Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
fb35b70b43ee8a63f69d9426198d5748_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb35b70b43ee8a63f69d9426198d5748_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb35b70b43ee8a63f69d9426198d5748_JaffaCakes118.html
-
Size
461KB
-
MD5
fb35b70b43ee8a63f69d9426198d5748
-
SHA1
b0e59582c719e26797e3462ccebc696c7e0cfad4
-
SHA256
b9e88100d33dd118f0188cb2826f77754d41fc4e9d4a1236ef8c2433dc896422
-
SHA512
1642cf047100eccbdb63e99c22b337a87dc65e3a1e567cd5edd03b63651e5393485d503309c2cd9cc01c36969a1b9cfd189e3b8b2a061300d878f5899f03d966
-
SSDEEP
6144:SasMYod+X3oI+YpsMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3/5d+X3m5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433646925" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b006804111db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000004fc88c638f86949eb5651a346231e79990b99e12b20c9ff0f8b1158b59b598d0000000000e8000000002000020000000e8d4f2be3161ab9e72880f927812853430efe9a1ddc9aaffb50e95c3b182f17f20000000247b028231a62b38d8e7d386d7bfba78fc37526831cc88e22d2acce08cd4a05640000000f7b0eefe11ec009ccf44c086fddeb840d19b6d1b28d33dd76b44d2580891b175d1abc7cbf19da8816276bf6e023064f7ac72c1cb8f9bae16148d46ab98954edc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A76F7671-7D34-11EF-93CA-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2692 1044 iexplore.exe 28 PID 1044 wrote to memory of 2692 1044 iexplore.exe 28 PID 1044 wrote to memory of 2692 1044 iexplore.exe 28 PID 1044 wrote to memory of 2692 1044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb35b70b43ee8a63f69d9426198d5748_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6fe1a3c1bff65f9be57b5061629f58
SHA1bcfa2d6d890b81dbe60b7365141c35bd06d33155
SHA2565293fbedad836955160adcee037ea2f8121b5705c86c391a8bff9d3a56d7f287
SHA5129e87b5260861ccbe89e507818f88dd56c5bbdda94de2661b8aa91b8dbe076968fc932172f6f055e8cd358e0090942b8de1f4a5680b9a40a8edcdcc09168078e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25b1d418f6ce62d7ceec714dd9ae33e
SHA11c17a4d72a30d80db24df1883e7bea7cceeb5c2c
SHA256d1ab6243c542044924749fb47248944688160eac6dffc39e3de15ecd03e99209
SHA5123e8e62c88fd4a68fe56264f4f0d64bf6a19c5fd5f7a231851d1a7467f806c6b3a6c128f714436510b6e6b40db76628d9135000141b0b664927be4adfee89d078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509993a26665d659cb172fb4b35a19ee1
SHA17bd30b0694d7a9f4e8280be94a7ea40962bfda4a
SHA256f0a9ea27385ef6ada41d27a879710af6f9d6c52b55014f405af84ecf6563f5dd
SHA5125dda52a1674cb2d27eafce359fcf828449006b3d2916dbc82498dd54c9aa743cdc1f0e7236ce49711d377f4c11ffb55741178f5d75f1a3a0e0eb70b5074208aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5156965795d2f37c9773e04007b38b7a5
SHA1b0b54870c5df35f98727a3f22ec0b14c43e77a02
SHA2561869b32082e6b23b97da9551654634065fdb6b3ea33f7d929d49436d1edd2287
SHA512a8294da77c925e325a9e07151f8bed53f2ffa15f6966fe16a3d1028fbc91b7f2e16bf95d39c37c75477274e5e25f466bdab8f23df147dec69d18799596c9a96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b262fa8ad94f8c7c0edb56662c043615
SHA1b6e2bdc6a3e67018d35b1b76902bd964db591a93
SHA2569c5f1644e0f43091604a8a2fe0e05abefaf65b194187bf44ef47129568b4700d
SHA5128562cbee95e91bcaff4b31cc60ccaa4e9b70c1a87a98017ccf5224c0cacca39b48d2dcfc359084b0ff2517599da6210b7e0a5fbc3bbe088dc59a9858cc7b39a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73d0d86c848bd5de55a5a7b84b57c13
SHA19d9b5a37f9afeb5adc7f65f87cf563d0290682dd
SHA25689db96c470fa2f4a49cd83696d5b7fb9a96e18f864e5012854183a1291ee8091
SHA5121383786b907a3c1088ed5de5e4a13dd3da31f67c04f5df85696d753ed760b596a78823c72296471e8af991d021b3f4e062b61214e2dea331a7415371542b1d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540527648dd7e6089f718e1b67b5278c0
SHA1ce2975d5519f1eea91d5a3350b9cc0c03da39201
SHA25665a99f5444280226a834230eb14079708a1910365b3752dab7041bbda89c0f70
