Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
fbda6509fae297933f1656eea1309538_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbda6509fae297933f1656eea1309538_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbda6509fae297933f1656eea1309538_JaffaCakes118.html
-
Size
26KB
-
MD5
fbda6509fae297933f1656eea1309538
-
SHA1
9528c73f4b9f5bb9c6059dbc2ae26901a25df7f1
-
SHA256
c0df32de6f476343f5e5d0de7a4c768ecdd8a32efdc1e2f376b7abad66f3368e
-
SHA512
06a65e175aed028122ad2b6016359314fefaa8c39bb4ac70d9bb316f8bbff90acb23d8db94c1779256fab8b7a7118068d6ea1923c6f6042f042fdd3a0c2d2320
-
SSDEEP
768:0H5LNXfnX/7N/PN02ME9yleW5G2sEBbUz/3kAJVh6vSPvNO:0H3fnX/7N/l0BEoZ5G2sEBbUz/3kAJVk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F297D01-7D70-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0aac8067d11db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433672494" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000001f895785e18e398f28a277812858f6fe8ea939b176dff70040fe5a3b50a61af3000000000e8000000002000020000000db036f9a268b3aac22b329527da2f4753565bfad22583044dd29749835931c5920000000b0dcff123ac4fa91fea626ee2ea590440963ef51f1676ab0c2b437cbc6a0034740000000b2bfd5934aad1fcfef986233415f4c6cec28123fd3c419d8590f49011ebcd559cf5d8b748421a0c4eb00a37f6d32befd97cdf96bd0df7ba7e4ccb598d28d698a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2668 2252 iexplore.exe 30 PID 2252 wrote to memory of 2668 2252 iexplore.exe 30 PID 2252 wrote to memory of 2668 2252 iexplore.exe 30 PID 2252 wrote to memory of 2668 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbda6509fae297933f1656eea1309538_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221c46f3b161e6a4453a73d699224e71
SHA193248e9b3a042bd370c30b773fbda84c1a95d37f
SHA256dadc6d6506e442a68bcc7bbbc651b24bdc4ef5a51812a4676e3cdab3207dc5e4
SHA51215d28ff01dce158998ca9f86ec49a4230e7e779b0526649a94da26e6696da0b73b1e88a68c03476c7fec96498bce7fd81b887c2823d62925c8173b1809bf5722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2d3c9212dd6de1e479557ed98b3b1c
SHA196518a8c538b37aa2e81684f5e4ddb892bd70f3a
SHA2568ce239cf5a9fcd92a282237b5d47eedbce0f89abe43b77c611beb4252b3dcf6d
SHA512164116cb7ac880f375c4adb25b85b46c23255749147b648c2427c8b0cdbf3ab73902a8cf2b8d5ada2ff494281b6d1555ae548ca7772cdde6be7f3303c7294012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fab81117b2968ee8692e9128ceef9e
SHA19bb2a96cc028b3689d65d6adb482fff43b759af3
SHA2568d133dea6e6c3037c98f914557c2d606d8807ae792c849c50a91ba0bb8a3b99a
SHA5123ee9d4382b360493146b96698feb989d508aade08bd56624384b7e6862de19c88889fd80d331ac96e9a93aeacfec761ef78641fa2a37a5a2875a2c088549f7c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec361fbc32b8717b3c96cc981be411d
SHA1f4284bedcb1f8fb7b9f8c997a3d433fde25f5903
SHA256023c5441ea7a2ed2384903a692f80a486287d98303a685ab7614c897f18ca9fb
SHA512bd3ef018b9c3ad8925310b7524364c444f96a1757852f3d362a0e05fec938f8d04b065ed0b2bec6dcf1e6626af70ac1842df5b09e05a1fa5cbca8891902d8de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c591d068f8d8a70edfb31720ce09c190
SHA1b1e463144e739a5c37e14d59b0ba56cbb06eb58b
SHA256bceaa4136db0fd819d140c2e67e00b4f2535ec7d5ae721ee719cc45b14e17f7f
SHA512fcd771a7ce9cbfdf3a52b82e53b863068332c367b2d93ab2cb0fa30a0bc7cdcd3b56dc768676ebfe270ebe63332b39128216ca14146e936708197fb9178b0898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df8bef7b49fcea502495fa932d8c693
SHA1d5e2ae92349fb98afbdf7da7515852e69c7ea666
SHA256b14eea8da4a87074ee99ab032845e89eda9dbbb5b0d9c69a431eeb4181c16803
SHA51231ab5e417510dbccb5fdfa0ffa29ebad39a9ed80a54360bbadbf84a8d2dd992a22680ce6547a008e1c83fc76e70742740462f1e39272621a47703eaf1835b9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a11bf40caf9e754dd3742c27fc4d3764
SHA1699541ee421b2c1c70c1a71893baae9a5aca494a
SHA2563ee4aa3501b76faa984505cf2ca07b6e58c630a6c3c2148a5e34a3b2b69e240f
