Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
9da9f9288f782851bd63a7099e6e7d46_JaffaCakes118.html
Resource
win7-20240708-en
General
-
Target
9da9f9288f782851bd63a7099e6e7d46_JaffaCakes118.html
-
Size
4KB
-
MD5
9da9f9288f782851bd63a7099e6e7d46
-
SHA1
e8514b3cc76e30db46a1bf4bab1cf5c213e06e99
-
SHA256
ffc78e327633515a69b643f21f464a127ac54031456fa50cdd7e097907764a40
-
SHA512
2da62d3d1c280df3fc691ff714458336240471b4dfb81d12db86066dc9d1ed465b5f6871e8d8737eba39f20e75baa5f153fea6dfc08ef3edd45897197ad361f8
-
SSDEEP
48:t8EELTeSa+KyvLq1JZavtqdLu9OzXA3qQk6kkmkTTi1Nakpn/i2C1gZy:PE2SIKLe2tqdLu9IA3qM85gT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438727574" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003aff84413463ff46b0b2f5e50a9cbdba00000000020000000000106600000001000020000000a02ca170185bf817fb4a5937d86d19b0dba5859076077b1d135749d4f90791a8000000000e8000000002000020000000acd887fc1bc3c20b4f3ec70cecf83f92f92e2cd810752eead939ce9d03d98571200000007991415f8f32f4b9e225a99cadceee06ca8ba416f434bdd1cb02fbc444d628674000000019a0a592d73abff15567640c3c965f7f19c504d728c60513cc24159c6b6d1d40d154207976f00ef2b559fd3569beef36bd097eab750df4996e63ab32c8b4bad8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5BFC421-AB69-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2004ffcb763fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2192 2396 iexplore.exe 30 PID 2396 wrote to memory of 2192 2396 iexplore.exe 30 PID 2396 wrote to memory of 2192 2396 iexplore.exe 30 PID 2396 wrote to memory of 2192 2396 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9da9f9288f782851bd63a7099e6e7d46_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e9678b016857f1fbbfdd30528d6170
SHA15c5a29e5d23faa24e91050138178ecf9d3b81015
SHA25671fc04117452809f64a670ed97e04aa351d662098dead9b93de7d85bac7feecf
SHA5127fe8e7c985ce0fdb6f26ca8ffba7100e1f8eab0202ea5760f7fa11544439c6d5791b3372fed208c075969be357e40d1bf589645be62d369424074344ce5cab35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff27f5c25b7c2e528b38b9d157096868
SHA1cd72e92b910cb9cdb01debebf1b3aa54a25aa799
SHA2560421625e6d98be9ebf93a0704cb2aae335fce1d7a2284b14c8f3b54f4c6ede77
SHA5120230c52a6f277defc6de931a6ba68e74d2c999bd07e40898bea4f116cfae1786af0e4fe7565a69d3b14beb535e9013c6debf4e463315eae03ab6040460f6ce53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c34d18ba41a4e2fcba9c800fd02d3772
SHA15f381ef7abe5995d6e1ab941316a8e4be17317d5
SHA256e69a2c6ed6a01be48713ec389772bfe90bd955d0e79440fcf8ed2e9eb3577f3a
SHA512a60e407441f86c767d431010708044dd35dd88f2ca68b851d9ca817496b9e5b205d9a68866c52b6fc92c2759e2116fe06bf8204db5bc8d2dd507fc26655fe297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3cda875e79f1de21449a59dfca516fb
SHA1a1a0f7a195c6528634fbaefd9bd7338ab6287006
SHA256508b46c94363dff131c25dcb03384e788828b0f921c4d2446d25d763b597b7c7
SHA5122b93162ff92abb218950aa335e779280874c28ce666afb5a175a6a8c1a078c22276bf6d4a7ff2e52bc451f00521be300feea62850b9f2d03f8a7b22d05527c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feae52020dae461f2e3840eeaa7e19c0
SHA1634708cd70b8608c0dbbeec8e89d3557e961d9c8
SHA2569753e8d95f71ba6d709046dbf9cf29e2495049cf946988c6ad7c7cc1acf3dba7
SHA512600c9d9fc0246ed0244343fcac1c577b5bf0e743e48fb211f23965c2f9a791de7789acec85dce00bebd770fb5aa3abdf93c6dda1bd637190033c9936dcbbbc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c06a8d3d3706c6b4f3972b365864f9
SHA13a088e74df6b8f94fa9fb15740c8fcfccedd8171
SHA2565452a72ded50cd29235a4b4739d028f43df7e1cb3ab84183449c89350f67a78d
