Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
559d0d66220372d4bb3be273e8d64e39_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
559d0d66220372d4bb3be273e8d64e39_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
559d0d66220372d4bb3be273e8d64e39_JaffaCakes118.html
-
Size
6KB
-
MD5
559d0d66220372d4bb3be273e8d64e39
-
SHA1
465e0bbb9d44d25372e9a18d10f68e5313de8c40
-
SHA256
c7db2507beb557c9045921c371cfe8b571c59ee9e873c0157d4c1b4717abe95e
-
SHA512
f9f2c783d253b3cf326c0e759b0d2e40e2d16340a4054f9c94428bffcf1dc6348ad3dd9f533b0c47cf098661f573fb9b01a384e072e711b9fd0198a791613d80
-
SSDEEP
192:t/A7l7vFZ7v1VA8hWl5lDZmgATKaXIuTW5:VWfM1ZmGcM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00cbe361b21db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435389701" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F7BF341-8D0E-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003046f22ddd211597b70be97a30e233b7169a57483e25faf992c84d990ae80d71000000000e80000000020000200000001280768b2d1d07159982ea576f418a97315e2c52cae6dd726a267000e817923d200000002716f6e6ffbf55cd28a2e625b0466a670d1f622855dce2e5f4132a0e40bf915e4000000032b453b29d40867499888f7594140890c73a7a6045315934dbbac37d9af0e1683ce0579c541815afae1901f2c216da81b341439d74d920a640b4c4a34589e4af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 800 iexplore.exe 800 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 800 wrote to memory of 2584 800 iexplore.exe 28 PID 800 wrote to memory of 2584 800 iexplore.exe 28 PID 800 wrote to memory of 2584 800 iexplore.exe 28 PID 800 wrote to memory of 2584 800 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\559d0d66220372d4bb3be273e8d64e39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54187c5fb24384f91f776f4fb3c03780f
SHA1f5f2c31eebea8a606553d94b035be7a307eea3c5
SHA256501db867cd42fde3572cd3a7911f9ea11d42dae460fd416ea014672a10500be2
SHA512ab710364b6067bff4258ca9ea43c063dd800bb0d98f8ce453ab12fd0cd08f84de81eb56f93fe0ccd580b5e1505d688cf9a7735800162dc12c7e7f0b5403b397d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e4a379091249fd07e684f7af71c1e68
SHA1a1864cebf7aad4cabfddd2140973e617d7d93f82
SHA25601408ce29b0bef1de9d0da1c67c6af0f305c6677156d85d16ca4be50b005a7f5
SHA512959c90762ffe0603766a182c49e935fffe268cd83a99491b320a58c560a7d8530e53c4b903a17bc017c326ca6189ff1da4d986782a6484b379380e6130c7c265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f3fa2e700add938e873baa8c34d5b49
SHA1d1fbd76b85f370919e33d8eeb9d10a01ebf48083
SHA256905712a9938ee39752f4bd122126faf88050583232af88d97869193b68f0bc2a
SHA512afd7096443621f0c0803611d42264970486cb156c302765194e1955d1a81fb3eb7cab7e5f6521b6f6a35d1a90a6ce3939b83794abfbb819955cbab68b708b2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a3d04fac6f93c09e3654aeb1be0507
SHA1de4e1cd450fb3d37fbe1a411ab259bf2bc79a2d8
SHA256407c0f49b8c885c035ee4bac4809e187802d956e9cc879121f620e8d42703376
SHA512b0cd315741cdfb3e66676d75cf1c5f064b071e699acc740f393af3bda4b9bcebb147c9b774a59e4b92841a1cd750d37f8ab4a804a23227427980fdef944e36ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6bcf76b50413d8625b6e0b9e671997
SHA122ef5a9b8b0403d6518f2cda5e0b86b8c4f4736c
SHA25660f937bdada5840d51a4e4ac81bcef7a9f23cae2360ae699087eb7364a2176e2
SHA512914a23cbeea3f3e19c1461496215490af13dce53f6308b806851059ea3dc1cfc6888768918c4085f3daadfed6d4fc8b217984c1e32759c06450d7b97f499aa31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767c8de5edfadfd2184335ba8e72d790
SHA1b940fae3737212c457b6d9754e7c72de6ba2899f
SHA256ffd27e97c6157559725bb03563aa3108e36208de7ae82a23d78eb55082dc7766
SHA5129a1e07d44bfc41633a593c14a609f00996b78b5c18b2769b74ab0e5d2b9ed7e85614bd3e1b4bf16ccab7403d8ef739c904397183bd22574ad90ea25cf971703b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ca30b459f54d864c7f8962224dcb54
SHA187ebf6d68fb0d11b202d8618e6e6367a8db328ba
SHA25641e57191acc349e05a10d02ea85f824fa512334f736b11fee81d4dfa13d3f205
