Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
fbafabd168c5b7a954ab77729625c7d8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbafabd168c5b7a954ab77729625c7d8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbafabd168c5b7a954ab77729625c7d8_JaffaCakes118.html
-
Size
71KB
-
MD5
fbafabd168c5b7a954ab77729625c7d8
-
SHA1
b9b0d13bffd5d92b9253ddac5bfdf2fe17acde92
-
SHA256
81023e87075bc6ae3ad6e37ce6b9e34229892cbc2fcfd6a7ab1417bbaaa8218c
-
SHA512
c7238771ff9ed011bdfde6af52e21651452a63d7c8947c78551315cdb880111ba35b0cefd35e0a76b38c89d19484e19988876a077e087440126109665a6e9f5c
-
SSDEEP
768:f6A3VR+u/Bvi4A9grsnu0kcGOQR0QiGbQgtwZSftFjq8L:f6A3VRzvi4A95kJdid4Fjq8L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000a19bcceb6243986d8cc8e9e0a51a95996d50fb1bb8ea342f2b2c502d1818ec1d000000000e80000000020000200000001de38a4c20a31fcb4904b22d8f8b8de1066929d36b4b79fa8ba1424ce0a85326200000004f394a493fa9123ad69d11edd0dd0c70b54555154c862841deacb2a602665e07400000001b6a85c5776c47aa280ee01505edbe8ceea7eb408179f0ed65d92a22b235b0a3f8b52a240e365147ea4ee3cb32ca64c092b20c9fbdc98f966d561dbac017a93a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433666486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32B74FA1-7D62-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b6cc196f11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 840 1928 iexplore.exe 30 PID 1928 wrote to memory of 840 1928 iexplore.exe 30 PID 1928 wrote to memory of 840 1928 iexplore.exe 30 PID 1928 wrote to memory of 840 1928 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbafabd168c5b7a954ab77729625c7d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c84a876df966381c6262f5c7a87ad43
SHA14606d9719ca2cf48baac467e74a65c85469996f0
SHA2567b63f4699360285e46a39c190e5f944e29a681df2d88465db98c9de7c4d866da
SHA512ac5f08cc1601583f47089152a5b69432f9b5708973e1b1aeedc79126496589307569e047280063484cdda3e3bfd1e8178bc38cd4aa079faeaf03320a731c0b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d270ad6dcc0be72131327ed7e3f058fc
SHA1b8347fc59562cd201ba3e3ed7a2ece3b7c0852db
SHA256e7380d7c9654e7804d6b9b838ec2fd8a29ee6d72b8f8f1e5f9cdb12d70755ec9
SHA51299844f6eb4ec7dbbd0871e2f1c42749572f049562770390ab1834b2c554fe30cf815213251c57c3f5d261c9225ae58741b6d9c5bab4517dbfb5114e00250e331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c9572e12b361c4901f5018beea05d0
SHA1661c452ef653af85bdb013e2f7041e6beea2f662
SHA2569447e7ac6ade922170e0e40fe5f12ef6fc2bbf5d4e0f492037d25a6eec5e7445
SHA5125992f7a069601c6e27c1800ca30947dff064669a32e569533a6177e500a1003410572aa3d33936dc32be7f2346e2b3456df47dda09a4ad17748b10a372562d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c54e4f4855e3e1af72ff0749f5e7f8e
SHA15702b734cf37b140ee02b5933b98632796486c87
SHA25664cd43c06456822727db630371d0ac51530849976d2e28c8173a44cb9c716fde
SHA512fd1833c8168d30346e51422bbbba78cb9309511bd21789b849a471d9156ac0f27ae87e3424c181c9e63f77f41abdf1589dceae8590c40130a9a49a6a1219962d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5673fa3ca9f41d01a2e61ab98b4222c5e
SHA1901a4a4dcca5675f8015181c9d90490784b51925
SHA2568a4ff107904fa828c91eaeb4c9043da7f7dddfc962c9c23aa258c84a1210393c
SHA512ad1e56c701af7adb972b11e725cf0ef390fa62b803e863e0d7306a965bf675e8b4467c37efd404efbd44016a63c58e32f938bc773029c8603ac795b02a76ee60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543828f63aba555bb9cccaf467e662cb2
SHA12c9d8fa7210db2eb01c13b4452e5cab0de1ae17d
SHA2560ee1cd5482ba5aa810d406d94886212225fa57fa36403fa1678ba8c897079ef0
SHA51210b5af6e434f0cfc75b6da50a8f4bd346c7357e0bdcd289b5372413e4cb452a5235b60416ccd13214a5ce2f7f3f230e176001515261946d580121307190dd1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526869983fc35ec88cbd2d7bcb2a6e878
SHA11610258948a15c849216c87badb32ec564b830d5
SHA2568165ad26433e550f27bc7e1b78d45a2be471f9e9a3ec5f356b900edb7fe763d4
SHA512ece776d4f75af5fe7a2757bcb70307b643d12072a7d1ec88253ab71a9f5a08e62d83f522a351a5d9e94fd592e353f2e3590cf356c35071bd9b6fa7fe8f189bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca2d819dfae3a5422430adbf9eacb4d
SHA12d8ad790709fda0125f3b949ed852788508c4423
SHA25669f7d2b2ee73476a3a6db6aa7486edb25d1b9e796e22afb5dbc036cc3654dc73
