Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
fb669bb91b073cd43ee199eb90d9084c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb669bb91b073cd43ee199eb90d9084c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb669bb91b073cd43ee199eb90d9084c_JaffaCakes118.html
-
Size
2KB
-
MD5
fb669bb91b073cd43ee199eb90d9084c
-
SHA1
52d8453c774a0daa2a962c71525db0b341eb183b
-
SHA256
4023f76f7a0279fa3a361edb5dfc09603f2137b4b8365cecec198caff8808c59
-
SHA512
2e9dd02ab1b82ff2443d828e17148b12d97a9c7dc668d9a8690b1afe39f9eaa19fb22e27a9cbf01403f1cc572a028318a33dfceac744a2adb75c518391f47fb7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4037c5395511db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65534501-7D48-11EF-8334-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000be2f920bf956976e221e21d4cba21d70a5764ae76ac2b46636b8484634a40bc3000000000e80000000020000200000007d5b6dd013671c836167c582d5cb63b57f8be6de2d57d6c202594620667a8cb220000000bcd1f5039a7ad2ad020db991cc34132902181a68764532e3fafef3491e0c6cf040000000d5a928d6f6755f5e5cb8729638b8889d1f14504763350574b344ea986be8749d7cafa9ba538293978d9778b6daa3f73599187e794bd8d1ed823b720a187a9f16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433655403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2832 2992 iexplore.exe 30 PID 2992 wrote to memory of 2832 2992 iexplore.exe 30 PID 2992 wrote to memory of 2832 2992 iexplore.exe 30 PID 2992 wrote to memory of 2832 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb669bb91b073cd43ee199eb90d9084c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba24c99eabbd38b65857a939212df74b
SHA1f917d2b83685b301c325430aad61573403c631cd
SHA2564830919ce4872363be8e90328793156258da32afea117e6ffe5f589c5d9c6924
SHA51264dc63d66907de75fc492bd001b0c3fca414825a5c61c4e485f929f74e50039834b7d651329e467e2c8e776f0c7d73557fc6b91dbac07a2591575872317834a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd9ac40bd98974945368dee1b82c516
SHA1a3fb100d4102285e6b818f979cde741de36185af
SHA2567ecd138c2f65565d33131e933081897cf1666c7655cea52848bf057016f99a03
SHA5129b2f21e86e03a66fa9cfdb6e7c0a34e4e02c181fad0892c2cfd67b25202af682d6bdcd9c4d701f3a2c64f19f1f39779ba2923410525e0a7001e4f1a073efb674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577cc5df038ba60f8ddb544787127cf7a
SHA17bae9d64bd26a1ca2d845325d140ba9c24826aba
SHA256d6f35c4344133d0d30e1aca639bfca209375c8bf38c46939cc389b38dbc81577
SHA5126c4f8e8a36565be8264f0779d3200f4f581b4d96fe5896fe317bda5f3397fc7ff7655c4a2318434d32466aba64db0be1b064298039a0c2e7274c6125bb702569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833f6f9178b2538df2d39d21714a2e5f
SHA116777ba63c1ff7479e5fdb323642ccbe3048efb5
SHA2561e9a0cac79bad028b64010f5399ae95753040fd05d59e5cd31cd104564ae0e6b
SHA512921b208379dd15e12529fd58c588b62530d6960610cfe0c75e468fd24a0c1e2188c54e69e28e8681a4759ef21fb56e588644a2b66de9b17ee8117a606e4db3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed254e284b00a8cff987da1f926db77b
SHA1054af6d4d258ffe82d107342b3f3e9ca59c3ebcc
SHA2562a7f8ae5f852cb768943e9814140a94276b124edd3139e003a93caaa9e7e2d64
SHA51263abb2f312f4f2eccf8792a81ae7caae558397cce10406bc9bdd5fda53c088c77ab1bf8074f3a6aafeccb4b16633be2a97f96dbe944d4c8735e938943a886fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089c7b1ae1b3a27f1add691f759ac94c
SHA17bd8fb364202961fe47c73997857c478b24a0522
SHA256d000787dcad5e19217bf95e3f8702c9ee1942f879dd186a54dde0be468ddfb9d
SHA512a7f13e220d74b3abb554a587705732030f946f6ca085b5f529e441956a425fb82dcc657588deaffb874c7d8cca94ffd47d145db773c0c1a2da6458bf0e0495b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef3c7b0ec3e028cca0704d1b494f84a7
SHA1de7a9e57c99ead631b101394c21abcdc9ef26c86
SHA256a71169ba63ceced5f94ccac1d6c6ffc8afc9f25fbc63fa002ab55aceb3bf79c9
SHA5120edb088acfd69f92adfebd4978467044550f2dd61316ffbb9fe15212854979571b6e3b4c519b325297259210d154b2ff94c1ad64baf8ac4b081e0a61d23ebdb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53faf1458f48545d0d1d9c885461cde27
