Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
faefe5f85258c6780573bb7766f337ab_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faefe5f85258c6780573bb7766f337ab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faefe5f85258c6780573bb7766f337ab_JaffaCakes118.html
-
Size
3KB
-
MD5
faefe5f85258c6780573bb7766f337ab
-
SHA1
2daf68c1e44a5519d8f991511bf5d12bb4a19b9b
-
SHA256
7851b04e5017be2f0164a20b36ddedaf919a30d80879b90ef95817638a48c860
-
SHA512
5fc5f598399f26f608bfb41cd6bc67f1eb1e22d150634085676187a6bc1d3ca9bfe45d1d9afc9c0fc8f38e013a482612fb3113330f8226418bc831d742cd97da
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000349466449d16c7b3c12031c8be87a5431d981f3538091d42f4c712bc96dde6df000000000e8000000002000020000000b42e0b690292502decc4e0e5229b6735896e3ddec31c06a7d6a3f1dbcf151b599000000039b52c50c7436b6286d004bc84287a654840a555a0117505c88ed79a52c65282180097082639af86e809b6e5a39ebce09917e08ae00649863d4432a1a0d99b6f4a940a1099bdcade41305bb439da9d58771ef62ceb5c1f52ec538997c0ecde27016d4184a8c9d8c40ba9c2bb96bbf09091b881b62fa13e09bcdd12583dbb0778cd36553b17450cf5ce24c7fa7f03780f400000007eaf593b3977a2769a107d40ba591051362c441ba338a2bede45164a9f350627240044aba59add7e9ca62a1b877882c852975869eacc65581e7faab0515fa92b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90742FA1-7D17-11EF-9BF0-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007239652411db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000005f4af6881fad321f730240f3ee4209a124a59875037274be5bf37c26e7e60f7000000000e8000000002000020000000e771219a8979891c27c5150cc3d740d77d618180b39b2c192688bebd049ffd9520000000708559d7d70fbc489c488bcec4747b4763042396b4b44f11f1dcad924bcfe9bf40000000781e3b3c43a8b36a0cb7f31e42ea3775592d11cd0c13dea06ac84a475fe4e9c40f3b1c7c4f7f96f343504ff6417152b68d725b557eeb846bd8a06756f37d00ec iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433634431" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2640 2692 iexplore.exe 28 PID 2692 wrote to memory of 2640 2692 iexplore.exe 28 PID 2692 wrote to memory of 2640 2692 iexplore.exe 28 PID 2692 wrote to memory of 2640 2692 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\faefe5f85258c6780573bb7766f337ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53113e9163b1281038d322950e94e68d4
SHA1f27181ce925612b2c5c3264fc66be41a6ad6e3c5
SHA256f5b70a85c7fabd9bc2208d7a6ed7626d75550c046d510ae05ca7be166edc1811
SHA512990a3a75f9b1853e7851f86d8d23f9252fcd1e6f92615d9b6fdf55f8363338c008b9ba349763143eec22b5593e445f55f50320a7f1f55a915c5a679d40ccfb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480fbbaa3aba1de0e1566a5219da279f
SHA146bff28867bf939856ba37fedfc2305a1384175e
SHA2560961244aaf3bcff9f261cbb41e50858cfeb86c29907e2969a00d206ac1e8cf16
SHA5121112e6d0850dd21068ffd98caf7365da650299280f53450036383f19c91f86b4e619bcf98f5333e0e7851198cb7a9e7238e03b0928e30c7414be0280463e2c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46a7304ff62c845b63aa3f1945af8bd
SHA1fcc065f255973b585b0602e5cfea3519265e6aff
SHA256838bcd3bad384da58bc15a2be95ff2c0c365ecb7df98f50b17772cda3a9be042
SHA512f53f02a2ae889fe332b35587300b940da8f0615d29d996ecfb6a28bec0391aec39548b1c803b4374ddf60df78b1ebb030ccfca84f6de4cc2c45ae768ad8d66d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f39e9025bef4da1813973d22ae6272b
SHA19cd8846819a95da4271eb952a220a1e6c142b260
SHA2566e0ed2531b16006ba05ff7b1ae6b8d1e5798fdec4e7950e285d97cd9da317507
SHA5121cc66aeb0038349659c344d17211b64dc927bbf0073c7f9f769b7ba5c9f364a8ded4ece2e83a0c963886a56f292e14f19bc237a307d85a1a0346e8326f287807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d690307dff25e829b5f557d3f27fa1
SHA1908dcca4d1dd56d372f15795d758a829318a20f9
SHA2562e0efbbf099d0755844a3471df6b20efca12c886628fa9d84c0e184e6408746f
SHA5120cd877047060f45dce180367facca062d45e7107fdb294d77e2c4b8f66cf37e3957b5a044393f44834570d531aa0398232230c10c068f6fae6f91c1d954e8694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5c44b3325bff01f555f484b9291bb7f
SHA1434297d5fdfabd4b2396003d3f897e27096cdfd9
SHA25614b29768db1d68ff0b70e9f7330fc61e38c543b1c4a348b6bb57e90469e78eaa
SHA512fcd302b86be8f54b03a0608a1be9cb6ecd353326f809beb5485332b15fc6be02920d046f7fdb75adfe9f156ca1889838bffee633a6827a52881084cf7752752f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30a1e25b1accb118d999296f30f9548
