Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
fa165f2fd434a6daf0d5dcbdb08a31d7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa165f2fd434a6daf0d5dcbdb08a31d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa165f2fd434a6daf0d5dcbdb08a31d7_JaffaCakes118.html
-
Size
12KB
-
MD5
fa165f2fd434a6daf0d5dcbdb08a31d7
-
SHA1
165ed391ba13365c5019d164ecd462c9112191f6
-
SHA256
5a988cb3b54421bc35f1879252fd87dc171d368984e8fcbbefdb9c5c3615f12f
-
SHA512
bb83857adc22064d2aaa5bc7924821f66e6625e5ac9b236b5e723bf1942125f3c07362f94c062c1ea710bd1129faec4b762feda9c5a77bb9bdd3443a6a978686
-
SSDEEP
384:s1lIcvVKjlm/gclBmZWn6vdmd08LOXguLZ:0gvERExLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000003462e51679531214285d446a0f0b52d6ca66d4bc463a079edda7770088704e3b000000000e8000000002000020000000cee79a15e770c363deb2cae1b0f99daf3756a9547eb368df569bf3000c3fb84f2000000084fe88dec13df3534444aa923182a11510e8921f4051041c0ef4a2aa9b77179d400000008b8da8f3b3f3025314b9955972e17c6d23025907600863d77efc46f877085946fa9bcce26b24802bf99543e454e2582de7adc6b441c2d976cd06d6114600f94f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4FE3D31-7CAC-11EF-B525-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433588565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604e09c4b910db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1672 2516 iexplore.exe 30 PID 2516 wrote to memory of 1672 2516 iexplore.exe 30 PID 2516 wrote to memory of 1672 2516 iexplore.exe 30 PID 2516 wrote to memory of 1672 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa165f2fd434a6daf0d5dcbdb08a31d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539cddcdeee1f8af37bc886d3aa96be23
SHA15985010a75cca69475c3abbf26ccc74530c4656f
SHA2569337fe28c5d99af52f413ac2c11034cd555ba804175b5933d70c41678dbc8453
SHA512a1815b1e87fbce31aa1e9df28e5396f92005e6c15f22096c56256ddd77bfe31db8ba3e278a600e90b9f8a8593476a76c8b5e25ed28b5ea6506ba9bcb71cbcc54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ceae6cb5b51500f58d64d79ce6d311
SHA13141a94a7a03df320a748f1e91f1e9149142b4b8
SHA25649a7eb3617d35f9111b2336c55eb085bee29124baeefae8a2c57c7346cc2bc72
SHA512e8127b1e53d31606983850ae9f9921396c3c0568f039dc191e62f22b5418855c70682648217205476a2d058c6f3f19f8c67c23f808c0c332de608cb28ecd1c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad43565c47e867b14d53a2f8b616bdbd
SHA14bfbb6495137cbbcf1fdbef9accb321cdd786068
SHA256d069c8edf8a7bad28660dbf5f2895276efb168d063bdcfb0404cae0bf99c8674
SHA512292752a65cf3a9b1ba683b5a07ff37b5fb47d53a7513b05a97de5921b38b16c0475782e62115e5f0cfb4798712ad2cc1eb669ee60c8de377067991d68faf1e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e9017c07f4bd1469c5551a6ef0d4e60
SHA1e968885044c97844bff91f4ddd8c1bc6de88b896
SHA256afa72bdc11a41e8103e189a0d0b007a4c3dc20a78e66d45db12f83d2b9cfe007
SHA5125b898c8cb820c805f41fd21f1e8fb90100f7cde5b480c5ca9fdbed36cd15ecec34ff2cee7636b82e414643ae80ed5351458649006f8b2c3be5bb0c02301b3f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e5c8547f11b59e257c0ae4b8da3252
SHA1ae1b2e5d2cb81739b944c6327df98cb82d2f536d
SHA2565f1dd02e8cb423c1761ae516ffd762a37cf6fd424e873022f80a9351caf00fc5
SHA512f5a85469c0df7f804eeb250b006d6ced44b37d7d71b4fc1d073b442c0ebb5207488c3afbf62bcc01127841d71c9535162460de2a2f0d72fa3dee26b2881873b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a797f96f8d88eecfd8cae51d26eb4dd
SHA1c81fc9739b39ff02538ea37001b2b314985a6061
SHA25698620b866582b82489bfb8c6118f8d7403e0fef590702d4c727431db803a2b1f
SHA5124c20a0d702aa89bdbcfc09ee6e1bda4a9d8a98b0c3771802eeb7480178f99a14d092aa7a00701b4545633113605a72f697d3b01d44530213da7130aaacfb36c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff308dfb773ca079ab4f22b60a95a37
SHA16e0cf156cc29d5a33f0c139e21e83ec7ea0d4f4e
SHA256adead825cb32b5179d607007292a3ffbf5bcd1a853953df4e40296190076f680
SHA51255a6c5c7753f56b3b3b47734656eb086fc896f2268396ea944977de02bf2f1f5d4b7d3a307dde59e49eeab861e3da393cc759f2dbf59c814ed0d8ba8917134d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557120735412f50c64bfa95ec74c4c39
