Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
fd655c2c1c270fe69d71f4c2587e8b23_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd655c2c1c270fe69d71f4c2587e8b23_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd655c2c1c270fe69d71f4c2587e8b23_JaffaCakes118.html
-
Size
2KB
-
MD5
fd655c2c1c270fe69d71f4c2587e8b23
-
SHA1
df55b41f37e302dffc48e99298f7b52c5e1ff83c
-
SHA256
f38c23d85b2a8b18a1e8b474f9507f3f9b8f5e56e08ee85ddd9a8e84e805433e
-
SHA512
71ae522a65e4994677436ae42bf7dba83fb5580e779adac116b4444b68c38f51c9fcd15d9a6f7a8b531ef376252fc880cfeae97ca231f0c3d6e200a9c0f37fec
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{174DA231-7DF5-11EF-8CD3-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000cdef1f3428d86ea83bbde6f77d99145fea374e3a2a45a02d3bbdd9d7b043102b000000000e8000000002000020000000be2020e94b923598bb8962a80cfd266bd81a31c7311c2ca6a5cf713b3a4bc6302000000025cbe8f9ab423bf48c60ff2f8a745234bfdf2dd3e01beb40d84712898c249f56400000003377b08575df4178a759c415b9539dc7ce5e982e6060cf428e7bdb28543ac11681d31f74070cfdd51f095aaf8316ebf3744fad6c246ff09549227d29b306e226 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433729575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c5cdeb0112db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30 PID 2532 wrote to memory of 2092 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd655c2c1c270fe69d71f4c2587e8b23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6734aa63968c7e8ce2be5af0432a8a8
SHA1da1b772b621eab83f6f58bdd566f734990d4799a
SHA2569a54785801fb24f45d3b41007e843f9f6fcc1eabe21d8ba8ccc1bbbde02642a3
SHA512d6d10963e766c683ef6c3d8a8a5ee196cf46172b1dfe21a265c1b53d0b9b353f54807d4955c4770631df77b6f6fe1406d89d4a6ff0ab7dfb1131a52b5651e5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd824852ce8f7d0628a09f2338a776c
SHA1933c31bb25187a772503c71b8a7caea1409e7c0e
SHA256b276e86524e8e72689bd74677d224f762707255bb1b12904722ee82cb31b2f35
SHA51293adf518806ed1f502e836fdf8a35805f2141c70aa53cfe648926a32a489176a5d0a6c2616c1f35d4db265f1187ee9a20ea0589b40dcd1111cf75d71e4e73d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da5fc6ed1f8603cac2050802439c7fb
SHA10787737fed356b9b8aa38b765c5dcdb28f80ee2e
SHA2561a2505ad998b23fc7967224d1d8e0e0cb834e0a9bf17f602976e434b3ea41cd7
SHA512ef9acc4f0829bed28edf8d6224800726da11732e6fc54432d20c2ef6e3e06f62134423b441623f39ddecfc66bacda2f919989b63a1099cec006f32a3ea8aa7c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5dd27c97d639cb520d4ab1e4afdabb
SHA17e42603c388306552fb46699b773816610146503
SHA2567f08fbdbb0209fdbc5ebe9470c986b6b7632e73128a1ff06fac263bd757f762c
SHA512f79589ca51f2b0523271515876ffdfbe936daa6a5cb0096508eedf8b697ab2075fb7b5a58d47ebea2260d69b89bb339e7ee88b59d1f7a1a5755494c541a8e153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff15b75ef217cf79a00f89b87909f48f
SHA1a1406aa04abd5bf9c0f1145ef979ef42e2a29056
SHA2569b8110b6fb379c9e5daf58b556ce7dfb8277658d1b4e77b2942bab9ed73570e8
SHA512f78071a0f7f908e99f9401d4e1723e57d7e0d5f5e8926dee3130996a146bb9d6299787cf42cc610fb0c69ea2ff62f44bb64a8926c6670171976b893ffdcda647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1c49cfa020901a36f8896839bff3ad
SHA173f9969ce243ed6885fff5880793e5bf0299dac8
SHA256e58d002583c634eae794c491ba94ebf49c38d7634c3f15fbe8a3fb7b02f88b6e
SHA5125aa64b7213d598e919148421c3ce748c8f5d69c6cd62e29534dbc1aba41199bac75112730e68383307012c19d8f8808c38fc0cf59e663ff3818c79bfb54b2318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4855639465973984813357432fbf87
SHA1e8e4bd05bbbe1bcf73a05f302bc58e2ea061f1e2
SHA25631e59e27af79cfccaca602e5a537f33e09de6e444299986205cbf8cb686ae515
SHA51251d7bd012a67d2941e88f3e95a4545b9cd2d81ff2b25d1877250f882d14463f4711991574265d2f5c433f636b77908d10ce1eda1f287af469489be0711e64923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c9a829e010726143ad66dd0c647c1a
SHA17e67b1c89a17b98ff5e1037cc783850fd93c91fe
