Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
fb33370a4a4818792c18331946005090_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb33370a4a4818792c18331946005090_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb33370a4a4818792c18331946005090_JaffaCakes118.html
-
Size
463KB
-
MD5
fb33370a4a4818792c18331946005090
-
SHA1
bb6913ba15611773180d3bfa41dd758d7f434c1b
-
SHA256
d38cdd84678d518209b07faf3543376d889663d6c8739764b3e35d7a58ed1736
-
SHA512
d108d23537b64f7cc06b526ce051c741a8866d32afd70c3c1f0ad6a9ecf3da55456e2fd3d53b068fade42a6f607a5931704698c78650123a49a037fd201c7f9b
-
SSDEEP
6144:SBsMYod+X3oI+YAsMYod+X3oI+YjsMYod+X3oI+YLsMYod+X3oI+YQ:s5d+X3A5d+X3V5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433646471" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000513e6fe48b3c6db1b9313d463aef742f4c4664e332e39ad3740b84f64838be5e000000000e8000000002000020000000d5cdb5207cebef33a2f191d825144feb5c208411f4c7ecd4622bcac8c58b755890000000d281efa365d0162ba36a46207a43a8380fcbb9e58ed3a8bebd8303deb8bdb77a8f18b9801b897ce382c87c312c934f9f6a2dc08bff80c594faabf7e8a187d0ac46197e0803c3a2179c0181db3ff94e0a8075df9c0dac9e3e6c3e1a4ac18a74ac13b0b1c15a01659b9f52f4855a4e85d02599d7c3eafcac9ac9f612a3e568fd0631e4967d40a87c2d96d03d74cf1917ca40000000e2c5818a7f957c382548cde2330cf476d19317286f273f94a42313a199d686513fee9e432eb31a9d210af7cce39422b78c0de5617fbf70ae12929c9efcc5fc5c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000be965adb4bab6b8dd8e42a1bc673076ce57e20e67081d97cc4272df451381ad9000000000e8000000002000020000000e6d6908daacd3c61d95d59fa196bed52fb234ea971f4e6f43b55438fe5b683bd2000000025bbe2ba597d08ce190b8331fb98779e1cbea6852da885e22079b8ed13c5add940000000dc56dc85781dc198182c585b923c9830ccca3085102f88c86bf8e91cdb4dd0d44ed9069b833c2ccbd0bc4676aa619e4f6a0d1f7a177cf473d5b34fcca355f036 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b804734011db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98D840C1-7D33-11EF-9FB8-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2416 2128 iexplore.exe 31 PID 2128 wrote to memory of 2416 2128 iexplore.exe 31 PID 2128 wrote to memory of 2416 2128 iexplore.exe 31 PID 2128 wrote to memory of 2416 2128 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb33370a4a4818792c18331946005090_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9979ff39c2c696810a57ef63fb5135
SHA1c5317163efce88f206f4e0b0cc4f7bae65723c0d
SHA2569d8bb254e759100347480ec7d7f6e04c888d1ae49117fc7dcd78012bb9b1957b
SHA5126af5e45d1f89c91e8a4b0a20f79a495282ca60bb87ac6b3d2504b3aadd931bc1263caeb5856d2050dbe2758148b08b5f5e8824b1c5404b027ba240267f38b981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57921e112e1f354d603a5560358af2a7a
SHA1a21dd64aa7f100b9700a747180dd18ef1b2e87f8
SHA256b7604e4c8e639776e339b5f3fd6870ee15b71a4e00b40e5f2a1cc1649209c869
SHA512d03567a63c3c7479f96202a27b82f90c5088e09986511e52c172100174c8029aba189936768f109de0d844c5df3da3b87f8d0f387b8721ebb8997e9c95478674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519185e7b51fda3c9d2f0491476a314ed
SHA151423ce550564f2bbd6fd51b39855e8656a40d9c
SHA256b26dbef8c1069e70b30762083b59107af5ee0e90fdc033168f5ef820dfa7e71b
SHA512004e8d8001fab70ea692e511fa994cc61544fe848989c6aa215214e4a6c12ccb9d015f0b01f085058dc0642a65550d2d703ab64b2187fbffd29f8d7901fd1bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d24b4d1a9bba1187cfa1f8c2daed13
SHA1138699c7b820b473a5e06fed44f5ab2991ebdc7a
SHA25691da487ccac3849bb21a0eda839c7078807e8e360136f3826750a185cc53f007
SHA512ffcbed98ef023a9bc1af2fc686759644eb288367e5d989baf15a0fd244cead187361242df730b2c7a2900a93d6d435853316b300bf0db1b1348936a27803a78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0915078d2ea30c7e006c9df476f5b51
SHA17d135324407b24c94abd62e464e68f2180577a87
SHA256fca8f29d1a5a719e060ed45748fc47acce9a881c505f2619316f39790b813c78
SHA51260b61d78000e2feb7aaf2a128694a542c690f0c65ca643bb34e5dc7a8114aaa2d27ea5b628a965c1ae88ab94594ad60f16ecfb8b42038d5744beccaa6c0448be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4a46fbe53ccb8c7a36621e705e24c4
SHA19967daca71190a8fdd14495df69047db13740b64
SHA25600a0bc26ed394ed7d194274cb9bb8a60ffb79e2f5f8322584261ae4e81e574f9
