Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 20:10
Static task
static1
Behavioral task
behavioral1
Sample
fad6861ad66fdb7da62e8bd2e68ec425_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fad6861ad66fdb7da62e8bd2e68ec425_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fad6861ad66fdb7da62e8bd2e68ec425_JaffaCakes118.html
-
Size
53KB
-
MD5
fad6861ad66fdb7da62e8bd2e68ec425
-
SHA1
dd0f0e5b3efb1ebaa362add03a7c19c97d2c758e
-
SHA256
c0c600c5a42d7ecd6427fa993fa29cc4dce3b7226a71b9c720b8cdb79f723ea8
-
SHA512
d28eb9e82b1f5bf31a27db8960188001eba3b452a695159c2afe6988befc91ecbb8671c7c24db7e7a6407297f85894a26561933925931e0bd154876649f8553f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUcrunlY063Nj+q5VyvR0w2AzTICbbAoV/t9M/dNwIUTDmDf:CkgUiIakTqGivi+PyUcrunlY063Nj+qT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C0EA621-7D0C-11EF-923A-F2DF7204BD4F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007da8425a06ba18a937d5d75951aacd4ec5535d152526bb8e2234bce127a90afd000000000e80000000020000200000002ffa08ee28063ef09ed767b21dedc7bf0a4fa8ae8e4c72b17482c1e833c964da20000000a7c6d6fb5bf020df79ee72277a4f820306bbed9a7c4a7cea4e8cbfae8ba29a02400000002e0e0631441863b5a1fe9fe31a977d58be921687c6ce6d0fe1970716e469d88e0798d753359d750626d07a417aa74915ad1f1777d7b1415c7951c9a81b4f66e4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7006fb721911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433629751" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1224 2912 iexplore.exe 28 PID 2912 wrote to memory of 1224 2912 iexplore.exe 28 PID 2912 wrote to memory of 1224 2912 iexplore.exe 28 PID 2912 wrote to memory of 1224 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fad6861ad66fdb7da62e8bd2e68ec425_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59516258a302f46e29216fe09cd4b84d8
SHA1ed587c48f007aa6c70c0f2a35d4f4f4d276fb1ad
SHA2562bbed25518c1da81e91bade3d09ed57dc7243aeae08ba2f2d5337bddc75eaad9
SHA512a325cb941ebec7438f61bfc257ffd48f3d3f7446a743c163ef0179934a14e3a795d00101dfb7c3a84e97932b9f2970778dd74e9d2deb77619638f62c12dd9cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7de811af7bea78a6e3be75dc05cc81
SHA1ab6afe55dcf791a5ca6bf4472babfa96c548f561
SHA2569a83e26f75cb148190511f1460d5603ac51ce061533ddab75b78d8c00a984d18
SHA512eaa6f2ac1b13a844746ce81204745e284968ac3d212efb302df12bbfb08aeb6af438dd24fec42912707ca0da01453c08505e84108ded2e32babe4420ada5d0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55476c5d76538fc1703df8f77d3778fdb
SHA131f8e762f738b35bdc22c40a510c3a7dcff30d69
SHA256fbea115c6d2e76578554cb18083bb731ae00498f635e74208df0d7611e89bebc
SHA512077f83da150b5a4e5e7acb44c53818e466850090407242c42d13b21e6c215d473e1f329272ced330e4013a28b2b5bd73402a710db9a814785f06080f6f4e6fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c08699ab6f469b487770b8d14bf0c6
SHA1d450cb6d64bba3891229601ff773e8bd24244351
SHA2564c280ed736673a4d1886449ca7c4d361eb5e08baf913f1f2cd56cd8d7c952c8c
SHA512ebc7740baced46f851d1cdb8a85a29e6bdf3769f0696c0279f12b3aea4f4574058c1a8032d948810149ea6cc884691fb88974dd38c58bff9bbf8802969a7e4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c43e4fad32854662522cf10f9aaba1
SHA11bf2a3b08c9b5500385e18f507fe6dd920386c64
SHA25682055d739bebaa70b4e7dcd9aca09ef3e6583d4d2387b8c4ca3804db43a1bf4e
SHA512fb33db6ad9c2ec08e6066cb2533336d8058e453fa5895e3ab03864b8213c0ace333a8271792887321273d7be11d87e2a61dbffbada139c968765d0fe85a7f2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569889561aec08b81300da61120adde27
SHA1a27243781239ccf5c4bd373e5750386bbe461fb9
SHA25687e184a73f0f070e0a08e4e67de739e0c817b90867a3cd894d0b7b9d48be825f
SHA512175d52100aeb93fa3648a84dfb05b29632b0ca03da71e65096bce8d42d414a3afc9f7c7719be82172abba13fa752132c56057b96ef56cb960913ce9b5067a397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c49a63582efc856a6e446c03314b89b
