Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
fb485cb0b6e01d3a49bc36413575720e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb485cb0b6e01d3a49bc36413575720e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb485cb0b6e01d3a49bc36413575720e_JaffaCakes118.html
-
Size
2KB
-
MD5
fb485cb0b6e01d3a49bc36413575720e
-
SHA1
1139a468e520e26f31bf40602c268e2baea3dad0
-
SHA256
6811875c601c52420122f09d830762e2aa82776bd09a9755482ff73f2fcd3041
-
SHA512
ee7d80547c41e492a642d803351889059728f7c0190731c9a25eed3ecd6409eee3da625e7277c3666548c92c8e543f04376970c1eae2f3aa5a06628c18380fa8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09D1BC81-7D3D-11EF-9A25-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102269e14911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433650525" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004c9b480b932e695a7ebe34eb035be1f9a2f58ce3dd0729c826139258cd9febf7000000000e800000000200002000000019bed6e1c6481a1a35f32952c69f152ca44c8396bc69b00c2e5a2467cb6378e320000000c16bc31e5e82474ce08d788ac805cce366164f5f0668b20d85fd89edfae41447400000000743e184703f149e13d095eec16c98294cd1c754ab4d229cb6e5d31a7b2bc0457f64a496f34e0b1b2d73ddaaa54d9e18c266b1115250c804ceaa222d68ff86af iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2828 iexplore.exe 2828 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2768 2828 iexplore.exe 30 PID 2828 wrote to memory of 2768 2828 iexplore.exe 30 PID 2828 wrote to memory of 2768 2828 iexplore.exe 30 PID 2828 wrote to memory of 2768 2828 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb485cb0b6e01d3a49bc36413575720e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084fcd5d3cf1b2ebe03a701487c16ef8
SHA17930b8502ba89f032811b2118440f2ac8813cb11
SHA2560d0baa4ee339ba3752a5577430ac6dee0cf83041c23984220dd3ea08c5463934
SHA51278c26aeef73dfe0d266f96cf604ddeb470928fbb8a0320ab05765f4dda324cf52f153728ebb23283dcd501c558ffa16ab8e5c77b197025f31b5e95a0fbbdd3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b21c0b8a35ae58949e6ea8d45dbbdb7
SHA1ba4240f7df60478153bfeae5e2574d0785c90090
SHA2564ee7f56f1122c35b0c21b7c6e94a38f07331c2627ca6b50c1b7b8cd74633185f
SHA51219671279fc5a34caf620834ca517b9e3122cfa447127653f01697c322aa8f8c1635971f118af209811f8385e75a209b65283c03a62d8a8844847bb1b5a0f5292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275aa20a3382fbaadd14b599c01b7a9b
SHA1965a4b8965548714e193a0f3aca5a2d541bd7206
SHA25668cfae43eb1d191f68169d7f8ef74ca8d78312aace6ce009cef74238c5626e80
SHA51250059de32586eb2ce6ebff9261e8b73ccb6cbe689a3ff763242c29c04706c561ecf7ad5b73eadaf96c524a53be51ea077217f7ae6dca3670155860130ce88b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561cb7bb3d362b5089032a3b5273458b7
SHA1327a61c0f44473f07ac14282b4ada502a3abcb98
SHA256e3636a101f6a84a2f1d6842bc32811f4d1fda9506b11ad690f06e5b33a6aaf40
SHA512eefe478036dbb719f1168daa15ba2bfe6e4e49c525d6b798cc06599403884e1d5fd4b93b3241cf790f5d16e6423770f7322400e68e696c56d3fcbe27cc986998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4cbfac4279903f0e6b8293228fac34b
SHA16681f60a4fad86a9aacdd9e5983500bc1fc5df2c
SHA256449254d3aacfcf0d39c50d0bd4a3b3185f3778f7018c629533ba237a3127080c
SHA512c1b4ed4df3c2e102c9f827c60c915fab5d8166ff05c4e0494297d5a31a341360ec7a44233285bb6cc8a10b302a2947a85b13ff5d5ede732ee9f13e40cbc451a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4cde76995e4b81cf79f298d4838b0b
SHA1cf9899a77ddd4ddd007938ed9a289dad2e3c5024
SHA2562c5b4c37a1543f3b9452ce17ff09cadd3f068c00b3f538156348615613c8dee3
SHA512479dbb6dfb61f78638be222d217eeb51bdd7a02e35a0e75ef83b223419669c3d9db77866cd38070dfdb627de877e4e2a174d6e9faf89db8269bd7980ae518444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f360869a78085f01ecc936191ec114
SHA177482b8184c3c9af82d7a423f472994ea76b9fdc
SHA2560485632f7b75c499fbb5f30c1377154cf889a2a46b2ef43cc4cda1c78b33d61c
SHA512a9722101f3f4976a9d170a2f37ac071878406a4813e1ed153f6fdb343a99017f6bfaa040ba26b7867c395948e4baf9fa12f0bcd423d55098aab0f8cc6439a0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b5d7ccdde42f1e4947229a1bae6c01
SHA174971550ffd49e3b5349a2dd8188be180c2a1fdb
SHA25614a5f6d086143e025614799ef27089bbb2ee9ef51d8f5a5ae8ea3d44f77c43c6
