Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
fa63c9df8855bacbce46d2baa2b7dc4f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa63c9df8855bacbce46d2baa2b7dc4f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa63c9df8855bacbce46d2baa2b7dc4f_JaffaCakes118.html
-
Size
460KB
-
MD5
fa63c9df8855bacbce46d2baa2b7dc4f
-
SHA1
38c87664f3235b081eac3b5922ed4bad8ee0b55b
-
SHA256
e7efa2b477804f9673304748073046df75d6bd8f25602dc2dab60f9bd5f6b1a0
-
SHA512
30a1497fb5290a2d16416fad849fe5523b2f5477b32335508c57972d2da2dfc9f2ad05d77c1ac51eaa122053901e4cba0a4287b67eeaa48e758a231e9c9d09a5
-
SSDEEP
6144:SXsMYod+X3oI+YwsMYod+X3oI+YKsMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X3Y5d+X3u5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36970681-7CCA-11EF-AB3B-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fba910d710db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ba98f78418004466e09b4e52256f0e9e512cd07e002cc19f6b0ae1ec81360db6000000000e8000000002000020000000758beb83bd4ec13ed05cc7b6911a2f229417c816d418a0880c528d5c9545b0e5200000002af7ea610b5b05e06266fd173c5b9f1cf9bda8bcecbe002bd509ecbe97914309400000001638b72ad2116f9099c2b0bcea0a8b91f7b6e8cf1dfd309484c0b232324ffb3cd9f758a2413c4622a387c9e861fe9af92474e1ea7c622a3e27c0742dd4d52d74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433601209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2528 2508 iexplore.exe 30 PID 2508 wrote to memory of 2528 2508 iexplore.exe 30 PID 2508 wrote to memory of 2528 2508 iexplore.exe 30 PID 2508 wrote to memory of 2528 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa63c9df8855bacbce46d2baa2b7dc4f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd649f1707e5eccd38574e6a8b18577a
SHA1ee4345b02dac915fddff540e0dddd8d8471efe50
SHA2567f53cad937064b88540c779f487cbba7402c3401fcfe0719626e2ec418d7e4bb
SHA5125a5a742cc3b528dca8ab616160603cfc28dea82ab90a5899e4396ce37cf5be1e3b1882183c6bcdbc87621c0cc4086b0634b920cf524100dfc969ed765f9512ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6d1c48b8e71bc50d89adb4b14f8e9b
SHA19920735222bd5dfbdaafac12afe54837b3fbf10d
SHA256a426d26386777829324bf646aa3e26bfcbec102106fc38722b9ad358f44746ee
SHA512f01ab8da5a892365eec8f343a700869be68093e2b7b360835ab7fb12cf1e904525e6206158dc9a91dfba34408c9269f4295e5e3522df77e4d36ec5f622e6840b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e6f639e097e32d2b1dd577ec30e441
SHA10ce6e862cbc041990c110c3288778550295eef03
SHA25623e196421e129b39b5bc9abc85ec4c226fce7f5bdbeb48567c1506514e23e581
SHA5129fe5ecbb2063a7e3f90a7f706761099c3ae3489d30c0ea68d68c1ed8ced76f6e78f022901a8a685c26177e8b1396fb5f66509b73bbcabb9d1345f74e48e17bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ffa5bba27c7d09b55ff077208c847f
SHA116cef1e6efc7b14c789b9c2945d11a59504e7ea7
SHA2568a57ef111efd5996256768921e29fbfa693979082d7afa814c0a2b536d1f50a9
SHA512305da1ddfba55fc9deb111af1b0affc667a959edc20c6ca0f510e120ebced218c268e92858069a9225d044149394593675f65f9acbdaed93b16afb965cadd3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af68830c2d49ee0c18111db6856f33ff
SHA167af52c667d2f9fefcab29f2735b7e667d39cac1
SHA25609fd8fba1fd3eb2a46919ae9d7cf7fd63c5fb8dbef36efb2e0840dd0c3da2dcc
SHA512feb5f456fe100352d9756fda576dbee6e7ca80a5bd39a0aa50366a4a6733b2a6213f406eccb91bd95134f6ce462cb9894f66185342c0adbe41d7e1ba99b95ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524006925dadbff6509d0bd2ca18cf12d
SHA1e0e3720f2c44504342fd7cd3c61d52e3662b8806
SHA25623024b6a2be933c5cb412a4a70f8a16655f7e5d36aca00babe8e9ec8280870fd
SHA512a6f017a846d05d531a89b42be88cc295c53686e70aa09b1e02439974a78fdbc8d544444cac3fd322d8bb2d8026fd22e387907cc14e49f55b1d645ab31267a5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e46a11ffc5aed05b66d214a3b63cca
SHA11b326bbc910c723083d47427e6f869eab20adb7c
SHA2562ff7a4d0d3e108fa7e2c3651c21ccccb82e210f73cccc204e76864e61497d8cd
