Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
faac272386dac5ad6d9ec879345a8e86_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faac272386dac5ad6d9ec879345a8e86_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faac272386dac5ad6d9ec879345a8e86_JaffaCakes118.html
-
Size
52KB
-
MD5
faac272386dac5ad6d9ec879345a8e86
-
SHA1
df3b7b9322c6ca0f56da182343a5a71036fcf9a1
-
SHA256
f57fab6731df7379cbfd89f206ebcc2fc3c05b159e8c4b56cc6598e77e569016
-
SHA512
ab4382edca149901920dc48b5484b911b839d7ade03467ed63e3fb43837c6b155c9964f7e9c0a1ba9f32860f5f368dd04163fe9de2e788ebef09a01cf9e505e0
-
SSDEEP
384:NZFHApXITWDnd/JkY6lT4dtqO2na9JFDYydd9PScjqmwV3wOEPwSJtQN54+MFsIw:NZFYndib+tR2naPFDhz/lwNdgQULG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433613272" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dbda21f310db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000aedbbba1578652617e32aacfb21bfa72b0850d78acbe6ea39358c22fa9e203d0000000000e8000000002000020000000a279606e0992f7fc27386e006bc5839951cd07c15edde843f92dd8e3df58a0312000000032bdb4bb3b781e2ceaa5003e39605c91e77ba9fc6eb0ac79913e0a96498d9358400000008ff1fe2ea163c2e606b41715f8195f0514f4bbb862a75645947cb96d2d60d35df693531813df7d2ea503251c300d393f7ec2af779b95789b18513e633636b10a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e8c0e4324ed59b2b937ef61a24b224b79d2ad04c739bbe9ea5fe96afa4c4b4c7000000000e8000000002000020000000a701724187d320743caa17b142b96a8d8771b83542979ebbac8b2b67284699269000000079f953223fb386818f2cdd7c2e20b6732503cacbc68ae366d5369e7d53bcfe4383fce1f32c444bd96956f39cf21e2f8fe197a7476e62e791690378414395e8f0a754b097cf2359aba009152a804d660c143a1a1364e6add16ce4e9e58c15fc3f276df1db7c78967b7487c6ab6743ab83316a837c48a2345c343a663be2d7b32ad15d68f7422a8719a74020fababd26044000000038a0824b511be046398b1f5092f59ab63b92c31a628dce569b3e8c0f6033e89bdc067e58c0175163814f3fa740a4883639df7f457928b2e07061e0a030b8c8dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D513281-7CE6-11EF-A17D-4A174794FC88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2808 1940 iexplore.exe 31 PID 1940 wrote to memory of 2808 1940 iexplore.exe 31 PID 1940 wrote to memory of 2808 1940 iexplore.exe 31 PID 1940 wrote to memory of 2808 1940 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\faac272386dac5ad6d9ec879345a8e86_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ff289a7d6a193620856287c49c8792
SHA1c351363cb95c4cce5b2f6864cfffcc9f29a14b53
SHA2564722201aa57dda8dbd780888198f21d8f7af2928672e57488ff2a22931b48f9a
SHA51237a21d5478c693dd0888e3be316ef10012e23285c0a06a7d3e557010d777b55be5693273173bd01df02abe005e46c0378f0306c059e433e2b2427c78e08939e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51414ac9bee6cb24a7d514def2e9e284f
SHA15cdef765dc0fd87584463d954adcff68e292582f
SHA256dd27b97ece23a317ef897fdb4c5bf4dae872983f9715898acb8a3841ac2d30d7
SHA5120f9f52ffdd1e1715e6ebb17efdcfafd9d67ae608dfac51eda09bc93df57961c001ee9bdd4ff0467273140a1255616acf4d204daf72b1ddab3971e15e76d424e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f041d411be28d2edc0eb823fbd75d89d
SHA10c4a7ec69eabe9bae2a7609e341d2b4d5bfd7df9
SHA2568b5249313ed64e2a3633af06ec36dd2f3014b5227cfec14fd04d0766bf02473c
SHA51260e6a6e4bbb6052a8c46c7512c4317d40675c172db0f786ed317d2d3f3bfbd40e9eb862e75aa04aea042087e2ef2317495f135cda7fc290338f0b94745baf8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce9f6e3085675512c9a7d3e3222c2ed
SHA11cbcb1405814502da4a5dba2b70a26cb6c437306
SHA2569a4eb200a3d0ecdb66e4dbad96a2b33e368cf1d4360985da2e61d878a2862ba5
SHA5127c42116a282343736165252dd7f9a432fd1bc09c82939f423ec0b44f9e2bb072dd817db3d847b8e10cb004bcc130c326aa880dc18e2d184b1275596a43d30a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaab1f7af6b10f97aae0da61174cb232
SHA144acdbaee3e9a0683cb2fa04594ac7281cac7e31
SHA256f139c80ac7c0d87e1dc9cfd60c6cc6791012eb59f265dcae9768d3410afdae63
SHA5121be5a8d2575593bda7f09b211adae0a0117c5beb732e36a9839749154b88d3f5160785f597b8a896fbc1e5492a779479b38cf50d95f8d848dae0b40b422b6c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5becb3b197f9c9716d03750e72890b33c
SHA1cc7c8d75d55f923c59310daeee71c695e3d99315
SHA256a98fe292321dba8882199dba9faddddaccfab29c7689b81a230ecb8bb89877c8