SHA512a515f63ed85ca27c05d9a0c5a6584bf7f41a8ba6f1465f47b15874e1d50f560230a72ce9f9f253f640c7613a1a0afd8c5cf0c09e3de48a1395aa6431d5180bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569096e62c043d43b875a6c92316de4a0
SHA1f0f97131de671e40639f554a377c429b03c91e59
SHA256ebd8867c721d35bb6c9c351e6e3c3b0c89f714c1cc3599caf2b67f2c23180b7c
SHA5129a1799ce183356fb4586997e38450f3c5510678f9f3da3181d808952485105c2449b256160d9273afb438dd0eaeb76c8b6ba615c9287cb12cc49968d0f3120b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e063b91d174c4c2705aa7d3ee3672e
SHA10db14f3da2b81c56cf1646c7e1acb0fac96397d8
SHA256406068d0eeff6443bd96e8b8837843a3ff91f90e2f66f2b3e0468e82e6fde3ea
SHA512af2eaa9b7041f4c06aa4a9df58831c31518aedfaefbc2786425d664f23085cbbfc09094c051f3b16257317108356229416b215371d34eb6ab9c282d08763bd95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547edcc5ad36fd4ac26a34cf02a1fd478
SHA10201cf49565ef9db426b41415a239e89a9f98802
SHA256f34dabad32ee3ef8eec881a669d8f308a6f36b17198a99c5922a748e9ef6eb32
SHA51294be702068d6aef6934dc4d991ef4299d927a15a6d88038f4198d98dfc98e22b36ff55b1e07a4a9574ae124f033b72215a1fcea29e82d1572378eef42c41ed54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8f1c44578fba94064b3fb998b9d3b8
SHA13250a2989443ba4eeb1afbea85b0b89b6de209f1
SHA256045de910770be96f33dbac540f4a4ffa0ac7ba340aa53732ecc694695251d536
SHA51285a0a15086ec4b4a00654ee5d239cfcaba23bf1c40939a8800e37f302b25e7031eb42a5fc2023607e4a2882bde068f3e102b43a63d8c06c7ce1ab3fb3976547a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3d5d6dbb73d8ce6d9c2b6fc0fa9950
SHA10e8b62446d7abc6582469e3ed02718a4478b1a10
SHA256c470eb130d760b668d0e21e1db6151951c66b2ecb2e5e62b5cdef3b088139ec6
SHA5123fe3ca8bd0e03ec7a4867802dfd1d0b0aab0c72b3474d81ec39c32a446bea4ef55eb9ca99da608094d081f199d39d5d9ff3832af5f0a328c764a7f31ba865c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe0741ff48c07fcefd44a37136fdd4b
SHA1c910797a14eb683b57bdec5177829c2b5f2fd0c4
SHA256a158f06bd9a948f1476036b8b28dac3249626cee9bbbb1bb593134455a98a287
SHA5121c80311a279a844bbc670fabb5e3d5c91ee6f0e4ebb4d8c7dc02da45c4776c0e230bca872c88f05ce242cc860bfc16567ba577963c0c0ac592ae99467f21e2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525588d7032682c773c9a5f10a450696d
SHA150790cbda152343d52d8ebf6ca473b01922891c6
SHA256d5231e5fb83ed17c6b913b1a946d25ec5d1c217f394c6b2b310efe55ac1afd6d
SHA51270293e19cade3694595ee7755165a4f50c294e313c43c6d0c4aeda8b0c127e595b52a3efb5a0dd09b8fba4c4a5316cfceb571568e193ebc743a0ded2637dce8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78f2ec04f1eda4cc951dd7e3fa5af56
SHA1b3bea78f44ed3463da7bec5cbd0da5c52181a11a
SHA256b33ca64969614027e64c7f9ad64a75d564e8e320684c267345e6bdaa6547a248
SHA512cb871201cbeb7e08d3291b89c0b0859a8d936e77af07e08976ea3822eedb879aa6ea905b89cae4947d45d6af572a8bfbca9d2432ea4bc3abb07c3cafbaba239b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a6bac2fe9a3512ebf810bb13a8fc95
SHA1ea2b3e6d95c6520b11cddedd1e67e5e365e88db3
SHA2561ddd0c0875e870d9967ff354f870d6f0ecac7538581426bd90790215daccb70a
SHA5123a9dc86b100913ce0ff01780d3e3e7c345d16cf53781f185e14d5103e865bffb7208fbf7058baffe152d9330f8d24f87f0e058cd006873163b3e2cdceaa1e87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ef16cc47256e3e9b5147ed857846e4
SHA17b48d1532b28f89575ee7ac55ff5ab519281e07a
SHA256e90bf64a904dfa2e84aff659f7ee403b648b7f9a2d318c05c8da31ed3129e76b
SHA5123f6259a889cee54ccea7d54074a7df08811def589aebf1364a440f6793a70481822cebabfa6875306dcadc76cce8261f82fb0f198c0b7a8815e778e73d30bd7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d8d673affb2a161de59fcf992cb2422
SHA1363bdcd6d1f6445cbc98e4379f2059a1ddf09a4c
SHA25618345abfe31692ae21021c96088da77afa6d904bc5122695ad09a939472efcd9
SHA51274c03592bb579b5dbde6148f53910c64302983db0e17080addeec83191301cdfb27e9458b8d1f6873b12426572ac4bf6adbba66bc2ea9711234f3c106accb604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9bd5176252ddf41a960643a4d07d425
SHA1efda3d86c886b3b8329cbc5a214046caf4c29ca1
SHA25614f1ae0cfb2bdde4f3e8bccfa5b7189d26fbadd4616f877678ae004770f14811
SHA512acf76967783a21ac30e10dd9e26090d8a1762fa6ccafb46b22a9febfc13638fa4f7a38777d6fbeafd37fa99c4cd6a9a367903c5e3bd3c50c76e4e8bbaa6a640f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b