SHA5124f1ee5ab75914e4330522cbe50f05cf981c558c98c291488c6de89214e105cd8a79a7f56ec25c24342648a1cdcf9b41d439e13ec8a44485bfc7db81e92907d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f743257175628ad45ebd871ea970c31a
SHA186aa35c0dc048580b7f8d58b90bb22f203eef2e7
SHA25670755d05e681f9b92eaa08eceb2f408f0908c7c48791a8818e2d2b9bf7229f1d
SHA5121815e8da35957780ddc18675d80c3be9284d33bbdf632ea1534a6fa61c702e9f566b9f4a87ed785d5430cf4e47c3ef6db37d03d3019b5e7ad8cd39be13bd84ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2dde6f6e68fe8c0c59b7630d9ed3725
SHA1f49ae4b194c913108d13f3b8f5183bcbbb2af3d4
SHA256fd3ef135f1c725a067f9c53e2ed9bcb0b04d22691560268b00781f24794fbebd
SHA512025f2cf0f699416ccd693e0f06d21e00bf1fc55ed47a25163990b220e787e6e58f291809fd4567e2d20e010b1eaa096cad91e20d3a9457c6886869cb3a1c9043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01deb28ab57996f9bd6e78cc269b9dd
SHA1ff99d3c11d770b39f2a011b837852af81e352bc0
SHA256c063ea926f47b0d3eb95ab1d5d76d746bea87610cd181dba0a187d52a5952c49
SHA512275d78a87f62d050933c4b9c587df9316ddeef1b6000b5b7108039f3b1cf40c1348d08755e593bb5edd75bb4f01dea36d68eb1bdaeedebde0fc63faf73ee310b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56080e83e9ea717a319fccb37618e60dc
SHA138cb28013dae9b4209d32e40953daf8c88e71ff7
SHA256b6c56f6bc45f6df4e7e62699d918632e4d8aa26eaf0b4b13f14cdfc9f230e709
SHA512536aa7e177676ac8ac8b47735d74aa049dbd4185ec14e43dc0ac295c3069df99e7042b5a953a274fcd67888cb2e101b286bbb75774a6f1a9467d5ce4439fe6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574c51ff794591c8be9e6c9349457718b
SHA18f70020626c6c0aaf2d8124fe5a2bd0127c87950
SHA25693e94cb8798e38ac73a19098502d72c09f33f58173a13ba06c11b4c4c2c941fd
SHA51271135d8849e056438f029e9d8a4610a03e25af635ce73d55e2f71baba267c718d080b45bba930632adf9b9e86b6c68cdca08ebddbae1931a20956a997a7c76fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa5031a3f715cba047193d0b407476dc
SHA1d31c01a9b60e502d35e8bca5200c58592f608887
SHA256a44d3e5d16825806acab71da3ec746145ef26e3933e9d843737e4e87512c9c81
SHA512f7b939b0f50e705befac70c4ba42e820d475d417edfe9a246bf0f2a6e778235da0724e596983648d1b00500f18646765b1c9544965c0503bbe408c8d982b1785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650eec7ba772863d47a728652e655796
SHA1637fff04ed48f628e56c3ec00fd0258a32ca2c3c
SHA2569fff99779338e47f0b6610a5598f0791336308976a4a0bbd8b74d7d8b03fa099
SHA5121d5bc56097229262c0e2e85942a2fbec19a0d90bdf5ca6ca14dbfa286f1344790c3a1ac31637a77cfaf31c4d01e58c1c28f9c7cf7e4cfda7327e061c6cb790e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ca8003fc43729a634bb835daac5a449
SHA17d71a38a62795c9eeaa4a3d3f8d0e13b4123418e
SHA25668ff6c27fa87e2804dfae8a13a57021355391813706da05d3e866fce18bc0240
SHA512ca774c912b79dabb1d63ca8cfdbe273c729898aee2d1d714b4bd26b7476232a7771b1a0215661ef4815f759d3196345fdcc294524c663bb90ed7ae66fcc3c4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e902de3dab0a65cccc2e07958cb2a857
SHA1ebcf0d418b39b87c953fc8b94186b6d6d7296ad4
SHA2568245c47679d21f5bed495f0bf224c286ee5f6d81213f48c02a360fa84d7aa252
SHA512d30be2fad755512a39ce30000cb2cfe1b6b711580d71c70c7f075132d3be7804438b4108b73b53d07b4ab30e019f62b550532fa0016b6fdc4ca34718d09e6e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e18b80ff2c78545f1baebdf2525c363
SHA1ac250d794fb1bcad0b364d3acfe83e1f6e9acabf
SHA256535d3a3873fd8466669ad5d23735b2c4d4c6a401247450f5c6fbc038f5e31339
SHA512f607b7b6de4503f0efa157234ec6ad426b3db4231e96fe1cd267df55ef07461b9e207d9376be5a379425d6ae6574357462ba53b63ce26282bda69715721818df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55771647abb0fa594858f936b4bcfac2b
SHA1e6fffd1b3cb6c3734236a2fa378f8151b2b1933c
SHA256fa4303b8b182720b63aa7e3a960f705316f21941858e4c637eca1e674a513930
SHA512a925b445766fea3815de85ad6c9b0d83fa2d28bd9b280b8469da7ea3970b4aada2c3817fa2065143258294d8818a18146d50064725dfaeebbea3b5f49426023f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b