Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
fb0103e91fe26f20800ba170ad69fb1d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb0103e91fe26f20800ba170ad69fb1d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb0103e91fe26f20800ba170ad69fb1d_JaffaCakes118.html
-
Size
345KB
-
MD5
fb0103e91fe26f20800ba170ad69fb1d
-
SHA1
b7653d4fd28ebc0500a11e57a1e67eb3eaafd07d
-
SHA256
8396aed18a086fe224a49dd7c398963813324284c450f3362c9d60d48943d80d
-
SHA512
74cb240958fdebef22d58a936c3ebd7738a7e0187a450fc0ab180044c021fffaba156e6441782d0cf4c64015f491763da783733cd384a52b11272e254a63ecde
-
SSDEEP
6144:SIsMYod+X3oI+YBshBsMYod+X3oI+Y3sMYod+X3oI+YQ:55d+X3ON5d+X3Z5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F9D4BA1-7D1E-11EF-B4D5-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007caef5f9cc454efdd62ce0672f25c23f7b6c722b295eaf5fbe629752fb173262000000000e80000000020000200000007288864b37f7630f6174283aadb377418b49ad434d0ee5d705b325ec07b5b98e20000000faba90f2f3e271238bf09d128ae53da903a0101b2f03415416245719a3260449400000002214c0f30ba8f68f8c8d70e1481e2cf267258c9d9f9755c4b55c5f94b3f4181cc8db66764053788c685bbb789efabb40eb8c4ff3ff7f571e7822837870ce784f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433637436" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d02b6f2b11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 268 2336 iexplore.exe 31 PID 2336 wrote to memory of 268 2336 iexplore.exe 31 PID 2336 wrote to memory of 268 2336 iexplore.exe 31 PID 2336 wrote to memory of 268 2336 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb0103e91fe26f20800ba170ad69fb1d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583fbbfac2f0afdabaf3b335ef8a07840
SHA1312085664770ffd022259d2c768a19228325f85f
SHA2561dce9b4997881912cfc9d6d2f1cadf98c4de0b911b913946e2ad09c099bdbfad
SHA5128acd0f940c8152340de1aeaa67ad0a18d7b2236637ce526e5de3137e0abd82436e1a65b65890d45ff2b3fbd483772786262cc03728be7d47add3b3ed863102c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e25fd7de2123dd7a50755132cee3ed
SHA1a0940f94b9e3aa238aa1fb08d7a22f33bc24a3e6
SHA25614da61d4ef531cace88c4b83154be0be8b9496a121906251237903762000e5cd
SHA512213016ac4fb8719da03d1bdb9cac350e796c4dacb4072b007b1e3f566e66a02768ac187711b118adb9ec888ce5805bdbe7f2eeeb3ae5620743ae48c424070263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515b415e90c6251c8d90c0f85f76f8b69
SHA10bba0e8d82db6c892e6a3a0004ba6a85dd9043a6
SHA256ce354a5c6e9e85e83606e3dbedea3a4a78bab5e6eb7f3a2c1f585089f37c5c0f
SHA512d900cca55579dcd2cf65ff80e698bde26740dce938a204f58d681b87f886368a83616a95885a487b5959ee2a4eca324c024d2656a79773bc900472c2acabc7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534dd9ea3416e3045de38c28e09f4ce82
SHA1c0214db2cf2a0814c8fbbc738800d224ac59721b
SHA256354d0276512e5178fe5a5bc4b4ac69b1ec98872b917a46f395e5267beabdc60a
SHA5126040427037413ddf1c19678ad13abcb0993f8790a6ec3240b12a88b0e13ff614f2f735b5460ec99127acabc2c6d874dfaf2deb511d63540cb71539f9d522483c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d40b27997e537e2171083a25aa0ca49
SHA180a39b632890fe40c23734d3e47d961bf634c97d
SHA256167b8c1df3d389134e78bc8bd565f402d862c2bcd81093dbf174101ce942ef42
SHA512c2c3b3e3f866611078e6a0f5b92c165f0cd281a8958a52613dbdcffa1c17264dbb998dc5bfcb202f7945049cf8f486824e2796419cf7ad26a64d3de5ae929113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a1267c15cf2547285e6f7147b4aba9c
SHA14a69791b5d7a7bfc84e7e9e2ec1c5a8eb9311aee
SHA25673bf7e8dc3492ccdbd4f1114a442222cad7fc10598e0f65358e6e88457aeaadc
SHA512ac66317c686aca02302c7c559063e35e84db54ea93c4ed0b0516f23ed39351a5e537153e5f764f9d04d562247a437be36f51716fa3f0f34a8f3d7357f5c8f258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8cc022ad7b180039116b7ec02c3d7bb
SHA1d447c6aa90692257bcc0c27a7b24808a53aba631
SHA256a1da8b981d068dafe26a6c7b208c6e7122322ef10a0ef23290ec04bfe14ea672
SHA512f0a2f53dd2e4df334f1ca34299589241021150f9aa2dfa5d0552a4b67263068ac26273640b755125bc7a72891979bd54d62cdfea093485fd775755e1a4517bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee063aa891ab2ce8715f15dd6f7d3222
