Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
fd452af150ce0d80253316dca30c1fdb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd452af150ce0d80253316dca30c1fdb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd452af150ce0d80253316dca30c1fdb_JaffaCakes118.html
-
Size
3KB
-
MD5
fd452af150ce0d80253316dca30c1fdb
-
SHA1
455cb482a91f0b98c26b12ecf05bd0466fe1e039
-
SHA256
4ddedbe13738f5f011426ee91bf2abd2da5edae96605f2f9dbb287c472b19f3e
-
SHA512
b34695e8300087e367a757ffe0e5cf42bc8c0c6d67e8c16becfb857f34bebada2d6c7b63939ac2b9b7a8c76e9e6783d10028cf507d0a992256d9eadd4cbf26bd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{583CA4A1-7DE9-11EF-B439-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b484cfa58d883b5a86509e550bffc577dceaf7dbccb9e5aecbb915dbf524f8ec000000000e8000000002000020000000e9864cade6f1b9d5229783b91163e75649459df036879bd7074121c7584907a020000000edccdaf61fe3a01b4fbfaf28771eaa9bd99fb5a44f5f90e0b8620bd1315df08f400000000fae4df129fad46fa379296ceec83f3fc53c22bfcdc7f8b645e027d8be840ee8a7d9787ff58c5fecaf4c36cf36b9fb9b3e370fb3e66e824429a10ae9f83d5c80 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50525230f611db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433724530" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1076 iexplore.exe 1076 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2576 1076 iexplore.exe 30 PID 1076 wrote to memory of 2576 1076 iexplore.exe 30 PID 1076 wrote to memory of 2576 1076 iexplore.exe 30 PID 1076 wrote to memory of 2576 1076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd452af150ce0d80253316dca30c1fdb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73b7b40f9fcd1595d096adb458d6cfb
SHA1b7dd314a083c49e072332b1c16d7d52482b17e8e
SHA2565a3dfe4dd1c62ae9ac17c23da00cb05638dca0f64e2801bdc8aeba3d80af1dd0
SHA5126ae3a09ede9dd17205110bd8a43c15a4d8d159c9cce5d3f2bcb1894f41acc3514730699bfaeb5eae5e4d0cf41740ffb8bdaaf0c67668e498e80e02fdc245e8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57077d96a9b5cb7eec29229fd0b2dfeaf
SHA1ca36f7320aefeab70692cb743070b796cea02f1b
SHA256f03398bae74d9c63cd8b4d0f24f6622cd00fe4baba7ab3b1c926ee47bf06bbb0
SHA512628a59c3d98a4d999deb3722ce762fbc96b48ace4dc86dc768906834d631d4e602cbea579db709e32d23e9a4bb570a1bc94c227bd0005645bd8f5ba9c09127de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c0a2c015f72ffee1853b95deb34854
SHA1e2a274bff139b79d150867f8f283cca277e0d8d3
SHA2565c07d1afd830595f22aa13cb00b6c0bdee261f884c135af1c1f6b4d2126cc0d2
SHA512ce9cabf317eab19b64fd6f79cb00920d6b3ec03a3e167755d8e4dc61a8abb5e59417a707716f6ab9b459fcdd365378f4621a0a6b96e8d8aa8fad7e3bef80d18d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec241045198dd89c3411d65ab7502884
SHA1f276062205b2a21fde53624b6acd3634aa41c637
SHA256c9c8e07d896efaa2ca3945442f15c1a626f05a3c40370bd0fbc83f279f028763
SHA51222fb7b3600e912f016cf41dbd89bd6a9f597b889493a21d2f3961f8827de86b28dc12627a6bf362da5cb84a854e1cb413f5760fb90b2af6b49c9500ad3467bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5cfd6fd8f3382d40e279a6b9417e737
SHA17aa815abfa10afaab1546167168f5691ff978721
SHA2567c4a3e1f1e6dc7c2aff3f039585ed4047d1820e7ac450ae38c5920ee904826af
SHA512ee4f0a25a460ee369653c7b47ebcde747434c55f73019ef421c637d431ab2b7025201e5531f8644ad0968ee222786b0fb9b5a6bd838beb8cadfc6c616595fe70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9bb19e3abd83055fc40a92b2d32913
SHA106f48427955735972a895b64acd2371e0001c763
SHA256c6cbab839497e0049735957d4c299dd39deb1d09967a42375cd5fb07014f7b24
SHA512a63e4f0fc827db0836fb272b3188d6d2fa07d3445b5e3d378a9dcbd5525787cb14c887cb2381c539694905c27e688e228eef63d19fa9fd496c5db1abe7cde355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974756de989185bbfe90b06f12f4e299
SHA1a93261815c4cf658a03d81a388d312628f43f8fa
SHA25663e1660861870b53dd3acf93d662b0a57c864fce0e127bee34eccb89d3d1ed6c
SHA512abe661804c771fc3f7204053941dc42174e72b19feb6caa98e88901430d1d6147cd7e765acc539d28498bccd7fe28aef3641467af483b043b80b1ab3fc89be81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbd2ca6c1b5424907f6d0bded568462
SHA1966bb5ea7b8b77d875acbc70a1c17c61ce00b87f
SHA2564dfaa4d7d5d5bc5e92baa0eaa04be81b67490b1d4f50f1a2c7805f73720b9c2d