SHA51217d6c64657255c3197c1f8748340bdedf18e05a973a5c7017f2ba6596af3c4764481d96f9cec4cf112fad7ac1106b0f032d470bb81bdd7516e5f14c349875db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c7d1e71a1147a11c60c4a1f91d79ae
SHA1d00223ff040201978c0083ad938a7e7d1ebeec58
SHA256a8372a326ff32ac74a72dfff5430cf79a81cdd1c7b33f21392f5bad0396a9f0e
SHA512eec695846e784ca11634989cc58d4a0105c0d14c03f40d7709ac0c6c07fb6e1bde629341e7929b02cabe5b0e3f6406ae28f28d7eb48ea7823b59fb0cacb5d812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568392065b00b3f5199097a96d1c8d907
SHA1b9e4af0e78f3ddfec2f04e6348d5409f779015bb
SHA2564759ced714878fc92656c55a4dc10797cf7ac9c89b40cc21f0aa9e62496db5bb
SHA512871fb5eea5922a1c2e62c9f5d7b546b8e359e80050caf723f4b2d80e61454583f412fccf63fd572017c5512857070a1003ef595ef27bb0006ed104a133554031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b539c86ddbf79a96a7476807a91a09
SHA1ea825ceab4f38bd11b648ef6fcdd13d89a1bd1f3
SHA25620b0e1d4aea9dc162a083b5fc11fd0fdc5abae47143e029e861b560568712ff6
SHA512543cba40c037abf3c489eea82c7b4f9a675372844ec7ce7d9e3740f88830934ce322ec5243e19b39a1c82963a78295daf52e8bd908f1dbb9571646945d773e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f670a21cbdf1da7068fb5dc44128f31e
SHA160e8ad28aa4329cf55733fd8efc2adf57744f0dd
SHA256424ec7afb86c2891921bcaa73597575aff785713cea21248ec96788f70f8e562
SHA5128d3bc9f980fbaee56baf663cbdca34aaa1b7cb5daa008e7b559fb83a43d1275124346608023f675cb629ab907b2566d76fefddc5af222d563b7139b4ce30a498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d65177df3ad6bdada0eaea94d6520ec
SHA11ad4a1a469377313186d8a9eb984f1eba2620929
SHA25618dd9a81701d1484a04c1437077ba5f1b8c60c23c258013d850ff202c5aa9d1d
SHA512a4485af732be0f955763d8c059345da4037414e9b1736194a70dec89e01b527e1ce942063fdc8628f36a133ed996baa3edd78638da75bbff326295b7208cc875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56973191ff603d60b4808cef10e94f842
SHA19265d07c43dd8ec7490bd47043b5f4b175ab6710
SHA256b3702b0c3be6931184a7114f23f0589b72f277f8f4ed53b4e803a40e123c8a67
SHA512971fb3a46aba756a3986a2f2f4312ac444bbdde4e063cbf84975ea076705c9af3ed58ec5455e7815316adfdb7aaf990cf38d47a68a7a16ad93d1a73d79c52f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7ba60ea35f70cd2ce3be300db96a89
SHA19c09c4386b599258c1178e9c5f31a3830214a1aa
SHA25658f5032cfb8c8c597c645a20a44f2c3ad8e31d1acb37b81a36168ce6cf96580f
SHA512476c5fd14d40bbd5fa05bf09563f6a33e77ac1528a35788fde9cc3f108cf42580cde37e74c01931493cce52a30e33f4f4fbafa51d66e10c9b4f17203351143a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5204c1a522f4eafd93815d998a57a1091
SHA164df82abf98bbca1088e8d44810c56618946ec89
SHA256f3ab7c38b4e7b5545971e9f2e2666bb360c454a500b99bfc20f9d9f7748e5b5e
SHA5123affa44fcefacc2a63cf2925f4cf2e69ec63a52c936c0aceb1b1c6effffc49e1d604bcddb0f5e7264513bc0f9e997ce4b0b5672a3fb9c81c301c36ea7a4a4833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e1149780d1ea98b0b9d85b0f4c4f93
SHA16fd6d0861afffb5f8e7e609e5a8ef0c2f81307fa
SHA25604f807a720f5f9df89207777e554f7913626876858149ed67dd01f5e9616a5ed
SHA512ed715f65dbf362bde81fd48a69568d796dcec4a6ac2cb308e273658d45d1135955ab11468c9ed334f55ab6c69e99f9014a7d7dc40b10494ab870b2c0fcd98bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555bb41479e00e49541595c56e4982232
SHA1af6c2fcc9bbd492fc6f55fc5d3fb685385bbb167
SHA2567a9c1ef260b4272977b2cebe590bc656b1df0b0ea6fbf0301c54459504938c6b
SHA5129a359df9c3d39d8241b60a8b68eeb319a9934042ba2bd8be39756d9ec546db19460556a7881b4e1498583900d34652c443cd26c04d2a1e6a59b3d72ff9219516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e40f315f4ee708adaa9168e769e97a
SHA16f1cf9bfe2d0db1c91633802345495421439cafa
SHA256dd54df61d7075b57670323647e26530d9b4f9be90cd876a2761be3ff8adbf933
SHA512b272b47fb9130556cfb622e46d226600bcd3902ffd7355728292aea5faa472d71ec66243f7cff7e3ff2da4d84a4c865860e989f6e456dd862ca45997c7b4d93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56119205b6b3a05eb9333d2ee591cdd6e
SHA15c58d21c9bdc3f1d6d87477d0e1801f786d9c8cc
SHA25618c6fc7b2b1e7fde43898f091cccb2abc3294e50dd0250692d91ddd8df3d4d49
SHA5125c7aa0672eac03fdddf06c8db5732e4400d75b1b62a2dfc03828108dadced2b898bfd1e9ca0f8b8dd153d19998788e081f2bbc009eec33f9de045b6972ff3676
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b