Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
fa2c205610571db8e85ee5fde178ed5a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa2c205610571db8e85ee5fde178ed5a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa2c205610571db8e85ee5fde178ed5a_JaffaCakes118.html
-
Size
177KB
-
MD5
fa2c205610571db8e85ee5fde178ed5a
-
SHA1
d39d01b4b70bf2b8f50999e1a017f3258c7cf3e8
-
SHA256
e5e005ea4dfafbf1bcda2344fba2ec9ea33579a6ac42f51cbc9d6590567e7f5c
-
SHA512
033417b1c5d1b4be062cd1426b2dc80600c7e324342fbcc4b80957de907ad24e869c00a339cfa0ca5914c0c94fa944a4b2c2a6e511ba18bfa398fd60c19264d6
-
SSDEEP
3072:fClN+Lzwg/7tI87xMWbiIfZ97nm6GOywvnm6OMZKMPWd/:ciW5M8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433592011" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20dedbbcc110db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCC3D3B1-7CB4-11EF-9109-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b8fc85065c29fdc6d0292b354a3cf7c929d7829c9f745f125892d48a88d3c4e9000000000e8000000002000020000000f19f3f95d8bf910ba789002a03edcca2a16e7471b5224d56e7fa331b185691dd20000000e5f0a124f057190d90f8a368b6de2c6467b0cd8239675538cbf255c7cf7e022f400000007b48fb575a76f1fc9c8b0bd600aca7e1833795e8e837764dc1219dc1559197ef86aed0ebf3568a358ba43a495a04c89720f7fa7fe04bfb19684f738c30a7f30a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2320 2400 iexplore.exe 30 PID 2400 wrote to memory of 2320 2400 iexplore.exe 30 PID 2400 wrote to memory of 2320 2400 iexplore.exe 30 PID 2400 wrote to memory of 2320 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa2c205610571db8e85ee5fde178ed5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a534b48e62df0d5a55459b147618046
SHA155032cfad06515f1ffb90ef0d2371a0dba2ce59a
SHA2569c857cd6bd4785a142b87d5910112ba95f460b4e8b6fbdc36a77ef248e33dce9
SHA512b27b026ca7a7a605ef2cd150d305a47c81ba6bbf0ab9bc44ec892aa91d2f268fae33f2b57cc266548419fa5b3847252924a794fd2aeed63953d6346998753996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1fea0fb18a3b9dbc3c1494e5357656e
SHA1aa0eb6dea5ffe3c646a2a2a3b8cca91fb47fd8ca
SHA2563f0818b7c95537522c7463808a3377624fa8e1a3ea257f2b5ef1d127629b8362
SHA512193efec73cf7668a3fe82013682b5c6a8d1a94a1b044a904f68f24c4131396eecd8aa385bddd5702afd2b360e8ce1c71672ff2a5909cbeb94cd427ccff0ad7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5511bd131166ce285c809ebf701f4ce3c
SHA15d358bf88eef90a38177753fddb17a0f7c040592
SHA25695763e5098fdccc05e612c798c14a45992b36dd57329df1a32c8b2ef6c5d73cc
SHA51290b300851f90f17f3828003652128994a10880536bc0f1153f202b081c8e2e306a67180ec33b879de014a600dae90b9aa75ddbbe9a2ed0a8f11a06355e081ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57955dd2dad02c4a8be302efa84f159d4
SHA1420b7c8a5230f8025e5f3173c18e8aafb8a7b2aa
SHA2563f66fd55f862c8c3fd36b3816fbc9ae59438b535d31e3e8b4102aa80258f25b2
SHA5129b378c23b967021f407c25d9d9b4f54ec98be61b6ed2b647256637f71a36a8e727959c8d16a129aa7e0b5f8e2c067437740878bcabf54b695ef7cee236c08265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d816ae37840f082893a8d2271a7ba0
SHA187686f4fec6c56cd4683d0e3f02db4877d78f8f9
SHA256ec20bd95c584ce681ea9bf730cf9def08ce6d7f32979f6240a45bf9f39757515
SHA5126dfaa02e8d78036d1cd558751ec37854cd0e513c226357fe6a977e24ab710c3a8fbef1a6f93ffc3d0e4d08f8522dc389a096c8c09558b929330be1b521e8cec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8fc58715012ac232def0b8fbb3427ea
SHA1c54068416a109e5a05a41b14c1f706983a6de594
SHA25656b8f06b4aeec1e6d09b3ab4f9f683defdc782dcd584cbb05a47364c0168e082
SHA5120f711a21f8c39be19846eb34888719d18cdea9b2ed0e5743fe1eb79e0c36bd5315c8150f9d7712feb8fa411398b966681fe06f5ccc777dfdf099bd74e581bc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e881ae3d73e01c59359c90af753a6c69
SHA1a7423e91d85daa8d007edcbfaddc37dfda2bf871
SHA2568e613d44862be8df78aee7142d28687a9de5d6c4425c333bfd28daf1d4f1f60e
SHA51276e004762dbc171b230db82bd74c1005aba6812646d70ce3b700ffc790d902af7892d3aa59799b40d641f6d37361d509ecb9ab8f3010ada9c97306cc3896e103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c54e65f72dffba3fb63a8734da3b64
