Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
fb4e44771f2ed0501bc8dd586d1b918e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fb4e44771f2ed0501bc8dd586d1b918e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb4e44771f2ed0501bc8dd586d1b918e_JaffaCakes118.html
-
Size
1KB
-
MD5
fb4e44771f2ed0501bc8dd586d1b918e
-
SHA1
56b9f1b34ca290ca2d28c3637fd7df8b2ddf147c
-
SHA256
91f9462f6e57d089d9a1f51ae84d2606b65dc7fb01986483df5bf17bff306b3a
-
SHA512
f15255ba87e07d82ed58cab11f3f2b8d0c96f334bf98062a56136f902026a85c64150d16443d5b11559a20d6d7c8a97c94e9293931c592b023c65f6793386da9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d5518b9660985b631b4c57073096625c04d077dc35c540271c400215cfe931c0000000000e80000000020000200000006a628162498def4ecea470d0bde59f447a8df9bf629d2131b3cb2b1f429c812f9000000097440a521d8f735bef2ada34e53c18491a30244efa0068ad090fec643134b3d4fb8083349092188fdd81c3926f2a81a097e204523c134d91a2c3cb8ab096dbe5409c8fc9469643ede9f896adb217c78c692d220c2d67a7e6673879f7cb84edbcc3282a9d9dd190e238866cd076bc9d7794549f67f4e8b3a511836b8841a4a2fac23818d3d93523bebf3f26baae107331400000005322c6ce0840326e9cc02ee8573e9edb803236a4cfbab25b41c916f42511713c86d91d436f824dfe1b11c16a8fbbafc29e42aa625be9e19f474121fce9401d0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09158014c11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000015178ad6034f7d166c2d44ba7281e5f81b5ff7bb47661a8ff439845cd6f6a397000000000e80000000020000200000000f48197eec698433c45d4b4a1d0f0ec602aefb8db0b7d1009f223bb84298bf1c20000000c3d8cc21191b993d818471ac7fb6f93615a23fc8a9f3f06147a5f044048cf71840000000740b631e1866fc933c4e50341de8594ec2ef27343b1b24fd8e78bdba8f964b77462368e03e4cc5aa954df19fa3db82719db89716456bd3bf90129f80053dfa2c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433651441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B38B8E1-7D3F-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb4e44771f2ed0501bc8dd586d1b918e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d451e6ec732ed8c4a5e262daa026311
SHA1e7873fa388b4e1ba745471130e500eca86a67c2f
SHA256713192e3a450fcbcfbb626144d1a04fc476cc8196e4f5b99bd6fdeab19665eee
SHA51238cf45a854d30c06b15f1ffe68bba848355d0e4f7a26ac64e2baba59434d4ba5621d8350cb86bbf6e2e471b30633ebe504de16810bec9333c46b9bcdb4cc1106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5040983f7f4b2054bd99d6346d4ae6
SHA1d4540213a4cdf31e1d9e7cf655a157de33844e64
SHA256ff784c1887ee1c973cf138f74d441d86cc6fcb8b2433aedcdc7029ee9b54bb2c
SHA512b21310583e4c450a2da9223a0b1b2abd1f1b9b09058b2c1a0e22ac3a8cffe620a40193591e08768fd8bdf56c998868ad89764dd7ef060e926943e4ca75d5692c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf7e0d2c1f13693d9c08ecf96e3828f
SHA12c620513b85c26bd4dddfc4287cadc6436ef36cf
SHA25645c330fde95f37a00b948fcb5a7d68d5be19645f8b1d81810a31bd1668930f1f
SHA512529cd15945013cc2e498c2f69dbdee62cf5f9eeb87a48d748862b4d7cc8f2cdca0184a20a1059a318689d27177db4b72124cb177efa693759522067c90410c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319bc5f3c0b50c1648b950c8edf13e56
SHA166aedd9f8b5a44ab6996cb6f816d2323fc5b37a3
SHA256b84b5da2041424584938b9b71476924a87860689a0e709d31d47800fd1754404
SHA512146dcf2d73b8816af614f9b9556418aeab0734bf806f2f586762fbda5c34b7d523742704a6261ba84143968f5d0e49aacc3262e2e57d3487c3e00ea4a73c0989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e07bdab3764562c2b1a56580663597d
SHA135e936c5d3dc8046d2ad99bc9498fcd171a0dd10
SHA2560d0efc53fd92cf8675e308c91fd8c3b3b682acd25bd3602da56ac7ed06812b55
SHA512885a756942138ade06da3ce1b477f52749574f753e32ce28a18bf907709f4b8adfc647bdaa834b9f4eea2f41b2f6cb2c1d770bd58232b0a780c3e577cccf2c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e248575b2dbaf759c0b0205504e56e2f
SHA13c645d7d295084f6dcee7f880e93bf46fc20b152
SHA2566e97ef2a14d54f3c30145f8064d9a9a6297d66fc6d8fd2092d0e1089c027cd37
SHA512dfea099051ca1651fdfcb6e9604676dfe28e4e1fd3bfb7ad4db7448bc707923844926c1f8f7ed3c43cb0c37d7115af9768604f553f69a75a355befabc2b19476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0415fe121a2096f21e84e56f65dc64