SHA1f3e6b42a25a564c9876f83dfaa5f297ea672a038
SHA2563f293a6d8b92005ffdac6f25eb27484380b4b6965ddbf5ff7d010fee6416f298
SHA512532a34090e0b911dae84921b2e6a2ca9752374ecbf280438fdb8c2795fdcff180afcf2e8daf5eee11439b5369c833af43484aa8f5de4ddb507619e52977b2b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540814f95c3eea4ec9444e1b07b4b1ce1
SHA123398b2ad76ca58e134e72403cee5fe772546c36
SHA256a8f478d6044e1000c5d9648ae9f94a85a8c7f25b8603c6e99a7a52c282961dd8
SHA5121bd9f01e3ee69b96c980ddc63c52126da05dd518aba1c2f4a5a74d9ad7134d8f201399e44a2fe8adf43a4643d9dab4827ff2e2e1a80abacfb8daf22871813228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea457c9c5b1d86eb3281efd93c46afa6
SHA1931b54111030895f7076a4927e0ae2fac2379895
SHA2562f2dbdbfe512aad93d13f30c06033aca6ff90e793be48939fde95f62b3ab4190
SHA5126bc46ce0c86c5c632c4c64de24f1ccb08f9995b799e29040bbd6f4ec905a74c238bfcc3f1b7c80f6fb97e7b0483e9aecdf96fe47145cae5ba0dd78b02ee743b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510234272281ced8a07c92996818c5ca2
SHA1d00a39b892dcc87f4bd3d98f72ddb032123c6d86
SHA25684ee8efc9e1c62af09a2eceda380cc1be7de5b8ceea1236079e66361fe4c5453
SHA51248043dd5642f187640e1bcf82089200fd3cbf4f64a435cab86cf96546728b0c6fcdc9d3b062fe54e426eb50438b757d297c31f3b41a2f36bb55ea42816186585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d2af7ce59a122d014a3055530ac231
SHA17cf6facc658166f07d9e2513fad2954353aeb06d
SHA2565c66dd48900c5c8b6cdf0bfd8b3ff3ab4b1f3474acace1d51c9812712a83599d
SHA5122282e4d3d261f051daa5f93862f68f0b728efce12da25ba9288df9e67caac8d803bc88bb0f0ee6aefc5dd866a92db885ca354a4c071471fbcf799cd747439e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d2cdb7f13853203f1f4d10564e52dc0
SHA15cc4244d7f1f3c9432da094f466bd7b00108112d
SHA256d3d86d0a653f4b167acfc8ed5fe19f3d7452f41a2f52c86f601e1ba684f94591
SHA5123ab5481c92801820167efa128c66877c17b0d7922b89b8b0d372d1133c94c06a22e00ddf9ad47af71d10e3bd44b0cc73fef6c540515e842ad400a1f79792981c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7522e98a79c4971b62c3b8742e71fc
SHA1e2097914d5b21bc3a767bfa15e426e5e48dcf197
SHA256108f3cfeed17bd010f234acb584adac70bf7b999f3e78d922cac28689620fe3c
SHA5128782a2eb404cebcaf304f44d5a7d5d4f9e216d26ff87ad0302cd728b419160bf731c752634a7b2e624b346b8b2f3843a84815a1cda1d74c3d16a79cf7310452b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53747fa6682708c2d00e24239822f89e5
SHA180318816e94325aa51058268cbb9063fde9326c5
SHA25619ea3662fbed568db75e3b390f75a32e15fef5cafc7d5031203210b0b1a4a276
SHA512952fe7960c3b9a46e5fc278d601ed0cb419080cf116cd29d30a01be76383d713b50454f7c7ebafacfe01721cacc94904126a64a5061b3f0db476d4dade9056da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b3ae7d460e8ba4440d24708f17b7eb
SHA10fe7daf4aeb87b1c4c6841d25431ab6717b55437
SHA2560eb6705e0a376cc3a024a608a5256fe57878e03b262ace40837c169548c2bd7e
SHA512f3430ff592defcb3fcf85aef19de40fcb7ece82f0d606bf791325d826fbf7d81180423d50c901a2f86aa715258252db8274c075032a867d133bc184aec0a8c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd95821d2a00df63539a9604193ba94d
SHA1bbf0df50f20f997111ca6e8b5b14d47f63323ec9
SHA256243aadaff1117f6ed6f7bf5a98db97c1aac8abab9ebbbb43c13cbe3f91d4a7c7
SHA512baa913ff1728457935411e9d7907816f9109bf1f5a21e5a20c3694e791482edbef5b206e948fc50380c2ddc1d56a74a8bdfceee91010e0dfc4bc9f5318d24d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3bd1ac51a8680975dca6a51d4cc7ce
SHA14092b04c793077c15fd7aca63d168ceb78955f88
SHA256059da132a580c4ec821c0b67c7d962d1c6afcaf2ca378562e77ae671dd7885b1
SHA512eb10ba50aaeac2df924aa7cb234ae14d6a883aa388993815ff32f5c9a4a1ecf4234716848c71c5ea718dab338902a11b3fadabd69b921cbbe9c20e3e7f679bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57e612ae0e21d507d29ed9d502fbcb2
SHA178b2a35835173e2807cc521a642975effe465cf5
SHA256b720e6dd745114c9340a68aa51876d025f3625c0acfae28d7d2c954775bcc4d9
SHA512f8853ebb7a709d1ee364c02723feb2ec2603c5b36053a1e827070540f46491eaac258a784b8bca639be545b96b9889c41cb2d88b908d39dcf9b34968c1f69889
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b