SHA1e239f0e709e2da77ef97a55afb929ac0ffd66aff
SHA256a13b101fee8b4f152ad4cb5265490fcf38f77f09775ed9fb8dbd124322830e24
SHA512b2fe44c46ae96554b4ca697af9a5c144c8e9a1fe986051ae5e481cc3c81ddf5a36d46e572cd4b193e3519536e8184a60475fd2445700de28919ec717abf654eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53269ac1d3f6d648b617356a5e5221567
SHA17246869fa27a67ca8a756cbe4dcde977d668da67
SHA2566392cc21d6c48f2ebe98a33308add63c73089015c4b11ea109d1ca1e320024c5
SHA5125689c74ac7e832912204728cb27e14f2a184b4df78debc793e3d19bedc37e080b9b9c2b4e0bf4110f779d9feb11f6ef31180979abb8191507c156aca36b98317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc63e433d2a387da6f0a55975b8f3c40
SHA18ba5f7f0ffad6c528688e5d9a9f23220febece86
SHA256ff2aaaacb16c53076fdf93135c81e34808404f78093df490e00953f9a61943f3
SHA51202d30bdbb0bef5bb0684667749ac89abb8cb35282e4155194f3936927738f65eb8cc7c6a5af933da1a18e6afa2b9ff4a0f6d6fd422ad745a56bb6dc10630b9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96229be4d19e36de2c9e0e840cebe21
SHA14fe82b6b44df73d840c442e6c0deb64834bdf864
SHA256c836603fed262cb9807c790511e4f0ff1c06f723de358a989e1c6981c2ccd76c
SHA51244ac3401468a98683314534ba86d5348d8d83e66b8384f3f2d0b02aa80b3e9c9f84054dac72726930ea669a5971f0a8cb05bbef7dd18a536931a71b87866b0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598432b478aaedf2bd568ad83cda3dd7b
SHA134265e327f792bc1b6f8762d4505e6fe1d0414b8
SHA256907037cfb88ce26c06a9c0b50b512741e1a9a3f2e767ac15a49372b318ed80fb
SHA51289a0a0d10113b5adbd636d319c7c4a8d9a9aa8ecc59888d812b3431499cd4279ba6b1a45fcfe0e23a3dceb1a962ef3eea37edc19faa12189f9e05bd5e49b0aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937f933d77f9d7f96613560423299e91
SHA1481ae8056b5b0861c21f80833e4110242020b4fe
SHA2563eb51e74dd25b0f251175f2cf9f2e3126265c6f89b801199a4c2e6640542977b
SHA5128a5cb3e320e35f7a28ee309e014bbf42708a3fe03348bd2755358a7d84d9742113790a8653a5b3aab066fa24345f7b57a5a0147e46437e5c21291389b2c1b1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56707e487197df539465ea29f8db6e08d
SHA1fc4285f873580e861aeb2c30a50ebd38b71da64d
SHA2562e0fdbbf38fca32c55f0f9c57beb892b902f7de3df6f2ceda0fa323d9b189eea
SHA512cb926dcd74f60db5c63e39ec730285edd0042842b1283d3f6e574f8074238b5a322c5da6137f0b5c058d4e3005bbcd34afc83991d9c993d8fdf7728c2aa23e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e976cbe57e6d5ff877289197e014ed
SHA1c04bb735e63e6c87b389aa124b8c7ae792cc13b7
SHA256299737931015064ef84d4ab0969858a5347c8236a5eeba9d2c13a77c5ecbad80
SHA5125adac29d98f874d26cd2b18223f4d90d616f07355f9e92b5bcc01c8e7873fa5d633a28ee8b97e784dd6bd739566bea1d538db70a267525dc2d9339661fdd01b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a797204342e5e092bc38ccbd7b0b31fa
SHA154ec0e5c4166fa2d9a7cebf5887e964ff9a99c51
SHA2567398f9d8db48caacc019a5c4fd382746aeba90e027f6c6e5385b5bc8756a7968
SHA512f8f887c0337bd4008f181bddd689ec92cf10014d2d37f3640dc099d735ac703606acf2dfee9b7708a3df447062e2be9605fc893fb879f66d67355140894dc307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521cdfb30fb58967597eef96fafee32b2
SHA104590f67066a212f6a62a775035808b1e17e2fba
SHA25614228dd924289a64cf39b0d8fc44b11bf59f4946b3dd8d154439446e5eff8403
SHA51296ab7ef9c478dc24a102230630a47f1345dc43bcebd07090e1d70a49a79eca1879245141d9118f7077dc33785779348f61eff5a8697dbf9794e76d7650429ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa174f7d6ed8f35bdb4b030cb7fc724
SHA1bf729d3211e56d4d35512347510f3d2dd0b00004
SHA256a71d39490ce716ffa541e0a5ec7e374a2c703371bc3985d5202c17209109de0b
SHA512d531e78931677a170ce424145a78a3a91ef9e5417c7befbb4d2548f37479046d3ca995d1722fe91ae96cc2975525b6958698f7f165340a598a994ca1badb7829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e11753abbf7e758c655fc0b4fdea99e0
SHA1e402912c04e9a8c260389f412cf2b47032bc36bc
SHA256f5ab9f52630d3f81f57499a4780acd0344296202d0d7dec743633fc571a77bcf
SHA5128ebe525fd8532c31c107b4aee4624e12ceedd15131fd8c4a10e3384350045d9b56804de4d5e58ee2d01dc36bb229cbf41c337a573a43566b164762c2bf175a3d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b