Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
fb8bd4e6e8f18eff8870afc687eb34de_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fb8bd4e6e8f18eff8870afc687eb34de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb8bd4e6e8f18eff8870afc687eb34de_JaffaCakes118.html
-
Size
10KB
-
MD5
fb8bd4e6e8f18eff8870afc687eb34de
-
SHA1
0dadb4b475dc499e848433f26f2d42f2eb2a6be9
-
SHA256
588ab86be780b375f08c8e11efe83398b992c74a567dc9a3ad6ec6701fbe9bd6
-
SHA512
8081e7340257f1732b5b36e452776071692e1950e611cffe10282a10be9b9f13eda3b7847483e855af48d2fd59db0b4d1498172cc9cb2de1e8ad605b1ad1cd6b
-
SSDEEP
96:uzVs+ux7p6LLY1k9o84d12ef7CSTU5GT/knYp6hVpM6GnI1tZFK695PeqFJ95PmK:csz7p6AYS/Yu6VJPZFK69sSJ9SPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433661247" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05caed66211db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0002ED51-7D56-11EF-84E7-C278C12D1CB0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b7101725efeae5f32eb7685c6c724987e7d5e692bf7e894673c9029b71e14f66000000000e8000000002000020000000d30c88d3c5650eb0675719a60a821ed6ac57d61f13beebd909711aed1614959f200000008898b6a024b6681eafa70ef4bf86e2a6ef27151d24c5cf1fd6f203bafcf7177440000000db29f5a35f4b06a0e19bfa7d80641699ab965383c1aef3ced6bfeb3f5ffcdbf78f35c31b44bcdc3e7e9fe021fc96825ef759bc3996ae3262931faf454d641fd2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2304 1696 iexplore.exe 31 PID 1696 wrote to memory of 2304 1696 iexplore.exe 31 PID 1696 wrote to memory of 2304 1696 iexplore.exe 31 PID 1696 wrote to memory of 2304 1696 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb8bd4e6e8f18eff8870afc687eb34de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c93bf05f946c1ad726c4641fbdf7b766
SHA158d440f79f06078a3c54d4dc09ab4dcc14cdbdf9
SHA256173e4ecb4dbaf3fced83df094a12ae1e246f28d18b0a3451d47725bd68574e20
SHA512e4cb6d9c1c4179ca9aece24b687cfe5962a92e51c74317f0609d914a6419d078894a3c6381c76d6b5105bb1ce419fada10976a53e36dd56bb4f5e59cee5e4f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58779e35cfd89ba0b113331a9c70e0ee7
SHA1bfb7c6751f779891d3dd86bd8298f7a609498e26
SHA256ebadff002fed2e1d1df0cea6577fd1af25174ccd70d545422bc59d5b83a22576
SHA5122371d7c7921bd4008f9ff241b188c0c71d0d52e36a45ecc1eb2de82d5b954ceccb70ce195b9b22448eefb7b4bd2e998be274aa9e2a43017444e39dd2175eb64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546efcb84a455a62bddc52fbec9f96e60
SHA19b1e8706b5654145b33ceea7ab7725bcb08b48c3
SHA2568cf06705144811c4df96c806eef74e9371b9d233301c8c6a08e2f5d39f0157c5
SHA512e65f1c5cb7697b4a39dc691183ce4b95a44802687dcc53715e91e38ebdc353ed138e4d254fba5fce27496d639e230473b1e97d4123c4bc56c078363d97d6865f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56118e6ea51dd2bc8f6e18a77e1fac7dd
SHA18c5f24bc074390cbda6400813d7dd6eb43f14ec6
SHA2565d430797ba7e2556ee0e87f451df94b9c07e04505f807fbca21b17205c49aebe
SHA5127c9d503d7751cc0f56c8bcadab5ca7ada9a4f18303e7dd1b4e619afdbe4f2acefd95034631fab425d37867b308fecb45120fac7fe43fd1652244f37f3886a1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c669bee1589f4943fca6ca7d4b4d9c
SHA1b21d7aa6540b9ff82344159f4a1ccb02bfd04947
SHA256cb33a03bae89d7329f4de67cd50403419be4e7461be0b06a63602f15b9b6fa52
SHA5128cccec916ba99294932cee2743a914158fe919c79f2171fa487c3bdf0ff25d0c4151669266063926b3b817e13d4c91a74dc2b7cdb06e7b40b210198c4b6f140e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530022273b25d8f96848c140585ce4223
SHA188d02b2b81bf43d59383f6c10d0b38a8da327ac6
SHA256965488bf5948263038a1a181036b3c31dcd65927a3344fb31922dea1140d54a5
SHA51281992c59e04093e8d67a29ab4ae0a13bc99c199dadc3ad5a86ca815a02b382d516dfd6647c06c22d40c2722fd79b27cf3e99b3e2a35905b1bc3aea7c8a117de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57079dbf144a5449d876426d0a55fed63
SHA1315223076dc2ff5efb9e5ba6c7b0926f3d0d7267
SHA256f2572f404cc057a0fffadc9859f54a4ffa7681f062a6de5e0dba1aabe7dfe68e
SHA5128b63ff907bb63a70415eadfe11a59392d3f42febc20b8652cb3cbd483ea2e4577eac45f6882a3b2a6a8b8b910bb482d3611ae95821054cf42958d0993dc9d8b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c134ec6d895857979a8fe02cc3e6aee8