SHA51261cdd71d08eff24a5b0424ce3a14cd8f48a3b451ad81bb428fbde19b332cf3883763b9db1e5549a22298f23aeec242c83b87c3025f21f588a1cce93690d199e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09e8dc663773cb8fea0982c797ebe1a
SHA11a7f7a933a87732b09e04770313db8d60686041c
SHA256ebd283921831a0ca701d25e3bbea912c521f3240cd769c90f278319d88971d46
SHA5128b1aeea6f0fadab44534e41bf55c38030d8b0d60284b0f94fd67c77ebd70271564b58fb1ab5c159db2704e0854bbe9d10fad98d38d483037bfe77bfc3ee478f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5ed3e8a0cdf06618db03f813ad215d
SHA16a95ad9e428cac5a53c6f8f205fbd10d8a9968c0
SHA25665d47433eec0098f05fc03ac71fee0e0bd2e57fb1d37c34b6ffa88a4def52a1d
SHA512275688514e2a620c9f1593aa2c4f6ad4cbb710ef3c25ba50499f2be53b95cbb214b9d1d572dc18959a34d5ce5993b31a485b1a6a6a9a46a576b769ce71ffebbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5a24558572b2cd09200421e89478b78
SHA10a4296c35a2d48f236bb49939e91d8942fc59cb1
SHA25624e6920976b3840bd12f15d4f3d9b2b83cf3396fbcb2675fdc32b02f7f7db295
SHA51275e5035abcdbe2bddbc6d5ee6b8525a1869db4823f5c743c1e607078c2435a489b07d46a6370733359b996cbde089d580c6a26526dcb066298d1fe883fab40c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843a09c572bb0f103d3b7e7bec6a6723
SHA160f1982b9a53369ce822d97d636858edfdcd1608
SHA256ec62b574ce1e13f43b0a29ea6bedbca7b49612bfbd2790f6b966fbb7c2be28f9
SHA5121cd9206bf44b41cccd6ddb25b387f0b618d34748023f778a07a96fb7e07f9a71965f39a482dc36d8ffe1e745d1990af98b14275925de44639eb01d797bf446df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a5da121b8e1f2cfde2cc760412a21d
SHA15d425dc2d44ee499c00037c28b437e7237053abc
SHA2568cf051b99f183e3463d11959cdb71d6198e3f7ace9c2c0ad1b107242201ec3a8
SHA512020775f2d98c3b179fc894fcc7231bda00c74022e7acdd684a33097feeb7e3f79443e45b173563ddcaabc69c00d964d586148426afa63198f26b1ccdcfbea3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783ec07ffc5ae2bd9926a956d98aa9c8
SHA199269aedd9676c68f19cd1fb861ea77d3b6f67b3
SHA25671cbee7b471f33ff39e141a2321f39eec7f8a1196b9c2f84ce1b50810269fbb4
SHA5127f7681f066af2776b4d7c1d2d202c3da38f4360bf1611606adae62fb1b33c7bc11f5259cd88a0aa9837248b1cb4297b4d6ff4e11e3ae1f3314155875c48cc641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55174a821fe807f33b3dea06348d9d9a5
SHA1ea162f119fead4f2b97c7d405710dfa24c7c5cdb
SHA256cf64e55fc088e7c3bf2002092445c00c31fc2929483edf78c29c9167f4442e70
SHA51280267c3d6d4039495fb667d150d70eaa26db183201da6c6f147d84a59d35e8ca486117e3686d2c07c76939b731c9439627b52c30d5abeac8115c3fc9f22fe206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b96e6fb52eeef3b34af4fa814e3ba49
SHA15388ccd2dc9ca7b16da4b95bd5f7ac8039430086
SHA256526ae6abe1fe9058cbcff1e2894c3682dd35f0baba44a8e70be3926ecaa5df68
SHA5124971c3f303934b7957a0770eb318672595388cf4700b1bdf13f9159234ad909a8f705be152852b2b8a53c47f42b2f4082931cbae5c78fdece0b1dcd05d2e79d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f7b69461772789910fd01cecff60c9
SHA13461394656d7b113d408d6d27b6ec835e92bc161
SHA2568ee32018ab34d8f39fea73be04eec06f68b4e5abea3fa9b979db8880702d2a55
SHA512b00e2667284f813a5c4b0ac88535e230d13beee3a1f414d9209d68e9fafd5c0153f3def0fa242f4e1ef5aed097bef8767220ccbb419ca3b990f05a914bec5862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b729edee430cb0d8434c0d012b88fedd
SHA156d07607d1a571c03d089a05be1c5ed2108fcbf3
SHA2566fe3daed66fa88ba3af42b1d84fcea11b973b1554716ea63198d4cb67833528b
SHA512f8aebeeb25ca965f7eeb3df1d527d2458f18e3317ff995def4b4f114326cacc987b35461edc04f1706ce51fcef5eb404e9b82b548b1da4a961a72d0e35586f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d5d19e5338c66f6506b9b67c7c7db9
SHA1a1358cf1f029a65ea7eb6c6b4b0591a69c66e25b
SHA2560169612cbf3efae83599e058065486d9984002a63df96f5df8798cb139494fe7
SHA5124f689cf147c7868c551c1d4048691867258e09da00839945f518100d7240cec25ea36c4bb38e2a0827bf897899eb3cac0048c44099e24253c65ef88ba7ebf8a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b