Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
fa66b33d1749f9da2dfdea6d1e343491_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fa66b33d1749f9da2dfdea6d1e343491_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa66b33d1749f9da2dfdea6d1e343491_JaffaCakes118.html
-
Size
17KB
-
MD5
fa66b33d1749f9da2dfdea6d1e343491
-
SHA1
0ab9dcb337385b543a65c816d1d55bcaa0eba508
-
SHA256
ac96eb06f9b2f7f747c24d50ae0cf067867d51f688ea5b394d0105f1a1bca702
-
SHA512
fb0d1050c4926addd6b7e678e86fb0f02897eb4b543bef77b00eb59b88fb89b834c6899cef14be5c5fe08d28990141ede1cd7e7694ca4bd61b92cd60756e272a
-
SSDEEP
384:FatXbj9GIWAsqDGbTGPUasyXS0glRYJxyz8tC:2XbVWEUasmS0glaJkzZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000013d178d7cdf8d6e4ebf153a96bdfba8f3f67187c64f19422d486bab56424bdbf000000000e80000000020000200000004dd86bc5853064120881c3ecf23ddf0467587fe9c38a6abfb47f2f507b045799200000007a949d5c6166352f6ae861a026b396b22800c5af0417434ecffa2f49c3490f0540000000dea3f405215a19e15663e60bbd4f683d921db685e3ba585c4c810a34cec9a1b1177eab5b50de025463a8ae6b595171e73e3a0722720d86e55f7e61ee8db00005 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433601648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2004d202d810db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C47F9D1-7CCB-11EF-84E7-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 696 iexplore.exe 696 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 696 wrote to memory of 3060 696 iexplore.exe 31 PID 696 wrote to memory of 3060 696 iexplore.exe 31 PID 696 wrote to memory of 3060 696 iexplore.exe 31 PID 696 wrote to memory of 3060 696 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa66b33d1749f9da2dfdea6d1e343491_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57232c0e55c90b61e8edf033e42acd316
SHA19d93bfe89b23eb9a00cd223f979ab949c9d3cc0c
SHA256df6cf95795f0191e633c84db4522a5ee294ffcb63755fbd90d451c6137036116
SHA5124a8567a58b1a34646fadb2c7d1aea9ac859be7c5b05f4c97e960799064ccdf693c27638caf3bee112f18f0938c1e79ffb319c541c0bfd36d04c7679e57576de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a213737bc8f2a4af957f774794dcbc9e
SHA1dd2c26c81479ab26f776be216d9c20d168203ae6
SHA2565d887894567ab9736f7f229a4e8b0a806bbb77345830f0f50ccb6c0efa6e186d
SHA512c97c47e7cb1872df3779f758e4aa7fa2cf20a13000596b88b52a79f5dd935d532e3a33d0fc688b6184926482cb0e020da48dfa6e78b5ac7a81bade4335fe1250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce508be0f4be0f215975e56da1acd80f
SHA1058a6726a5797943e8be36eab8d88bbac05fbf8f
SHA2565ebee830cb5d0db509a94b8eb21da701a90ab2e50643002203fc8184e9c583de
SHA512d1387c9e07e19d1b0bcda17419aaef547efcdeab116721a82ba1c3090e52657314afcb8f04c9493293e1d37f9b3a84b23dab1a3242e82b01b29b77e46188177d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5865456ba4c4310aa6dd64e252a24b1e1
SHA18cdeb92165bb6e4d6cffb608542df27324290eda
SHA256e9bdcd82dc4f5e93def1e79a42a884f88790e869e0abf9d5bb7c9105d05ac4a2
SHA5127a37112536cefe5374981f702393a6c24ef58950661f2c6b8937222ee569b7a3de642b4611c02a4503dc995354f29515163c1ef8bdb9d5bedccaada93e601bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da6588b08abaf8df08af8d142e5bec8
SHA17085df473f99bbc746d9f918e98640999079554f
SHA256866ba58a0765af1f81cfc5fd959286edd0dc735bfe5d48e4c4de1057e1a67b21
SHA51230b28cb9a5abc5a52e3d0c16595f1cfd0b952c16eafa7b56d9ccaf7838d972b6524ca545d86e65b1bb0874a58613ff08c3df6af04f319d85b0aa735f4d089155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968bcb95e7a3fbbb4196d28014979b21
SHA12fc8f3caa25cfd703d3bae409c6bd7f3e4a5942a
SHA256d82563fb74430d22f51bcb78491d45ed19b07ff4f573313d3200a1d49302e828
SHA5121890388be9f7750e70b11dd64db727c61235b6d4e4cdeed3b82a2f8a67d8537088151e4710e3d122670e1c57069c286d7e5ba1dfdb6b413d70ce19a67a2735e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581bb1dbca0d457208a1a307e4e14f37
SHA1199577bdba80b70244b0008695f0708ac7db87ad
SHA256b5b68124f806f832e0b6783937053fefd2512f4375d37ad688f9efe27b351ef5
SHA512e2d38b516233c3beae5ae490e152fcc30e765bb1993ec9490759d4fa412de13cf3bd73fbb41bd855bfaa4718a1ca45531d021c0ed9de1039d039e427a56603b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20fc96c4211ecb1d632fc7f75d76916
