Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
003fd6230cb9e0d667a1c5658bda5d9e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
003fd6230cb9e0d667a1c5658bda5d9e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
003fd6230cb9e0d667a1c5658bda5d9e_JaffaCakes118.html
-
Size
53KB
-
MD5
003fd6230cb9e0d667a1c5658bda5d9e
-
SHA1
ae8e200d834f947e26a7e3c2af6a0f9305e2b53b
-
SHA256
b455151cbd63bf524939d6dd81c2d94e348f6213929ae4fd2715d090a9be9323
-
SHA512
750008add647163232f0b3ae5766a7464cdf46ecc167cca9276286ae142a86995e159d40849a6fed277114ee861b0fc7657fa0b8beb1a33fc92305ff0ea5fc45
-
SSDEEP
1536:gQZBCCOd40IxCenLVfDfhvftfdfOfqf9frf2UfZf3fYf/fNf3Hfafufmf1fzfDfa:gk2O0IxBrxF1WyVDPR/wHFfCGudbbYKA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000fb4f1227bd81857876221d994e4b11d2e70b206c543064bce0e3afdff44760ed000000000e8000000002000020000000af14a3e70ee57a861fa1251633c9bdb96ecc6086f3d9a9a6816abce46d334a89200000007f93ae8c666ba0a63488ddd034f81912d6399e0c1d753c720b6f6a9f21b51cc740000000813437c0c177b34da7fca9eed6889ad7f50ae020c03d2660d46838803946b5857cc0d859925e7ca07cd62a54aec5a5593f0a66deed54935982cf7f68e1ac8163 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF2A8CD1-7F00-11EF-BBD1-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805841b60d13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433844587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2332 2524 iexplore.exe 31 PID 2524 wrote to memory of 2332 2524 iexplore.exe 31 PID 2524 wrote to memory of 2332 2524 iexplore.exe 31 PID 2524 wrote to memory of 2332 2524 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\003fd6230cb9e0d667a1c5658bda5d9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f32605c21dbfa90cd2caf470f1bd36a
SHA191f040372bcacf99ca9fb40e260102719885c94e
SHA256cd7e4592c3efe7b055069ecbc6298d0298e9d902ab633a7805591e7554cf6473
SHA51219b075c76331a9727d9e3981bff2b28996561ae321e80b0b4592584e2ee43f9c5a7da977048fc36bf851a5d23869edaebbe75cfd583552bbeaee9158a9098f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52706e3ff030fd074c2b58953ff49ac61
SHA10290b7af2527ac587ddb02ee441d12022a107594
SHA256eb58d07a5e29aab1c456de6fc39af39e3811390054f2c92d7c35efd07932cbd6
SHA5120fd4627daf2195ea408c1c01447398a2277464ad64ba64f34308ce142ec0c93c3f22e5476ef8dea83c11a8600f501563f31d6e20a878a844e703c78f9c698292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a86c4f1e79ceb43d9ea5d482d34adc
SHA1ff55fb1474da8ec6eac6cbb47ac1518b0bc168f1
SHA256d72ff0d086b77dd585bedaa915bf5a8e9a831979cf99b25073c51e8b03796541
SHA5127f77ddfa955de8ffff81811fef1e9fed67a67bd342065c968b403084ccff24dd31db86b5feb3db826127d03e29cd0ea0a0587f7d075c1ac24134da99691bbff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91080042baa935d987f11b648adfa8d
SHA1bac8c985c1ff17cf24bf3f74d992f4cb5d9ecc31
SHA2564f9c2726b3ba387c5cdfa1d6e0d20db4ef2fdaff9e207d0784944b020dda56fc
SHA512bbcea7fb436f6f6c629d28074a2f7729bd51d0ac2281be0181f74052838b8ae2ee55968747ac64994143600113142d47b2be74fdb9f26e89ab810ae4583d7dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24d1fa8089019de8e25a12eeff1e0ec
SHA1204559ac1c58e072ed559cf6f4f80bb8589d0e2a
SHA256e4f81e4819ed8e1a7c22af228c09e341a02acd842796a2adb75e6cc1a792ae20
SHA512003e501660fbcc514a4e8c7a7b853ef990eac0c2dc9c2ad35394e98c0db6ae4653a4be4c56129335a66bcc5c95ad98cf76d00982c252412ed6d75f51e4cd9f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53326d229f07e8c0450a50cea14d8e048
SHA137d071e8a9dbb0e0fa5c487ec90acd31ab3138c9
SHA256a49a3bf84cfbfec1fec4525e546dd82cd0b725c1cb8221085fb4a25513c165fc
SHA512e24a9e2dc5f0e309b761a9bdfa2b71a7add3093ef33075b6a75d49f0581f364d2180aa1bf6fa040acd64ee0ec8e9bc8c8de4bdd8e99abcc04958e6f3e6761ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513255c5339a27b200319aed0fb0805ea
SHA1fcfd1e9be79b2e41256eeb87a49e423c014b1d81
SHA256e9ca25bb67d11b6aee2eafcd5d735b720f6bd9302bdc86a9596d5ea7bf5426b4
SHA512ca8ca1203a7f0e87556cb3c5b6a20db2e0fe6b0621a43b90fa010efbecdaf00836a227f894c88496d78a8c8e304bc11764cd580a0cec03d53d4abfd429753745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c0c91072ef472037e9b773e4cec7b9e
