Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
fb43651330a13bccee4a29c229631997_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb43651330a13bccee4a29c229631997_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb43651330a13bccee4a29c229631997_JaffaCakes118.html
-
Size
70KB
-
MD5
fb43651330a13bccee4a29c229631997
-
SHA1
0c8b45f8dfdd86a5ab2389d58abef9176d1a0e4b
-
SHA256
2c2032adc4c519f1fa4968d6f614c3ae7269bac1736d3c1badd9292006782c5c
-
SHA512
79692052c4b7f5b0db5adda91e8d1f102427edc3fe05806fb48f5d3714ddfd26a4ea9943d8ce3c7a4520261723fefcbb454e8ae4b2c89dddab7901947bce4a08
-
SSDEEP
768:JiMgcMWR3sI2PDDnd0g655Rrk5ivOvwUtvi2oT2e1wCZkoTyMdtbBnfBgN8/lboz:JWmGYEwAiHTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433649549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000061332552465b14727da2a5ce87c8c8c85630be07e1c6e4fa95e9cbdcd97a53aa000000000e8000000002000020000000daaf75e5ca44e38209e4f9ce768eee0178722c21fd9c14702b17b0dc29309325200000009686b23edf2e1dfd8a02b84cf76b868892a329c53b42659e0dfa452630975987400000004adf48d0e13bb254357e9cb00235a5910b09f1316a6bae97c87dbb4df5c5c1b06c8d0c0960e588edd3634ec536d398c610932c8e246e9a1736d19f1ccea41063 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C38CDA91-7D3A-11EF-A17D-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009e43984711db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2748 2636 iexplore.exe 30 PID 2636 wrote to memory of 2748 2636 iexplore.exe 30 PID 2636 wrote to memory of 2748 2636 iexplore.exe 30 PID 2636 wrote to memory of 2748 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb43651330a13bccee4a29c229631997_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe4a4588ed59f65f2871e6919e613ed
SHA1193bc0c7676a887e6cd6e261b8976cd9995356d1
SHA25664612ff7d5de6f53ae7bbe49c0c803523864904311050a3f785de17bb92a0dfa
SHA51226e91512e7bb7d01c6dcbe14c39e084b387a0470fd313e4544335eb832c26ab2f25f40c03442ce8d592eeab6fdc945a5e05e36112b1a98891f96672423924834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b19765a506c7912505edec04b1e910
SHA19d7c5c5497abd476d913795155398f3411909124
SHA2565045313220ce2bfddf01c04c194731a85c3bdd7d219b12bd0045d42fdf138230
SHA512272b2544357988dee9fff797efee92e474ba2d50e866c671cea375dac7186942418ae60667a8848717085f0fb7e4764c77d446f9f53295a0a8a683cad7f66b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96f3f9146bf06092eb4ef94faca3fc1
SHA1d058e5dfb3f60f89570b46b57b4e826207c61b88
SHA25650e35e5ffc0bb6278c75fc74b95c4d21a51d486734950c71b042e8f1ff2003c7
SHA5126a6548f25d8436b24465f58a1539ec02bb50410c45747308cefab6d453bc9760232b417e405b419981332bf36bc081abf076e773db64b6a8a301357dc04e59d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e32ccacb154014c7391200757e63ebd
SHA1676523ad6ee810e121e2f6da57448179146d00d2
SHA25695d94003e53cf6b1df52b0ecfe4c0192b0b3f0151397d279c382fc011923f776
SHA51258bee52bf7f0c0b96c5baef5ff5883ec05a07ca4a6dc855b49220ed6875ea55f3e590798684aab66cfda1cef6142752b4b409b84e4027c84346b2d67c3ce8b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d29d4ae5f5b5c02d5acd03b823dbf885
SHA10a07cbe99449d0de17d0e3764962c8f507f385a6
SHA2568976717295ffb57bf6237bd1ba1fca51c47319c4d45719ca760edd94c17075f6
SHA5126b8e7e6f142538e819f6a3f0aadb52d83e8414db87e21a4649c74e6c5df6ae76c5539986a87d766bcf03cb17c946032ba05fdcc98138eedee919bf7bf6858577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa317e8b05ca5fed5e21fb3b4fca8b7d
SHA12f9eebaab7bbf6050cb9d555cded6b6447d05a1a
SHA256a9174a7b71964bcf0cf9dea3f988b05956d009b9560532dd59cf8e77894463aa
SHA5122fd3c06d1138eeed9a1f2087183737bc4c196ecdcd09e0228f62f9807d0c4c5243480bf0d844f82404b7106d41a436f64629ca9d7a0d6b8f4057a348535b6165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565bcd1d7e9947ee6ed3f15e53bdfa784
SHA1165428d88deb3891c61958ee1dabd0898d2a2151
SHA25690a08e723e8b2d7587a6c8bac2165a65595ebd0276bed02c4f0446882dcec4e5
