Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
fa5160d0ef763737b85ee2665b5872af_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa5160d0ef763737b85ee2665b5872af_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa5160d0ef763737b85ee2665b5872af_JaffaCakes118.html
-
Size
61KB
-
MD5
fa5160d0ef763737b85ee2665b5872af
-
SHA1
e3512b1f93de465c040375d3dfad42b732e5315b
-
SHA256
a527f4257e7259e855b3db00fa5afb56d52bb6a51482ceffca45bf84bac971f4
-
SHA512
5bd5f575c0ae17c2a64bcb73c4d95460c0cff2bd659c08e397f8c183736373356760b5e130d088042847d89105860102a8323f643bfa86801e224309c1d9d2d5
-
SSDEEP
384:Og4gYgZgQhYV4KZytroKv9akhSzOZ7nwLPcJzHjPB+/EFSO1Aju+1Xlbt7EKxvhs:SPxNkk9hv4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000023c24448a2b106386a9349c24bb3cbefe2d97cc3c11afe36f84f08ef59d4979d000000000e80000000020000200000004d8f890aa4aae64ff57a061e57750cb5f3c29344709ebbf5a5e202012face84320000000ed3d4293a074e1987dedf806b787d8573c77dc0fb61c44b9465f0018ca72ac424000000032f25699e864dfa9858aa997909ba7bb86f107a1fb9f7301c350da788a76b063ef0a22a588fb4cce863f602ffa2983a11b4b924a285dfae572c3edc2afbd0d82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF289651-7CC2-11EF-8287-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f082c2a3cf10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433598028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2348 2668 iexplore.exe 31 PID 2668 wrote to memory of 2348 2668 iexplore.exe 31 PID 2668 wrote to memory of 2348 2668 iexplore.exe 31 PID 2668 wrote to memory of 2348 2668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa5160d0ef763737b85ee2665b5872af_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2448806ff33949a9d3e91e8945bf088
SHA103602cea4ec212abdf8c8b84e052c23973353d50
SHA2567b77e08880c8d256e29f019a3eb27475f14570a86233db22932f0cef76fa2c5c
SHA512c534338490b26206ca5e22a9c5d188340ca37fa42ef3af9e42aa6b87ac1a864467e13d63b3e638222ecd312433b9cdbf844d391aaec3da037011d62cae73f73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166ae4754872ee3727b4c8127480f4ac
SHA149c007bda090d37c3ece9a5ad60f4bca6559603a
SHA2560c3414a8b1ddfda8e165a6de63e0f686d3f67141940df70ad6fef0c63b222634
SHA51287cda5670c30627fbd42325c367a07e8c815d05af397c5cfc0396504fa4ec563b47c7d5f77db143fec210a8152cbec5e2955c4954a20d0b6def693247923fbba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8a02a1aa90835ad34136abf1387762
SHA1028e70d69fcb1d400382b24c6bbba3ece6fc05f9
SHA256195b0a6d1a676936c5bee823dfe0c6d60737a1af6f658de4342793c2689621a2
SHA512b5811dc3b6b79251699b0516c57f8d9997ceb9dc07c2fdb2112d474e5d5f89ccf8afabd5bff9896a463bc08024275d4f27ce00899ca7987862f606e9fff9fdc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fdf076166202e6d61cefa409ce8b1c2
SHA10d1a0f9e494757a797bd70695c6717dcd0fc49d4
SHA256ac78f6af2e72e6b8347d7036247590a0ef9b60b042179e2f8be4054285b91bda
SHA51205356464b5f9cbb4cfac2a06ae359c6e07c6bd204fe3aab969da8362d0141c3a175cd09ad173de6d0c124a52aa3f5f551477db9f12ddf36dbef39b27a1984122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b06a4846d50682b6b183b0a1cac08e3
SHA115e684b082e0bd791a3a4dae1bfaec0cb861d404
SHA256a14d05cd778e7b99b2f5c517c8226bab8d6b327830fda2f37f95f8299ec61c94
SHA5126af4deaad336b6315c19161dad142f402acc4e18330134e52843bc4b4cbdd219b8785d2df424e9158169af458eb8dc04abc94088b2b00399126ecccb1ed9ac12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca08d159ed6065fbf3cc02c5b3bad1e8
SHA175d12415ec6c7448acd4a4f4b372746d03985325
SHA2564c940dadf77d702972d6f0aa4b7c4ef6048013c2da0f9592c641635bb63c4ec8
SHA5126e4a75936be694282a5bf1e3dd2600d5ae210e58b61b56a4708a320ac701165de6f4327768d613e0037cca5480b47db1c7a8a7ba5959950fe820d461c3630942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af3d31a539747c0ff4fe22727c88b12
SHA1f104f1affa82c6139d31201d55353b3435a77829
SHA256f3ba639aad12e0b2d506df5d13940802ce910593afc7d482724f1387155f8c45
SHA51235cae7580d9fdde4c0a053555097a5f1d4f03f43ba84b2b360d93816c7737b69f2a7756928c367a12c92daf9a7b7ee97a95e93ef70ac195266f6e27d447e2389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959b7644994ec9eaa13ea8cfa2d10ae9
SHA19d0882c5d762302ffbd285217cc60a54ab534938
SHA256596e0897a632ab756c5204ec43a6f676ba17e00f50425c09cdd98d4543bfa65a
