Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
fb90550743b0f7e32a969fd8b5db2adf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb90550743b0f7e32a969fd8b5db2adf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb90550743b0f7e32a969fd8b5db2adf_JaffaCakes118.html
-
Size
460KB
-
MD5
fb90550743b0f7e32a969fd8b5db2adf
-
SHA1
d8584a9ad7008dc42e40e85f16514af8cba27609
-
SHA256
f28d1b803799769d2b261b6d1821d29c61d681bb67511d244f3dbf733317be38
-
SHA512
0ee6b33588908bae090b5d193457731a3f4545cd9547ae4cead459afd9c23a2bf5c9ba2b1bd4dff8b89fcee40ed6730ef5651010a828d0f69a74d9a2f62a10ed
-
SSDEEP
6144:SDsMYod+X3oI+YdwsMYod+X3oI+YYsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X365d+X3o5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9386A3E1-7D57-11EF-9C49-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000006cda4c27328e3adf582c96be21e02c82e283f52e3997dbdc31734a41598cab14000000000e80000000020000200000008d7a3dea965175f8507779eaec0995b11d41aec148a3748e700757b1c9de664c90000000c7f01be5d6cc7ccd793d7a3d77d3485a3002728eebf5abc774e6caabfac206f68df10a5c67aa649610d0d0a09b7ef48591b7517358ddc7168c1e29c586473ca08257cf5110895c886b5f59f435bf833402ecb6bab848239a3ca6d8833622a93b46c2db6acf0dc993b1d96a783132c81f3cfdd267719a64f6318577fc691d418e53ef99ceb82fffd438f048b28b4e5473400000007d82db93efe69c19b0ee665e0408979fa4d753bffa9f87cf93ba32aa68b9e39e58643a2465d17d3676d21e0d84374594affb37ddd4e493bdc621ae51cf6ab566 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07c9b6d6411db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000000924352d0a054ba0479f9ac43525e264e5f1215234c7d48a14f72c270afa89000000000e800000000200002000000000504b358c8ea06e54c292c6e7777e19ab04bd7c0090ceefa5df4f4e4a5f2c7a200000008d65bc1b20d89f4018a01d77f5fb9c732ef7587740dee3c1e8e9cf184dc0dd9040000000bfc66d9386f2e4c36b018139f1a99687288d55acb6ebd6a8cff8b92e87fe733c5a07a0bac6a599eede247b426cb99ff7042d20f1cb3ea52fb10fc43d264fe4ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433661924" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1384 2584 iexplore.exe 30 PID 2584 wrote to memory of 1384 2584 iexplore.exe 30 PID 2584 wrote to memory of 1384 2584 iexplore.exe 30 PID 2584 wrote to memory of 1384 2584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb90550743b0f7e32a969fd8b5db2adf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c718dcd3791af11d0cc8a8207e115e72
SHA1f8cbf13ccf29a62320ea3a408ed49290e4e17820
SHA2562e6485c11abca41eb6029b4df3f7784eae3e5665be4eda3edd7d273d7c9e0467
SHA5120eddfd6f1b8938213cd4d620afd3e9bbc81b5989d48283c6a544e19b523c9ad594190ff4f38564ce3ddfbbf3d00e7b6906ac463a9bc9d5e3c81e82a17780f58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc875da42d6854c1e4c087b35b50435d
SHA1e804cccfb4e66050bc56ae9d9f78faf4f29a6c87
SHA2562748ec7686bea6744f70fc8457cf62846f74208dce1e85021299626625a97424
SHA512d5bc20744a8548d79dc5dc8b0d53acb1d8d06fb1ef90591ed7647ad49f423447e26b7a6dd85b1b63885d4c334f6e1b0953df37ba24fa07720738e5d0ba9684fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5374211cfc261fab7a427baedba469c
SHA1454779218bc231970d473d889b5aee94696cca96
SHA256b34a847da391a0a12015a821599ad533ae848461713dc77eca391722f2cd4ccb
SHA512a75c22a78c5e69604d61655f365c7e8d039a618ec764e59fa5406d400d72deb05e1588083c969b5f90888d365c808042c2f857bee91238b3cddf8bcb2ad362bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0fb9c2dbcbed51bd045d5d476cfd30d
SHA18f9545cbe286e3b67a947f005a90f52f36e4408b
SHA2561eede1c1d3ceae74cb7296a440267a7c6ad1466966dafd2f4176a03eb8db5d30
SHA512151c2c159fa23a85fc57fb304255320a8df1aabc8e690394b74ae3a384d83d90500d2e7e7111d41cbbb46c60f033900757534661d6984658098fc33f147afa9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53124529650e10c3732e6258d8da6367f
SHA16a7b152252428309fbda1cef38a39b2f3b9f473b
SHA25667421314582ceb28096ed6a5827d0d13f30aa08f50c64211df32be35f8a2d8cb
SHA512dc5932fd83068f063b8c41a7a5060f1a23f2daf576085dde86538b1afcea1c04e821cc6f36476b1cfb1a2aec2a2cda118683829ed585c7e6fb6e54f8d32483c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5297b4d237d7bd29ff0b58811f8e1f7
SHA111f4989753d63b43c3d841e0111345e31419a41f
SHA2566d22109d402d56d61f773676a35ec87bd40c65af18549c486e11ea5f094b7ee0