SHA5123e46cff03101ff52ad76b91b31635028ca8f167e9683900ea9e14232de4def2c9a637732d754a44e4b2a1e0a77d8de1bd2a929fead69536e4dc979c6ea3a2494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12cd51f0d87c19269766b0f42eb919b
SHA1a542a9e736f7f6625635aef3f84bdc8b4c85ee08
SHA25625c976129d89518fdf8b6cf510d93499312bf48a7bf105d0c3555ccba58af3dc
SHA512a6686a87f15e54f516d515a6cfd47c121a7e3dedfe0de72bfe914ef18af0a16a1572a54c24a631cd16de42a507d82b53e98e31f4b343eb0282d4a17c89964d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f08e406c4e3b8b06b59d445be5f1333f
SHA10f0867d17e2c6dfd3557c48bb01be4adb57d3036
SHA25677c18e1a8934f7ac0590b538807108b8b016899d4723f4d642f4bc36f3ea78e4
SHA51215429cbfa1041debb56c0dcdb17ace5deea3c61800b6c311c733836e0a2c466713e257c9f0d72eb4164d188a54532517180515cbda03f127bb3d28ce8dad03f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2828086305d86bcdbd93968203042f
SHA1166c0be511510282d97cc1f1160e46b646b9deec
SHA25644053a931dceb97f62fe6e761179c9b8f8861bcb30ec70f0314843d8bf12780a
SHA512b94169bb92b21a0a7e9b2b53e52080a30bae336623eb9064ae6f2b85fcf846aaa5788c5ac3a60c236f9e22f1f7600c3ec9cc07341da498cc1039a25f0bc9621d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401550199c5db0646c68e91934bfbcbd
SHA1658ac72215c08a27cf70f82fcb430ab8ab52c2bd
SHA256c4692b7bb74ac11575f5b835f3855c82dbf74d4d6d9b9107a32ebce97019c9d6
SHA512105c5b114c6c91a9b53d426f11c71f7535c33ad2dadfee36d73288bc1dac502edad951800ac51360b8cda7b80f2501403ce001aac8a5e7e2627675faab9ef7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592834927a296ae6ef425b11b1b0af006
SHA19e238e20801c77607ec9c95955b1f460abd442e7
SHA256abc063a442dd3aa3037d3ce5abc7c497697036715b6abb13af49bf8268a279ce
SHA51284674d34e2ffe09edeabd2411086d655fc6ca0d30488b869794a67ee72e6386b31929df0311464dc4bfbda388aabfe088e17fc858ee17a9c3c5018645811a8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffc5653d96199f530ebdbe1e1c2b683
SHA16f73e54d7bb745624a48eab988f3b70e310a0be2
SHA256b19ebe81b189002de02562e9f64a9d8c752c532172d417a818d8cda200dd58ae
SHA51237737c27eef15831f9d47d00b514ab2dc1d524eea5f2db4139be5f017531ad41f65fe6293ca6e09f6c0f19041e00dc558d34369fce6134e616f2380d18c65c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557293ada542d598c20d43ce8cfb09ca4
SHA145795d7b21b256e39dcaa27077ae9a60936d68e9
SHA25680624bb68b2e723a9fdb20e27ec46c580d0de0f36c66ce77ff4aa5003fc26fa7
SHA512eb264d91439448f866da81fcdbc049e582885d4d4d12d26ff558f7397d3fc6042fa95fe7b1f2b1399fd9025b55381ce2c7e47f64ee3d86c780b5553935c93171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56591ae07b8e29868e5eb2b8987febb77
SHA18a26000291932a309357cc202d29aaf5c77fcef3
SHA256f20192e67d0afc216409bd38ba97b5169197c0cc7f178f9a75cf35bc176e209a
SHA512f8a22a858452662ffd0ecfb01be31f4fe58a13769f92876c799d1bc4d235865a7ce8ffc8a8df302fb71c54a70137fb5ff94987a69f4f40d629d835a0c24fc930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53501d47360e9c973a1235c63120f8d8a
SHA1c6245890038b0b041075e2b2f4ebfa271d5b2045
SHA256567460e28a63e5304e116570882135b1b74cbd98dc0e4fcb983ed7814f5a9cb5
SHA512cd0bb57f3f16c835fdcc74964d800ed33da53395b7bb2f520ccfda881aa29a3971d6f7d5ef2b2dafbc5fddfd1a4d708011d52f07e057cbe23f73fae9083a9a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c44a15cdf943fad83869769a8cce54
SHA11c6f2a0963d3a0b2eb9111539e7d9df52a83ae4c
SHA2560d4bacb3b955ab92c3cfd06f3060d937b923329bd67c429537d28bf297523e21
SHA5121b46b4622a35d189bc5017e309e4ea62c902d3fe8ee82549c390e92d501cbbc8f64f7a2cba14f8ed234e68d449b10a4c47ec06c964a8035594ffce17c813c63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efdbe6b716929b9e4106823c709317fd
SHA158cbcc4e19cfc214536d6b799272b56705761bf9
SHA256abe4bec6094fe6ca13e376bf2576f5821268a29d313ad2f4da5ea0b86c43b87b
SHA512ede2557c3508f7236a1653f386cd330bec000c0f51ffc7b619f77c0064adadaa2d881d8557f87ee63a57960259faee46814ffa73078529b7f9345a92160317f1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b