SHA1fea2359d5df032ac7b5eb7ce8e6aa15c747ff754
SHA256bfc285e56860b2615220eba320b175fb9c4f006e8073c4f8ba6651c286ae61d7
SHA512e14da918db4a8c5a68871b232fc395fe56d97e7b7ae4b2e19333083622a771832c3fb47fb64e51ad27bfefbe34625b392110321a1b7c3391e46a8463d581306e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddeb6f892c6170aa7d33a043b0aaf801
SHA1e7f5a404d2c4f2341ae09496a5f1ca193f001acd
SHA256fbb369b36167acb72eaefd95538082a4da63abff46e4bf459c90094aa38974d5
SHA512e186c3be9106027eb17c2a5460e46772886c0b7b56c439cc69b16fbb09b986ff4876f67fc3608da3e057f74ba9c6eee05ef489c9422b80b420bc1ca7eab24c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56629dec699d9c6c23033c2f48367df32
SHA175084cc59a49ec39df7b58617278189aba9e2640
SHA256ef993571d2ba10eae70367f2aba289f69afea51db23b928fd7edd346888439b4
SHA5126e9b3c4105702df666bb5e7b69875daa77c8f4c4624d33998b9bbb74afc967e5777a2ef0225ae47bdb8f0db302729de79a21207e8a5771aeb0d8833d36d67121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa353d3fb17628c5bbd03e842b8dd6e
SHA1d058f4dda44bac72776c0faa95831d65f6c32dff
SHA256f3ab9739cf1229f976287a7debf89a4982934012a4d36deeef612fbe24d39cdd
SHA512e3af42a9456758eb594c3163ae9f6366b80e91d8d72acf2a0cb3d904ab95893f0aba1bc3a924bb95825b5e0e20666e07da30f386c36585e4bff9a2188fc299f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57139ab2aa946cf1d279832e90250064d
SHA17e2a24a0393161c61315af3720acd6352997bcf4
SHA256992a38bf1fe3667104777f73c8c026fec9dfdd9103b0b27f3f709813c06530fa
SHA512b47f77f300f53cbe9c538df701ef1d9361f6ee6ba1250ad7dce449b14e4f54a1f0fa2584341bdc7f08c1f9b04c434100e30f36fde478273b5085eba3f9be476b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d382631e7f1a575360a7f1adb633f5
SHA1151628dd820add76faa5bc6cd45c3c17ce5d69c4
SHA25639fb0a2644c9a94df26e689e1a0f27864b2501605dc64d8f46517843c2ac982b
SHA512bd9491e6fc0078824a1dd0e9f23225b59610184350aa76e1b920eb33a9a8da858c25aeba703ed5d31c445adae4d0f5ac66814e761864f6bf8f65aa3954fabffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f64ce742b54fbefc7bfc08e022b188
SHA18c49d269773c71b10f236311e7b5ba9f94065e39
SHA256eb5754d02d3b0e709b57ca999c194de864745b1cab4e199567a58051267fa90c
SHA5120e7d4a93aa617edc019d104f8589480de328f722939e62285b635669d4e3c669879e01b2dd837d67e7225a5eeaf5bdfaefc2741201d762101470f940e53ec445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2281077d36cdb149bb884bac7c59d35
SHA142e647f3de7f27cfe7b8a52cd61c1e178f9ad299
SHA2565a5dab89e8e1a23ded301831f6384574c992a3d00cc4ccf78e672f6ff11941e4
SHA51204f3619ffdccc7f6c009b887806fe421f43a11ebacc075c4aeb535b99393a0650ec2eb2efb9e8d69739ff68786732dd97513842b224cab0f592454efc7091709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970c0e6fc327e5a31b7d861a046b3914
SHA1eeb7697ae871f80802a4194791ef8df75c8942df
SHA25601d2a113fc64b4ee73b99e39944d492df5592cbbba9daea1c033c940eaba6d5f
SHA5122599ffcd92e7b8be78b0ad2cca86fc17f24249011a88cb6202a92cea20709c040b23010e91e0f40f8fb28f720abb088c38c988a973b0309f7187eabb9610da53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42381d11a883583f2afbf9a39ea1edd
SHA1d4ba5d72359d19a3a3b2761404b00aad0da58775
SHA25683f5ad29af4a1de1f5b8c04a0d7f72bfad376e85fc9603613b2ff44262804d82
SHA512f015fd7a1e41f9b9ef5016e3902865d932e28fa08adf0f84f9af77faa74360dd354d309825b34ba7d9ae3e94cd22a65eb85dfb3257c6df2a766d4b2b11db6894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58241f21a2bdd899318ae780f5c0c8ac3
SHA102672f88b1c9977668c1b486c43a6945c279a429
SHA256112be140ec00c34ceadcd0d9f654ccd9284677119e29be654a9c61203107e70c
SHA512e1a1ce68007882b49ab7b4924276b9a6872fac281e32fd9c1d9a82d940377c2f0308f405ffcfc22eb4f6252e202cc68055a912a7f83344db8eac5a996e9c41eb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b