Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
ffea9e7776f51744b215c08bd536d374_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffea9e7776f51744b215c08bd536d374_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffea9e7776f51744b215c08bd536d374_JaffaCakes118.html
-
Size
6KB
-
MD5
ffea9e7776f51744b215c08bd536d374
-
SHA1
81510510579b67339faa1b49840f7c35c9d48334
-
SHA256
d97ef38fa91d68d5ffcda0dba0347436d7958982c7250278cf825fc93f7d2dd6
-
SHA512
2a24ff16aaf73ee59eb4db1bd92caaa6bd14ebc343a11411bf03f7e0d4b140cdc2e93360d5e5f2ce4cf21509eef1e5b5f51f8b15c61e2dde36b93887a5d6f828
-
SSDEEP
96:wq2xB2An24+iozQwbdMl3I7eGafXyY+dvdROsSQQaEjfeeRvSfJW1qlKhLFUp2up:wxgy24+44See21L1QvMAFUp2uzN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609fee20ed12db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000001b31401108a69d92854c94f982657fdee21f5c63e986fae0b00fff84b9f56464000000000e8000000002000020000000c8b5938f4952ca7be88c40e43ea82877b822c440b48e00b694dcfcc08fd8239720000000625da6b88bc11ff4ff13fd0de75f42e5bfe3f98a8fbca8cf2662fe05faffab43400000001e43db91307757325ad3c4f8be6d3b4402803bcab28edb52b2aae2b8574431d76e856a1053382b2e3414e34c69334de0fd0beea73c52e65a10eb67a73013f0ca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BE435E1-7EE0-11EF-BFE2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433830595" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 iexplore.exe 2444 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2876 2444 iexplore.exe 30 PID 2444 wrote to memory of 2876 2444 iexplore.exe 30 PID 2444 wrote to memory of 2876 2444 iexplore.exe 30 PID 2444 wrote to memory of 2876 2444 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffea9e7776f51744b215c08bd536d374_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4bd38078be0732cc48c798ecc5f552
SHA1bb9622089b8015911f69bc1a0179eadb6214547f
SHA25627ac27bfb5956ceeb4fcfcc2abf35401a1b1bae3242194fe5b8ba49423dd2379
SHA512e99c1278a14d6061af60a09406dd369bbadeef356b2345e97d9d9dcab365ee97bdcec4f47d631fd501c7da92a03eaf79d2549c579601c02f6721c253bf07f194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579038db403a22189ce47a1149df6ac6b
SHA1e9c3d685f3b1fb22b3017587dfa3520a7ad92df8
SHA256edd83ec10d18d4d71dd0ff30c9ad20d42f08d60c904425f0215b295a11051e92
SHA512a8d2914653156f660e0403e4d12e81894a8552067da1b51bd16fab2efed0cfc76b68dafb7bba27e53d0776e23b1ec59cda3484950e2fcdf6b8420a0c41861869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1e8f7d4321fd3fcdc59047e431e8b2
SHA192ae1044a1b7bd1bdc77f05d3567afffa61bf191
SHA2564063d6eb8662fc6c76eaadb7669b836be26976762f53e2aa2ef13dbebd0dbc92
SHA512251b52c86d4f9efbf5e398f53a1a94fe7d0282683774c0913a7e95ac2b1c16a8bfeeac39970e8438e6ff0fd2f470a63a2abe532289bbf5a194d470677125cdef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e778763d922e7e62f48c5013a8f736
SHA11e1967477470bc1efbfccda9250e06a62ce06397
SHA256aed0f652d0e9d72cf9f4ec65c9a09f0223d6e553835b8bffa1195bb415aca178
SHA512a86cd8b3cbbb4c7d109bd4570200877435f6cf257cc5c4ffeed06dd4e78857f17673b10408014c22afa4d3fa2ac6ac987bb106fff9da9359ed864e9209f8eba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0ba70383f3f8fa490c4ae098df4558
SHA145268ba19dee288963d74866d5cdaa4565d9992e
SHA256435f9ea2196d069ad80f005337d3c1622432737619812b283998f30d750e28b6
SHA512be82e3eb57990c4cba1cb5f27b6978f14dc9325fcf25b23790ee5abc9db1defc73934ac398f484da2934e0309ac3e9553d99e0631e56d596b5290ea3a03b81dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbbba88d3301ad37983caf59f1038262
SHA1d3fcea2ed27d015d328d17a16f2cd3e07783843c
SHA256ed7600b4207ef3c99b4ed35f23bcc17c9374b9bdd52f04a232f74acbecdef72c
SHA512b29dc1b9146efe86ee2fb4cf2ca02bb6957a7de3a76a84fac873353802a511e6ee313b4f4585fe87753ff3e9eba513af76d0b52e68b5735cf09ae51cf768f2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad9a8bbf04bec61c6aa1a398e026db2
SHA11637fd3480db673e7d8087c4049fcb473a093cf8
SHA256397e6c85102460df8563cbf67d5f4e2b619fd8aebe2e868b3a739a3fdc0cf5ce
