Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
fa2eba945dad76e49bea96c1eb4968c9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fa2eba945dad76e49bea96c1eb4968c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa2eba945dad76e49bea96c1eb4968c9_JaffaCakes118.html
-
Size
10KB
-
MD5
fa2eba945dad76e49bea96c1eb4968c9
-
SHA1
e940f8c7462392c24e412d2a3085b67be60ef7c5
-
SHA256
18b5408342e2623745d2253ab824b3cd22b4327a07f7cd89ce611adc66fecd11
-
SHA512
c88ad216ad59bf145dc7821c7848c68b5543c72d1806725eca193ebd511b9627d60dc5f6eca967b742d460a5a2fbe437ad259de1d590ab10c8e57da9427eff92
-
SSDEEP
192:csz7zbAYS/TqBJ0IaRX9/cZ1JxV0PHb76f:cgbAY8TqScoHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03caa8fc210db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA9A7441-7CB5-11EF-8CC8-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000de6ae9e89a29e9434956bfd39a81b5a28de8c8062c87e0ff1af1708dea7307fb000000000e8000000002000020000000baaf423adedf07ecfbac621dcaa344d8c1174321caa10fabff298e9790482d7d200000009b643d1b99922d0d9bfc683c8306de8f2151a150fef589d0a551c2f6904c6aa54000000067b007408759e86858b6043c62534ac335a0b3f525419e78e9f309b5bfe3b7c48a0940fff1e50b10528c89a52ca8d2e5613ad269d46f6eb0a5dc9708b3f7be61 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433592411" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2748 3044 iexplore.exe 30 PID 3044 wrote to memory of 2748 3044 iexplore.exe 30 PID 3044 wrote to memory of 2748 3044 iexplore.exe 30 PID 3044 wrote to memory of 2748 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa2eba945dad76e49bea96c1eb4968c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a624dd580cf6c0fae747af185020ee
SHA19e1e336f3a2661cc2d02e4d0bc8adf3a986feb69
SHA2560a048fa6348c8c03dd510784a1885c046b928f74486474bcaaccac8345fdf1e3
SHA51225a92c70887e0bfea4f931c83a578c86e9b47c1d4a2379302bdb638e6b10c99fd1dc6777f4742b8d8b529157cc0bb73ecafb7e7b0d138366f7b21d9e9f455053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5239d8b4f26cf618b59762f5850d1e053
SHA11d2890789088a8e4710c7d8f80872d51bf1b8a27
SHA256a674314f837917294b9edcb0e216109e7ced47119750510f1ca2c413c29daea2
SHA5123d010ceb7f515071ecae29ac9a1d2fb9924cc17919745d34960a409800caf14f37349ca5f6789050af93a3ea58130aba0cf4bbc5f55eb46d604e980c569e8a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560cc7adee064dc46cdc05ddd8cc84ecb
SHA14b65cf1e2d92b646e0c89ea66fef4e40b867c11d
SHA2564a44bddeb0d25cc50594031177b20571d1487b0e0209575492f5a64043cba4f8
SHA512dd51af39aa9f56341a355cd66ed0a420b65696f14fd8c88a7205d40162c1892bce7cd903073e12837e8bbaf8a7062f65f1b94d3b63463be20d6a8275c7ffe452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534abae78e0d03491933a24893a41e575
SHA1531ec29862b9842fb767e22b2b23cf35e6eeb89d
SHA256befa4219db20c99f1e29a7b647ec32a136157da64919f0fed9c5c2efd04008b8
SHA51219e4ad8589971c0e77df94880d28d457e0b243f503ea92991b9f87d964cc80bb75f58b510830223502f2dba13fb9c4c9d6e07037e776cb9d851d5dadfbcdecc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139e1e3747b0f67e5e67df1e6afaea29
SHA16a1f5a7862d7dcf8d6bfa0f8ce926d087fdad239
SHA256fdc9176b05594a349750dfba9a51df4d586e6a5b0b921be85ae9814968665937
SHA512799f1bf9eb7a421a6ae88012669cac4ddf7ad379037b2072876fffcce9a4384aee79ca3b5cd566c66139af9bc1f7bbac152802d24285d45989766f0e1d32dfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485f6f8f46cbfb2a38a1af539cdc4438
SHA1418d2952fe2f1be6f50d4903119a2feead7b15b5
SHA256e6a4bb03311fda5c97c1f6da9e1070e5079a875724f0cb20e772cff8b5cffe8c
SHA5127b8ff981dfebb128350fc2148fc670ca0b32b35a67e249bccf931bdb0f89a631f5708cc5eff326943506af924b23560d282ec68d1cd88cc7b14dfc71ca5dd824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58355a8b914158a9a87c9a34bfbd6f5a2
SHA195fd890e2d7e942dd26d1c5e1082d075bf0ee7b0
SHA256a0b6a121a662abc0f6c992f4067342e2c5a4198c973b6545f5d40f569b760cff
