Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
fbc713c4d335f14db7deec246189b08f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fbc713c4d335f14db7deec246189b08f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbc713c4d335f14db7deec246189b08f_JaffaCakes118.html
-
Size
15KB
-
MD5
fbc713c4d335f14db7deec246189b08f
-
SHA1
8b5da3ee08f048a511fdbd56bd7441fe6174b882
-
SHA256
9f658a284f13352cbd7a2fd1e0df76415c86f1cc8a74b1a70fb432a54ca788f4
-
SHA512
7a5789078d5c742f86b043ddf0a802358024413c8f6f5ef3f9f67ed8aa847256c2eac07beb6e165f73e41e2d5dc2767bfaf64c2d7686001ae31955389a6d9543
-
SSDEEP
384:SkKOlSTzb+bxlsHu5OsG4Yw2D21enkiSsh56tan:SkxMr+DMuQgQ21gmnsn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6EE53A1-7D69-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433669768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000224838fa4a1276fe0ead7a38464cb1fe282ca1890eee129bc6fe6cbf56f8d625000000000e80000000020000200000009dc77d4cebbd7dae570fd3404cd19131d497279f7d86fca2fc019898e0c3bf2920000000e328e40a1d04152da4e339772f8e7f11cb8cf9a79d4f63a98a0d8464298f2cf14000000062562a9fb2fec2bb3de446bb692654408241adab5912ed22e6bdfd13ec6a2b59190a378e543d0f5322e17f8c40c9edaf9fa5cc3980c3a35d746a775c584aebb4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 706369ea7611db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2760 3012 iexplore.exe 31 PID 3012 wrote to memory of 2760 3012 iexplore.exe 31 PID 3012 wrote to memory of 2760 3012 iexplore.exe 31 PID 3012 wrote to memory of 2760 3012 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbc713c4d335f14db7deec246189b08f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f97f7d8f9a6367fadf05db1ff36c75
SHA1a592b0e6159c6b62004b907f71541a226c2fb0c8
SHA256da09f097b55382a61a33182dd674931c127e68ff19864667ca10c270ee81b935
SHA512df15fa2b7536cd722b42caa60bbe716bff8f6720688dd10b1dee6504c77d0f48cb3bf0963c7d2d7a103152497a044ee05f361a79554c430e7ec3e8be396f641d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b2b0663c7fc0ffa60edcc898ddacf4
SHA1f237c859454990cb4784132e23b6f417bb111e90
SHA2567439e14cd1d8e94d47f032c3d8a45bf7b09460b17e877cdb666ba3d557fef14b
SHA5126d1e08265f74afb3e1c2b5505f959280291d8c3453190cca2aeb745e7d4da589e42934ffe417721f6ebd2f9aba0eb5323e01987e6b12415b62b66aa593d34991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a729e72b98cccd85ca05a3f9b19e59
SHA12be1053a2ee0715f1c94dd9963c919c4b87414cb
SHA256cc1b058a23fe2de84e770d6c1937ef8222d4deb3ff4950d0de7ae8dbb6fcc322
SHA512b6c150827636f2668ef42b3e8416c5801f64795ef5efb7067b27bc52b587ff9987f5b714839dc6e8fdbf900487606555532af9c5d833bf11d7f406b0b3401286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ed6cea28cd66bfe6c004df9bbe8a33
SHA17762d06025471d749082c1e3a796d9d7e0b0c206
SHA256ea09bf45b0151d773057e82855822e8fcc6a9e1d046ccfe2454149d8d4450c6c
SHA512c517ed5c09311cdb92a50e7b52058d616c4e9008cc7a6cb3579bfdb1b349f2c655208f55482227648e1f806261f5a4431cfe1a7d1fe00910a1c216edfc426d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550274e793873c7f421cfe45165d68087
SHA1a175a110573ef5584bc2accb73fad690bbe20c84
SHA2567ddbeb62dec6186e4f60d474d618eee3460896c381885dc43368482511b74c04
SHA5123bdb2e461b4d40aa89fc3797e93cf5596d7552ed3e007058da2aab1c4162c233676dafc88626fe3878ce38f1446bccfe50390c102092ea4e5dce6de7258e8319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8b5d994f7a846d94e32547a0df56e4
SHA182cddcd23a702a63c2c5206e3bddbac800a8f2a9
SHA25644e282c990275f7bebdaade15cc899e9bf123753d10c16f22b31b57b9e491e66
SHA512933fbb9ffb658ecead1eb16d95b63939ecc3b6d67e50919a88840f0e9f95b835210f8f5ea4f70bbd72f7f59b6ef1d31dced8437a56bcab6091f418cda00bb76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33f7515b8febbd263bed8ea0c5235d1
SHA1fc76250821e2a908ab483649d294fc204d57179a
SHA256cc0918bb0b11344ba97bda6e00d3f4823ab60c291ef2eb12c6582d20b4bf761b
SHA512c1904cdb85bfef0ec1c3a541e6c28f383d9da80ddf9a1552a83662b492455f96709d3d12002d7ef6a6122543dac7e1cb29916786e17741cecc6f80404f62cccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb674a8ca528c90a39eeed058a995d1
