4180860a1d138601afa4bc1cd9c9d89772ed06fdf3e687d2ea414c306d5b71baa92e46ca9900b0bc9764033c54732023ac95c1066bb1b8bae011c35d910a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea39983e04d4f6740ff1b5da2d7ee35f
SHA196f13ddf4053b016e81471b4f868a8d5ceefab7b
SHA256cb164f2cda1bb186b453e6f39f44e8b0a4cffa9d532cb08b67b501e6e720a519
SHA512eb9d177237d126ca3ddcaad042b83024650bf8895bc3c29b9c121d92277f77105471317382cecb616f80292a15341b79e52e04a5c7791c0b9ded04a9fa1e8092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071d57e555beb3cfc74ffa853d499ebd
SHA166d605cab8e855e0fd4435ae03b8322c301b0fae
SHA256a1affcdb9f3dafbd60c371cacc7e5ded11a9f473b3e44d58e286439debd1c04a
SHA512f0ded0cabfade116470fe801c0ba412f3c0c2b402c3e0334fe6bd2ebe63bef1ea3a646ba76841543e06190094eef6f4f6e983947bc5d6040f52877539d89747b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509cb7acac2ce86aac6b874e59685a859
SHA1eced890b3819b84fd37889baf0d4dcf2ab69254f
SHA256d864e6406ee81866adab58433abd3846c1f3fe05f43bc5e2985c79366375f3f8
SHA512fda56730b578442068ea7663ac3fdc2ced2bf9fcac3340dc5a75c3df6cc3ac1041f87c3b50590efb7bd0e1451c5216157ef613637b531ba99baba3d7f01c7252
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b