Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
fa0de3d345973dcc93c1785479de502e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fa0de3d345973dcc93c1785479de502e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa0de3d345973dcc93c1785479de502e_JaffaCakes118.html
-
Size
21KB
-
MD5
fa0de3d345973dcc93c1785479de502e
-
SHA1
c94e79ae4b386c7a847b5afb89fc3a1fa181d33f
-
SHA256
97cfb2fbaea267a8c9299b5d085ed265eec727d781955d2df99a402fd13dc94b
-
SHA512
b00a6a5a72de3adcbb947f559f85c141d1796754ff158e983d35c58bfe8a0905ec2bccae42cc0b70f691644f5c94ced7ea0dee7363ab20983c626fbae7e5344a
-
SSDEEP
384:ziKKcRAa5r9DIiXboVBD8c43Rdzc/kQ9fxmEfP4ycbp5oIzVcr1DJZTO4ui:zipa5r9DFMgc43DY/dpxmGP4yZ28JZTv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000001476770cfb4797aa8a461f2aec7b811306754beb32d7c856aeb7b029e9f9aa29000000000e8000000002000020000000cc6b1f3c7407f1dc6b6c4fbbb81f92bb92ae32dc005769526d353aba992ecc8e200000006ca5d99f0807e37ff851e4c77bfdfc8cc998d24e4b8b7cc7a6d6eac030d01cfd40000000e84560620df28d10f5a3b300a77c20ccd61b2ca359b2c2506b7676719589c9e9b8160f8d9717f522cfb12eb4ee9a4936599fb298402163ea28bf44f37f8823e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F631931-7CA9-11EF-AB2E-FEF21B3B37D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0deab35b610db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433587104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1668 2640 iexplore.exe 30 PID 2640 wrote to memory of 1668 2640 iexplore.exe 30 PID 2640 wrote to memory of 1668 2640 iexplore.exe 30 PID 2640 wrote to memory of 1668 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa0de3d345973dcc93c1785479de502e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1fa36a9e678a498ecbd808933fa18a
SHA1b0ff5cd3e449ae20379dd4a072735ceedfee78c6
SHA256641ace33f49118a8fda04ef3fcaa4ebf12515e5c660a8901e8581ca0cc43f19b
SHA512119c87363c276bbbdda93dcfcad3d70cdf00a7e895d961811c5169b073979d037571f9df539503f04a0f6f681b13208bfd64ab91094cad300328a25d1f29cec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd38d276f24f1f157ecc82c037184de
SHA14e38f31e6aa10b50901344a9c7e7caf1cbd2e152
SHA2566adb9bcaa84d2f47cff08ca0a6dbd669596ff2bb0e704cf27b67aca554962f7d
SHA5120c4fc8f7199be027b9215dc377eece3277073dc012df0599e674793bcf8533ff80694d514dab7fad265fe491031bfcaab13fb485d84df191174e93c783358170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b627fa2e952ebfd85dae9dcc65f1e16
SHA10b2a927fb7d1c98d36b8b43cc681f0560ddbf83f
SHA256afd6f38e601f5028acee0f9171f649695b9f8ea2c5f0bdcec06a3f87dfed0d0b
SHA512061c8749958b3181a160b324eb5e68d041d21467f2f2ef9421c46fb659e272d2e4ae24895578beae473720663446b754aaac3181ce3a3840dc91185bbe8f8e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18d22efb6118ada61898d439512835a
SHA161345e8a99027e21a398139161f55c8c3e3beb3a
SHA2560f98ae71f2a8a4e7afdd683b5e425070110a2362114802867ab10afcc95cd7cd
SHA5129d0d3c67756bcb9aa1c05233e2557042ab3016a771212f0db3245b74377dcbccae73962ad6ed93b59eb92ae9b43b867272dd0b3b30e41e566d7df87ef789c0c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a3f05e7d7cb35822d6f7fed8df526e
SHA1614e4c03557ff4386b8ceebc9a09b98522f47aad
SHA2567966231c176ed1bb55e0a6de1bd07e0995f136b8aeb5c1cd4b63267f95a09188
SHA51257ccb6a97a2634aae608df1bf54ef2e52916ce5fd3d3a1b11db5a96ab65456cda943c089552ebcd8d1624ad1d060fd1fbef55a6ac8ae63f7782374f385c2c147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637b99366640d90a7fa26ca3acddd882
SHA1290b12fcabd7f7b2ec38e8f0a5ed2b3fcd58c3bb
SHA256da803766d44ea3a80403970574443c96397be027a35231fe316cf6bdb380c136
SHA51252d0d739aca4d59b4328d67314eac1446536da29bb3b11fcd5ee33cce814afde0632775241c7265abad568ec94689c916099df941086a933200d905d5c5f708d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ddce695bced8fbdc2e51a135896de5
SHA1b2c772de27cd6544c658734d91f1a9ab46662916
SHA256336663e8d5b7d072c23f92bd3e4f351295e9817ad7da0f63179ddba04430bcab
SHA512c739d20ab6b8ab8487278d58199cbc47b2694ddad97774ac60c1db8a2ac4ed278ef35b620d4d4f29aa872eede988fe50c8b414f7baaf0ea7c833acd3f75efff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01d570389cc3b5b12e8100b9b1775ab
