Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
fadbb2f4cd76abc2bf4450bd47055b8a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fadbb2f4cd76abc2bf4450bd47055b8a_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fadbb2f4cd76abc2bf4450bd47055b8a_JaffaCakes118.html
-
Size
28KB
-
MD5
fadbb2f4cd76abc2bf4450bd47055b8a
-
SHA1
e9961349196069fbeb5bf728344e02caed3f3cf0
-
SHA256
9ce7cd53e2854b75da2d6af8897e136c6f2e2dc4c35438bffbdc6ae8141eeb38
-
SHA512
385097c8eb92ddfdd34e66b751d2015b01844fa9f8f57998906fabeb922b6dcfc1c29b914ae73b25540d4d366bcb9bce9c8cd368022665fc817748c35bfdf48e
-
SSDEEP
768:hOBAmXIwQ/JlEH02yCoCNCNCsCsC7C7C8C8CmSUCT3ozgEZF:hOBAmXIwQ/JlEH0rVMMffkkrre3ozgEz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433630796" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19E25EF1-7D0F-11EF-82B6-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b052def11b11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000510783ba741b15fe8f09d46774c24b0d1965f762af396675c5d23addd160d17f000000000e8000000002000020000000010043edda6cde3a52789695ff9bbb7f48490afe5d34bb76f140c9d13f3bc1a32000000003f566f321aac6982c3c201e8cfae380af2c13bdcca6655186b5d884f00d124940000000b523f82333378eae00a094f0b7da5283a1a3f96894c599f1d930f031a75b43eee6afd1049d6d757e4beb5e3e0e55570416d9a9e3aaeac1adca10b1fee0abcaf5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2732 2736 iexplore.exe 30 PID 2736 wrote to memory of 2732 2736 iexplore.exe 30 PID 2736 wrote to memory of 2732 2736 iexplore.exe 30 PID 2736 wrote to memory of 2732 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fadbb2f4cd76abc2bf4450bd47055b8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f485d68bd05ac670b7e5d0216f46ef
SHA10fe064af594710643353b125a17a7245043304ed
SHA256faa8ea2094b8cce7b8f0ef4ef7789aff523b6ca83002e214c985279d5173567d
SHA5127230ff94e6e983665f49708892812725a352082ad3dcc632b0b13b1b56303f1ff1c92033adf783d8810f8690a51e5893bc1bd0de96be0ad396f576c41160da11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c57e9338f98fd0f427974583e646276
SHA1a93f0a04829246d9bbb4f276ceb86bf6514c8821
SHA25619f8171c9909ca7e224867f0f8aa63590d6696cd99bc831518b8f8778af5bf6f
SHA512521d22705386db8468814f695b17338e33fae00a4ed5d1415b411be7c0537a39fec503b95584a4bb1eb784f8c83a63639cc50575c790af58dda703784b023037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f83affd3a1df6d871209154e911452
SHA14a9959a1e5ac75c6c81f218580ffde8f0e578da0
SHA2569e6bb530734a6a5df13207faacb11378f810fddcc06b72ddc91e294efdaf925e
SHA5129ed2bfefc814f587cdb41c89a67b443fb5563f73d593e59422327f1d8bf4ee2d270ad016d8d1dcef0c46e6df38fc0cf69e72431354545c99165cc9234b6b87ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d888dd2e1f548191a5c23a61f2805c4
SHA13f2144643e47ea37be5224c7beef3421c488b503
SHA256c8e686a0877ce74ae4fedd3c9be068da167d597a0aae1d3055d39e28ac38ba49
SHA512c47ff06b8dc90d45b2260b8cba35c6924d5008bae290babdf3810acda69cc0d022e15ae5a74e9250acff529a0ec48b3ce2f8b63f09cf6a248247acccc36de2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584262715adf020601ef89956dc663711
SHA14899a4230cd551673d9e34f09fa42eada1d80078
SHA256dd9f1e2f5b835d422e3eeb3b2cc62c4fa505bd126e6f4b774cf34f4f9140f476
SHA5127b73cd7db98bcbf6bac117aac1f805a599e1944701eb199a597f424d2b9eb69102bb08cdbffc1d6b6ec176780a187f836ec378c1e0ed5a685e0e1fa148f4cfd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dff097a8be3a8c34e7ce886b4ddc3ab
SHA1610fc2258f1818b76668dbb49aa5471348756bda
SHA25607227e4156c8c569f41f985cb9dfb1a842f46d256bb957b3d486f7395e480e14
SHA512e34be8c4a16d4ef7f32972c2c7990074b92829432f5390df778466fb48fa580af5a79a0770dff04ae498347e9e33bb74be7b9fb1ae57519771bcceb6bea1cd53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba6298b9d2c67603aec0472e3edd59f
SHA128502d13e90bb538536f2ab17ff3f946e493f39d
SHA256317fcd4adfd13ccf44ebca09de0a400295c00090b85749928e24a6fe3b5822bc
SHA51240d716c5b2830852bc570ecf185905807afc97ea3cd2cb76f5f0be0042c56cdde13476618c1bca73107a10693c24964e63dd5005958b1343273c13ff0a66c566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7de2036c30c6352b547747c98dc43a6
