Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
fd3240da4b329a0f95fed72cdf2f464f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd3240da4b329a0f95fed72cdf2f464f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd3240da4b329a0f95fed72cdf2f464f_JaffaCakes118.html
-
Size
14KB
-
MD5
fd3240da4b329a0f95fed72cdf2f464f
-
SHA1
ed43ef032725162a42a0f4680e8b22139cdedfa6
-
SHA256
47ea1e45e089aadb712e2b8654d32e8dbf13f95c5e9026aff0319e0b83caa455
-
SHA512
caffb30b2435befd99f4b8fb27ae9f3c8d0a573bb75337d556bcedd3bb997d1a727b058508a98f3f3846eadc51ad3870f1d98ddc22639fdc2a0b220be380261d
-
SSDEEP
192:JuU5tMEs3Z26S7ns7g72w6cg+zBv1N/IGqgPiuqossq1Ld+rMB06TExKZto9McET:FDsMSA3sga
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433721538" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9018b334ef11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{604116B1-7DE2-11EF-A0B2-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000009e024548ad650b16a395a25b98348603f239770c08c89631fa616c1a6285ec000000000e800000000200002000000052e9d519d506feb77fccfd2c412da461a63ae6433e0dd656dbc73c5c3ac47996200000004d009771a0f9d851bff80181cc2bdbe3c0b358b38638f3d5861498976c2fde014000000076f055b37c9535640fe82c7a854da4b1222b43338e5d227f23eca2f3e184ae319b7ca4aad625831177a18a9ed8d5c01314512f5139975c97b93e5f7694c331bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1912 3056 iexplore.exe 30 PID 3056 wrote to memory of 1912 3056 iexplore.exe 30 PID 3056 wrote to memory of 1912 3056 iexplore.exe 30 PID 3056 wrote to memory of 1912 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd3240da4b329a0f95fed72cdf2f464f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155e40bc108e9859dcfddc0914cd1b27
SHA1c81c9efd16afc9f95b4b1086c106cc51909daa1a
SHA2562396496395119bf0488a65518aa5af2b5511f79417d3153e095853979a9ce499
SHA5126b0573026ebd593978386bad4151bfa1103d0c8b30cf0c6d56a38bdc723f359482d74f457dad7390336b8a6f42c771c8db6c9e200649a0d5fa558c5261b6799f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5393b60d30f0403676f7ce32545189e41
SHA11f1cecf952bfa098e95a93aa2fb8aad85f1ef2c4
SHA256715e30b90c69a13209e20ed764c9ab3cfb48b12551929b006090b74e5bfba5ad
SHA5126de292ed60f32fd69beccfedf30f95dec32076be9961f854c8b4f4aa8aa8e03ee94cfcd6d90bafb599d53e9bafa8c2e98264338fe4a2468d96f08449db8ef5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee22c0c83746ea3e690b27465190a8d3
SHA14ee2b2a66c0dc6a0e387365dfb024af68a9cfd0c
SHA2569c531e3c617f8a3335cfe41122d55fb22ab8129648ae1929485ec8a3f9cececa
SHA51280825e6d900b114a910f45bf6a42357c05a9117869793009bcdf25c5a313d2274018ed48d5f1f2ac66d6f51f47cb9600d764867ed9c3fac8dfe0390ff0948022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f31aae2e0b0e412fff13ae8c19f20f4d
SHA13672bfc81651eb5b2aa60953888ca74cc5d4b2d7
SHA25603478305a4b400fe906bda6d7ffa98dc48297311ca2a9bcbe1d88d1b0d7b4770
SHA512f169b226ecc1a0b2ad237635f975e43b90f25f61e57549d82c5adaf32606426cbba534829f8d421c90a2335e31f55279dc08916f3d85e1f96100c4c237673bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223cc2da92b1cd3fe51dfb3df8935c78
SHA16941dd9b90555655efa6d962ded3d3d06d9bb0e3
SHA256d477bba1c049165694c31416537053e772ff1cf1c2d821b6be67adee5939772b
SHA512c5e39e58145326b1c59a90bed97e8a70df746bb206678dce4611750542a3d52eeda4669e6bc4029bb66bb97d4b0d229bbb504d91aee0bcad909b4c7426941e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528a018b214633da8c56a9cbe306012c
SHA19864968904caa9a18cbb65dceabf338cd7a789fc
SHA256d163a888920021addb86c7bfd2befb858269e368142f2188650b6aafb302ed75
SHA5124a60f998db3b894c1785444ea3838bfe8e9d99af8255e0559c189af1dbab41d6ba6c06d451d13d29eab8e758cac3c873c12852b0609d28927c41fd4d9d615a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f797636f0703dbf6c6b1f9718142fa5d
SHA18c84ffc03bd85092d37622f41a341150db671cd5
SHA2564654cc0a4d8cf2c8d1d93e97c5c4e32b6aec9bab9e07288004dfdf7abb308062
SHA512c28368fa2e491c3d835ce9605607ac1bf63a6a89ddb007c59b46570b88647d0b1cde6a9e597abb43a52fdb5d5bdb299dfdd4192ffb2bc87d66b45482fc5376b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5222b594b870e6f476930e2ae70442d