SHA1dc05612e986b49b1d4c448c4a1967ce17fc850bd
SHA256b2b01b26f6b0a5a3131dfc6283fd7acfd5fc733b6b045d841fd0c294c37754c3
SHA512890ba2670d559dec1eb43e0d41e42565efe4f2648fee76ecb99223722a010a9fb69f4faf7b32417de4246d95cfdae211ced09bec68bff8404e518158925faff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578699c4073dc7c8cd35c6ec8ee5d8b9b
SHA1663bd3a6fa9f83bc6ec52a7ae39e367f39d5705d
SHA2561027c376e34f525983eadfc853a8cfb6f27142a88a454eb676175ac92c14ecbb
SHA512876b0e9d7b5271430451b564897532bc9e1e6d548998603849e39ce7dfe80655af7f6bbab541624e8bf3734dbb69c728c87904b2a1527d1f71c937cd9ab2219f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a6e5848e3f768fb5090d012249ea85
SHA111c968904870081c717b7e9616e75abf3fb28ed4
SHA2565668ac544f484a98bd449cb8d2fc147d973ad72adbbcca12f9c523d6c179b1a7
SHA512a24ac0231c4ba24cb024b5a9e7b6a7944698df8334628fbc0b37c79ac098c958a632f50e0e577047757033d7bd96ac62c13205ae1dbfcd4191f211890612a7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb1c8c8940e1015b3db7b32d3a7aeac
SHA16484773b3fb906150fe22c1df64bed2b7c0ff8d6
SHA2564366bc1e9941f296f78306ba2a602863a56a119dd8ddd6c1b99093c11a55ee79
SHA51247ef0693a0bd4f27b9a9257942d32fd10b565724fd65cf944fd054709d9522785bbad202406c03c27481514972b22cf9d4df49a72da82d011036a27ba5d775e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabe21f93156919428bdfa707c3cd2df
SHA1c8e8977897f41e76084251384a3ac6e286c95fd2
SHA256e25290f39be9d954fccfd48fa301e9fe165c629b152f6e17e21186cd5865b311
SHA512436d29031d450548d151760f559fc46bea9b0999c881902b0d0c255472da979ba5ed91017c4481a682e3b0c448546efc6824b33a53af6119e2822f0be8ab712e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58437e62a63f65d70158ba9d13d53f0e8
SHA1f2a600aa5da84b0a70a369ea00d60aa506b0ff22
SHA256d8f0e19525ab8d84dadcb87e70b8175b68ddae94922da6df72b3fd4e5d5c146a
SHA5125c4a1bdace8119619957c76caa5be8a710791be0ba7fd162f6cb174f1cdf2710940cc15dcf4479e1df5836782201895ee8c821f411d7dc9e74b6211e4157730b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7af2beaca7cd60195c401c8d1d9835d
SHA1ca77005bf9fad424bed4b3a8475625c5951e57c1
SHA2566ad2249233e3561b887787bee516a8317a4fa848c9edc099758097422d1026f5
SHA5125e07fbc7b4e53cd883fc6d3b08144fb1aab6f2a0bdbec91c75fc21d1bb9c8231486a6101c74c50d0d003c477ae69cc769bf7fe3e6342394907cbbba2b8d2e948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6e64824dd20489d879572c99421d8a
SHA122234b6eabfb125aab1d4ff348f44b2d6726bab9
SHA2569413b2070ddccbb6307f827a2c71133cc90f2706128591e2c84031ff1d561ec4
SHA512226af2a1ec8dee5269b8f085287219c7a34ad47d971ebcc01e072bf7aeaf226ce9977cdf8b98ca14ec39cae454a19c23627d461c6f664367bd0785067d352e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555125aa89b792365b8338fe924c5c32c
SHA121f5da2c5bd0b999d76946e2b4af994696a97d71
SHA2568d873bac9fb227fbf970544e047e91f20de6bf6b611b01003d99316e9166629f
SHA5126be65611e3fa42c23accb916e0ef338f63f74828f43dfc5e44c8d43697d05b058f2d9daf1cab5cd998dec3b10c67192f471e505ae4c4212a9ddbcc7ca1482532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e18b7d5f6310126d414a4a33f866ca
SHA1d7438858d1f04bc984fe9c8ac6fdfcddfe19841f
SHA256671f9788b1d2a47a19c53cbdc515213fb84582fa02795ac9b078dd10d33e4961
SHA51212d277c1f87606471791ae423b3fbfa8808b71377129178391127ed6d14e8c865d8b45ef6fc861553bfd1ca9323d45bcb03433644bf3d201bafb98b5f558f67b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd9382072de885e15f0df5bbe86da99
SHA1be99c66ee635cb53f3767041910fd257113953fc
SHA256fda8646ad098f3a32970c6f1a8fb1a82dd5fda3eebcb08103cb218e54bddcfe2
SHA512e1d457e7dfe569a2571d5b496ecbb3310cf700c7a0dbbb7632640d00604dbe5cea93bbac2906e7813d031ab7dee66af3ce722d03c95dffd918a5186ae8facde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea81dd0dcc7c4e4afd7e99a417b19c5
SHA1e7c4cf33a1c6ab61982cda38e973d15edf5f37e0
SHA2564f7788c8f8f0ce6ae34d0c41bf02f2d59ec03da95b50f8d7d2aad246f7b46e48
SHA5127ceaddd5d760e98b14bd4d9005d63d482eac3f326363e221fadcdb2c2b01cbf7bf2f39ba30a712f47b4ae7ad9e1b3945a753951b5033c27c25f1452f175f6330
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b