Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
ffdad89290915d6c6f98f31f9b327adc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffdad89290915d6c6f98f31f9b327adc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffdad89290915d6c6f98f31f9b327adc_JaffaCakes118.html
-
Size
11KB
-
MD5
ffdad89290915d6c6f98f31f9b327adc
-
SHA1
6b908389c4ff9a00339698e8350657699d4fbbe5
-
SHA256
1b98bd4fa00b182d350c6eb6cdf35e1d71441d7d362a5fa11c951965d75b6b3c
-
SHA512
efa99f0b9f2093435cb44832ab3c2123fecbe85048333b8df75c26d6bfd140fa79ad4f583ca733556825b8b764fbcf6dd5009f1a1e3df0c993b8a41cd63d0686
-
SSDEEP
192:G/M5eS1diDD8KJMlR8HPHFjYg9pr48nug7JFzDacVw29ngMTe4ZRm:GxSjlqPFEyprug7JFzDacVjy4e4Tm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433828347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E679631-7EDB-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503457e3e712db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000fb7340073c7c8f6fcb7cdc687f28d6f70d4564fc37db57aa2d9a9f64e3dcc776000000000e8000000002000020000000f1328b51bf049aa334fc914878a286d7a7688dcd99fe3607dfadbf9d3d1f932920000000d6367d9fcb5feb2da1dba3f23709562009fd5416e94a3b888c412288fc453fbd40000000cec871d7657c8f0754207288b9547f2c5bad7c0936c67c908725b3e4df13a679f127851169ab24ee729c670bab8e9e49999468ba3f784c9d63f77c68ae217228 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1140 iexplore.exe 1140 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2276 1140 iexplore.exe 29 PID 1140 wrote to memory of 2276 1140 iexplore.exe 29 PID 1140 wrote to memory of 2276 1140 iexplore.exe 29 PID 1140 wrote to memory of 2276 1140 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffdad89290915d6c6f98f31f9b327adc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9d67e68c610902104de0cbebc84aea
SHA19141b13dc1e39ca9bec85a8041b1071848a297ed
SHA2561f350067f94538d15acca5d1b9e53fc4f55d742866c9377240edd31e29800206
SHA512d71c2b36390e653e0787c2b9f978ab7c7a5be68d4ae729de14271b61245ba31346e27b75457d9852cbaeaefad592c5b3f11814a3a7bfbcf79fc3397c354240a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564fc251b355643959e6d89dcfb135d4a
SHA18772d5147629efada04b9ad6b614f095f36974e7
SHA25674bea4fbd3e916d4b674128fd6da3d2593a9fd00346a751cbfb0b391583b01fe
SHA512a8ab08ecdfd81196db12b57ac9e2a03bea3b6cc789bb6ab57bd4692ee6c6a537f23965ccc19ec064180518f8af9bdda716e1d2ec3455084b1ab90482af3276c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bbe8a6c951f0998647c43de65579add
SHA1319d84737bcda1381980d149019d4c0a90b00348
SHA256ad30606f4683bf052db94c413db2e1537f3c088ebd836f4f654229f6ab3f0cca
SHA512888d712735fe22c3b2fe3ad830ba6203a84483b4030e9a432d626709f39a73957310d6ba16c6ed55700804977ccf0bf92f4bb56154648d3cdb4350ad9cd6b3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef6db31a277137e70e46a2b6cb4bb33
SHA1f72ace84309cf5868c348c060425c5b61c30661f
SHA2562c22c3b46501266d4fdc5b0f1998eb2c3a3c35642e64cfe08ef7d1aa56d5f9c9
SHA5129b2d27aaa786799eb939c5b4a5f6fde6de781b8556e4cbde8400d390ee1da908335d6144a599c35775bdce492b78dca2607ae27f17c19d54fa62631aa647354a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478e0761da75e17768c747e3c96f031e
SHA1f40a0236d0e4525e821c9512f6f590b246494d3d
SHA256b048a9fc7c88b26bcaa1ba6d9d690b816353ff256ba941c472c34781094c424b
SHA51286f32ce73fc1713acc679612b56e0843ea2fa8e4ecdbd4f55cf7efd8ad9d1c0cc82f597c6fb5afc6fc89864f24957c8e67d3f3b8d73750a27499d76b5ab39863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1c798bf25e1d576be8d1a9b357d420
SHA19950f26416a93699b8e46bde8bab63e780ddbbd0
SHA256a42da2748813507b917db5aee1ad3a550f9659030f379b05efa0d69e38e76aec
SHA512ae10a73f8727244e82f03e12dd8d6901e43a62b08f4f4e93515f241a8af935fbebdf5a2e217dd8821add88f106f17f334b3959705bd0beff0044830995f71cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2a3845ff9d2d1125d251db868f2395
SHA145a844fbfc292676a6d1809e5bdeeb95be53c395
SHA256cf06a833db3b9d7b26bfb780e72b6579a3870ccc7fc79ac5b9ce4ee08cb70462
