Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
fbe2d9464931c139b8092b7fee4ec9e0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbe2d9464931c139b8092b7fee4ec9e0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbe2d9464931c139b8092b7fee4ec9e0_JaffaCakes118.html
-
Size
188KB
-
MD5
fbe2d9464931c139b8092b7fee4ec9e0
-
SHA1
c81752315ab2a1d17ae7c69689d2e6587be2396c
-
SHA256
da7069e154beb1a053a7e57acf83969b246b9622a4da93540afed641eb392860
-
SHA512
a49c0b2a7c7b10a1926a831e43a93ed8fc8b28e9c674c14fb238bc8bd30b1ce79412641012eb27766c60076d6fc852a870eaa0a51a9cf01d47b3e378494b3631
-
SSDEEP
3072:zV2S835We/3fcjyQ8SoJ7k2sZF3G4k5QhLpOatVSsqaA68JitA5nb8V22wOoS/0v:zVHDe3PSoda3G4k5QhL8atV86VAK22w/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433673707" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000b28f35a6c6976b76cfdc117d2f43df88908c16fdc9bbdea78bb3eb35bd24efa4000000000e80000000020000200000005d3c7abedde95f0f2fe92edf7af01359f0006589d73ccdff2989cce506644203200000003afe8015be165c95e8d35ee71fceeeae81e0ab1fbdbc99253635ae71c981e2aa4000000082b50670523369b5a32895d92a5314ae9ed7438925ae675fae904d586ae6e062e2a61ff66d021cdcc088f6ee7b2102824e0f963efc6b888c8151050156eeb496 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400ec1dc7f11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02C01AF1-7D73-11EF-A641-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1708 2384 iexplore.exe 30 PID 2384 wrote to memory of 1708 2384 iexplore.exe 30 PID 2384 wrote to memory of 1708 2384 iexplore.exe 30 PID 2384 wrote to memory of 1708 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbe2d9464931c139b8092b7fee4ec9e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD50140aa5c98f3f97871f084b2816e6798
SHA1a8f70ad85359e9f96724147320d3d3cff7f3f435
SHA256db6433beddd0641b74d03def44f290a637d6412f9ec91b63bc92a0d7e5a83857
SHA512353892f5c144be39d413401ba538bc3258f846ac77f93b2731690ca410a00ebde16884dfc7445780b430032a19fe6a8c2ad7fbc63529d5dcf70710a5cc479d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD526cf5d758ae188b6123eb00617aeb744
SHA1c5680afcfb2dd00fe1d4b21b604b85f6e60b88a4
SHA2567326a415e9244bdaf5331d8742f1e6a56c7003a8c8dad7ed45e49be4a04a8b43
SHA51205a6cfb654528a19fa99893cf6bcc583e90d6150cce9d08564eed3889cacde4654bf4a8ba93a21a1d9a9a64e0295cb5165110c357c99ae936952d230735c6fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5eb82363fc53767d4fe4b6c4ccb216a7c
SHA113c91c558b711c2898df43e11f3814af9d63d969
SHA256cba1d4ed30c24cb2335d88a6c8f6815e19f1bec48bed82a7b625458547478401
SHA512a148f8aca7b1c495119357f1723a6661ba35bca598dd4b7233d98e2fd2959c1a416c823c0644c17537ff4d0d3b80449d211899c655b68f762bd294e676a0d11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5a41f3c45899da4be6589f58598592940
SHA1e4e0cb94f77317a61f0b13459f2524a3b450b441
SHA25654ad3a079b3549300809c75a8482d5f1071ae97b15133d9036578cd267f11c72
SHA512cc0ef37154a42fe2de8605b377d3d6237cc69561d66724f868ae06a5742c40c88498774512ef1d62d8cbd4f42f815dd3fcc569ca8308bb5f9dcbbaf874b259da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD51dfe765177d5c9f3cd1ce7020de2442f
SHA120149e69ced28af6eceaa3465e822aad0c731140
SHA2569ed2e76e66c5a11fe10a6bdeef05b0406ace5f2349a6ba54c7caf7bc11b1fc41
SHA512b69acfe3b5e16cbb26d0048d7efe4a6043f94cd1a201b121e660700103894a647f73b7abe42f3ef8af8a04ad17e4ca4ef2eb9c7d70c69fcc13eb88953046ecd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5486033c2df3060d0ac18982fcc1b0ef3
