Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
fa8d2eb4d3c51a30934fb9fe98e2254b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fa8d2eb4d3c51a30934fb9fe98e2254b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa8d2eb4d3c51a30934fb9fe98e2254b_JaffaCakes118.html
-
Size
1KB
-
MD5
fa8d2eb4d3c51a30934fb9fe98e2254b
-
SHA1
0190d8fb59768875767a5d9cef061d037c45887d
-
SHA256
5d78835e13e49c42aef196a6a2840893d7fa769f56c8c61f1614b12442b6649f
-
SHA512
982bbf398598168b3699fed46ecd6f6a8d4ddf341fd3870aa9fe4ce4f197534a5e55b0bc78a879fc2a859f8d3332d4f454f523e7349a06a1dfa3126b93b6995a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E36EDF1-7CDA-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000c8df9d0bc80cc3443c5593c32e3e3d8ccd2e4b4693b7222956725c32b89dec38000000000e800000000200002000000079aaf46980d0185a5e83fda9c9f8e124d961a883b1159efa1625d39b3153db4e20000000504f325450a664051a29fd5215522ff3606c673537302cc3d5125f1da15f4e324000000015122a2aa537d2c0e1a57903a7a54c6132b3bcd4cf14c8b6f62556780f4aaba8ff7b7258aa9165f0b20671cb09f17ff322c5d5d88fc454ef6ffa1ebdd0c5c97e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433608227" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106eae62e710db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2100 2556 iexplore.exe 30 PID 2556 wrote to memory of 2100 2556 iexplore.exe 30 PID 2556 wrote to memory of 2100 2556 iexplore.exe 30 PID 2556 wrote to memory of 2100 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa8d2eb4d3c51a30934fb9fe98e2254b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d22e4d536144eb548acc9a02a9b3dc
SHA177443a922d3d7407cc17e5db68a7694e5e79189d
SHA2566a2e0491dffb2608a8870578c472ccac1c4acdef6464eed1bb7aa7ae1d3d4e2b
SHA5121aa1264b741d9ec327cbada14ddff8845ef178032686f491ec540dc19380873548df7ce1136267f5e22ea780f57690edd1bb4b12cb77d7453b9805e5d15b4ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362ab144fd04a549fc4676ea5d37c138
SHA158da8c91dc0c362639ef07f92753756c6a542266
SHA2567abd2ad8d1e82ab768853e6a824e26f468aa0738b1aa6d142845abb8b6be5771
SHA512e1b2bcb707b305beb043bbd280c5e95b1ba65ce5a9e178fc2068c5e293a5b786eccbdce38c629174ed1a2367ec2c2435e9aadefaa68d256c8245e0f651aaa435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528eda98314220b65e8c1336ea34510d3
SHA1adc041ba4c5be95d0ca792661e9d39009c48caef
SHA25690aa13da14fc6fdb2c143de9abccd85990dcbdb25bb11969d5d8ba31a9860028
SHA512952196940d645ad9d7881bc1bff9e1263b6ee1d6ce1a86c8a04f5fa6931d8a50fa0a2bf640ebb71241182cd76a68312990f3d87686d3b64554b635c0081421fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c2081a80a7528cbafc8c2138564330
SHA19085d20dc26f9cee20e8ce20380268bcee9ac752
SHA2565e8157de62f14c6e822a1e5968eb7c05c103a8697dc014375acfa450ebb5a1f4
SHA512683fefbd11de9e1cd2c10bf1741be663e76045c145b0f7e15ff61e54cda1c0f7d1864d10fca4e1f61d445a9dc6ee1927e975d716dd85b549dd8e6e3e0ad7622a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d2d7b6fa5d27bbd9fe5672a9529278
SHA18f9cc02a7155c54edd88de5c2d99a75e137b9fc7
SHA256977a63060f5485a047be339254560018c62312aa8999d9c14c45a092c6c98869
SHA51276655670491d015c8b7868bec29558c0a825022045fb1886f9408ed431020e3b4a79b8952bcdbc4043bcd1034096092d814a76d2e21c79b353b199f16fd82e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc9e4429e814f6e8c98a72cd40931d2b
SHA1afa654206a7039ec5f2d4bc73336bc3af40d95c1
SHA2561ff59fa890713e04ebd25e7c2a71ad9502e600ad16e7065f32300ce45e3391af
SHA5129513e18bf0269d112c56b78a7659f3561fb6d35d490de8d73560ce64d50a4c7561e5d74130339ccd018c82fe268125e334bf5ed447e9166ded59e36a3f8c4034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d29ad78803d9ad0bcb34443181a12b
SHA1d4a4529cafc47c4f238e98c18bf2dc8d08a51c3c
SHA2562bc9adae559e1ceea3b30b510b2bddceb96b36e583bf0975b590b8f0ed60956b
SHA51299fd375c91e4491ff408532fc9399be7902ce7f0cc9d83228e0797feb52166eafee56309515c266d4ced63511745514ebbe07bdef12f37a27e199051b011eb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb14645f18aa8a07d41fb68eacb13a5
SHA10bb7ab36dc50af99c317bdfd13286c22e22a39a7