SHA51263763a23a1a0ef66d964a9c0c67af41ce1b48d395b39b0e7dd92e9425669e740a07840243e20368b8b37d136be91599377c4267e63f2a191fa6894913f06e55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53066cc259d8f8da3470d2a145dda9445
SHA1d8b460533ad8305c14a98823da8d6e7e26a06ea2
SHA2569588f79224b23d97d3ec11cf1757c34a28a190b18c720fd54c12dc436c6f9c8c
SHA51213fa15b8f6d32c08781cfe30c0291f2d90f11613f32f8ec7a3eee542ac8efecfc954e76d0f4305df0c86a6e6a26895262213754599e40ae3760d9a9a4abbfa1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee19a41bd7f8e2580dbc3577df2cb9bd
SHA16bc2021cfab95a4a1023f7d51c2fa0e678316e0a
SHA2564b77c2767d08bcfb0f543768fa19c895da416c1698a66dcbfc8b356cefa67dd1
SHA512543bf9d7ff4cd8189a02f97dc6f70f15d090bb3eba020950a8a885963de21b3c0dadaf47e731e872420f6831f647c786fb430c8a7a8a1318ec491079f2d2d033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def511085a6c84343f1349bc6da775aa
SHA163f06d0eaa56c203f7a81b77539b49e2f2b963fb
SHA256803aed8093a5a3ffaf7a333a05784b54ccfe496823f7c99dab146cf1a7defd37
SHA512fe52a19f088d654c45ee79ecf37c807d0054f510d6a8d322f142c581d890966ca6d28e5277366bb8e072354a927c2f68429c2032e25efc29061dfc37ba734a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c4f8a53dcf24555d0cc8f7c7898ee0
SHA1f5ee0b9ef2d6bddacd515ff1e0a2ec4a715175c1
SHA256e93b7cc60121dca85faa8a384a2779a00cad02fc328fc521ad442d74ad596ee3
SHA512a6c08f5cb9a04f815cca8dbd08dcfae4b613678627f7c160f4fd612d3b11d5fa9ee63f09c80537cc4b6b8718a43b491d87df2679417f1630d759a56ff2d286af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57756af459c304fee2af68e952aa9bd16
SHA17e4996279710e99bd180c7f2822084f6745efc07
SHA25634f99e80609a23e277c527f355b0f7b49868d751a7f9d89bb7c174f8c6b57cdd
SHA51220ae6ad4388a1385cb96d880b92d3cbfda3becd4de84728c1e58306497b60e8895646c7866d54177fb96f7e178a4bbf43cbe13bc309fd8f3eece55c761223678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52234c17dc352c30001a52696e8224022
SHA1ee08416815cc8a7e1dd69a9fd916cbbbd35f5f1c
SHA256c8048b02ea330564bd8bf8fdd4a23bc79fb99c170d3b2ad11a2e10b768984f40
SHA5128d01ea3eab70c34449059a71db3bfc89249056f877a41f4e3c6e871828f08028d8e138b8b4787ba81e9a12e52e444bc285724b1fd89d288946ebb329fe5c692a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c0cb5fbe9bda5e91666677b08b3d8b
SHA1d8e9ce24fe6a4f58e64ad4e2ebfa5325c6da9591
SHA256d5b74c23499e7f503c9cdeb93a7677571c3ffa0cedf854c2e15e401e474e83dc
SHA51214d204360efe93a682f0822a0437955d1265c8e4152b1181a2c1e018831d2b1dac0128d06ee61611d1017006a3bbe9ffd7a538aae683605a1ef99249fa9210d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636362432fa8d54b70750fe3a06269e5
SHA1a8e76e61226ff8ed4d945f24fb5e7b8d5409a617
SHA2564c98b6ee77810a02e0775c6f58cab09b11ed3c2e8306734fcef0207e26742f08
SHA512cbd8f497f88e95154b3472c069677ab06678875271289abfee45eaccf9b65592794990f5288d4ae8f5df92a84b68f74388f43a720d09b994e874e0cf44033b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814df101e004b9054a71c8eff3beb060
SHA1f69d62ab590acc48d20519e06dc4d4a705eb275d
SHA2567c1962ea4f3ad71ac0c098a497d3a3992f4d84759fcd4f3c9328d1521b14a169
SHA5123b0c7d23fa5dc0ad53b73678422b48ad5ea471426cb120ad9d8d582a6acde99b856aff745ad14595ce235cfe6e36ae846f11d5112ddeedb100d889196b4fd0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565deba2ab15e3fbd82de68768f2ae69
SHA1d2f4fef895835ddbddaee5f40b1567b6a1bf6e13
SHA2563fcf236505ef475262df8740ff97eedf31cb259c53fa0365b066728d54a1d2c2
SHA5124e3fe6d6f307c9bfb68c76e50bf8e3c68e8c2b66dfa39d1b325e91789c93e463914c86e7ea85c349c3a4138fc1faad37e1853316869838496d5ec6f1b8f50e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e451ef000f44d4b44331c808549b676
SHA186e664d06d22b25f2b84f1c0030b2f41d1f3e0f9
SHA256b636e308dab542791d03ed96d47310178742608b5ae9b92346776f99d6643047
SHA5126e46ef40978a20e82963128d90659de4449b79d5659a64bbfc3a58328d1973987fa77249fbe29ad3923756bd14da3bc271f7ce41d7a17e8af6c321364aab66b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588fa6cd8e3023c4b07e26b0248cfaf95
SHA129d307f643ed73d407979258ec1dd814c0947ba6
SHA25696590b5f99e99e0153660f8136364931922dd1e4473c75c970013f5986bde6cb
SHA512b1ccc12669627474699114d251ff4e2f0cfea3177b9858e25fcb915bd7f2f54fdaba599d02991e2e829bebeccc36362e4ce75475dae02a034f009d64bf42bc24
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b