SHA5123faf683e132421c215aadf5253b35cc65acf590e3d1606a7d4e18b126ac3436cc8577c0003c38e9e59641d1d2f6f28a69d5afebea3d30cf402867752533d893a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa07edbd665f3e439dba2db5313add52
SHA10c46d796541588bee95fcb5e00f5b37dfd3dee42
SHA2564dbf74148a521a3c8af7078ab04410953c561453f29ffcf59656963f05c3e38a
SHA5126629d8681625e3010569ad1a66c61057874d667f6ecbfd06b4417c9ca39a01b5eebbc1a85f8f2d8e3c9314966cf4f8bea22f2ddff019ed9dea3b80e4c085642e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603c28d6e5463ed856edbeb7a75f98bd
SHA139f1981833cb84baf9333934a2aa6a3e01f59ed7
SHA2564e26f94b560d439f2c36d773ac22a8b56977a571ba2326347d257edb5258332a
SHA512f81263ace2f891b9feed4f5a0ed83829aec1f67ac1b5d006e41282c7127665a5c70bc03d0a8f46be196729c1a31a48333b79c73d2a2183ae763044ebaaab9e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1bf782f036320a71bae224acfbdeda
SHA1df8da8f4681384e196f05242199d845767e7d001
SHA256170dc4f8c5548c528d6899650abaad0865bd3f40943efe1bc506dc78ff44040c
SHA512f85d7595a0865b19d5d926b1b0ae2a789bafb0f628ec5b99b848917aeb6fd9a40b52c552d011a790e9e4c1d273bf79513a8e5a71cdd80dc54bdb5bc4d75a55e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6e131af3346b149a8acaa1927282c8
SHA116aaaf78544074e0e0ac794d6982e704755425cb
SHA256c309f79bba410c706cfd151b72987e39a01d89450882529b7cc46d6aa20e0759
SHA512b15fb894bed963a8490e4308a5beab77c53e47ba0f47aea2bc854202e5699e8d98e3e69984dd8c6d87ab0683d9231caedbbd37209fd6e826ec89c9d9c099d394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e6be3425e57838bf519a856caf3ad1
SHA15fefe58420ed1686e653db0339b4c7415ce272dc
SHA256e32374e98efa14deade15bad3277e765517fc1ad11fc91c01bcb6b8bce645bdd
SHA5121d1f2a6ee18b95ee02f1ea8605fced070b192227ea2e5dc1d0c00b396c1d493d702a73c347f5047209b19a31dec2b1efa35d6130a64c14ba774213307ef8bd06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d960eb0fe94f35b25daa280424ecedfd
SHA1a2f68c71efc57604fbdbb2399b4748c454748924
SHA25605c368859080ecfec41e8e8409ab50ce0d37651f0ffc6c876867268d8082c655
SHA512aeb7824eef710b6b99d8c058e25c7c31caf4f94dc344fb596289aec64ab5e34d06d585ddda758895f727ab05c1df8831df3ccabfc0c1378dd54df15d4b6e8c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc4a66baf95edf232ab226a4b783957
SHA177004bfa270f251e1907df3b61c002b3fed5b6f0
SHA2561a1b40eaa4b7a07f5086dc20328f8992f71a969fa23152a7ea6155530c6952c5
SHA512410f0e58342b21e2cff854264d196facf66841f231492f720cbe0d96b9427b904e3071db61d9ddd73c9069d65cd3eee856665b49bfb5af8198116e1fae1aa4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abefdf4f163a2aa1cd6d9882749ed0b5
SHA1adde86757226cfbfd6dcefbffb25c71fb69a196f
SHA25613829becab0394c3c6c457b79d22d8e4325fa3a1c6314db7a304ddac4da7fc0f
SHA512cd990b84bdda5246bdf800f8f0663adf88b353e65c69badf6b0a5be1953accb937ba7b288367d362d9c2ab5c739536467a0f9cfb5ca9a35fa79b8a0688631676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af9c6ebd5fe9048202014cfa96e1ee6
SHA101dc5311101303b2b9432bf5c95ce730a9ab83f2
SHA256adbabf6b61ae57ecde1cee006eff6859e1c1e8566d46043c9892193b75284589
SHA512482f1cc402a62c39b3fd5c9cbbdeff0f5c7069b9e679ac5556e76140329b730ee5b2327779e8c8ce410ddf28599a98d5ee14c9fa0ebee01709377bb59ebf14b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc3087eedbb071a1f5cf12876986f29
SHA16c091bf4b735e80eb483534d3b322de9c0ae4d44
SHA256d1c9eccdfe886816d27844b4a155b864616d84dd5d2450334202fc215b2c4953
SHA51265492bca41ae01d97ac7c40879f9f56fe21dcf03c3691f490136611a163d0d375f6bd16b838a15b6961664d75d289ccfc8f3a97e63c92fb52a19d91639694773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52b21bf9ac6f18f6e1f35ed03bcb504
SHA1de962fae489da08b21d098d3980068f96b77ba55
SHA2567daff77d5a389c9f1a388af8a020db377152a7bdf1b475ef9bf45ed48ca4a096
SHA512b7f84763ec73b300781138f47cb8b258a266a8a4398b91d5f137e01284863daca7d6c8e47f37fe070f283a795623c85bba6526b9112807f37aa987367c7ef50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f9ce3583a3ce3f8f9501985dd62fc2
SHA176524b24d4ff304c0264471b946f523493d38c7e
SHA256c7e4e4bfc9c8281dfbd408dde9c751a831a0cb08a2c924ce93022d7d2b3a594b
SHA512b93a7ed1e389d75178ee950373f22e1443c4591c1ec9160f255bda4a7da6d704764256b67c35ef7fd7d8c12cf33f0ef11195654b8d01b7b6eaef414bb26473b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b