SHA512ef216109c03e83d1e5547b55d11d57d197562fbecf0b3f3a9afd9638bedda56a1f1fc5c40efd9edd0fae213cd741197674084fd2c322bf5c931b798ffbb21c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8d5ae9b8ec801b903b647367798145
SHA138d136ef3d9f2c1dc12829a07ee7f2f89e0a4629
SHA25693b8d089a781108305566cc5595b7115b897b177eae85b08c94bbc8cfefe629c
SHA51201f17a2b9b4e6810b59ba8298def9a37f33c1b1dc7a17fd3bd4ce033bddc79330a32715f7dd93809a643385a857de6855a0d03aa8ee0544c9f6840caa7ee6e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e57f2ac39ff72b54f0b3f696aee3c72
SHA1ae4d5a87386d264cc8c920ff2dc5db0af2dd6ed5
SHA256468a3da765116856b22efb72c30c967e51753b4c1797c2fe7699182a950f55e0
SHA51277c96a4b09c407a3a885be674e664f4532ca68bc1b2691ca7ced842253518203964e8830aa9c87615d9ae0c0b0869cd4f246227fbef6341aeb208bf488aa71ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd6f07c0e73c483647647026c2698f40
SHA1a27f4a9a63080fd61704d0755dd8586af8b490ec
SHA25670af071b0f1f8b33b4f434a49d80da6e5ab0073a3e8e0ae4247fbff8ce91658d
SHA5125e8e04d50e7eabc2b50fc2c414f6eb5f2dae3eaf4dcf22813a9afc22f25d93b7d75590fd955106c4414dca3b4d8d6acda9d70ceaba8779b6c475af447039a615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d552cc7f3b509ae69e6808e5acce5e
SHA1a90bc712ad249a12ef440b38b0765a88fc6f6d43
SHA25623b3ca3c02924025ea9bd48e6138593d9eeefa14ff1e296fc7546f36e88cf652
SHA512353a76e9204170f419014c471f1ab12367635e33a6a1fd95cfa3b96aaba712d4f990251792ecf8775575b5f47eb8b22450ceeec265fc0a55f4929e981e7f7a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5486d43aac44fbd72c5182227ca670ebd
SHA18815f43edffc058590d404f73f467bc7cb826c64
SHA2561fd3f375d904cc7bace53f5bf98302b4c61de4c6c368c3c148e55e5fb5b97e1a
SHA512e15b3de5844528a5d258eb7c855a42ed7625c532f92d7fd015e77152ad27f1affb8aadcdf55365a891909b970b0c1f5332109f043f23991c5b320c1affd510dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53612f3316f38f8d414b0b8de5d184f0a
SHA1dd7a32e5b8d0cea308fa058eff8d2de623299c45
SHA256c1aa07c750f5b77a10148924386874cef78e4c532527ff8953b9679780f6f68f
SHA5127806013d6d5c9086458e3b3a8a5e2c06b71225420330bd34246e15169fde1d4273446254d96d0512647b892f004047886abaaea32471488347c123d136bb10f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677ea88fd17e801eae0793e6601e4e26
SHA14e8de3e5f69808357afba664fb2a178e0c8724ab
SHA2565a732694e6bdbb7f43699d1575f99fb8449063bd371f7c77a0a412bc973146b8
SHA512b17f19b4ac5b412527d936970a6264742cbd16200937880652137eabbabd856f50f5c71ba01265f3d41359d5543a866a0a95f0d52639163358a2feaf0d6b443c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea31ff027a9582ae9fe3cf3e1ff6f505
SHA15350547719a42a6069b0a282e3c87afb9054dec8
SHA2566f8b0072a0de16f992f63d117497b1f79749a7ccd770e7bb4a4f26c7e6c6b6a3
SHA51292211868e00e2a42a73ac497652b2eb4609a6f03bdb9b2a36796dcd6e80f5316b0d08eba5e0fd16e3e01443fbaa202a0ab88e9a9a09f39f7574621d43ffbc37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea57efda6c297a5f76e97a533fe40b5
SHA1039b21c97b4be4efd18092dfe7a4f474b2eda23d
SHA25609af23c06817c691e878310b86550c7320a8a62b9e30f80ea024413b5f5c5ee8
SHA51238bb5fcf64d8ba1e7087c525b860748d8d81a5ae5a544b9183a6ad76fe7ebec54186048417df64450aed3cb8aabef21d88d210e2b36ea98168b36e26da4eea08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57068c63994b108ee344f0a1e92c7c4c1
SHA10b9079c1b1682325fcb791d73c41aa02139c9bc7
SHA256d4bb98b09fb053dadfd0e109c326021255c715f9caccf34339dba323f630641d
SHA5129ec32595c0d59c105c308507b8ada9839b3f55eb05fc270ac1eb86653828d8384ec7e5fcb5f1ca7d572ba8235bb31b6c0a4d5344079560d65121cd892bf62f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be23cdf5d9035f4e8cc5c3261031b8c5
SHA1398cb3c9bbdcd20fd388877376310578ed943882
SHA2569c53a790b1b1336e3162de1b4e3ab3ae0e02886cbb18727b9face731c34f561e
SHA512f17ab85bbf99c9cba2930b3c838e794f49817bce84bce7917ef5820535e36c737acbf613a8f857db8c1d7e8c9910c5a58f3a50e85d1fef01ed48d398a3c9c77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d81d65ace6147a2250661219085ead
SHA1f5ce3fcce6382598259c1ea97c74062418d2087f
SHA25606301ccd80f0dcc4cd78ca9ff8d1b0da008ab06001245b9df4a0e1f7c0292bd3
SHA5123c8d2876164b45122731013dd2f59d32fcb073c0c5970113c1cd169f5f9d9ce9f6fd79be1f1eaecdc86fc918581453851705f882d701f6c74fa9504f904a625d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b