Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
fbf619a1277aa4ff786c8ebbcb8f0041_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fbf619a1277aa4ff786c8ebbcb8f0041_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbf619a1277aa4ff786c8ebbcb8f0041_JaffaCakes118.html
-
Size
896B
-
MD5
fbf619a1277aa4ff786c8ebbcb8f0041
-
SHA1
2d5560dedb56f3ab9dfb465c4ae1eaf14ff1d663
-
SHA256
b4d0d2e3fff3bf92b48def99be8bc1fff7e287bcb8222f9661e222a1639ccec9
-
SHA512
998c5d6844840a4e51fadd4cabfbe2e8d6fd916576b9ccde218bf8d401fa7c439e1d6047105abe5fe01d09ce537b63cc6bd1a3aee5a31845938a70890df37533
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{197280C1-7D79-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433676322" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60dff9ed8511db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000875edf39b893b46dc8b1c62252ea808ab47a981f81b5f0b6c62b9bc307c0e622000000000e8000000002000020000000b66cbc21288335ed2a2cbf71a2ca2663048800cfead8d1f409ab9d8e85485bd220000000f705cf637da5a5462de9123f83d84f2c9401564a72c8abcda0a780900fa3bf03400000000fe8ed2c8913933faa4b54854f361235b52c6191c4b04a10e9946e54cddd1591a4a0c84ca922d5f83fea371deee1350b0daa3477126d37be48cec44b667e35a8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 1768 IEXPLORE.EXE 1768 IEXPLORE.EXE 1768 IEXPLORE.EXE 1768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1768 1716 iexplore.exe 28 PID 1716 wrote to memory of 1768 1716 iexplore.exe 28 PID 1716 wrote to memory of 1768 1716 iexplore.exe 28 PID 1716 wrote to memory of 1768 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbf619a1277aa4ff786c8ebbcb8f0041_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354f90f62d7a70d52ec310137e8317a2
SHA1967ab3763e7d6177573454f68118d76ea5613a9c
SHA256b22eb01fa69d66ad32ec9afa92042975f7c73102a7753dfa15f5a3b634c584bd
SHA5122e7ff657dc9072a88d27a9950e170526dccce4fdc69a9a8f888adc61773069d1c21c908eee877f49dc596a117e12b44d8cc36bafdb4ea0857700d33910f74711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa675dd9b87df77ec2e4417a9a186b0
SHA184ccf0aca42bc7e17437ec3d7a6e2f4781bfc950
SHA2563dc683da8119f43b3389cf1cde040494472423f96ca564a12e980c1708807381
SHA5126718cb957dfc3fde944683e94f8ce5704dc70603689cb6d0419c8bed7cd32596936055074876708c894ee37d915985093330b7c6f7572de040b3992b2a47cef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbfe75f98d06ab2df43db0713bd1e762
SHA1308b4810e6c0e5ce00472d946378a56d50d405b9
SHA25606e9969fbaf531187520d3c2a96b44d13b9a09a4423184e36464859df7a40b6a
SHA5124556bf5317265ebfea04d81b78dc4d38ea191cdf5c2fd032d948bb0653a207403907c60f0955bc1fe4edc4ad7fb914b1455ddd16d292e2c2443e6be946d5b526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027dc9794eefe0b3243bd724e3654d3c
SHA19a1182972e3c5106bca7c5e9e35ac83a7e65a26a
SHA25623202bf9c71bf393c934af821b39dc8beef6f686c4ea3de0247e15cdebbe901e
SHA51208536140e778ddb4cdae7954e122c6b3a6a3d39966982012410297c7d9a05332a28ced541bd25af2d736da7595eb66ad5dfd555a4f6613265b2a9d57cbcf4e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9963d22beae51fadc38cc80eaaef18d
SHA1552979654ae21e663be0843715df8f534122b29b
SHA2568f2b5b6f6675a1fc4cb8a8b1e9d699e221dff744df565b7e4e178ef49924c9e6
SHA51250699921135eed9ae11878ad5bf0e459c85979832fd8edb2bcd82f8dbb53602bec92994fbe0f7b665ea2133df2f98042a68b0527471c68718706767ce74600b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12eb646cf72f5a52744de9c397072a6
SHA1a8f794561f46676818637cd30b2dccf4a39b87e9
SHA2567ac0186c9ae20db6df45eb2e70a942b712ffc74b4f3479974939b005da838027
SHA5125fc501bf2c28b077ec19e5b50a57c61b0b0334241feb0147118a34035f024082614a617fffdeb06fc6010b67cbad7c78c2340489a1d493442568eef287a23c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf94fddea2e2c4dd20446e34accf65f
SHA1de009abfcea63dc96c6eabfd24270890e34dfe61
SHA256c6e2f29b881dcec1cb06ba63cabba3bb96537f458e69361d9630cc032bcb186b
SHA5122d397a1a1f58431ab2cfd35135bbda9b4c74d06a1ac33560a69de11d5451d58a4e690c55097ca60fa9dc270225d5a477192974c18bb859f39900f3602b290f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523901f5c1f1139765084858825a53ca2