SHA1a52d602d4c879d029bbb53ce612cab476aee04a6
SHA2569acfa5241ae83f37953619c4caba1870c43b3b4322704956d6f591c5c4ca1e5b
SHA51225d3d78ef9d7f2dd9235a5d0e8c20f690343d2029666308c806296fb87c3bd71da9218dccdb09838912f3d10b6c6b3fec4a056758caf4bbf144b154725326181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf8a4134ba24e442e43e1894a2e3ad55
SHA10700b46b024ed9818f89c1a96903d3c62bd10997
SHA25642c4c7c3f42ebf80230f416b9f34e74a72e332eeb9b3c7151112a5dd5fa6d193
SHA512e7e4f5a693eae06acb75407c74f45851aa4f37ccadfa88a649fd9ab853a2e040c3bccfce79aaf650d6319b2963714b8c6fcb736e039d5bfbf07b3a24865fe853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0a17764c4b4a13be2fc02b4563c010
SHA1d45a8c48ab2eab944d01ac2ed816fe9c2042d5f7
SHA256bad45d2e67b5ea8c2b8909fcf67e227eb427ad010e69442b939d2aca7e01583e
SHA512606eef36a9da69be3ae9d9a79ff8288f0c47fd51a2845b2259fc65947d259a713ef30a4dcd86e9b5ff2556f1c3debdd25e1ce240d25a6505512534070a10b729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89fd3d59bd208e5ca832fceed905d46
SHA1a243d5d5f1607d7871cc2e3d04adb25518a9cf7f
SHA25677e181aef5f7234704293d4a6f24b321f42a0bcf3164f21c7776bfbe0344fdda
SHA512129f327e10488fdaa89af15171a7bafbfd68929e30d37d02b439fc5186cf2fc23466fcca3cf46a5834336489c86e34fabc78399ffe1a8f04e66cf03a30c451c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6257e200ea478b45f53b1cce27baa1
SHA19b281b4acea15f5ee1f973b5b1616224f0d9174b
SHA256c0c7f904a21cf65733365facb20f317e4454013b42f81a843c0d3a48928f53f3
SHA5129abcb7132e66461920864908dda9293180752afedcf71aa2aad9c3328a43ae14e706d0d957a03bbca2fb403f0c59effd35fb951e504b0e041dda53f9cac70ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b11fb65ae14a0e45cd097ed737fed4
SHA1615e5fcba720402cb4b0d95507648a2c8131a825
SHA2561515d6a2491f36554ffde154415e65582affaef244cb51cea750d9b5a732d66d
SHA512548aaa88b9c48ca60ffe2c371fe7977d52fca45885fccc858e9e2aa3871f09dbce55cdedfa59ea0b4857e6efdd77d0e8cbc956b1fa1b49f9046e490cc51deca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6643df83e3b15cae7166b149366be4
SHA1bcfae07137d0656b6e45a4ff3aa75fb6309e1681
SHA256010c954c67c751418eeca00b2eca1fc21f8d93ffcf524d16557a6eea335e4510
SHA5127cfd07e45705f8121021e354c0888010920cfb432d8181eef35f43c6512ce0ece638972e125faebd91395db249cd788ab11c5453e990f947b8420ab0e73f98af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fede2cdf6c81940a79252b3bff867b5c
SHA1cc3a65af863b6aa63357c40cb5904fdf924b5bf4
SHA2567a61c741f5f95f7acf6d232c2b878536d1b022242bf752f604ff16527a8f982e
SHA512d0c17a9ccbb4f11f8039eac17665dd63cab82f220e517ab36a0aeebbe53391d7d82ae614be7135a76d257209e2a15599f8ee9cf4df187afeb28c45c73212f806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591923e3eb4aab4b17bea08a68e3cf56c
SHA1858cb2461eb700820b72642a0f0ebcbaa4c4700c
SHA25635801b5df6ff53a21b3841c7a0e4da0081defdb80d15937a396bf6fc65e23f94
SHA51215a80c50cdaefb9ddbc8b60293450fd2cf4bc7ee93ff75a70b3736b3bbaaa1e2ddb5925a73c692495e41a918ea71d0cb447346370b839c392265a4eb3924e331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772c4f83903428dd712807548542c5bf
SHA16163faa33fe50aa7ccb2be0fb6718a445b45a8f8
SHA256d587a4c10e1db6ad5cf334a2337f34ab9f4e33a0e28d80ddf0630f1725ba5d65
SHA512a093d09b8e30d6147ab0d28c7716738e28768c3928b021c2a2328f250e5e6ea5e0cfdc30d530c545f1e780eca5ebf0531813ccb133010880e01ad788de8c196f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e42398b9ece19dce54c823b2d15134
SHA1232e1aab1ad14e5c8922a34dc52c686adf8b5839
SHA2568a207a588ac690f4ab5cf28222906b98003da886106b6c14eaca3a3f30b0b332
SHA5127abc25b600bb9fe55d6a66c13199503e444a59e71dc7ce193aad38bf5e1e8483f3fd098e825e92240f67a0f594c129cd8c64ca949c31940d41f22e74766ae082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648fe055040212d19a17a37211e440a0
SHA1a10e0c7340406d63c0bd81f1a67fb4bdb1622887
SHA25625800049a678edeb3bc51f370eeec33790fbaf2c5c56ca7acc8f96ed9cfc92f0
SHA512c5ff46ab87fb7d8e32d15113549d263cbd6639d22887398c8b61b7749569490c704193cfc9eca144ecdf94a130a768d82b67de11a71fc761e2914bc164978696
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b