SHA51220fb5eece281a7fd4e831dd0fb683e6d59c07343c02cd5bc1f02dc69355e0b19b7b1e85cefcf372049f0c9f1e3348867413599cff40c96aa02a94a634ad24a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5067f4101ebd4b78a34df8d060a671885
SHA1bf4861eb6aa80770c8446a6e01c48977e0024e49
SHA256188602a973039f725f920208b1df92684c9ca119efad67ebe13821a3f56e874d
SHA51237c697c7308231ecb91a8e1873224cf887a6496f6145c3a680bce1aacc000b3512214bcb7957e1375fbe4dc30044db799cc41b19cf7214c8d517fd49967a2aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a586f8fce798420c2ff5d1c5eeddfb93
SHA11a2c76e2dd16d6ff3376396031c6b2ec0223dbce
SHA25689b9bc739ab482197b5545e555b78efa54dc456150a24d67654ba49c322ae3c2
SHA512291a1c012134508a35aaa3508e5db2484fe1cc5699bb86bb59253783604f62098cd5a7388f4cad2b6c9c849cfa0caf8ba0703400e4fec9c958b0335179d02ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c3ee49250f09b6b9e401d115f684d9
SHA1deab4854916a31c5e149fae2db39f52c5c5245aa
SHA256468f035ec9f1e6163c1a534cc36290804939708297c57b40fde96388ca1c90ab
SHA51240b51bfc54d27e594b703d71a6957ffff46cbaf27cc316a5c3ab865fb3d11f172e3951f50357bd49f2417b6b0205a04759f36c79233b102dae9232c22117ed28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caeeefe9d5618e087a059a832c463b03
SHA16cba35e4b71cdd97a7ba0eb683889add191c7458
SHA256332e513757c5d8180750eca49bfe0cadeec2ded0b8fc4c457ef9ede994c53322
SHA512618b609777c286d4da631c25626793c53c8f2412bf964712975ceb032f74be02356bd2e1a212d9c612d3b1f87a3ab208a59f876033ef15fea29dfae8f73299c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7261b51f0be406ed66891afa3527be1
SHA1782c996e8f23d38fad0e67fe66593192255c1c7f
SHA256ab9d9ae9f557ce399b2ca8ec4717d91e257dbc51a4144930c5c92bfaba468ac9
SHA512f95f0585a009552e1119e78837a9fbedec270da087e665461a83aa1b01af10ed940c50fe29078cdd46523311a0fae49adb3ae2c30952e35eda11ccc7daf9a1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efda43f21e1d39d26ffc601d8a82b338
SHA17f20b0992ec7c1464e2685ddfa1025a61b4649ca
SHA25670f9df8b4a3bdddcafcded3ba577a1a17ad25f61c02232f8fe9001228ee11998
SHA512842f03fdb424133bb562b4e37934223003eb1433fe6c3fdb56a2baccf78c6570c24dcf7df9dab6d8e41525578fa2940fa0b3b10951f6880b7759894c734fcced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ca45033d5bf4fa011d2d49ae2a2e27
SHA15fd5449845f3383bfc702bc6250cc2969f87cca9
SHA2566361b5152afacfcbfa6f80c62919ba00f9151c59364347574916e524682d315a
SHA512aba43461887120511defdfa46bd79f5d64573e82fa7ba2b931185711d66389d2ba8ed66bf77d1ecd249c37b37423bf32522b6ed60256c96981390f5b684da96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407fe54d0c78c9e786dd94552581c4e7
SHA19d23eeb69c36ac836c10d400d31afd11ceb22db7
SHA256eebd571ea34157a838c554d4b9bdde75cabca2f8b9d1f8736e24c555bee9aeb7
SHA512491f5aa7841390beb337dd746966c874e24273a5f4f0fc0041b12b605a87670bfd2cc018270431d5617a3a9ac80267edcfde76d93bc4be00d2b7bc0301f33191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfea8d22bba2151db3cec7afeed2c6d0
SHA177a167be65a6d5578d8fc35bfde89e5f937bc2ed
SHA2567fa7731e342c9d5c8f2144dbd31a1780c7818763ab2c042d5f641f0d1639ac13
SHA5122de05d1bf97e0a155e6e1c0d9cc0dbe7a4950d8e24554b21a97068a5557b35804c2073a47b62bcd37c2d5264ccf409b9236a7199ab62449e879ab7145afcff80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfbb43ff3a30153d4ed07abbe027f69f
SHA144b4c0124a92647cd055d4563e312dbba72c2ebb
SHA256ceb8dc73483a511fc71fad8ba061843d8883e38bb6b846a29585b8e18b371a3a
SHA5126dcd36ac38e9c7b12246aab05b28f19ffbf7de652d8e3a727e0d52d979f0e7101b27d2c524b91fc57aadc498b7e49f0434a39bde7564a4b1024f55db38bca818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1015ea62863aaf7d5d11f96761459d7
SHA1f41a59a5ec261fc58caeffa393c59972f537d04d
SHA2569d7f26571575c5d6186ee772f76937919b8e42ce927597ca3d1d47706a57f236
SHA512e8dac24d0d8f48dac8ca4feb7336551c9e3ad34b883a83baed444cfe8bbc8be4925d54a56fc931ea34b23aa6019f4b305594835bda66d9759e9d42e51c68ffda
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b