SHA512835d8caaa92e9d16b597cc7a7581c44f589d7d7880ac989428d50e89ab07b9a0fecdf77240163b6f36d314a1e291d7222f4e185a2eaf4f32fc5c2229ef795c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a96b20a07a2b8062e7b2ab20b79cbc9
SHA1ff353ebb756b6a4bf239500d4e0b6da365323d45
SHA2560e3f74cbe5b41ae9a70b0b1ea2e8d677956ee141ab1c2a1018b3e750abc5ad1e
SHA512b8c19cc2b9bb96c483775cedb1e9261fc2ba73172081133d0ba986a60b2aff2d7027111229ae995530f82564434b3a1a7d2dc56ec529d7bda877582163047f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c48a9e7bffd98c415f7db9f6ff18d24
SHA1f52d943e7f6e4af7173466fb3df06d5f2d7a2066
SHA256d72fb3711437cd5de6056467500db5898258551af04e3d076388e0a3a727a63d
SHA5127fa44c75b0269744ff48ebc75787b232693f9b2d2b40908aa94beab0d0ecf6aba5f126d14fc573992f43de8180c8786e6dbf47c94f3ab55eb9f91a063dd8a9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5204ee4a6b3f0d81c2724fe39e285dbd8
SHA127059437cf34edc0fdd795f8948672bfe2e76e28
SHA256955a37c906e16da4d01b03fffb983fcaf1853ede05012305652204d4c6a7867b
SHA51243990278eca031b5b442bdd069c5413ef1a1ff845ae44a92d6d45ca2cb3cdeb0ab6545730f7b62efe09688ec48af04420d6af48aeca0326d2753bc2446ef15ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d083714e4dd4b7b69c1386cc9ed47879
SHA1292067bb0fa80a526ab25292131cb55dd0624aa6
SHA256f2f06aa3485cda12975b5517e85f6b051ee617292bd4cb6639fec19322331621
SHA512c307172a7bc7c83f85f3e0b457247d336b5e1c9c5e8478b4222a631a71d246b5e9315fc24581a6548082d81ca5687f84824349a206ff4ddc99427d93dfb49ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c67b52b170aca852e70d8eedd88c84
SHA139c58bc442de86587b55c5a9f607a87c97dcaeff
SHA2562d80d7f539e6582145dc7da694ac99ccc8ee8fe48156e0c0b7737c223cc38ae6
SHA51242d495550ca9e7428b26e98ec2078b4338e5851342d895a542969006bfd6c2e005622404d4a1b3acf2f1db5b81bbf3cec23b269dfc3c665bb0afe44a5e881a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560aceda7cea3e346e7be80c5342e3ddc
SHA137f163c011175e19d0ce57ac61941265b6007d0e
SHA2561924903051f816a3673398da4088c25c277942b16788533f369484c691280193
SHA5123fcd3af3e03644cbeef0c91e043279021d20a2fee3a8d462932e0223eb5c108e605b39716c51c2abb718665b63aec1cfc3126724798bed0723cf66d42e0caaa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b8d97dedc2fa1d3f5267562b1c2038
SHA1e9ee8c91768848cc287adc19eaad21afe2a5284e
SHA256b1b8c05a379518065699d88c1a2226e53945a497ed7c9321e2890b8518e879a4
SHA512de3fa4120445044fc87bd228421619f0e53312424bb384d3dae96af1288ab4847598c4cbe20cd47def934ff43134692592057cb73dce2645060eba2ec84a8348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546896a213a009f81992f8d1632a7bbff
SHA141289e5b5773c4a09aed39b1d03a9cfe57c8047c
SHA2562e0b0ab4f63ea50058b48252b4c601837490b1ccc8cee1fc232739251fed1feb
SHA5120e9c19ab73913d204fac65d129495d190405d4e1ec232f00271361432654bcef37a5ebebe41920dfa889e723389bcb9de397593911a653bee2016c556d404a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed0da27681392a7a18602caec191ab52
SHA108dbcf4a8a2053d77973cf658bb8d7fdf54d589b
SHA2564756c0504f7b241f042fc743f822ae2be271aa3fef5b6b9beb3ff2d373b0a1d2
SHA512d3d6c11b400c2c015deea6e25c5d1ea0ab87c9a754cbe8feaef4453cde82accabd742ec65cf19d43efc78d44892378513db559f4607d18635640b7d7f5412dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56595e11003429026fde1db920cfa7b57
SHA1f4de2e5783d9e8aa271f36d5f8c4545dc62b0ae7
SHA256f9285a017367e456f0b93f49aed3de5ba26552eb3c8fd7bcd7993315a7d854a3
SHA512a94898401a3346d90270d3a3512bee6d2a90e65be36b66904d3be3cb1149a1c7595801540cae66cdc8c7ef37ea5afb95345c21dc551ae7645f855ea4e9610347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a6498536eff049ef96dcd33a57bbb2
SHA15bde350e5313ec7e455117d36f6bb4afa834f70c
SHA25624b298435fda1bfb055fbdb2913e322efaabb3b08cdb6013e3c061412557aafd
SHA5122b9344aea48b454641feb70f5e824cbfbb34e7abb9e88b000a2866a95ab0b2d0fa42cbae21b437303e8ed509d618a9c70b6b963ab72d7b26b32a6c15d9a9ecb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506630f1db8c7a725d81a2046e2a0bfea
SHA1cdd3ba0b937dfbe05c5a0980c4b410362abee882
SHA256cd5e9d85259c21f831a7d0281108a22be0d37933db3fc5f15aa2e8b6bf5dd182
SHA512a2f1c34124552aba3904deea8e6e08055ef9e315ba410b5ce4ebc0b9354e2a3ed848905bceb00eab15088587cd62db94978e51e573df4f44106b0ae61597d5d7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b