SHA512f6534c587669069bbaa62f9a73f62007b89709f3fa1d3082ce8adcb16109acb603828d9be4f596d7d0ca5086423187b0708a40aa7970f5ce5606e3fa3c1abec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634048e748ae682b6d3a8695b89c82df
SHA191928f02dfa750f450975974c1ac3ee705caead1
SHA25605919cb26f7da1b0d65527d414033fdde050236a291082ae0eb41faf86a5828b
SHA5129355e9ffd674c759ae7aeb46bfaee1e511ca5a9a8b154b3e6954490cb4b6dfe324afc84ab65c5f8ff756b50feddf6d45ae43d5d33627d9001bd6d4989aab191b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe83c9abf58b2f26a50118acbe45962
SHA1f72002e888b56aa4158495512e126cc0f3cb7e88
SHA256b3e3b50609bd4f4004adcae2adff0a229ef78f895ccf1aa2e79144cff2665170
SHA5126becb78573abeaed8223406b70ae6c3d8ceb07dffb068353d962fabc1ef2601e7dc9807c3e88c92baabefd153abbd1abb73816c6e002308417e8fe20d6a44c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52090c7c7adb7a1f5524edd74362edc7e
SHA1e1fb03ee5aa7fce66f120bfd9d9e9a2ca6c657d6
SHA2568ae04d7a396b6a6185c95e70e9dc7d9e9c55bade40b57633acc28efecf8b76ab
SHA512cf9e4ec0bbb0377ca41c37e98b7a836a7f447cf7e329f51d507c487a9aa85071cebd3cfec290f55605a23bcbe7761f9af6ba37b31ca20e06461c8b274346afbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1d75128adc24183019ba782b2bf720c
SHA1a3de22c1289a5310c3926581e91ec29020f2f5ed
SHA2565d529072250197d84d1616ff2dd11c9706e3e95cea332122dff066e4f62afc6a
SHA51281b0fc5c76e4e065f9abb724e9c4a0c7e9b813ae926e769de6cd85346605681b10e4ab10554913031f351ba23bab00bb1e4fe584b684a6a5965226e069c06eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf6d4c09bf3657c483c9b91c95e077c
SHA15ee0538d2efcca493fb843af188a9cb7bd8a6a3f
SHA2564f5d4777cba73891d777dddce426ea7e9c9a8be472a1fb31b53504578c877c18
SHA5125c6ab5358235774374fcf25f49df03eaa6dd9c7758dc9add8543a597c93c6b77e852de1b505725f9787527edf8730dcc2b2cd4932c871bf14156ff48ea3a267c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f9b794aa7762a0bc32002a40e632d1
SHA1034e866cd8f6e23e0589998735ff6ffda9f5acf9
SHA256bac366f53ae1bcb8144620ec5072c598fe573ec60e197ec558aa8a6d233bbe30
SHA51217aa76852e7b838ab61c1bdac2e256c353bedf31a2de7556ce2ea3a5e2417db91b4662184748545b1fa889d4b5908799d5b36316c1aad0065dfb1808fa2a5f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa0f2a8d892a7a3bd8d5a2278e93749
SHA1e98f4cdefdb8c6a3bdf81b12fff419500107bc60
SHA25689e00efcdc37fe26b794b343795d34b70a7e4c745ade681211b570ba373558c4
SHA512fa4eb1c64f9998911c0f47258968713ba4957c3e02344f7f54075d7fa450170abd70438088149359fb36ed89ce8e804ee66169a1b1f7966999680adc0796e1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512e9fdbdb4f7bb61ad90c466f3b1d9d0
SHA16a3710cdf9aba6d02aac94f6944d77b40beb485e
SHA2563d0ab18f1411120369f25d61f9d40d8a06c8fff724193a4e78b632f8fa5eece7
SHA512707fbf7a40648e136528d25dbfa2dc2302165b7cd227df5a7fc1a28d00ba55a4e56e1e16fdbb4495c0d36c26e822f6e15ee6cab66ff0982bb0eaf4fc413de6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214a8bc4b23679bb862db99cfb0a6f9c
SHA13f86cad5a2398b8308fd3b6e32ad743c078faba9
SHA25615adea578a828f8e76b762aa406a83d9334c007de2dd48f8f344dc8a937c7d65
SHA5128eca6887a94e7c1010637b3f0e255896120f59eae0dbff4ed38eeb4c5f476e2a098d47d520b12532b292362e495b8a5b5863b35ed3e74f6d2ad903d53a99792c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444095b59cd0c9d9253a0bf750a4f568
SHA10e0eae78e6ccb0bc822dbe945c600d6158683972
SHA256ac8a8b0386e1a6287091b93a438797997a5c9df89e3c1bcb991c3d3378f4b126
SHA5123bbe803a76c330552997ca4a9573ab0f2569ff94f50a3954ef32b12eb9a2cf282b4c0d60dd4a10c7fc272b5f77cab8803d9fa01caaec97a56e729deeea893e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bed2d512b270975a401bb783c505d45
SHA1e502206fe1d8d27bc2cee02eb4e494b4aedb224d
SHA256ca62ee0f28e7f3a6107316fd80db7c9c83888574864c3615009171ba342a33c4
SHA5122eb425e02684e6b61b67c17a7e8f8e166f772c8a37e71f795a3aef9e60e7881c3f7c2f0ae22ca4f8d2863558578429a8ced3368a27b128f36d4c00070d654a98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b