SHA1007574b5d5d37e8fd155f7fd575d462d4c28ebba
SHA256d072cf0100bb0c42a5ecff745cb30bb3bc685c48f2e28d206a43d144a98428e1
SHA512ae8bbf7ddfa7d869e866e178a1d03ca2fc69c7e582061aa5823c502a066b0c70174b7b2c36bf8511f52b513b364636df8d4070891b65af240782c744a3d66697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b87d178e37cbd3919328afdfa4e3a4
SHA1cc4bef5d5c34fe2a534c777788ae02ccda4a8252
SHA2566ad407e2f941f93d1bd14bc81f2e6b0570dff3bff9d5fce2df2cf44577bc111f
SHA512db1b477a4f0bc152d7999711698a3132d28568d88972e98b6067772e60affa761089a47fbf0fcbea6c764c39fb2ab40a73a4b3aa46f7db6685bafd0bdce18526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d725d678457972c2c8d8ec79be8dcb41
SHA146ebcdb839a3b04bdc804114b26f4bfee610f624
SHA2560c0595fc27ef7aebd3f7a799e5220687ca297f5cdf7d746a3edc8767f16849c9
SHA5123a9244f98db80b42ba8fb72c867ef765abab591009b029bdb7ba978431f9c0426534bcc0fe2a95618ea3831cc9e854f684a75b3a02f5450664d760b8e479cdac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f967db64dd260db007a3c7d65a615bcf
SHA10064e9b0353bed25b310ae93118a0c40d1087b67
SHA25652e77600f305ae48a1f78c8b4b37077598437fe5891fff4e4cded5d3f5051eef
SHA512c08d52e92b9c2bbee21f209865517250a3cb0841bde3804830bd9382afe97673ed4b99ca884ea5bae18a5614c0fcbbcbbd0aceb02b2bbd901f280e8b245c794b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6327d0b070f21c74d3b8a5ba92d9ca
SHA189873376eab8c7835f2759aa9d839f23ec6e5b55
SHA2561fa3f092caba1e3bb0b0d7c7c8023e7a6d5f0544cd0aaef35653b1ead03ae6bf
SHA512dca9c61f19c0ca05c9a8954d5c16f9281aa4830a53303f8dc35ee7b63080d93f3868f2c32168ae1e9e0126c21f863aec4045cad1b9ce8d38d35b5e6926f6bedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e20d2e0ce4bb2dbef5652f15d2ff01
SHA16483e90789e4626db7a065ce23dcd32e577484eb
SHA2560633ae4e5442a9659f08d65870d90a13e2ecc18ad2735060243db11327e70354
SHA51247eb8239248e7a2f301d8a00a64f14e8424706a49493f8a9489adf059b03bb369e93ae781cbee2a89567093ba59ba3943f8007146e6908bcc862b11997d25d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299311deb01d948a651f29274e3c8b0f
SHA1002a887b4fa1f9c1b1ce5550a353a83165b96de3
SHA256f744261e54ee3a3e134e0ae7cb1f3a7400f04746b52470da664b2b0e06dbf288
SHA512b5952749aef7a47d3d353fed2e4fe182c2d7d0ed4938db8b8e00c4e3f0cb7899616ef6bb4ace68d9dafb23aa90d9ed98803b80bb187c23b0f8e2dd7b4152f6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453aaf892892ea0dea37794831babe41
SHA1e68888a121467af3e72d40074b7e935373886ff4
SHA2560b32e7d9b9e0431dd9bdd6a7694da7059c2f1cb5d60fac62a4e82bd2c62229e3
SHA51221ae1e9f24f46df2064ae4655d9df84edb26c5ecefc73e31b4beeba28aa4d41fbf62910353d30fab81c6176dd3c8e38e9559856c14dc208090d208c0a5d109ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541fff407d2b32bf541fe1736d074ee15
SHA1b8663f35ed4514f7b686ff91691a6d694f1dd9d7
SHA25605de3d0852e97c1172a77dc41ab3a29b94886f257ad9a4f582dfb47df773f9d3
SHA5128a21bc7100406e87553ff0191f4c526151ea03862d3f5352441ac87ff2241aef6fa8729cc527cd032dc540e5f8f4ff0b88746dcedcdb165a227e7932d5b49713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b147d57076f5ae7de9e5353fe6928e
SHA11720911bab2bea9e492789395474bdbf002655fe
SHA25605329b9ac99c85fce467daae9fa354d210bbf18c09571cb1d0805de24a4bce57
SHA512aeb0b238c06b069f0fb9a3850bc84fd4682032a705dc948fe2d99d821be6ddf1946eefd29a0aac3f8941a71a86c9581b862c063523a4ac6af97311ebcc2e790a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25bb02f52e158ede9e2c29b00827874
SHA1eee47105157b21f83c1877381cb7c76316fc7daa
SHA256c280b13e018cc01a464dd876fd037dfbbb8b07e6dba130f3421bff41c936b329
SHA5122fcc9cb826f7b67c11b88891e513c7ae87961ac583f96d46fbc824460fd70370fb0cfb00cf0087b54c8c1b3d51ac26a0b336fb7bfaa14a736d41fc51b0a7475a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290b4a22cb9cfa0a50618dc325357c5b
SHA17ba3d71de6bbd93eb1f4bca72a32ecfa3f8db5d4
SHA2564bc1543c8977a9b37501e024eeb71012adc3729e6f1e44e4883f9da673c84d9a
SHA512d76bf7a1c8618fbd3dd73b6bfed971800f6b74c61529b480da8dda33ebea9ad21ef87765b28b813ce6b68b244fcdd10758ae3b77df965197799c726275bf0282
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b