SHA1c7ae1797c6f67cc3a5d6b5684ecdebcb61ee38da
SHA256d9b8f8b191fd503243cb8f3b2c429532aaf9f809f465c0548fe2ce6c7f70bb61
SHA51242446e98d8171268eb9fb7a3e35e33ec9fdb444b8f2132e571ae568f731b105d526f3110bdd066d7d93ed8368a1e750c79a58bc3b7d871d367c12057a645ad40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f18833cb57b132ca1111dfb9d6988a
SHA120760fcebd8b82e83544b34833ca5f3da20075e6
SHA256dc404267c37de2e4b6ce6ce85dc5881cdeb21079d7ebca125d496164ef5b4c8e
SHA5129a5d5f2ed5ad2e1affef1fae52427a8a6fdc7fea2fbb9f4516bb569ac94eb250cdbcabe91504f136d59f5213f5dad8ed385873ab8a28515a2b3a7ecf50765a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7748916419ecd4052ba5f1f038171e1
SHA1e0e45332aece1f2c35e7cd04c3d7db740dcc69c9
SHA256d004a8f058a410022665d8a0a7a5c0d7d682081e90b91cf712cd6563b8f4f439
SHA5129cd84c47df167e73fef6371f98166e236a835727e77feb67eab0d67252c29af8f803c2ab794d75f1d961c3b917fa1d003eef1f978155b6113c9ec90704591f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539a52beb08089f9531887be345551c73
SHA13b293d4e0a3f920ee1bad9521139ea6b151314db
SHA25637bc16a5e137d09fef19b8281fe791a34ed2d76e06ee433c75e3fec9e927101c
SHA5126dfe7aaf7c0a08fe02b41cb6282504863683efab1223297a0e0129f11ac9cb40dfe3bf92882e96860247c10af430beef014342693da367990d52fc7dd84224c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a3d8539177da77727bcd1ec78a1237
SHA11b7f2402570fcda5cee94664df7472db40897311
SHA2567d1272701197988c72410914e0c70c082e4f95ed2ec0022573df7c3500b47624
SHA51254e014fa4c4325046cbd44999b7e5204c240b48b5bf6ac40a2987c64ab101c88c6c37f0e34b1906f199523008080418f00c2ef69fbf5be29e801383b3232b97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ac59f4c6ce73e3e9dcb11e3f063402
SHA1700f65426ccb50e1031b5b7608947553737bac07
SHA25626a6aaf4f2a425824ebb74d03f54bbb4148a2787c577ef6198bdce5754815aed
SHA512bfc408b8352e7e4a775894872323ec0f8db810739feaa8fa983ad9250f9e84e1a30f7cfb3cac6d654465e7ca933f88ec3a4b700ce5c98f48fad0ff0c837b56df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57756eccf99bd1d088510c64a0cbe15fe
SHA188a5bead662967aa3ee6103302e19a8fab0b44f2
SHA256d89577b811208fccd42469934ac877a8ce208ff43a4fe86a70b0d1b11c82d7f4
SHA512df5f5d583b45eff9a273cafa301175fb655a219e029a94625b599906916656842a69ec12c12bf06c8f12ec61dee009d297a100809e1eb35d99922081aa30e1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f72e04d03f8473b55cb01e01d313057
SHA1a7aceeff6774a6c713a65ae27dc8d1d7874fb748
SHA2560140f21f6aa68ba964ba30d1c472e79da8c535e57b7093258c07d95be45c409b
SHA5129e9656a822a3a071b4ca9ff4bbb57da7633c9f5720c66a9f8b3c0b3caefcb9e4cf2a1513ed028120300fe2bced6e88abe7e5493798744f8a3ac543ed7d81b540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1492d5e3fc19c582eec1a98833be288
SHA1ebec0dee2dd14946dc3ee9574eafba8baf4098b8
SHA256db2ddfdda574550f6120966b37be84e574d2f45f5082d56001098196e5f0fac5
SHA512a7eeaffaf56a190de9953bbf02537a12606b51ebb3e5edcd7a222dd6402b8ee3b1657f0b5b16aedcc4c3bad1ac7a8706a056e0f2726c6cd50bbc694458eabc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c361813561c1e0812f85040fe7b5e0bb
SHA115638e9c64896260d7f6ea735e37993aa84d11e5
SHA2562a8876dbb9a551c4dda731ace2097640d1d07511808c30b0432371e994059891
SHA512d0a0f88c3ee3d0ef83214df7f2b682295075a5472a316d74b5a99692e61969b7f0fc8e231b2c5dad0ac9036a5e8b989fc9faf02c7edbdf5b55423228f8924d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe060b2c83eb2ccf6a8c3dfe8abcfb8c
SHA1ec3051231aa56cdd597843293f96744698820b28
SHA256e669b5d9055ac0e2bb5e2d43df37483cc79888d095ec29066f95464d8f0bfe14
SHA512c47e059d7ebc796a8dc805aaffe36b653da8313bf77bf319f64303ecd20dee248f133ea124cb5ac575c73aeb48d8c1ecb9881e3f2bdb094235474955bfb44a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5201eccc1d7aab5e840394c5d16d28753
SHA1c924b9fd45da31c32b02f8b64113b237618f2052
SHA256da48b621c3cfd6d9f3e667a3bf1a6176245ef40a7b8e9a8959de6e548de69476
SHA512b5b0da32e4adcb7fd2cb3a4816795ed0f12fde80ccd0654d4abaad8ed6e70d7346d1c456e5e1918c4d894505d4ec1102126c42e580ed21051d9795eb2d3170e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b