SHA10f9e82dccb1bc5cc0b5dc7da26848c64984bbd7e
SHA2561945473739a98b38bda21ef6b22043b3a95871832d06d7997bcc7e952edc7dd2
SHA512fb012a5719cc5def6498b0b0edda1c42740c2019898f42bd5b4556a7eca5eb69efc8a109e2825b8f658878cc2da96c7c9e12100dc6d4419e10f4b03b479eec3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ebdc225c5bd5387bca286ff541b839a
SHA11c93229e37f19e4e3ecf43d88d625b760867b94f
SHA25689727ca46573b2fb98cf004e54d411cc687a764ea4e8d8187facc011bcb02ea6
SHA5122bda5a576dae2098d4fd327e86e36150596531c280fd83507ac9829f2e0eec056efa96fa46b525567364333c9ffc6357ce2aeb64ee3071ef2c3b97ce5c6e4c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aec6efaf44087832bf0ea4a14a12163
SHA185ea32ea120127a55eafd87d9c611f5fe4e46d0c
SHA256f75e54896d1e3516be050f0dc10441c6a530299bd60df42b471c08af42c14d31
SHA51283e4a8ab13c7ffd00b64e261d84b9adfbb0837dd5c12cb08fc9f6e4763a1413b4d9afdd118848530c04e41880abd937325b2d6ce48c7597a94aa7a769be26eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833cbdfbbcb02b70bbc744bbde487bd2
SHA1906a161cf68dfebe984fbf7d55f159661533e82e
SHA256064c6659b7e0245cea54176ebd68bf1a4a337db04f02153ee732a2031229524e
SHA51240a82068a17114ffa75dfc8497ade3a817f049e2795864c3cdf9978e97b40feebe2e6e246ef9138e730bbc836daa0eefe650e8b5f87380acedc52a6d7b712b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b0a0c316334bbb315d69d5b32e3cae3
SHA10e58dc52d9c7c1f91a490c1424d8b804574384ba
SHA25669ab93dd1cae9cbd1ae2384c081ff4d8fc2dcb501ab733bc3d2209a8b6a7beae
SHA512104ef34527c06943ad1e56f62ff170d82cd8fc656c7d717b84753f745d00f4a752de3cadd71c7bf691914f5d0121f6fba1b09ec7027cb346d05261e2266bcfb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644784814bfcafda8a648444ff7b85d5
SHA1f8754df7682e0f2ef0d0a29754656330a2f44cd3
SHA25698e80d2006cab936d628690b8739c84e8fcba82c7fa28a00487567fa8d9f4a84
SHA512a0bd08c0036e3b0f41857379def60370117f294198e06e21f30cdf6ecaadac739daf1f918310910c3c1544893afff05f578c9d3cda8365ee8886b0d3f8fc5d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55932d9df8e0ffe5242f06efcbf5ffccc
SHA1c1b5580827fd95181c03249d0ee5733177fb4016
SHA256e63b094c5dc6da4eaa5d670c7fe97db4430c4c8b61ea5ecc3722ab885261d7a4
SHA512625eac74f51ef5ff18248e707198e1e23ee76e9806a132278a3527eb6732a803c143a6a084fca19ff0b74c4f943a623ddc423be8b9ad92108c7044c89fde04a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dcff13acf30d09ee2733b8fcd0899fd
SHA1eb812e44d53e5045dbf346a9958945d140c85df4
SHA2560a16aa898d55811bd71439a46418576f223cbd4ab3e57ee60f740f5c1d83fc51
SHA51205012cd51ff5b8b1de50b52a37d010344a9902306cf307666aea3e51840f8564283e96d92cfe74068425d7f8b5ad6441af45e0d510799e7304ac4df4d55e5f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa8c3d437f2ab8dff029306a8a2d30c
SHA13b97e59b45b63c1094b81588752ed8c427c187e0
SHA256266c8cecb53fa8629ebbad771182306d6efd29bd0780ec2c57a405a3b65dd732
SHA5127f7d3a83d6b89a99d788802c551a8882c68eb4a7b9061b9c51baa54620cc74047a517c1acfdd36c84884cb078c90542919258daa6c56108dd4e1db81cd98b232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566dc04aeef680eea409a8b13fed6bc5f
SHA117723f0ef8464b03a8e316b4d10e93c294e28909
SHA2567ce3c0a01855b7ccf236435d2978d52955eb53534b9154b72ccd21a2050ab790
SHA5125c6e3004e338a5a7a152f41f87e1250b3df92dd0c091bd578405b6a865bb33fd0928fd3c44dfd66940e6a594ace0b0b3ac50a2351c878828c36ca265cbd2c637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7f397afad35c0c985aaecd97ac781e
SHA1cff1a0f2f19d99eea31ee174f9aed3b886722c4b
SHA25657e3de1797827dc093125e9a71f772b6fa5023fb7e3b1db3b301fe6f2977893a
SHA512b2960a67affbb725b708449c19171288ef49594587f80aaaaf9e510db0e0033f728fbd767b8170415510c6ca13aacd70f3357896503f2f00d527955c51031451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c3cb9c5f6cf58a4ffabca15e2b8043
SHA184d4f00cb4d9a488aea0464e48d619ad6233aebe
SHA2565451e9ae3c7cdd439ab153488af3e20e1e3e72601bebc64372fc37a5b74f012c
SHA51267470890386da430def0d3124be04000ee4ec2e00bb3dcb23b5d1959349066b45569f9bce15553413995237f9a2efa08bbcad32775b7c5f8f09cce7696ab3e19
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b