Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
fae30ccb85a34ee61da6ab5e7f8ef33b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fae30ccb85a34ee61da6ab5e7f8ef33b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fae30ccb85a34ee61da6ab5e7f8ef33b_JaffaCakes118.html
-
Size
19KB
-
MD5
fae30ccb85a34ee61da6ab5e7f8ef33b
-
SHA1
2dc4d1a136ae3e1e500f85d4fbacf9e59978bb82
-
SHA256
6dfb5e08d3e9676392054b6aa62a21d0dadc993e587e32d3b71467981c998f34
-
SHA512
b463992b058860fd1c8716f10229f49f7157a8946342ec0c53f4a5acf130b9be1bf13fe4d9c35404cd231740174e05df518ffbc0e7e5cb087d61436eb191e437
-
SSDEEP
384:ziadK8vLWmtVBD8caQ3RYowlDWcmWsXucfIk99heGIzVc9B0a:ziaNLWEgct3LwllmAOIk9SG2qB0a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000029d351e901df86a76861da1a94da64412532b28e219bf88c88d0f2d51822997d000000000e8000000002000020000000ff20f37c4c4f538d100612fb40146f6f4f2d7777844c00a14dadd42c3de249a520000000ece25a22407291beb260ccc4a81f7e76cefa6371f7ad85efc2c338ab8539321e40000000357e94ef533b48200311d97f17e480d637629600316ff74d97fa2aee463fe811ed097bf0b551c67001155c29768f7e420b79a6a37d82c0e542cb23ea63cf92b9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e041f4e61e11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433632071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1265FDA1-7D12-11EF-9628-7EC7239491A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2760 2632 iexplore.exe 30 PID 2632 wrote to memory of 2760 2632 iexplore.exe 30 PID 2632 wrote to memory of 2760 2632 iexplore.exe 30 PID 2632 wrote to memory of 2760 2632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fae30ccb85a34ee61da6ab5e7f8ef33b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151c913b7e51af734691acff975fd9d1
SHA1d93510873e05ed7386e28e9c349af64ed9402238
SHA256e01f80e848d93d59466f6f379fda7758b82c5c2b9a0fa90e8cb9b8157b08c4be
SHA5120e317d5b83b550180bba944f61fa3d3dcc4b12b634dd69bffba21eb2d720fdb77f1a851c1f0339e36dd285b7d9f0a97e2816af1e2f854a2386990e76ffe2be9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56279cb90e65d45edcf66378a21b2067f
SHA184e9a81fc7d3aa057ffc2f78b10280d243367300
SHA256f5a686fe910bc4e720844de69b1dc69151573a28b53e9f22bee4be85bd7da63e
SHA51298e5553b0172506bfe291f7cb268f5c9e93de9426fc7bfa9d48936726ebcfeabde4bb483b941f0b3724095c17bec81b5cb1f272a8135cf8d7126a6843636536a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3051d160206ad84ea12ea9bab152f99
SHA1118f4493254603fd3acdaa02488ebb74154debc2
SHA256711256b50c435d44cb2bac8d5325522ef9293a0e70d0951c9fd802e227fe2306
SHA5122d83d911301c8782ba00489a974b7f6f013322069f9f2dcb9ea52b6808cdbe2a9c7f9c68d8e4881c3cacf592c81922f32350e959c65e67c4d40b1bd8e3b0e27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e431682c3ce7343f09fdb526b2169e
SHA147c203e4c0849b90bb80c24d42dd56bc5089c338
SHA2562f49c5ff1f435b4face0503a62dddf117482b95ef7be4ae06e3c4aa8c1a3bf28
SHA5120cea401518ea05d6c17d4e246412c93649141b56311ec9f025a76fc122aeea614fed6ce531495c189999f6547024bc3d6ec64159d5bffc4db0a6316af751d94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010254abe86cf96fd826d4b3f70b3508
SHA18ba87d7e9498f8d138776e6a9c7e167e68b506d5
SHA2563b920c42b2738864c0eeebf06d990cb9ac55fefff3ed948ab8a871feabf4fe8c
SHA5120bbe697e99b16e1dc9cd3e6db8872e9252193c02f8d8335e9bcac755ef135abe63988fb27eeb37cb16bbf862adfa65455ab305535c65d7906a512eae7332a711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5dd83f95c3fd2e4beaab6e4235a6586
SHA17ae7b99df884e8f37394d5e523ccf79a4bbd4bf4
SHA256dbe85ad196ea5cb79824b5748ccbd224f5e85b21d96f450553be4a14ae7a091c
SHA51281565245db6857d732e429d6b7f7f1eb0d415dba979f3728adbb7ef8f2a55643f850b0e7842743937851d5a38dbd17095f28f685942a9600479230198ce08cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafddf1d98d92b2533deae4c4b7bba98
SHA14441f9607b700a56c5e5ffac700151dc8c473751
SHA2560236bbbeab5e7c7297831fc7c17f98f536f289c8aa0981072e8b24f9dc216c01
SHA512fe038bd2fcf00cbb86980c4c6feac3c58893483d1884cf94e13a4d1d46f9b8c26628d8d7f9e0d4bec0c68505139bf30e33d6cbea60203e0ce847c7df87cb0936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c298e5acd0a1804ac869ea2bb03611e7