SHA1e0cb959ebdf9a20a15bccb2bf5ceafc9a557538e
SHA25699318d9eebf9de1c7125bab663e7d50564cbec008daccf3dd86e2f2c9d42d90b
SHA512326751dea9ad0d3c3984bbb1f3e11562d348b8035bcd76d739a8f4bc931dc4b7f29ca75e478e6e1d5f3d2d92d5c6b7a098f6777be92f0f6e5c76251cb8423c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5014045511fb8b51bbc6f790c33f059d2
SHA1c7b915a542b73ade5846896c878c69fa644f9221
SHA256fb17bde23fc17c4d13c482869a32a82db2c570e9e77a17a8a3e7e8428a5d9344
SHA51264449ec9f9515987291325a7044ff97ff3d3fd0d1cee6782a59df8a46f93a849c92ca7c9ee9ee42b2a25b967110aa89a42f4ab6e64428462ae7d21f0d7eccdf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549463f5124857ae817cbbfde77984b03
SHA1c028add5c3e774d83a52d4d09ef47f08ca948953
SHA2565992fced8f4e95da64ee090da468107b23e8bc0952ac725b641f8397cb11494f
SHA51209a03acb511cef7fe7c9ad85bc1cc93386691b4cdaacaf1999dd6352ab2632e09d54258c18644054c8c2b2adebd75e9e2058b3f71f2a6c509263cad88f85dd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4560c88fcf0e8b67f324b5b2943ef0
SHA1575283e8f903b28b0c83ae0131ef5293580ffc3d
SHA256a9a7670568d08132884686cac2215c55a9eddfd6abe457ee8ea96b0941f21178
SHA512dacffd0e520148b60aeb6ffdcaf2f037401de7e9bf06563969f472e9f7b5981b74df60d1b8c17dce3f997cd33836175914754e58d0f92cac03eefda9ec444208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c743c7fb2408ffd739c9b19e65d9ab9
SHA157a51e22cb9e3218e34c920696e4e98c83ff037c
SHA256672b6bdd33c102e84537e0be8abdd30a9428ef2e6ca75f3c463ac1e925bb4508
SHA51225d03409e24af9aa17c51df3d888c7338bb18d26e89e4c6634582cf13fdfab93ef87bc9ad40a3f4fdb15b57fa0fd3dea802abbbcbee2f767d5937b93dda99e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dded15b27b695e2ca4af6c662196a2d6
SHA13229202dc777f1b24e4de45bd5e77326061b5389
SHA2560e2345b28cb23cfb2d51cef59d11ad36d46112245626e2f2008a07476a7cbc66
SHA5122a2b6676040aee8f1935758e9c52055dbdd80dd2c03025c1affcb873c5457011b37ebc32bca6e02baf7e22d7d05d54f4768526eb277222d7d69fbd7cbba4921a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b92142cbb5af21ac47e4cbe8a97f95fc
SHA18fa853bcdf492c87ac6fcb49d3d33f35eccb15ba
SHA256ee2ac10f3ab9134b5ba6e21a033a60c64f3fb2fb28c8b7a2b75d239558c36581
SHA5125ab1d3d8235d6f5e3958c3018a33b78ba980303c5e1c55e9621d60851c486ea615b8fb0209c31e7da7bca08cf0679894e6abd5bdf28ba552b8643ef49d2c6062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06d0e6edf50689a18be6be8dba9ba36
SHA15b551cc09d57eff121cc6a7a8f52f46f83647c31
SHA2566e632f6a8654c392c5a8bc46988021c8aeb6c3b906b464e14d16462f624e7fc8
SHA512301fc475e45e3328a643573971dfa6ec8a2b7d844f1b10f5e44dd256849655dcd0f59e5ba410d134bf7966af40e0004848f76d46f19c09ed5e1e5cd14e2c91a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53576e06eabdab75be9199160d1796166
SHA105c896ba8f0257e1c20b30e2f870f47ee7befc45
SHA25646b4c22989bb4d838fb2179c92133292ef8354fe0613ecbcc8decd67e45c8e8b
SHA5120d39ef96e8d361c8ab1e0750437cdc906bc1f85e9be27aeb6e3fee21c6527929144ee89f158ad2024fe435fa25bc2114eb80add17c80556081954408b9fb16b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50911eccbb8f002ba95cb03ec0f543d8a
SHA1a233d849d3d9f81519ad736f15b941be9a52558c
SHA256cf3a1e934e9e444ad0f1ad1a1a563ea9278d43aa564bdad0dbed9a6f3c0a0ed4
SHA512cb064a467ffd2ad04431663e5242866c8cda626dbc41698e5e84eab063c16b6ef2277896e9fb31df5fabfbad93030dbd7f826553d288c91446961038db427531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5746ef47f5db19669c9e4b9aec45b129f
SHA1f10f88532af30aa7c5e776df3e9465c40a24c8b6
SHA2560fc9157d6b8ffa46ad90e0715b877d67b8bc809598d68d06b370811a237fe74b
SHA51288b2b93da984a6aa45e102f2560237777c298b060029e0856eeddb8c7c583d87600e9ba047e808048738db759e3a099d54423425e62f7f1d2371320e6a692141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790e57a6c59a976adbabf6389e939b37
SHA1837c23e0901c191c1c35c8261a386bb01f7126cc
SHA256a2a1223f10970d7ed6c0cab94ed2136489803e8418e9bc35bfda4c9b8ba11d96
SHA512d6f3b6413a2bb94ff671ba470c15e06a23000f99bea0435d2844b5dcaba5a3a42283bcacb54462be2b3341f01728c2c9021efce9d6da21a33a30106a10e6dc97
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b