SHA1679f2d49e8b3b0b85884713f5442c1ad80b568e4
SHA256fd8c3c3596aeb0817b169577d73af0d0cdcbe63b340d9c37acb56e37f948d838
SHA512792063eb48cb3dfbb3beaea163912e4786c90d59ec99ecf385774e340ca31c9b389b7276d935cb95a06ecc722d190d7418790aba0c040389039fac132eba3c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51aef0c82f76b237ac151aa3d715fa1
SHA13b1f1729bcdcaf562fb819aa878c6d6b53039c5a
SHA2560d2e37902326dd0ffdf9747600c67902f6cfbeff5ff95db2fe61e4cd5783ca99
SHA51247454655e79d021c75cc210f17a635c0f0bd2ef065db60550c29f559d34fc8c3143b4af76e5eed22572dc36eb535c447ebfef2697acb84ada6e71ba8e9b0c7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf192b2bbb7d6151e085715ab8bf56bc
SHA12b7993a92895aaa2a3c4cc543ae63847d8b0449a
SHA25651599f7ea45ce4749c086e172ffde375e9cdd0b125c8679297fe4089cbada04b
SHA5127bc75aca951a98cbb9db70763154aeec1ae6db362c16bd0c4d5d593343ad68e893a0ca4472ece4c89341276045af433315c36922e789c64a7a98cdb889ae9150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f916507c3c1a501f7b79e7747fa0d7a7
SHA126d3f388f7669e0ea08ac5ca5783dcf213c41a57
SHA256cf307501e75877c77fc0e1fc111ed85e6ae7b3c54b74f70982f8626e773a6571
SHA51248c44d46165c927a43ace7cb522476ed995057acfa7fc947db44b18d37944aabfd8be440773e374918e695718cbc4f8f269504dc15d498c76b1d02bbfb044c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee60a1d89571d1f598c87cdd9a9cfd4
SHA10db88a555d7503302b5ef4e2817bf6c1cefbeab8
SHA256fc773ab3c59ef598d9e1c0015d2903545dfe21369037b91a6ebaaa63b3ea42a6
SHA512de8ae0074398e7962becfbeedbefd2778219d934b7b141427c5a029b523c41a93c69d43921609c1398e69f8ad68f6c032f1b2aad203256b0007fb45bb066ff33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575207c2bf93006de294e76c72807ee74
SHA168b047247c577d6551af9089ac6084fc4505bd61
SHA2565f8efa00e9618c68673cda2b75857fc2e75a4695d485e9a0c3d022d8771ba414
SHA5121aed29457a9cecb633729f87c152cb309fc0b3234f00ef614f68bf1318dd966dc40f145906dc0133cbcda2992b870a1d2d9341dd17577482f24ec52a4d291742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569855b58878ef6c0fa01a0a774f55b91
SHA12db4fd9016d57fc8add7f9830e86dac3d0869e8c
SHA2561150be5300903127c3d693c6938ac2bdf0d8802761551e28442b58b487ec391e
SHA5120040f024f8b7750df34ae8a94fe542e6a67609249354d63652a0056ae4a9a2fb014b358855a4b80f4a271b5fb31a1590a83f300c56a12a3bb56fe38241b115d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e0ae7c84e580d77cb2a6cf1392b6c1
SHA1caa7b5d7fdcbaab8ae768fa7bac265da156e099d
SHA2563e907564981ba4c7c9ecf415c78f8e3ce186fd87edc8d86ff5975d8acbfc38ed
SHA5122641357e33354ba3c7306cc1b9631f80444b2f3934772bfd4fea78d0885722fcbcdda97ca662ffef9068bbb449ec9ab3afe4c711643c9c69a8d29dc13265ce02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff30880645cd7fa5ab6b436ae96e9a12
SHA1057f38bf7d91c5113f8be804bea8726117d31a3f
SHA256ac83f41db5a77b7691e2d66c178c9fdab63c8381133b71ef2675ce494f954ab0
SHA512b772956f7ad1dc15ffe7b2b47732fa2f2664dcdabaa65963560f08b67d631a179144f4e8cd42fba2a705cb59393854e317146ac7c520c11561e8b124d812b3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3bf7ddf40ff8468384db669d6f4921f
SHA1aadbadef160e22c5cde94a73b10598010477359b
SHA256bab0df09b805278656232203fa523fe0b7794664066e51d1b98c350883d0e9cc
SHA51216514468846bd721795e6d00ef077d46427e2602e53411f041cea793678c722229911c028c80f7b59b8685af3573c4e991663fbe932f569313476930f231753d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5020e69bdae1119f0d80893bafc7d9b33
SHA153385649970f7ac49223bc69cb82cf1a7ceeef71
SHA25674fe713bf45a64334147b0401bab6cbb6d105285821bbcfc51abdb8355dbc5e7
SHA5127df803f3904acd962f09c65a10dbf9bd0c5ba34176898049d09f3f15c8f56cda8cece5b4d21577ac7883904159a9a887513baac3e1962e26461ad423acdd38f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf79fd29dcf322e84baec1b82400b63
SHA1bf2aa4fade6181f4cf44dd5696b905d5797ce67e
SHA256791de9a118edcf6be3553f4cb85572c919a39f90c8cbf8ec972969b5727e5bcf
SHA512f77d66e146f4fa841865641a0553b79e272bd9c89d79385b3f0a24915a21399d4dcaf1127d9202183d1329851cac84f479dcc18e418f595af009f693fbddede2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b