SHA5123f84f7472c4a7f2251a2cc956e02fafd024131cc8021298140366db4bc93101b5d0c46cf5aaf28da9e644b7c4a18740665301fd6cc0d7bb3b9c7e3ffbb439459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f827ca25d7919f2f133be6e5873ab7
SHA100c8cc490dd92513d8d2be4f039f806317632c7c
SHA2560285e719268ed6252a9fce0707e0e96382ab2a9053a441ea96b20d2b7f07996b
SHA51209a2326cdff2656353a89b605c18c63fbc63db47ec62970cc486c22057c6135dfb68add07b371b7f7768a7eebb7732e73f1d77fe990c8b75790a7f978e352b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e3e74f7fb081fd6f1e8ce1e919b403
SHA1b9698ddf4c7711f985fd6e9c358116f7458f42d9
SHA256284bb60107f1a583bf880c810b09a389aec55d05fecec0e0bffa10d07df1795a
SHA512604be2172b0405e7bcc575ff7ebc50c2d3ed02bdf94d26b9a0ea8ab230c9f3d9d431b873ebb3879f59c63f25c94528394c895e8898fd3c480bb980ab35a4e949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35d2c5530e80381da2210da00013db6
SHA18e9ec66a9d804aef6cd74f2427359a4b2ac956e0
SHA256ecc24ba6c00dd40063380dce817f0a14b7ef0097b194f14d8354eb0d4de85bd0
SHA512b44c286672b86a0f7d7050b3b994f37ac78538c0ef00fc240f56839619dd48adbdb8db5db6caaa3fd6290aeffcf92c0b99b18c689d79fca85ae3a49379c37326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c189f12c8c8c0dad743236c3e38344b
SHA13f82cf0f08ea036290572663fe5a31b1bb65397b
SHA256418089fa15ca10b871f8641ce731f159c2d7eef260cde4831d081222a29357b0
SHA51286d7680669a3f21677609fc10a9da93ba18abd3b1c275a2248215efcfaca4d584de08e1cb4376941dfa35b1dba8e1a2cafc075e48e21912f17d9a62ba8b0a9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7256d6c01d450a0db767c11e6105a49
SHA1045260dd90899bc32dc8819f15ec24a883e6291c
SHA256dd258f889dc39296dfefe76e8b2ca1f16736d55766e5a583052bbbf621fb5c9d
SHA512c3256e93e1637ba6fa2bc17e1942c3d0f73b677f208b20c171398ed494c14d2cc50ce8241d47d635a02784f35b8b09f47e5e8d11f4f51c66ca40037c8b63cd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e927b870c7004710d5cf69e4464503
SHA19a65402abac7be5b9fea3e5e7f97f5d62f4c4603
SHA256cea4333c3ac4f8208634c1760dba00344831ab412908b64523ad9a26430a06ca
SHA512bc952e594cebdaaad90af40d175b346fb5ae20e63b055af7db51eda1177af82777a7cfb693e32a503c7f8e196fec11d26df59795f8e6b59d86b475475269f9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b0a3bc8e4bc8328b99e2187b2cf155
SHA14ee9f47e843d75d9f7c47a53a2e7c9328470f10e
SHA256155b72a8fba4d2cf581f24ba84d7aed9c8ce403d088ae99a37e23ff628b8f7d6
SHA512c3859ad7ad9e99c0940b2cdab53cf6a0e5ccbc61983868c1c1e8ebcf2d1e41d12b1294d8886ee2e337224e4213039efe0d36bc028a511f3000966fa3446e6e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c6c634e4f9a550feb3f58e7bf303724
SHA1dbefc9096524f540494d16bd6aefb22d4cc8657a
SHA25676b21d771a6f23ce6aa94e497bd3d64af9d38690b97615e6c6f56e0ba43eeee4
SHA512535c66bec7047c7598461da1d60f233cc3726de57055e5328cf5995ca32e42152bda72f558c685337dd690ce6121a2eb78a171c9daae52ab226e2683efb829c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6f14bea5bdb0dcdc91306960d427d1
SHA137eaf9a9a9b51fbded23304e01e875a58ab6c09a
SHA2562160fcdff314a809b020211b46644124f6c9c4dbd2b0b8fe95df0cfcc4b532ec
SHA512501eba0d51afec7f49283f6745d5aa510b6dac1b8a5cd882783726615142cbd093bc873192a7170960744fdfb165bfbe922035692cc7ec2eeaf42e9b3c05f3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88f6f155d19642b0c8143ec887acbae
SHA141905651e6088b23e1cb17fbcb2c3c73bc42c20b
SHA2565f47ad6594109b66df0508d17fe809233e2c501d4fe730fcad403f23e97b2e68
SHA512176b0de03d1840d3b2e0409e3b2237b4781c0613e6acca8e2f166602668b0f28bd835acca9d0f34ed69473960493013b1c28e23cd4afc3558df9dadfbadc58b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b