SHA5123e43cfabd9ecdc63afc750080fe8462e477857a94147c2df3bba2c22d3030a91fe9fdef481b73435ae35ddda6d5d65dd396319fa4b9de5dc25c88df706448993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9010c98a37b67170a49ae72d616e14
SHA1b9020734175e42c95bda486196905fa1230d42c4
SHA25690ada230c39cb5a22142fe86a9e8b83da0d8c538dc4c18080bbd41a75eb2e2bc
SHA5123e2d8cdc7c44a6c8de5dc79e7a2cc9a1aae1a6b8a88f1ffccd1c25c879bf1950eab0b549e3dcccef0c327d1c3bff3311f576a7d6f990551cc4cebde3339e4a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca4b0fc7bfd4f1f139fee834c1afcf4
SHA1b53c7a94f6dde78e5597b5bd2aae2d20e443dc41
SHA2568d69503439affd3ec5f16dd9bf00aa7f19907d058f17b5847e862a9aa99f02b8
SHA5129b9fd9fc0d900fd0e3df6d1730a06f54b3be7550ed78a62005465d5a54f98bcca2a100fa046df7f817d38ad1d236d71d6e4dc3e5aa907cc51529b0d52fc8b40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1b9cc46aa6fdcf77e66ad12e7405f9
SHA1fdbc209bf4b8365fe967e693f3471187280bc608
SHA2563d38729f82b8e1af9eba8bc69b2e3e2b1ef5949bd7f2809ea1d72252c904820c
SHA512673fd45a6d4de98cadbadd614d8600b7a78fca02775d30ec27295371ee63f67516befdd2894073cd9d8beb4732738c5dbfdc4e5226bd2f2827b62d226cc87b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a16c539ca74311767d8e9e0a9e18ef
SHA18cef767600418dc2050e4c0ef2b86ac8dbce4276
SHA256608d2fc006b00c6c6af57e9511a5a439e5a1ff1be2ca3c6248b345618fb87e15
SHA512f16cea4faba0341e368423bf9e688449ddf385b01bad3acde0681d95e3531c206764098d64e4a250f6470d7370c76300d1cfc6cc211d0ddba11f1af931774be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0246b618576e224701359568de733a
SHA158d68357beef9d052ef590f8827677d7be4dc880
SHA256eb4cf6572e01b660fd051958c16c6251e91b38f80b259f4082371f753d3af251
SHA512c646ab6306cf02a43314be90ee00db895a5c6218780f9bbcc33316ee6a929bb95df74a55b00ac5f6614d909bdb676964255714cee75081c450808eb90088f4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807c8e6fab1aea38f947b81e2f0950a0
SHA1aea971577814e7e358f6879a1dba2f222e1af331
SHA25611a43e70539fa902ac7eeffff7d693e4e4f975db508435fd19df8eed0bfd780a
SHA512df116d9550df59445896fee5c69cebf4e7c3ab3247ab9f90249fc85ca4c30815e534cc2b3e93fe6e7014059662bddf46a537a83d3300ff8c7aa5aa3c23ae6405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503ed737d8391efd0abbdfaa9a35616f0
SHA18a179154fce9bc513b85f51cbf381bd768ad2df6
SHA256656f922387165ac214a128dded4f83f07af818c38ca0f07e17779262db596229
SHA5122410d79adee932eed1983a8b1c1dc0c77faf445db815215c24d3e798e1334541b97e3b6376091f47e9ea34ff117d0e51433d6c02f6ac9685966f94ced072cab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0f2636f837282e912c93b9bb22ffdc7
SHA17ca7582cb0e6b381ddff9cfee5c8a209cc99d285
SHA2563471d3b014ddee145ccb63074571b6abe4de0b8c73921d9a6cdd97422c64dbc3
SHA512228edcd8dacaae7fbadb6c9ee64581efaea06f9fdb02f55b29eea71e30eb14956e69ebfde8871ec60264b89510e7978899755366cca64ecfe4c9081ef47481c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588319e3c5f8cc514f3a8d25255942bef
SHA1f5016db321468966a391fc0e83de139a4fe04337
SHA256922c023440457f1bf66f7ea693d9b005ee13df29d9b56031aea20ed48d20b706
SHA512b349fce95f2929d868183393531c06a80444ef484e66707c5a2a20d5716a637299869b0459a24a6717a92f0ed000d02e0100c503b950e7ff8c5d664d52b32d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52347c3cc1899365deb164e42164ba907
SHA18d0507bd8b128954a06798cd07f2cd1b2ab0add3
SHA256873e74f7e27db76082f12817c15f6bfa4cdd7a1306adf4997f26f62332f45e2f
SHA512583ee8287d9b68e02ced70c0007c4d973d8897b10411b0ef799500e1329439dbbc440b84a7f2bc42cd4f37fa9ec9c99eaec47cd035e92c6749a4b298fbb68ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512431aaa95c00708b984c7629e210cba
SHA1b9bf216103c192297eb7802d0c2dfcffd5097c72
SHA256561a2586f29941df36c6387f2214e398432ee92abe76e496e8c03624872c6457
SHA5120d4f68c86fab2527b4a0db14c5d5f5ab4cdf34a8c405f8e484b3a0d5018e4154e87e818bac75a33a93b88be15a7b67cd2f2345ebb6d8ce6b36587db0c3bdcde6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b