SHA1779af744aa7a396ad7ef7fc7208594eaac755fde
SHA256055ee9a1bc3947ffea893e501c58c15e597bfea2a1eedd6b0e324fa734cb9ef9
SHA5127972d11b946966c1c149d2e18c5d25530d53271c6300aa8eed6ee7a9498fdd2db13f527b039e5a725903742f03f743132d0b9c37415fb7a5b15fd948dd0a6793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57214cf843cfdf8d121d98adc24f2a359
SHA1ea0179c04c7daf4ef7b3ba46b7b6d2607d53b036
SHA25688690c53ef31d6456505fe8caf8531685760cdb86c32cba04c75e86000de7cd0
SHA5120b01c1384ff2b95be7ebe6ce65424f058e9ce1cb15c8b78287a6ce2a4dd60a84e6ed54ba6a047e22285711e4a720a5f5e29139ae36147370fbf8d0c8ede4126a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50684e939fd8b2cb9c05547b9ca6072b5
SHA1026a4aa600eb5587f2a611241155a1798ae3180e
SHA25659836e4766b35fee7d76fc0a14e1267ee2f8ac2ac1b53b77e04f4036a4e80d29
SHA51270f3d08310373090f1aa22ddb3462c8fce89469a0b666cf668d803f306beb9e0ead3785d33906b66d98e4002ebea8158925beb715990c43567c4f3980e763860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c14b31ed21cba75bd27cd4fb1252de
SHA1ebfba94262656a14d1f100802d0bedcba78b994f
SHA25633bedf7d508f8ac9eee213cd617ee2708d22fd3d1c49e34b831cdc4be394417c
SHA51224703817a8933bd7a7b4da025cd6d8cbe75a26109302e41789d3ebfbaf4f0a0fceb0c5f1ab37b5ec186289d9276cc40b55b816a533fc53f7d103fe55daa561b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570072b29b23943f41fe53cebb670b279
SHA12d833fc9478a5316bcb7ab44fbdc712a4f0f02b3
SHA256ff5a2d543d559f333b74884d93cf29122c439db3161f50816fd653c4ed42d1b0
SHA512aa40ee311ba226290b01db8fbbfa789b11ca9cfbdbc294926adc21f3659d7240289296d0a2054fd2dfa4d44660ae530cfc514cf4d105324360c73ef49e77be4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57606fe34d723052a26d301d507c3588c
SHA1500bfebb46762850d61c215f6c19ed114bde10d2
SHA2560551608c8e1b873b974980ec4c5e3da5daa6eb9677d2ffdffbfb324735683255
SHA512bd48195f6957c128a0db14303a687b2ccffe1f89c1af6d578993b6b25c7917000a0063e551026ed743cabb951f09b62bd3dd90fed639acdbee6d6ca64c432ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546645b6eaf20a380b62b4fc2fab23b8a
SHA1c64c0e8610dd153d36cda4211bb0b886234fc199
SHA256a3c836ac06d8076b89aeee32a9bef44b547237ad11d039258c36ccd185d9a8f3
SHA51234ab27f2e4e8eaed6f75b4e86d76332b9a2b8748f7333cc48973fe146ad841bfcde919437e9ed98c6595d6f583e7219174cb2b5e886d05f9d6351de3076181c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3a708d89cb8fed6dcb28cf5611f0df
SHA1142143c5f14b1ca764dae8ef91be6ce964bd472a
SHA256ecde3f9a0cc2d88ea053bffb19cc55245ba887584775a0fe8e84e8db794e1cff
SHA512e9ff09a14265d80bb83ade563b36d7a66c9dccc1dcdf3b36e1c1bbe73456665bb4d06f0b49405146c8508c8c8900131cd276dbd2a9fd93ed9514a04660caa580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084df8cdd04fb407258f0ffb74c7c064
SHA189e8005ed560b31d5ea5085092d945690a73d954
SHA256360cc2a16f1bd976cc7d3e1a9f555ad035e2306cb8c15c4a5c9ece45cd4f51ce
SHA51225ebe82bdeb70a42cc9e9f127b744b584810a892aa60f7a30891fcb72810f0faa103785518420d5bc6d865c5c36a9d9c3fe96a12ba5df587bd93d3ada80f6234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e7e3ffa77792ffd62bc590fc8bd7738
SHA16d29d9ff13b36a4bad167a101362a268c155bba6
SHA256ebf42ee3b16a34edb17eadb07e8821893ab1e147ae7cbff016d551e2d40a80ec
SHA512621b618c031a249ed552c2f14b2ff095be7a417f7110f0c2b8f00e3973ec8c37e7733c94bfc7aceece071b0acf6498f4c752b24d1367696a70f84d86ad90af17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee13c16dc9d4910b4b7ffc397d2b16c
SHA1f30a1265e58ed2028b363345058762c6d720c423
SHA256aca66f477998a1a9ff86482619d2a2227bb4dca478b051339f875583190a7df3
SHA5127db6ac42a6cc90cf4bc988de1bb9aa2a3743d1d14ebc4788c0195e9d795abb5b492a322ddd9621055d46235795e1e8652fa767ce776a87ef50e4315d20cce9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958cf7088d6d25d3d5dcd8a46ef262c0
SHA17a57279de939e153e30731b880453a4a0b4db400
SHA2567e78bdb9aeaf34be23ce70025217557516c7ca75bf28bd3d8c2a3484736d1f30
SHA512e86142ed3cf857c20190c0e208614e22a0ad37f0a304c26a00d6233611678c81fad23a4f147dcfaf8cae8022261adf00139a154eee1e67f999ba412fec6e5e0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b