SHA51292075a0a946e48afe9b52487e2b9da6a61630500b80e8e9d7802acef642c3d6c26aa64e3f825695294fff4ccfdd4acd076f8642ec13212972fa706d7e5a34085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd6d799178f3ddd146571b451609a82b
SHA1171be7cf1e8bd7b5455fe5db1147668b4f279bcc
SHA256fb87349b33e63edb231e288a735356cb6edfa5fd392ab6749377e74841ef3abd
SHA51284338dff2cd002471f5b8dedd3d7a49ebc0310b7b87eb2ae161db12cb0befc7fc2fb76cc9b2171bdd712023d6e1065f427b595773a61d687c779ca82bbd3ef8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120348c4ad9039cdebdd7bc82df7b03a
SHA1c846e8af6de400d613f3e4f3652703a0284d8478
SHA2560a06c4c1ae554abccccc6bd76e4bddd66721ef0271a7a77c014b21f10ec84e9f
SHA512fe13e9a8a0177fa87ae9ffbbfebfe6c9da97cd397bdb7915654f1bef66f7243b63085f50fffedaa2df945bb069203821bf3a5c73fbd1c1c81d619339103a2b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87f17ec97da23c51819f2f7446f4f44
SHA1a8d05373ad1ba48aeb161b84ceb2ffd67eff6c44
SHA25619b0e119aa478f57979f9c281ac53f384555203909a337d54fb2a79cdf9f5574
SHA51238a631b5889b6edcbca942a5e0d3d186ff2f32b972273d00e572a64f313dfde2ac2e92417824b51b49e5276ad2001c5692902fadf629b363ee642ee30d8590da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55facd8cc542be93a81c0af8c42e8a8f4
SHA1e628a60cf7eda2c866803451da181304569a1528
SHA256041178344962fb3844cabec5e3610c46e8727c4b2cbe3116e206eecbc413b728
SHA5129f47e83f0b3efd487fce68b80e99ab60342e3274ab98b70620dd4a9c472826afcde98cf2e6247633d323878afa19eba7d96e2750b1bbfacf588b3415e5587e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8cd2a6872945cb86375bee240645fd
SHA1dcdf9e0ec00ff8b4fc52eae0b28d240cca31491f
SHA256ca5e5ad45eaafa993e8f834727abe2e73e5707dfee35d1789306cbde0d8b0c96
SHA51210394f8d24dd27d9f71bbb80d90cff12a8fdf08979c50ad6ab2b127d5ad28673035ed86afdde4ab5f0e2cb7d147680474f513d67d2822a4d924413e37a8c7e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843fe76da6f6f39988164ab805614009
SHA10590f775610c9523381364ba05e3b7aaaf5636b4
SHA25608281a141743b553ca1cb3065fdf97ab0c73006b6ca70c9c4e5a38562a8d2f59
SHA5127d44d64573479de34dc87ad71ada680196a88d4d2c93c5cf91d26626dc754624d7704567499da3936df3afa6a455df6364bf4cf1294473904c26c2c0100800dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2957af867ed0604123bc3a97f56f83b
SHA18d7a4b0a09260254c4590557e54c4b300372b30c
SHA25685e7ba79fc7d58a5806d4d51a876e189f9c390b094c5f647a99909b797019e0a
SHA51285efd809deb01c20b488db06f31f9fe4a0df286316ed4c07c19a8cfe327cc29cbdd884984384ffd0cb1e71feaf69079400d542ee11fae6920e8c655defa4c1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5579e831df8bec4fa93baefea7e7678
SHA15d961104303da16123ad22daf0bceb7831b16b80
SHA256beb659a5a48c3f94b465bfeb72a6e84e90f3485782c62779e29df7ed01aa8f67
SHA512ad9eaee726aa3c8138b1df33b1ab9e015c61ef43319ab67ca1ab81bc9e3333cf03a297f30782a9bf590cf1ce17f7ba67c41005f95d991908917b33f847269bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50caca3f8bdfe3801165fa123a7696cb2
SHA12c237140557d2b266e6f99b53cd78c9798ae48a9
SHA25670ae4e4efceca9a35213de712f4a39ec8ecc2a3fa1d50084591d39dd1674341a
SHA512f0f1518649f1a62dec04f44f4c60b07e3ae4893d73406892a21e9b074f59584de3e421738eafd2f9a7be277ed57390c1f7f33a86589c2b754df3611a2787a0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2d4b433a07c2bac94d079388b8fa8d
SHA1d4045877e611e7557f49194a062f687ac22623f6
SHA256eae803e2aa0b6cc3ee59c740944234ff8bd8eed8cd76a0e2681d3bdc09df7a5d
SHA5120fd780e78d3ce8bf18595ae79763c55433ffbf7201d2d4a385164945a6295775141df8200a2add18612af234a7043e504a8ee5ba7e3c72cb4141695d0129338e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568781ca40c0e23aeca34429adfec6f24
SHA1bb13f18c65ecfe01aab6402d319c28fa2cb06525
SHA256f884fb26329f821ae4a32b25ac0cb2d73812a2395450c3728f1f6b188cfc426a
SHA512f30bce326f0714c57d142db298a31ce3d160a070b7e7a3a06bb3aa76f85090f0d32e986a49b400e0e55c701f1b5e666f13f99da0225508aac2868c566b9005d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b