Analysis
-
max time kernel
68s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
fb48428f656f4180a9aa785a38969cb7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb48428f656f4180a9aa785a38969cb7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb48428f656f4180a9aa785a38969cb7_JaffaCakes118.html
-
Size
68KB
-
MD5
fb48428f656f4180a9aa785a38969cb7
-
SHA1
24f0b7c706929d38c664ac1fce72f180e83f4562
-
SHA256
a0c9755cc5f65c01286b84682bd98b3abe75760eed773f6503e6439c65c0e460
-
SHA512
264f62af4a7ceae08e7c4c595f46a5b2770be67c8184920bcc586b24a79736ddac7da9336f93c3ea5e6049e0248e9d7658be46c77ac3574336f53f5ba6f160bc
-
SSDEEP
768:JisgcMiR3sI2PDDnX0g6dZ3wgoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JUy6TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ee17b2ed47975c1726c023cb6150b2ed02956cea024cd3d561eaaace832a3dd9000000000e8000000002000020000000edab89b4dd2c1eb42f4244e54c471d14c281afb7bdc6140e504bdca1ee1d4d88200000005d811cb2d70a848bfe68e3735d1ce68cfed80041dad3833c53c825da0bddcce34000000060911856dbbea7c62d2aec081a8e890743c36651ecaaf4b3b368cb42c2f8f7cc4a0ba44b80133a0927001f32b03c246f6b7dec75527a53df8aa6500aaabcb2da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433650523" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07865581-7D3D-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0efd6dc4911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2784 2096 iexplore.exe 29 PID 2096 wrote to memory of 2784 2096 iexplore.exe 29 PID 2096 wrote to memory of 2784 2096 iexplore.exe 29 PID 2096 wrote to memory of 2784 2096 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb48428f656f4180a9aa785a38969cb7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4f9ed6b165840be586254e63df79d9
SHA165e34f088467386b7e1b22400635124b4d818dca
SHA25676943a0cbd8e48fa56544ea3ca4eaa6f4afdb5f16f5b20d084efe99f81a774d9
SHA5129ce3d19e04323f834865be9ffc4a7214443e67d081276bfdea41c1cef6215b4499fd51adf1f878041c00ac28d5e5d091aca38babadf75a4bc16b4a7376636f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58106f4688225d284d5c1a7945bcbda9e
SHA143da8712023ed80ce39c38e8964bf9d96fd59376
SHA256b5702ddaf617e17e6597b46befeb48f3b14ccc80c0afc71f95eef52710299bc4
SHA51239258c758dce1c3d783e6572cff4bee51380d02a6d55828854a51e0887db215726cb3b32a08f1d9c78d306e6436d1a18c88112b20c666f9c2e331f010aad0c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2820d89bd78247febbdb69de923069
SHA175db49e1f3d4794e4db05cf8915b1977cddc4e4e
SHA2560c06213d6e2d06ce6ded636dab3354daa5f3911c2b1428647653bd1b367f7959
SHA5129b096483d5c5ddf925eee39bb993b0a68159084d872c840da28d94d959b17181bbc96137291c8cef216d1d23f7e4fa32f732dae3ec06538f82a0b7862b53400c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d908e67f3c3592919d1461a5c9dc32
SHA16e985605187051851b9ba05b4daa7878fa8676c0
SHA25698d1adb446e573d6c58417fef8c17e6a5b3a1fda557217758476737339d9b83d
SHA512d1574aae474bdb17337f731070cbbb13ce1412e9460f1b70a4d8dcb38ebf724049dc58e80f2ea536b146479a045d1bc3bd722de54d2873b8149945ddc9f9e807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aef2fe2d0fdad86a6a00f71fa8ea041
SHA13cfe573bfc110a30a13ed4336c9a1b9c92d9155e
SHA2562263b72038f63c6183da15bd7bbb93c8391a76410b5696227bb7b09ca3b7e25a
SHA512994146d15df345939c1814ad71684c1989cdc0f7499c9a9a686c57febf69c1578cc1035bbf247ea5e90fa2f9a4ccb531943a8ad0e0732de70a87f84cd72d64db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527143d2b08841029102132a4f1fe3168
SHA135f46aabb6fe5270b35ee472f2e4c32a717856c1
SHA256dc97158589ed9d7d7b402e5d394d183b22549b8eb69fde6723e289d66cab686e
SHA5120a7973aa8becf90c38b302e2c161c1552cdd51d7108ec7f33b4e2e32bf6d85c3f998940b17d708dbf71c658f00c513723476636c7cec658d3747907de99c7c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77b72fc15a66d0cd4d4d88ae28a90f6
SHA11b1facdc9c06a5108b79dd80600462c10997b69b
SHA25680c4bcf121763007390335ed606d221cb4c1d03b715196ffe2a657dea0100c20
SHA5123c09c214709a0fadf6c13e6d973688ceb6ada4eb7d2a3d8995c25060cc294d64f36b2b8d8706275ea6690fda8d28d380f12f7b2424a305f3d492a16bdf3d6c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee1aa15ab025eba21c491808354d0d2
SHA1575ac02d42c9f380e426f34c7220d001e60a2d30
SHA256511bbfe8a721b4713c051cad2ca87e584249db392b5cebd54b6acbc1b3e310db