SHA1119e6eee67f8cc36912eba86e8d614fa537cb9a4
SHA25679a687a0e8a884a5fb8e62f9ea7a1b89d96368238a37873f7a6a4f0228d2e1f0
SHA5127a165b255946ca89ca0afc09b9098a3d217f9dc67bf5244a33cd64cea51f460959f420a8527eef1b654205e85d14502ad4f7eacc2f922713394951b76862e852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d6170ffb9a80bf0a4d9a70bf8c5ded
SHA157b606db46b7973a1ad2b6fc69290c7792764260
SHA256bac70373f05bbf1c9d9d1a55819e2a301ae34d72e83480dc1fed929be13e0701
SHA512c9d9e81cd07f10baef7eeabb8ad71185879d7f8043abe5f0ec48718f16fc02002a0ec502872f4acc82128b69451dd23afde9b04d8a73c508b2c26c3ddd85a99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe2fcb4ba697f47ef36697b0a7dc4b8
SHA1cb76d73502b3943d86bb6474f73c3db0b357e7c4
SHA2569bae2765c8fbb463411531366c5a2c14b6f30b57d48445aaba1fbb4027dc7c04
SHA512bf617a3dcdaa04b54bb0f10d1dd69806a98ca047daa8b4b2347e2386bda6431181e916bfccee8352c20fcc40fa17f15bb5d84ce3a7a1aeeb1a5ab350481f3d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518e6d6e2f74b745b3b295871fd91f5b2
SHA13061c875b20b82d257456d9c5af1f736e03f618e
SHA256679343b9e0a1485f74f33dccfee83bb461f60a0cbbd4d3a72034b9ca808154c0
SHA512f2f0d550bfda6d2f29eca9f74ac980dbdeca5153461740acbe6aa841e1ffdf2db3ce139f5da489a0f999c8594198e06da612e9691eb1006b2f1929917a60d23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509208a902e9e0838891170011fd35ecd
SHA187c28e24beaf58cc1a8b5bb475c04d0af4bcffd0
SHA256b7c9b7f7936fd52476a52e1a5cb8c8030020b0076b657909a982ca9b5ab41112
SHA512a689795e3e5763e957e9bc05bc7fd6ac19aa3947543c3504171cfdd98a1d95e5a029ec0f2409761131b427f809efcbdf622388f9b2cd4aeb2c0bd6acc6a8ee2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a24cf086f6c04bb018ad64e01f7dce
SHA192b57e377689b5990416047fd8cbdb2a44e99cce
SHA256993e119152ab019d0d4e20c51305f004693ccc326de1b7c19e67eb186162508c
SHA512fb09d489f929059205055f4cf7bd675a0f403c3d16736d81acb90e9fd17df9e76011827549490032cc7e2f19008413e64701aabc8322395153064fe8c52323b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53913adf901c7b4a7a9783a5a0ffe4aed
SHA1405eb648e97369ad7661a7c29849e738cd9ee367
SHA2563716e192a040b2d639102290a5357c9f5b0ca6eeb74e59481d548ca97554cf25
SHA5121718c0f625f81c7a6880c77991c71d915ef162fde80f7910a6d70e0d397f65e5ddd15a159c67dc8b2ec0ab91d76aaf0bfa5bce4e40736138ebd63e18283af53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667284de6998682fe5c0aa3cb9f510d9
SHA1fd031853dc53ddbb59b16916b004d28ed80441ab
SHA256df4dc6bc1ab0cd0c8439f02549ad45a837394e0e4289062fe0149586a7093754
SHA5121e6cd7a76f6d4c310558cc29e555c9e8fc36b58c557606cfd567557a0ab3c5592476601e781bde89408e6f5fc53351bc5cad6b2e4d6ac61abf713db6d457bd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8e4e3f3bc94be81a6cc288273aeda8
SHA1cdc043d534ae68e21d2bcda644b8243bc879b43d
SHA256c3bd67c84f4fad84892ac136a99db8f82845dbbcbdeac2f15e70e406dfe8fca1
SHA5124904fe98a4a59347f32a7a1144150b6db0fa7f8d7e071375e03928525e7b720237b3839284ffa1bd2f1721eadc60f871840c618fefa9da4b304716af2c98d177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77d571758f2974ab5bd4028ce85a05d
SHA1a258394e9e7b4dc3edd29ec34ba7da34fe881578
SHA2568234bbecef421cc4f894bbd55c66b31e3ac8f3b8c7f26a6b451109c523c0986b
SHA512dcfd42363868ec0a4920030566ebb1a107970bae39523c57bb0e5f988df90b1545e38d0f11f8ee68d24d0c61ddef7e0ee987a2fa3b856ce4a37fb8de7aff8ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e7e4f19dcbd9febddd9be474748920
SHA139c8fc19c7a3250d8e472114e63e6d73b4831bb8
SHA256602960149ff94030b5ecb290748697b781fe1341b2217238ba832ecfd839761d
SHA5123542c25e70a6488b102ba0073638e3e863f6f10c75556e4e355482096de94ba435a649c85b7db1db1ba8ff67668997d5e11d5f4e309fc33834441d1653fb0e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a38420c458639141720f8626187bf46
SHA1f6fa5d8c2ac398414261bd46ec95ca50bc61e140
SHA2561a9500928386efe1c1f2e680a838281748f69da490ef4973c7d1ea48d1cdb5f3
SHA51287d694a86185b997e4d3401da13407cdce9e769de5873351c4ccc1bee021133d164aaeeca3b6cf57f1cf7c28e79d5e148fcb2b40810a2390180c7ca660217242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea5f8ef494ef7ce2a689330b64b2e88
SHA115712503ea31269f06dc241030d83ccbc094ae34
SHA2568b9acba342dbc10f543881149604aa31168f964d553129363bd2984b88245df7
SHA512cd45d56e2b867eb477d87303caf750f721d92d8b7ddab22783f182b448271f43a3c3f4d6e6087cd9b24d1f5e60df62593375a9c52bf4fc300e461841084e3cd6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b