SHA19ad531605621a30790006d7b8fc682debadb8e97
SHA256780fcf299706a6b876e1a0a36d0606a71cf284b4197187ddfc75834f2c0d618f
SHA512adb83c7029ae9d15342fcd1f67d4f0c91c28be675aa7a6dd4fe1843d3e3bb48a126daad6dca329b380a8ece14f7c2312e4436e9f6ec73ad0b1aaaaedaed15b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202418a02c1bf3b93b9418e3eaa3e918
SHA19058b62d8220854ff4ea9963366920bff852722d
SHA256f8e5df974db504784d811bb4c1ecf50235eda8cc138f28ced7ed935bb6c5aa9e
SHA5120c196f4e9097afda9cd33af8e4a99d501eaa1654c5a062a22ca9f31f321d4e4fb05300b2c4985dbaab14eb2e440b906c0d3249b341332b6eb83290b4d971f215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd425470f9c1abd25c097a08e8379b4
SHA14bc35f561bb818c7003ffe54175556f8df1127e4
SHA2567a45ef6bcb29f75f1059110ccd10c0890f8543524308660b617a97c83f33fcb0
SHA5129e08ebfbbbaaf88429899acc8461d36bc92f4c731080c175588cfbea7694a32bf889a2900e5e7b99fa3bcca5b738d8bdb7be68cd699da7a2cf985d22ba1f105c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9048122e47eb7338d7708b208c64a2
SHA17170d0354e62cd3eafd4385400317e7414f9b10c
SHA2560d56373a9c7072803e3f340b7599e63e0ed2fa808f7692ae2cc99c2bb44e0afc
SHA51251236478fcb9ec59a77ec5a4bfc62e060d36cfb8ef133b4316ae3c30645693d3da139be856ac4ba407e873c956c63cff3a33d64c412a602504281b16bd124a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd41bca5f65e3421d2dc760bd23e74e3
SHA1427c0c067913ed8e803472d99e7dbfcc724dd6bc
SHA25644b37b46e8f4c52283abb12fd47efe83ccb6dc0f107622a52dc19ee2aa2c8827
SHA51220e45080cace32724ba363c9258fbb12f4f47a383982eb4b275508c3e3f313682630b5ff268b831beaefbf4c8df4777d86af436b386a3072bcef8d79bfafc508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580af18440e9760d691433b7cc5f49d56
SHA153d53544a356fbbb2a4a9d8b07f641cbc9d55fff
SHA2560205f485f9ea6ce8316bf8ad9cd616d2b031b3e60ec1c714b0c0af8e805e81cb
SHA5125dc4a40cd9dbddb65fc355224fc74e228a3d287f8e4a6588c206a83b1c342451b277e2d45b8911f87ffb3713f62820a66e496d8cb03c5e8410d10dbde1cac78e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad3efe8de256b39889dfd8682e007d7
SHA1ce1dcddecd9903c0529e733456564cdc2a5ab947
SHA256d0ba87af6214a6b2335344a6a4b5e24ec8e244192079ba01b7a57c4900f8ee78
SHA512c7ebe910708fe4016ad09a5a6c6754de3a0c15dac3b10daa79c6a8da4f403a9c8b87a860298b39cbdbbca8dbd5326557143e5c641aede6a8a1f2c9913e8f8189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3988c0b9c1ebce78ba0778ff8bc5e93
SHA1589de970a3285e6cdad0dd650f6ff4bce4d752cf
SHA2568bf19b79b0b3664b7b4f2302a344bd93770ab48ac796dd6863e2dd64e26cd90e
SHA5125b43bb9274dfba70e8e0f388b1e961ec4ef4a76690aaa044b9125b64a73b66b48fdf174459569cd9d073c0cdae6e888a5f75b822357cdc4d5057dd4a2f653e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513fae1f487fa55e1af1aa2e67ca8ed53
SHA1a02c0bef5c4e47f55da0b3b05fb3cbe6f9081e02
SHA2561ee62414c4ef8f65b3a21519e0b74ab0adefa5751b61f948feb81edea56d1b17
SHA512e2753458b73c1831965823dd1c65aa5ae58cd787e5b0f0b3a922cb444b25ec10bacea720d734079498c6fd0bee1373dc2be5ba21f27b1539bcb58eaa0ed5025d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57591517d22bd2bd56facbd95e41af32c
SHA149ff7c46edfdd2c992b5a7b8febf303bab679880
SHA25679d4d8e4e993631f753dd520d8cb2781d99606b488fea70bc64e5c2115ecab42
SHA51227ea18780ed6c4908d122d87e9759186ea4776f56baa2553566f76299375c488be885cf5766bff029b09d9835155f654e9d101be7d70c1bbaf7f8cef10c22a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbbb691b2515b6def83f20e7af9b9b88
SHA1a7832b39730663488d637196a35e293c3c2eb5f7
SHA256e9926a6c7e72749a1c36d2a2cba58cfc99e950e6ba6b91e128fced7685a0ee45
SHA51252c9893fb6032d80fd05692361666724e106e9bc84e7e354e956a041f2c875135b28b4482a992351fcc7bc2bbb5f5969ff5ee8cb1e526ab9eeb4a53728148339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc85f6a3d359ef40d70811dc52075661
SHA17d03cde6fd942ebeb1bbee273f0eab1b29954203
SHA256f44f65ed40003c0f209873ef53eba54286da4548fa9456c370a2d50b8c43aa92
SHA512e17af2d3f30e626dd7be4599a1b8158fe7337c9fe6a4cef0f9f34b860d17abb04643c246043771dd8ace6ab884cf2c9138da214a68ba8f051f88fff6dfd0288a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b