SHA1a575df5b40fa2fdff28037e21a75e41b5dd3d117
SHA25606b8bbb83eed49f7aba873b13630af0cc4ada87252179cb442290e9fd057baaa
SHA512443d90d3e95da58650247d59853348fbf01a8ade4119e14c6cd8aa12ff37e490c2b691bb69c325c144e436ee797b41b29eebf1686a0021fed32c48721c1aac3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ca9f59c568342a43d7f44a7608f0f6
SHA1ef2b900e16ba824facb8de0de1a7f5c44df26219
SHA256267f79d2851a150ce64e856ca99e97a86b7d79fa313e242cda35bb70703c1244
SHA512936685f561da450e950c0a65767d8e014db76df5c7b93124c11a3b5e2416ae54b86f3aa101143ef7ce4a72129a48f910548ded6d16e2251a0984c1e5dd707f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991ab9247698fa1351a6bd52c9f6aa3d
SHA1eb5496764bcfd3eeb2f5efac53b933d5e38eed16
SHA256bdd30b2f1cb637d80a277c5b3e51c707ee8e70236dcd0cdcf8a46a3932153a70
SHA51282480f2249447e639c374cd7d1807d29c46c4b0a384bd126b06b32b08d0433b581ea89c0a8119b25cf5787647db3d8d8212fa399ee9cae6d1a560b8496456c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa08cb60c50c935e63f01bd26e06be52
SHA14b1f719a5585e47915e95e6392b28e3c4b77acef
SHA2569c6d71c2682ef7e347fc303cfcb862db9f25de6e91343d79c33839ce3bedfbec
SHA5126757eb7a0ba0c85c940a0f46073379ccaedeba1c68dc1f07aaca57823b8ba10e77099e31768c818566e8f85e6afa6e04d01877f323930b6f08e5478aae03f2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207d5cd617850cd9dd05c21e1630cc2d
SHA139f853f9749ac693a1250569cca6107010eb9c10
SHA256d82f6317aca12112fbf7037713b95e54c536cb96f37104922f56f0563f22f5b4
SHA51238873a43e0b3eb32f69197ff747d9a9f60e492473b1fa9bb5fae9c78adf21ddde60b6223fa2ab50b42f1d1cadcc42f20064052ad1b82e3c7edc4a8108993e2e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d76400a35e4a1243bafb9f01702cf0
SHA16ac331de95b9ff17b9ebbf28da2ce217d0d286e9
SHA25658eb271d94bfb699fd90b27ff5160292e8a2a6721eba80a514a609e024344fba
SHA51221a5b688878f5f56527bb7cc957f91d66d7502afefa0dfdf19c66611adcc7a7a7287633f4d52dcfd517875f2f2ae5648b6d574a8bab4d390bb97fe84d01ecec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b1ec9b7a3369fd8e523c16586cc91f5
SHA1ed321991c62406dc7d0f667c55ae5fd32da46768
SHA25691c66376432a32efd4aeaf58bcd78c0d2745d30ef27975d4372e3c6f9fc0c75a
SHA512747bb832620a667d1b622e6b61aa797f717852943b12acc28f273c639445eab4aacfb865aab66a86dc466a5e4fa5dd8f225e7b7b3638db5b04f32026cc7e4995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6f80503220cd14e5a7ddc2be68167b
SHA1fa501375bf62cb312b9aa8dec1ab4186de52c208
SHA256aec935c5f89b1625b57c6bedcaf184e4d3fa3578446bbeb120e528f4d59d76b1
SHA5127020a4e5e8066799afbd9a6e89d3a5c520a4079f3ef6094686d44b4a93e746896f200f7906d43a768059712fa864a36ec825447ad936c986ab7be2217d190562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379becff7d01a175b9a8eff74bdfd050
SHA13e0607b7fa90f954d5d6a42386bdac52f683d5aa
SHA25697ec7668993b862870c22a92094f9c318a016c1af279157bbd604d1a506d48f9
SHA512ad5685673324752c62e46121eaa1d0f1ca631ce0326f70553e16eefd4099e4edcb6904734e38df399ece38f46fc5c684ef46ea0b66b8895d251da60e4232b6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3346ae2b50ef250653912c6dbd4f20d
SHA1e869984fd51b2e13bcc6ef2d3d80d299356c6ea1
SHA256dddbf9b9a68fd0cae90a85d1d73eb5cc216be06b34435eb8ba691a683b15de14
SHA512f21c85b4e5faa30251b905e4b324095475d041dc73ccc87ba4d5c459ef9fcdf7b6e89ab2dc6025d0d77809327c7924488d7ac0af2552c2aaf277b63f01fe30c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22ad28099b4e6ec0efb13fe0d87554f
SHA1cab12d2a4df610af9ef136b486b7b287d43a3f32
SHA2567a6892bb160ea964d4f53e586cf811fd970ba3a3460b4682833d5f73590bf161
SHA5123ca4a75e062bf294f015b6b258a08e9279018feb217561e73c82ae48312fd146d6e7a78e9fc367523e73da2e77566a965dcda77b16a7f2255238b99864c36ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9d00594746a37a473ab180c3c272aa
SHA104e74220676e0a8096193baeafec335a4344ceaf
SHA256737646abdaf2b17760f5827b9fa29930dc1d3f724e792e8570c214b6f88d2fd4
SHA512513ce5061277162e560dab2c2028d96e1fb263225ead7f8d63b5797d09aa3ba3b6b49863ea16802d87b8df0cfb4c5baf3a4f9a1e2cdf65aeb5d53e450e3dca43
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b