Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
fbf65961c48fbe8ef66248312e0ed33e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbf65961c48fbe8ef66248312e0ed33e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbf65961c48fbe8ef66248312e0ed33e_JaffaCakes118.html
-
Size
7KB
-
MD5
fbf65961c48fbe8ef66248312e0ed33e
-
SHA1
82234af2e85084da4317147e2194fe255ccc1c81
-
SHA256
d682f2801dbd042a58bc7760ae1cac1af47b03773e17dc9b7c897b94243c9fea
-
SHA512
ef3159deb401e5005b174cdae2179c1665293bab71ba19a4cc5d7af5d419e242dbcf27c62290ceb1b53d110978eea37a47709e0c4772835d1741f1ee4a58fa43
-
SSDEEP
192:kiK4kQqw74YhGcdvb4I393AoYVM0nC2KO3:kdnuXhGcSu3Aox6bh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000001edbe0f02546ded7ff81d7dfec6131790c7921dca81e7f64f5c1fa5aaa53a306000000000e80000000020000200000002e54697ccdded38c1bd8357e3299537f9755750eb64f2d733ebbeed711599d1e200000007fac5ffb60baad6f5f67ed76f82a039f3c69eaa62acab8654ba9c2ded3ee0cb540000000d1600a5c6faa72ce187c9f7b0c543c15fba161e4c606e00c4483bd828e7f8a174d2e8f3f4f9ee246d1a4845c3bd23a3fec84ca3433ba7f13c6c6cbb4111c88f4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433676386" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e071fc148611db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40289921-7D79-11EF-B686-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2780 2644 iexplore.exe 30 PID 2644 wrote to memory of 2780 2644 iexplore.exe 30 PID 2644 wrote to memory of 2780 2644 iexplore.exe 30 PID 2644 wrote to memory of 2780 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbf65961c48fbe8ef66248312e0ed33e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516487bfde5f8a78d50b2c012ed464c1b
SHA1e9ca8b982b0b4f1772cc2da71114d45634ee83ec
SHA256c8953103602985641cc7d1988cb007c75f952931e12c04a2d1f85944ddeecaca
SHA5123f0ad8c215a09afc2a44610eb5a7229b542c98a21a447a0f74ee0560a9df4ba368d52e9de459200787aee85e2ad64ab2fae2b629f0edb66f5766a8eb5af3460a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51152976c536ca047def5cabda32cd7ba
SHA13559c904341deaf7f0c1dc8c45d4f586c61e4460
SHA25662947f2986ec18a9c042922087dec3c0fe4df3ec232a47445d84cd2adc63f0bf
SHA5127585efa3e42460489d2c257764d7a63b4a77532520a9362a43195bb9c7b37654da91920ebaad50fdc41d3d2f0ffabfc53f2b9effe7b816444530073bd70ebf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58338f803d590b873eacddc5e6c1c82fd
SHA11fc384a05eeba66791564834d2a8c96bb2d899c1
SHA256f04564742ba6dcc81e7ddd60566f11c858822bd9e2a0d89ffedcbd2c233c5a78
SHA5120ce9cf8ff8d5afbc89e3865f0930c6f338f5e4e140baaf079f04fe5f936988ff8f86193923f0898c8005b3e8f829c4ec6e100486a2bd6b5f8ad14c917b01ba1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b745ef27ce52c1a4573401d2eb738348
SHA13d221baeb28c35ccf40afc071dceacafeea03da4
SHA2568e25bff8f69eac25b68af6da5d0337fa201643a49e38c2f3913ef8071fdfefaf
SHA5122e60a9f93ad6cb3db53fa27d70e98168be8e7fa01db1e75abea115e7144b14211af3a010148a08205c8db08e459e16327d1214897ad5fe12618ed676364a49e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c7bc6b104fa14bfb9598d36c0af619
SHA1f1ae3f99d9abee7f807e62bb7ef37f5e155c73cf
SHA256a484ec13f76e40e0a5f7c246123052be9a517eb4190b1cac448a8cf0ce4c6cac
SHA5127df15d263ebac7394c53be70e896fe31fe28bf4475ca7de45b7d1036989d29bcba68214fb8c4d848b918adaf1598c62c95eb9634e0af162470c99c8bd3abe703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647ad278d8dc51587ea373a3bb809ddf
SHA143714974df40c6e130196186436adc3e5f09d124
SHA25640abf2dd7eeb5b2dbb550e189e9d8a84b0141b08320df2aa89cf452372518997
SHA51279327642ce065f1d21b978eefe1a2a51bb33ddd60a9d549a3d038f90e84c7338beff7835086bf225a1878b7b8b6a76d0fa1fc97af004a303df2bdd2f8d0c6bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd2419136e0b4d0dce9d538bdfe0875
SHA15c3d989d83c455008e0aeea4836e10ceb4a1b6d3
SHA256d1175b22a33944f44a126a4e0d8cea50554672b38d2727c0c9a931c6b3920855
SHA5129d18922c265fd1d0f57731ee673572edf11727ebe54cc5f66d1745d12bfeacec2e52ffda9203719aa4ed1be7f74d307cda58946d30443ace602385e98963b503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b0acb396363c972172dc353e874dce