SHA17867e84d354805f410e0ce5360fd6d4514d3b875
SHA256a96c37f877813736926ff4908c3c56dbfe2e00de7a4426f6969b2dfd9abe1934
SHA512afec58b72cc0ddd037f1c4f9568ebfba474703bee821dc40596f5fe15cdf8c611066c9bb07f10557707cf6af38d824e0eef3c040e6aa8c454277eb1b70bb1c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b123acc1acbbb1df18472eb529c09e5c
SHA1976ac9913e3bb8743755ebfc3114d72c4bec5666
SHA25650cdc9eb354b6121445f2948ae04f11b3a5dbff4639f0bb835b031d552c08c04
SHA512da623ebcefdd66a1063263a0088ca93d4caeccdd7993decf53cf1b020b2b2895cdad4b4625b45278a4f832cd1e893a28eeeaa98ffd0403ed87d125f348facbb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523611d990224fa647f3b3ffdfb905d18
SHA175d7cfe7466cb6aee7dd159bed591b3048ed309a
SHA2560d043729ada216568e950cc0c53a2de96f076758bc95185f749c5555d9b3ce3f
SHA5122a0bd871f417f2fb50c35ff7f6f18922504eee7c4ce31a593ffcd3536d6ec2977cc7a7a8d28873396764ae1e72c926696f673170aa738dcf486db33bc8ff4da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768848db62546f294e678bea4a8ca7e7
SHA114efe23929ff265dee46c1213a93cc6b3278d53c
SHA256b520f82d5b671775bf481a71db797af37d1cddfe33f3b1b1aaf0914094c88425
SHA5126ac97c075be63de8c13888943c69e16240c07fd2501c8f71964c290fa08f86d99272978acdadadbf7cfd466ed77b1b6ac8c344ad4ae05750bc20a584f6c89988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c725d52a6566f05110d9bd05599f25
SHA18d0a2f60bf838f20660949dbd9a5defe19e45236
SHA2566c9355cd50799c9d1e535ca744e1aeebdb3bd5e68e3bb914cabc202248e1bd83
SHA5128bd8d3f6bc602225cbafa9bba7747d93c03fe022a75254f8aef22001c79cb388751723dbc95b99dcd77ed24ee9c8e8d395f7bc2da71f7e56c8e39b525b411953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b3479520955b8ae2fdd3a2ecb0a6f1
SHA11b877ee3c242cf45bf4260a24fdd7da5bb1d4333
SHA256fcfcce31ff24e2264734b0a95cba4293a2926b038656b96a327c624d6183b933
SHA5127a65a5a6ecb6182a5a7ef73363d948f109bdbc0ae8dd7f09be8108532516e99fe86dc2fc83c294e27beacf01aaba88b897805f6af75dfcd113427ef3fbbe12e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb7299f02627026b95b4bb81642399a
SHA13d25f9418641d5fa9980457a020117218c5dc199
SHA256dea1109fc1157c6167b30371f191591273238c98e231c1be9af1f71e523f9e5c
SHA512eb2ac0b693dfdb53ab21ee69de4f00003541b1652b57cc09321cc63cb012640b72dbd4a4ba351638787480cbb35074d289b4c81b62496023cb2d850a1aad7a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75eeea86bdfdffba38452de5d6cb3f8
SHA1de2e412f5516b0285b5cffb8552655c959bd81df
SHA25669ccc31c3dd9b4c5ca5e5ba48258cd527059aeae945eddb1c92239f0b4856c43
SHA512e62b2fc886903e572d64c307166e871412cf576fbaea0c124a8577fa178c5ec6fc938accbbe62a26948ce590d253ce2619891c759e30a6ece75399fd3cf0b840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a2de890f7ffa13f6ab373cad0c9965
SHA18c6e5a3f0dfe46947d5f3b03a72938a03bc81bb7
SHA256af2678a200d98d763e5da7362a3dcb1a8676a38bce7bc304db15d8b87a9cf981
SHA5123149b3b6fffd94bc912d45256067c8e13a046086ac8af9e0a9f86e59909732e7da5f0a3d935b33ad24a927d31dbe258ca02194cbf4dc8e9a500cf92d56770b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6450a4acef72fe90bdbdcd32336fcbb
SHA1e75e326331a0b058c687a7142475dec768374090
SHA256b5ec53711161569442ca03f4203e70ffa6ff5d55a1f2b8aa32e85a42151cb552
SHA51252429b74f9303dba7dd74feb8ee1be1b0ca90d2602bb8a5a26d29b34f5736acd5756e82985239b96deebc5c10e3e3320b1eef083c4b3163d96b9e7a627404cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574279fe8dc1518d6de7f11b9988e3b07
SHA128ad266d6f75197cdb7de440fd0acd79f1de9f47
SHA256959fd07fb1ccb1c17c8d956b8fc8159fe14e99bd05a7347826ec7994516782c6
SHA512465653c2bc09d6c04608c50f438a5d955306c705147d7c1e520598633aadf383e45528f9adacd1c139ce23c6c24ad610dcc9130856875f62d63bb2b721b761c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6914ec7cfb1fb5bfd8f5450f39f54e6
SHA1e50e6b8a010f77947b2c37446b126000f43db1df
SHA2564383aae5d51e264ad84a1283dea76a87d21b994b49a3a0736f47dd0ccba878b6
SHA51291924d13f22574534fd5a9953bec0d5f23e53c036998371ef460bad35dd84d260dc76abdb62b8ab7edb1be25c6d35dab7e9fd56607e14596a49c09dda3a03256
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b