SHA51278c8942ab04703d0c7504211f0e446ddc9cd0d5426b334099b3b3f78f417580e78d1d796436dbe1f56cc94d66540ca2b4f6381414596c4bd57470ef20bd904ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e174864276eb86f8572061ef07a5e17
SHA17cf4b709a8f2835f43fdf217bc39b1ca8d2bf597
SHA2561c9a2d397f95bc2044000738747f9904550686d197f4a667f33b49b97de1f3a0
SHA512c99b4f1cdb084db7d5ce5933929b9e6d0981d8434892139374467bf3a8648309cdce7a6616f47ee104510c114b49dd0ac0a9707bec6a7637b65a6e8787a30d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aec8577402477f4d94e5d77ab53648c
SHA16bf6bc4981d1b46e3f62d2a3c4d4d1e06254b013
SHA256ff9e0deeff15eb5fc361d8bff1340fe286c535ca776ee07a1ae85cb6643e4ea1
SHA512f9aef8f3647f85bd098a81a45b3ab4103193396ed451e82f8d3bffd76a35fb508c5f0b2a89d27b560be543dfd7540cb1e6937c5235c41a61bffc712a81933acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cd0c6b5b2019c052f2446423fbb527
SHA1d123352dfbddcd474ca990fd7a2210d6bc389232
SHA2567d4f4cc669a5ada38d824756f20c5f59cac2ff524690785281614dcddce36665
SHA51268053e0910142cf8e38942b2e84ba9121f0e150af55d0a98d8cf7fca76b45f81ece1271b60f6ab6b1dfe7a069ea0c709d963ba233709db1150b2bfe2517908d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4a33f80626cb3a07d808da51604a64
SHA103377a5848dd8ae95ceef3d2067adf872adfdf06
SHA25667bc6e6f24a5c96278a2dabbfae04bf09a5aaf2748f7d4445f9ec32a014b2e98
SHA51267087e82fa8d7be261d0ddf49e103c42b25403efd59ae98e4b1c0ec747a004dbe1e6e633bd2b3bf51648436d4e544fe3f6127b133bbd8528c45b07171a12f83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c466806d96f905980525efe699a85b9c
SHA17e610bcfd3205598d7ad8c25250ac8ea8e351fc8
SHA256185fb573a69e834a890db14afb958791f69fbd44581292cb7b6dc967bd9d7c37
SHA512e48b02bfe7df5cc13d76f696a30792765b06ee0506e9a720732a8d17f645dd68e909c73282213172b064d86e4c2c22d2e666a5f00e1a6849627d639c5f90a405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56604734235279ddbc48e84695a020c57
SHA158f85c0bf995274fb30be771114f11aca1ce1ca4
SHA256c8f93e8e6759d10d19d988ed1c3e3ea07480ab44128928aa8cb5d493740d9afc
SHA512d301021931f573029013fe3929fb33686afcfd294abb65e66614396fb40d24ae33999c85e581fcbecc70eae77fc7609fb80e0b3ede474a0fed6f05a2838cb3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc5770ff86e4acd70a669e44226a69cd
SHA1376874fd0ecf829387916fcb49b1b1614305394f
SHA2560064d9ed7008cef6b09cf3cee45272eb1fdbc8f846ecdaa6ff45bb49a8b7bce7
SHA51230bf191ccf3f4be6df0fe2152ded44d0d4fa01b968e71b5ec3266220fc4ca382dd555325f11ed7a379365ad0b7e2dce86871b7f6d6a64bf35451c8c0f274d323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d0bd99bf2cd6e37cb54539061cdcdd6
SHA1c1eb26fc02a8c30f07b0fde8de6a6e01dd3558b5
SHA256c2a3e83a5633f15e36d6d1f733938b041d17080d498502c267bc3ca3f3f35a34
SHA5120a140bd915bd1049fd5d27b3f2ae53744d2578ea0f6f6141ae10e0d7e63016b7b42dad7c833a0e06b0fc4c0cfd37af341a0769e3ce9059ff4d52211cfc69e50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0d78e11d4b23d3bb1a35a08467f08c
SHA1335e8e2f28cf5b1be3ecd5c21015b36dff11185a
SHA2565cb1a52fc04b1548128ad00a124fa8969e63cfc2db06a36ab848c1f77b0a2abf
SHA512553fa7f1e62c3f0a700b2a14f3cec1b8134ad8e6098b3f3a183400dcec3d1bb83b4be99a3c9d8e73655bbd1c3e870f8f64679cda61d4409d7a3d317d34087031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56295601eeab58b49e0a01086a1b2ec3a
SHA136656161b4b88bbe9db3f363206da90c0ea5dd21
SHA2560dc69aca5f0711da2c1e89d317627b4631f2f8582a0eb3c1f42a5d05a99a3b7a
SHA51215fc28ead4c11a650f3e255d804552d02a9e160c308d99e6e37030db4858d6c544c66317029a324663b1e5bd68d11fda08059d92259e0be646d5e50360864094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508bf032abe3ff0edfbc242e439e8f254
SHA1f931e9ed8d5d3459d59ef5e8a20ee95dde2bc94f
SHA2560ad36e4d36337260e9fbd39c043e844b5068f15f8af51ea25827a39d647bb51f
SHA512164b3d39245e21f6c8b8269cfb82dba4bc86a91a93d9c2c85e55156e731136fa7df58b600cfd65e0a642103a263340d460dea9ebd414921a48deb338a1ccb64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f02552174b7e42d6d3776edb76ccc5
SHA1a320964799fce18c311fec41ddf0fe460d81cb89
SHA25699784c4d8097d7c7f539a4a75a0a9e7202345dcb39b8a908a0304a818ff9d2b5
SHA512f5b55e167ab42590376ab9a599c79847405bd5c46ceab47af074028a8d585dfc6f85c224fe371c4fa0a9436682b055baf104bda8b0104393cfe15e9444dd2f25
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b