SHA1cd1f7310247ee8d5723d7b6aef7d222b6ff368f6
SHA2565c02f8ad096c335d0326df31356003dd1222e60e391c25486057a574346292d9
SHA512b3ba2ee3792d765537e13d9cf6ada93ad11879904309cb5097789df92a20c596194664022d248f8fa8646d239ce257ed1464568f5d89750cbc5d2d6669eb2388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc68c2b122c8bcc5e1477f77f4709244
SHA128df7a1dc81788c67f22526e126c280089de931d
SHA256cc22239e2186718aa8794861259c480cf7798e4e4e6f55bc2430bb525d9aad48
SHA512d2c7e96fa25f9afb645a0615f298a9696a6bd6ca82b467960709c53fcfe40d9c1cc06196d5d3c6f2f7b80b3d553b6d9500a66213b9f5bbbd9687f30e9ebe6dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29db2ef2f3d48faeef36ad44a12f41b
SHA1dbb77e820fd000d8343f4e0c0de19f81a3e8ff02
SHA2560e2da80dee4deb9be6965effc2db482685659aec6c06d954044c5ec071516c1e
SHA5126f44cc548a235f57f76e8902a218730ad21fcaaba0cd58c8c52d57aac11012105137b222c10e1df4dc7c584d4f8ae92ecd997cb2ea96497f8c9c0d58e3022d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512fda0771c873b12101137405685cd56
SHA1ce75775ded9bb7f39d1f684a331051c1f39402a5
SHA256ebd32c3ca13332ecffaa97a5b02b69f409f3e94f044803f5c3490715c8af890d
SHA512325cfc2c409c40762d7b5f329fb4981c1c39c63e8309005e28171e8e1a4eed193d639b6f871c073d128eed148fbbf6a025b903eeab798e2acd46e02d0a818c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831c69eecfa5dfecf52c74d4579cb7ef
SHA1431ddbcc34d61dda1afabd43099aa8ae84089e1f
SHA256c79de70dc2301acd214986f9a77441943d699de0392008ef849f31e4b01e09d1
SHA512f2ddf99ab46c1f37b91d488cba4893edf34983b033b94a22256e6828408f0e4913e3fa9b2b23649cb01b82e0910b0828486e2ab62971c93ec29b7fc93a6ebc20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba47d60eb419c19718beadcc32bf7511
SHA1e298f7b2abf77ade41e92e66b4f0b2cd28a85d85
SHA256e7d7130ef5364c63a48eada71e9fce97c444e6dacc9857ab192edaf9972a66a3
SHA51295c5118254bc54f351352c1e1d6d8c5cc8d09e297490e96f7d1438088047ec67541c7816e96e8ed56da639f20e2996a48e0514ad82e71c3e96a089e37a8b5c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598482978a215e24e2ac212c01d14ddb1
SHA184b9c5dc0411cc97739b25bb3a63d97eca2be561
SHA2567e90269e8b53383c79fb78c519a1243305f0d8604a3310fd0f4a0b9ae70982a0
SHA5129f08ae5b53d8f5dfd1aa7f34d660f8b308a9471c316112b26972d5b980702ec10933f6299237b948346e2e07791aeac352323451f8e4e8e980a4d639dc01b309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55028facf76f7707449a65efb77cfcf64
SHA16839beaa135eeb6913f0307f91155fcfe3947315
SHA256478c9361c006ac8f00758cc85678e9fda639e7bf3c5bda832801099d3a572ec7
SHA5123b25f6438b73d711cd844c2b63eb153c3fd3523eac7101e4f6a66b020727180b3007d20a57737415884534f7d43b5575a33d63371c57f5aef4308febdbea3349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba3d75dbee46cc8ccc73e2f89bc7696
SHA190d4945e24a2171b06c2d565bb2a049ef16b2e69
SHA25665c824c4ec8305a5499402309908a3330f75154ab85788a33588eb5e3603fd67
SHA51226d716270e7c63c84d7243f9fac665e8145e2188a10a5c4127cbb7a0320166a109f9f499a0d6f9904913add578bd6e5fdfe38e4567f16eef3ed3286058614303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f884a7142aba3701719dbbeffffbd6
SHA12ddc20988f78be66faf90a33b5baa9f16f7c72bf
SHA256b7ee56167dcb83b008a3a909351e03fbb5bcd6918361d2fdb3eeddb08ff1b490
SHA5128505b2f3065269f177da3288e4da7d7f86b19049b514dff6305fa3a97c4f241ca05aa05d1ee02e3b4e9d0be1217e66af5ae103807223008008260468eba89f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f2ad8d14ff63463b4d679fd23b3606
SHA16a1304d6d8a94ec254d064e83c7f5bd70de03df1
SHA25604c78f083469015dc1c5e68867bc75794faddf0f61bf6fd1b36bb2db61280707
SHA51245a9828d7a36e2c07bd690d1332ae706ba893410bffb84c5c73e52009114571de11508ff2505d06bab37a6223d704b946d48faaaf2df382e299f93859ff80d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd86fac189ed90fc7f676dc04efb0912
SHA10a0b1d36b6f976aecf762150423a483efa5d0ce6
SHA256fc52dc43fd719c4f0f383cfd7377d3696c677778b955f4953df082f869ecc2db
SHA5127b1243d2a78f861d2e6721c83be635e79ed136e2b0aac188cd51097b05878910de34860e846e0131532674f947f4de5f298b23b8edce73fc6a077ff81c11b5ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b