SHA1d5f9feaaf0ad4b44e226d1bf5d4868154a53b9ee
SHA256d7ebdd8b5c2ca094b46ea2797e311cbd656c3991d02e36d7350ceaf62da0e3f3
SHA512b377f0913d132fff28b08b8f54d9269bbe99c1285c9b89ce3cb8e2c37086d692d5ddf22a577be672db242c89bf60c1693fef7e480469e54fe288a601c555b6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7d23c3764124f9853203dedcc07467
SHA106e452e35e5f88656a328121dfa8433f42709fde
SHA25645475cc0ec660dfbfe9c9a98b3d35a84c92c9c45895bef1a8e3a0c897f05c7cd
SHA5129aaa6ab44381680987f4b1f959f60091ef7559fec9740b01bd94dd4b77d0a271d89cf26e0cc47bbb7fc88733e3d3cad5b9b33746efbecac10f9c9178b64c37ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbbdd55fd81543a8cb108e96ec0458c
SHA14408ce4071ec6159248f2705d525701fc305e3af
SHA25640428b6fe4747f2de6f381d65658a924dc99a915d32f07e24ed52e658f64d5d7
SHA512ac95abe0e9019c4faec162e1536075dde008a6318022f9d65a0ae26c236df5a74fd9cdfee5f188ede6ff427cf9d70067388a1a5adbc7b0e86414a45cc0402191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a12c3658586dae71e20f54431b7afb9
SHA1295356ab21a0ea21732e2296405f5fe263d7fd7b
SHA256db0634abe138a4e0bef8639539ec01b7299820f156c78a787d733cacebe66d2a
SHA512313b49712df048c51766e9fef8e72d044e9cba06591cc0de3f4870f07652beadefbb289d8e10b45f8ad46b447b8e8b036b84e0792c6ab1eb214f4c1048c0ee66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50582e5c26a6e658d62a0ac5b735875e0
SHA18e45e02df9fb4988ad24cafa6b2dd098388b0226
SHA25635ff55c269aa5e039421b654cfd4a527e9fe7f0043ddd76b2cacfbc5c111f2ee
SHA5128d1a34369d7832e0aa177f2d85ed32cd0e274c3ec2c0a3754c0afa4656e8b9af65044f6689ddb05ad6fc17da9ee253a4ce0a62bb534caa2f3f2e4b992608f7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575192909dd42490c770b775e292fca4f
SHA16fbb00eea5a66b4531cff2621896f9ab1ad6dcbf
SHA256137fa63268dc7b4d30703aa510398a1a0096e2e9d9b79e2f0655d0b0787b609c
SHA51260b273a8b7071e29644bcf9e0ac754b9572c4c11c99e301bae5d68af0bcf2bd267f019e8220bbe27d8c6ee721cc52b4b310bec7906116fa9c5b07c65dac971dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d4716b6a7bab4f57127559699c9035
SHA1d35a55cde0cb1c159e838a219be50495e358c575
SHA256213dd8d4f2e22088141a0410cda511be04f564a00843afcb9a86c7026bd304c9
SHA5127be30b85ec3f6fa80b59f189aad884571b38803c8213cb9a22250d3d0f8103a71aafdd9520c76c46683284125da7a2af38ca3425c2eecf68606bcf41dec3c5c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6211c5039a307401b4a2da4cb157887
SHA1ef113fb98b5fa475fdcb67f58c45befd41bef82d
SHA256c44c9972237904256cc42678163d0fe8f56457140de06e51f8d63bccff9c9b51
SHA51293ce02b1b8753f5c7f8118e1a4a0a38b4d280681a1a623c99ecc4f37c0ef15a649cf036146880bc7a1ccd0d46ee893657e1de84d5db1bb9d6a34f87c9d9bdcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd0f5966dff4b92e27f29fdaf46a444
SHA1530ce9ebbe0711f1975a945d811d43244fbcbe4c
SHA2562a784780352090618c0050c1a6ef175608dd81573cac89d50f80b8bfb318dcc7
SHA512a5523782b0fd02fa0774516ce4fee60910578b339a9ef966a70df9797b777013ac1577dda6e2dfaaff95b0f02cf9ca01dff4f13050bf39cbe10b439c21e8eb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbba03923e465e5ddffa173bad846489
SHA16349bf3e66a20d437fb72e15ffdfabdaf3c96476
SHA25649f68a949920dc47b9098567bd472faa4d4ca340b9b73edf7c42f41772e4040a
SHA51287bbe413d849ea203c7488f645d74353dd24e923dbe35cd81f55c0f731b033ea6c7b2325ec8aee6516aa73d0c31266fed2c6e0374573a7588d62f1293cf3b35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4709b605d6a42d9b3950cfa062daf8b
SHA15adc44fdf85d5bbd3a8903cdf4d82095ecbd6274
SHA256a8549c63099067d9165d6d3612ab9b66c5867187be7fa43b21eef5149c8d61e5
SHA51296040c808e5b58539a1bfc80cad09f24f370532ac161b4c119d45d3232cbd6741ad5160d56c6e20d365d9bfa841da7844cbe03214cc76ac04d3881261e361589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a06b474e2f422c193dc6c41ccc2432
SHA182da1482490c362e493935302215fcb55acdc584
SHA2568c3a1926bd0eacae8206e9da6d7e349e812e28ce76c727894f55a8707c7b9e43
SHA512158dcaf8171206dbba1dff7935b98c1cc0b081ee697a5cd9f742caccb8db15e61bbb8fc1d5b5ee6fd7edd7579b4bd78feb91dff58c8aa3915187cbf34edaf890
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b