SHA2561f818f493081f862f6240e1e5c94cb461e5b67ffa0303c2ec9f3ffbc318c0c72
SHA5120d5d322d68a5f91964c8d2a622b1a5e799561774e42868d45ac6ea462e5e07aae48ff4157dcef66aa527a745bd4b3f8b6799c41be58afdedc8e7c15a2d0ffef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f20608c23bfa942894eb93b96453ebe
SHA128aacd2a909e691a1f60e06a14d381a43f865842
SHA2560ff8bf8a961b63ad0be34b60f5afc9f21376b1d1ebb5562376e28b1928f1fe66
SHA512c7410a26e1249f93047d18c5efd3fa77f0a24f83111673fb2ab6ea897684f266578ca0e2bb522d26bed1f3ebfd58d152593a6d42e0d20651eff4c5f658cc2be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51310f55c3c61c6411a95bac627bcd704
SHA1c9a41ee1ad61d3c5cbf08bb10bdf2224c5d33514
SHA256feabe23f604ffe5420f697d42117529b9d4a204b0ab5e4a1bd0e059ffd62919a
SHA5123f010981b239869213bab047bd77ebcf9caf02d3c43be93852029aa3927a73671ac79a7beee5e82d5d53ccee1655958aeb6e0215c3dd09ed69feb5a05e11e3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56348f11ac6f05f01199ec6a13c4c9f89
SHA1a79d4753abf9415969a2673606916fadcadc58bd
SHA2566483cf509468c63deedbce0e2fcdffc6b1925bc55ceadec4689e986490cccda9
SHA512c5322e3d7c016a481ae5070236162709dcc8e5a8e83f7f31ae89daec932962d15ff8456a26a0d00c0ae337dbbd3a00231d796c76e5b3b0119d6a0ed1725371dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f9992215f053002bccd03f9462ed78
SHA12c56392e4123a7200337dae9c0334a99a025d06f
SHA256aa19eed2afb033c19ccafeff2ef9bd2f19ed0825622f5f3757cbedaee9f2ab0c
SHA512b778e5f534c8149dbd24cc748487d502fa7fe48be7fa758b4f5e4449b151fecc4bd748f29c47ad496f74d6baecde9ebd55a538dc162303c96f3c1df2448e3fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56adad39f716e58dc55ae6e054011f487
SHA1fdc31c47623ce710226fa20636b1c1be4a595964
SHA256f800ade98b9e694d44ccff3e9489647cbd7e906fb23654f51fbcadb7d870999e
SHA512c26911208473dabbbe87735d951fb162d8002d534f6a1f58efd761c87bb2a933ffd6a2e95c9b9440f379c399c036fef61604b1c7ef7ac971afef66b834b7dcaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540e6935fa6bf61a086cbe5ba702eb9db
SHA1faac2b3eaec8c53c67e497310c37718621f40140
SHA2562c76847e55ac01131aa8eaaa3fc59c7c41409995ecb904e1eaa4eef7d355da1d
SHA512d4e271553a48222a2da2794db17992b44afa3e234bee22f982ff15620d4e6fed8b74984ffc8f0626ac25c12da67a7aceb5fdefe358f61e50a16a7f9238293deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be476e295ad0e7bcba9a0a11290b09b
SHA12dec7798a60166b01a14b0037cc81945686315ac
SHA256f46772f74b196122bd2ef48e6dc17711f33efd3b0ab671bf70038964e9273ba1
SHA512715daae39795bb412fad9535eda079d733e84a4b3fd064f87d8a90b18d8203d65c1627857434b2d49ad2289d594cc1fdaedbe9e7db7d3539d54bd3271c37b015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543afa89d9fe5278e20f0a8edb3b3fbc3
SHA1768a17f6e414a7fcb2ce16f1ebc19bd0abfff9ed
SHA256cae298ab81c3936bc27f4f9365a36daefb2f87c62dd7f34f9133198ebad5ce9b
SHA5128d6152b46bb2cc4415000544c852b45de794eb07fc1901ac98c8003240715b2529d06eb124e18a3776d3270fa03bea891689501f5df0f00adf64ae964e4f68e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57998818ec87d2a830bacea0f64d68e6d
SHA136a68cbea647358205c5905bb85bc2496e561515
SHA2563bf488fe29a338fe6c8fed87f3ed7a3c1e3d179fa311690dd259097b02ee4673
SHA512e042d464df540e042e463d97765f18ef39995cbc9a6229f95fce609f8358fd433a586c296e0f776a2b737d1fb32b9c5abfb2fb0d842c6014e996a724a9cab962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54914f0d5b4b2899c08cf9cb552dbc611
SHA16122641b0cfd2c74114a6ea5bdfea77b4c4d5493
SHA2564368da3ee2d9eb6bacf8a925425ec969d51213ae51dbabf223bc9e3cb4ec8538
SHA512c923069816750ca5d4798a64dfd3a2f48231e809becc408b8ceb8083c8d3ded81ce3a26a9dfe814959f06fb07efe836e32e0377311c0e4f6c6e3f857cbbfa46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597813525aad99920bfc613cdcd4c2b0d
SHA1722ce6dec2637c16f66c78bb0a4eca68bf2ccc19
SHA256f96dbdce1cd36f5af628713840d7b2b1d24358c5ddd407f7f28b3c463c4aae95
SHA5127bf51fc1d34c21c3de3e28223f69d7e706f2031756e65213222453b54e9f4618474ade64a37bd2f7a7c394600edf1c4ae2bc9e69b5cae8ae61de64b9967563cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b