SHA5124a733528f84eed0b79f61043d7b6e8b93b440dfaa4242659e5568cee374082cfbb84ff40964aa178c5548bd5bf5537642a30eeb1bd1ba27125a4e16a72c7d621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfb7d7abcf6748d0126211a482529f7
SHA110a03fd4e83c709a6f90a5c8534a54e5842a2dc2
SHA256d49997069ca09bce596ec1e22419fb1737ce2c500c316a797435002dbbbddc31
SHA51201f9e0fa079c2c1bb8e25670bf98ad6820f40a41746019d31c255788f116e63f6777dc87ca910a0602be71a9685edca904b016f376833db76e04d375208a000b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52440448fd6e2773317e7c6e65fab45c8
SHA1d73842c8103683ccd671b958a6f5fed0e291c4d7
SHA256dccf8918ea7f18aea9393f79bacddcbc0dff64423e23dd20705076283dcdcd8c
SHA512d8a6d5fbd396a89ceb379663d1dcdbd56a6d5ae2d8814b46da74f2a594d2b16f750ce36ffa8c45f8c5a67c431e87bbf0be54ce789c4b0f9b7a4292260724658a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f388fb9f5f86daada55d30f91a7c025c
SHA13c39e0823ea43f8849baccbf9223ea32ce2a23a8
SHA25654af586324da1b0bb4b1d31ddd278cd4a33a8aa1d376500bea0a3d4c4aca39e2
SHA512935a4ea777f68c62f3fbce1f10868c8e3e368d43e4060c2f1271e15c92491ec0c8ee1fa6149afa755f0a002ef3fc82f00d32ff4f430b7535611c164425299b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1cc1a24ea3ef951a3d7b19f5bfbe514
SHA132486071c0cf41028e364848d85b2b23bb877584
SHA256e75e2f778960ca8cae449ff8ac694f7ca765ec6d339c8345e3d240d4e795173c
SHA51299e2141ee58e739df961721e65e5e933fbcb94881598c0806d064b3d71262ba83fbe60adb2d89f5678202ce5150b91d466216964764a3d974ab92b04be9f625d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c9bf2799553750b77aee346dabdd90
SHA179804095038f918cb430121323388e7e12f3acb3
SHA256011e565b2253849ef22f0ff30a7aded9f5633d1cd7a5289471526c54e5bc46a4
SHA512d7bb0dfe25da28b87f7b869d3d8f0959808aa41ab83ae08fc274406c6bd10d102afa96dd04116b417e12e36356a9ddb56f1c056bc01990edd6ca265b79514525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e1664e04b20f25a0ee4e12c7be55a46
SHA1117a62cfa8a3b19f8cab25e7c9fdd72cc39bee97
SHA2565c6e33c1d4db435e5db6d023060bf6f3a175eeb5a85f04b51dab7e6f53040cbe
SHA5127d5d26266fc8986e5f9b109aff5194d31b36b9ef34c87dde50890857e7db3b3e582c434324d6c6c63ada6ed3cb37c910f69751fe35b95aea0e40d9d5188f0ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8939d154555ebe60ee6e6990c6cf5c
SHA1f6cad53f104979e0a4ea929b53c6006239de4e0b
SHA25664c820105532d54aaa8c47a33ecba2aab3f69513a6923840cb800d0789dde5ff
SHA512d0babe2354dc5c5193edb3aac1b569f64fcafec0f4164cbd2cbfa70c65287e4d7344e337aa0c4836aaba9342a72582e27c705a712c4d1166639231ccabb46560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7258af733a8beda2bd9400ef6a876ef
SHA1b502467d4cc1af25b459cd3117b1a7b680ff681b
SHA25613065078c7b6d9a82e348b48f551bc2f6b32981e9b35837aadd4444e567c45f3
SHA512b4330ea09c0f8c540d213daf3b81531de21ef70df3eed65ea5e7d23919b46a6cb3444f78ed47b0e675caeeb672442a05c170d592c20225c632f5621b40824f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51036d861116d87843da951be42e9fd19
SHA1f1a2e2b393ba5e9f59048245dff4a4c70da1641d
SHA256b1b88347e3e9b4912e04009cb047357a628cf4e948d8b58fa6e35e2930ac0ef6
SHA5120a0c074cbdaccd95b61eb79ee6727980ff370ddecb79d4e42636bc11226db898a417591fbde764fc3aa2afb8edd3068723d971816633f3316b439e5e634b72c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563aeaa1589188315349f430826b59874
SHA1c24ccc23713f1495a364ee5fbbd18624130b0291
SHA256433a4c83b9a36ce0b7203c058e2dcedc9264303828f46794b7e33659eb922fb4
SHA5127a9c95f74b791d84f111a83caf9a9fc7323d5f96b3d57f4b451779add3c48c1b7e3faceface724998d76f4cebc989556762ca55e0642ce838f87c491953530cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e0a8d0df0c0d2db42e687330d2d293
SHA15487481de25607c8f211d271d1520e422c307cec
SHA256565db0de6e7e7b968fdc33e035c679131170d62d7e68f527627868ca1e8b6e83
SHA512c027fda2b698d390b1f4e79eb764d35f6b5337cd9dc12fa3b766fce7be7aa0033909fdd35723b02884c31f369cf2358668e63f04c80828b008a09e38602c30a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b