SHA256c28050e59bf5e68fcd80cef761332e26e83434037b045098e6131879bcd463c1
SHA512c8b6ca46b6578410ab1867d45035906b9856633b6e36eaccbd712455a02193b329887c7bf4895aa7474927a1587174fb6f281c4f58e7d9f79e517c5049bf4db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5837fd3fa57ad97285f27be749cac85a9
SHA14ce859dc58ab493a73fcdb59ad0af5fcd116eb20
SHA25668ab4e1c6624e19697d316e494dbafe49a21d052704f035385f03e39be5255cc
SHA512405e5374a293e8acc3554e7b5acc7a370fe7cdc6faf606aa058132340f8da6684de159e9b95a59e4c83fe9f6541e099143d1bb0a24950145b9819cc2e483f9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0a58b7880ee911e1c802eed76747cd
SHA1ac66345cbdf3330e81f37cb495cffccd67f766ab
SHA256b434421b90dfe2a3c630b83e5afca9919e6041c38047321d4a7d6c123ab26be0
SHA512a731ad8a9382425798d2a4d3308461f29f72e19c71345fb38fdc520ff9efbf11d0d803690b92f4aed8f11f3eb00db50840a3eea75b997d1d5c49162a4f374c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309e6176306185e814bcad1576580649
SHA1241ab2e952d42247e6a0822f25d64456aad6166d
SHA256e14d80cf14b85dcf3701eb793f7d6efbe205bcd1b9155884038cd99f46a3c861
SHA512b95013d189233a06563a297419adbf6b9094320585061f8440a3051182b1de64cb80e5ff6b14b16018e2124107e1d65bdc39554f26f8680d015f9464dbccdf4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c605f7b86bc900657268670e2000af
SHA115105a1b6c42790c7fae3069ca26d259a045abc9
SHA2563f7377c04546496eadbeae2002043c84107efc8520c7e0797a046beb622fa16d
SHA51208137ca9b6a5a2d7e1a498131d31ba723ccd8cab94ab81fbca745408eb6696a87d47806bf349b2109722ba4588c43ecff4058dbe8364dc0adbc2a327b1b6a6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a333d18ca9a85cc967a720e5350078
SHA18b617bdabfb9ae0789c5726534d63df0f485323a
SHA2568a6fdbea7c86f74da07a257c1fe725e0cf5c459a81927c5a1f00ead44f7c452e
SHA5120d0c630bf89474ff241c9f98f66abd745c768f6be6acd421949053e76118f87bda5bd900d122bec9b3f56874c0143b969fd3143313fda15753d077a96d4fb24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451b29836e0a9728eda71081ed7f5899
SHA1e574e66c7777f245a11933f5f6dd12b0b2b859c2
SHA256fa2fef48b4ae87766e431a9736ed38f3bfe246ffa33afa72d2b26a95a1cb1021
SHA512ae8bb4aaa964a889adde0494ff25632e0359ef64d764c455ca7d9dc7fa395d7947626c7af7a04797089cbee68575c4143ab63711cb73867d6e6e0982d4d55c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b379e0a6eea474678e39d05e2e318e7
SHA181acdba69810623d443b549da7ed44c4cd6632e6
SHA256d98d1344733e0e204526af07078c5fd44d10f7e5aafd1ab663e817bfa059804f
SHA512a272f8a44c72db90f3bded27803ef9822a5a9636840a75b4cfb11aa01843f1ff716a7ad31f8e2a4ce146d8dc778b9a3141ba1859619d94c00c4473b2a2071afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ee3fa5fa605df56f25b9ab91e9b66f
SHA112d2dbbb1b273e046e37c6983152814e7671a15e
SHA256bbd81af6c88b124fc1f3f673be31d8d7fa5569edecf7d480e8b565d2cd84037a
SHA512ef04650a290f0e9ba5d27f695f04d644c8e30a2a6a67b32c076148b3a7cc0211b37f3017722b2d6908650ac7020652a626e6bcb86d59eca8577ca7aaccd98fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b72445075a347c3a1321f9d2603109
SHA12a3078056547f1816c7e0dc829ec34d2b74af016
SHA256d569b0ea81c2d6b453171bfedaa1b05724309582075fa2cd2ac6d5bcde980c29
SHA5127f5b3ac3e592faba94518ef29341da2386878bfcfd20bc1ba690503c0c9950a7fb2ec27d48d5d2762ab89af1cef96425f18c7232b7eefc19c0762bf03b1a6f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7fba9e816cb60f0b1ac0b1c860cb76
SHA119e1505b3c6f6a6982e73d3be5a065275caf89ad
SHA2565564f37e1014dc5ced015229efc1f793686d4f92cafbf8e53992667019c5969a
SHA512453c3250363772cfa413a48048cdd94f291a0c29edc9b7cfa4612b6415acc3b8d60c5347cdcc22ebd2195531fb2bd3cd343c6a348e54c6554015ba2e6fc77eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f6074373aae29a1d736053f6572b8c
SHA1bbf3274f8660f624578cfcf122a5bedbb800f32c
SHA25630b1404efc5542cee38ce2f9401b81a76d2cdc9aa36bfe053500540ac4557409
SHA51234e0ab8c63247ee86a93cd377b3ce3dd2ed075f2ffe8822969e2c13425cd353256b69e32758fe6087ba7934898030f2f877b09a74d5dee30b7d9bd0108665e6d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b