SHA512baa834cac956b6c6e8781bd8879adc98724a48806e6373862211aa3ab7ca54e7b57047d3fd17c41ad692ceae31a637d1098a062edfad2db7e925e7f672e7a703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58341204d5d3e94ee261b11a3f322788d
SHA11cbb0598ac2f847cd5bb79e1cf2653226831fb76
SHA25656ec4f5e5eff5b04168eecc5c94acf672a8a4dce36ab5c0f4e1d6aca6b21ae52
SHA512fc4ce38a6c444d3199719d6502d0aa358bc99cd400e2ff6b9298338e2aa8d24673fd39ecd011eae71ca8d11bca65162e05a71bfea9752a1ad3c7c11d5eebad07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b904b6f7fa6e6ed072209a5038417f9a
SHA1d507ee074fd217ca65e5e273135a7bba75df0b80
SHA2561fb11ca6d4b694456b0b3696874c759e1336a0074a4a1c4e8b5c34641c72889c
SHA512197e701ef169961878f933580cdd6c4a08fe441fd4de83519c1d881f3c95e32d6c9901ec484ac4d7b54141297ff0947a255ffeade2c77fa9b7fe0ee5815a77f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597435d54bed3a78d8b4840455eb4aee
SHA19fa58a5e0d6afc99c336c47261f7dece1f1c73e7
SHA256c40a135b09759b6693841349099fd90b8244354c653001f6ddf7609c3a4edc09
SHA5122216937efb6bc6b9c2bb41c94bdd0af1a42d5d5ec60a9031195a02e45624bc8fe7bb50332059d1e05766908a857dec19f7ed0be0daefa6ddadc11514afb5b89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcce8d4296f7da18d2894f74198631e
SHA1d26db81d0aa73fbce0308ef679b38a30c0759bcd
SHA25645e7394ae59f4c61be24981d5f7b569736ee207c800d8b6bf5f719fc312ae027
SHA512b1929417dfd9b9279b4d2ad543426cb73f41147b0ec44995ae58be8c8f93761012ae19ab661cac92314579cf3c260802cd32e7173fbda80a76a0caac414287a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4d3e60ef3affca9b2c7240bffe47a3
SHA172b878e60ffc3205f123ecc5b9b2acc23dd78c96
SHA25605b3046d600a3b539cfc6ab5de3123c20fcdc6b8a179a5e7b2ac89ca8c7b6a36
SHA51264b541463f8a86d51ba36d71d17658ed9be6b41cb745900d86c8d50e7b82c4a66a788fbe8a2050331b792bf6fb134714b7ad4002729ad9c462828aeb5f3a0094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596464af821559080c6d545b386668d20
SHA108fed0f26f284b546ed3ae77041539e7a7c0039a
SHA256637a0e41bb6df160c885421b55bc6cee91d36ab277284100b66bcf502183b2d3
SHA512f7e8cec0f567dc88ec529c90607f7368407b3e255d6c0e5fde86f846a57a1dd46f60314c4edce11340ca40fab9d9e9b6a15a37b17d5def4396f5acb5054d0676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524679cc275be9d94f163f883ca6a5a40
SHA16ec81cb3d53d0b04bb0973efbcc129f4eb4938d4
SHA256cbd0dca7d4e1f55bf3bcf690ceea801e6b122b517972e1dad37aeda5661ee25b
SHA5128e64d1e7b50e83c3b5129b7c44c6b45690a68773035305b1e21fbe007ad9b4b57f849280cd27f96d2a0f76d030dd06fe60c123583a29f30f9701dccb154973df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d43e12a02a331928ab7fbbf853745a8
SHA1bfe00085bb572fedf4f4fca8d715f5e1a7062fde
SHA25696fa5c1de4b69e853d65c769d58aa6889826c0cda74004bf354575bf4980e9d8
SHA512ff13569101dfcc00ea9537612cd2a2f81a0062ade842bbefc92959d0be8f045da38892fda961f4e4359ef4bad3fddf6c80d63faea6bafc93576fc3fcd04dfcd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59974e16b6f2b8bc56d5d0b99f4d50421
SHA18a210b6a0922b4651be0a56cfee74c9db4a305a0
SHA25656fb1d5a7cf80735fec613efb36155354f7db0ae151d7a5ba4ff166a0534d3fb
SHA5126f828fd64a38cfbd1c5a816bfdb7c2f8b742ac075ad6113c251d8e5c9e1d6d683baa5ba357b300d17248f7b905a26feb910a6aa774aca5bfd53f1cd9515bb8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd87f08a2766fb1c76ab98faa595da9
SHA1d5a767904cef0c3c3f536c2c9514a9abb420e4bc
SHA256bd024183d546e77f6e7a6d37f5972b42c5a9f8ad52325c6d0bd99dc06f110f7c
SHA512efce3ed1cdacbdd7373a7406117f68b9579731e729ef355d6fb44737158d85fc95360611e283c5d61ba9af46377de01287181895eab69bcc60d64c6caecec8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586949e6f4ad66a216e748891a40882f1
SHA1681fc2f6dfdb459dd6f0733b420fc093ef2ce69d
SHA2565cfc21449d9116efa8bd60bb4e2b67b5e854fd6727d39b9817ec90ac6664fe1e
SHA5123bebbc7ac718b93db33169b9c2db5080faa448534360842c2f15be1d8294b842960d56f808bf8d4b7dd8aad4614351afdae5f3dfe156cbe63ce0341d90d2fc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53756b43cae08d0f667862ee0191474af
SHA187121bab1d0dc9b43ea349b1c94424f4b07fa0a1
SHA25632c04c67a715fec3901028e2f1964301b085dac0fa24183a9bc8452b8b0909e8
SHA51268c465fee6b721843357609da7118f3abe6eca450d5fb2d25a69aeabe7384afd1756e599e9569d35412273dbe90c20102808739b844740e6153c9e1ae904678b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b