SHA1fc17d31f8774fb7fa4840b048ec69297bdc211ed
SHA2566750039572aa29edb1843b95c7da085fd7ff8e0576f9806670b8e407ba5a027b
SHA51259d009030a1f439319eec665b79737c86f75268dc9131fe5ef6e1df01d7171bcb4e4640a4ec67fcce2af322a3d4ba8f28b23fc4393a341d50d7a5ed2e4f10c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189021a53a9a0ea08c0e664ebdfb0233
SHA19c279a8a65f046b4ebf068920dc84ef2b061032a
SHA256ce2d030cfb5c2863ca14ced9873742c7bb2966108262b2bb5e9b56a80a18a91d
SHA51286c63dc4b6de83a3f39de0ca26d4707dc379cdab2d6398962529d1abd6b82f4f5dbf40465c48adf3bd416e14bbd539eebc77b784ff523fb3c1b071a9275efd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b915be1b78fd03f7e23ba4907b61d58d
SHA1f11f812e6af325ebbab03b871efc7b0e3f00159b
SHA25617293077d751008bcf7d1548eb4f1dcd28a2eb993671650a00b072c1f97de729
SHA512ba14bf0ca9b5b731a25748d14ca50524c1ba1f08c23847967b40604250a2412f5eaa347f86e5ab20467c9bd347ddec360a87162600a81865948f16cfcb527c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b934c5cda14b572af8e714fe15771139
SHA1ea7673271bd16da944954373b115b2c51157d2ca
SHA25686e5e0fb06a9559164238429e239b40d8c489f8b7bbaf3a63230ef7982eaf18b
SHA512d62e5d8a030eaf1764c611e5339d403ee7110c7763e89b59c95969ec67ca9db26b4498c5056266d41b37a8eb0cb20e42ff1757f01e718d89d77d2a3b195c0e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57074283c2c705e6d3c007db3e6c84538
SHA18242205d90c6b21792454054fabed0d51bebd305
SHA2566e376a7b3e8719b1719196c385703f945416969aac7560b1554b43825e46ee1d
SHA512d643b239a3501ae0f55bb1b24d9517f1baba3f4d4d144500a47bd1e142bc1bd0d27a021e050834e16fdb47256e6cb9c6d904edd144d3728c68b5a91afcbba5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ca0bd8774d812081f28b5124c67e6e
SHA18c9b6c0d132fb83355366565d9a16a623241e454
SHA2560703df73a6577040d44155afebb461519b283380b123087fa9d7ed168fc19f8f
SHA512cf35493a9220165fa40166bbeda179976792fc376eb1f6d8a6b6443fa5f6faee69abc0300a0e2128f3bbd56d502d11b37b7e9dc8cdf67069995c090a7dc5c6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997ff0c86254cf2a1655abd9f013ee8d
SHA131de8b57c1c7c2d699f7478adba974ca18c55efb
SHA2561c0ad8cfd9b6b8afdfee490564a0d3d36e3d69d2ff46f9c8047357663a49d613
SHA51214ab42099e780a1a4e6db4ca6f449f701e8987253b486280fcd8a01114c62b4cd2693e32ff33932389ef99980a883af3a8fa9c5bafd168df906d84edf3373e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb8f46c5c0cde600fe9e476902540f8
SHA1f78e03f02bf629644856cace08fecd2e422facd6
SHA256f26a2a91adcf470abd85e4ca0d489ce1a318345c69aea7cf6cac853721615e02
SHA51242abed5019c912625889ad13d76e0fe9daca23c7a9b7b31b3df49c0189392333c91e4586b1a34c75bbbd610dfacd3016af5412f43754a9a70452e2ce88519723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571142567f0c10aa01d883a81d4ff1c8d
SHA1f2221c5868e529525f21ee05f80bf6faea6707d5
SHA256c0ddfd1d1812ba08a1aad92c064e1633b54ee167236e010a735899cad5afc0e5
SHA512da9d624ad5c1b2a0798d360a8046766f26e87429803a6e46880625f2768eb95da6f4ec433c59e841a7359af066b24102d38f48720fc0e31a17265b91cc8c43b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5beee2e9debcf2c3eaa8e03e79d0d7f
SHA1ce2387eeaddb578757d73f94b5c37e892437f8ae
SHA2568a1f1c0c1debe5d5b74f1c9a62ba445fb7a9bd14b5ba0c5ff5002b780f98b9c0
SHA512e6b2417eb778398d487b7da7a0f33c86168cfb9c38fe3e5d053a351ff1722f5a42be6fcdff78b51b821a1bd7a8d06ca7f4f3d7e9e462b99fac0d520a5d2c593f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ab9db87aff9d2a3b6b582feee51291
SHA12306db0de82771a3bbc4da5d2cfb192bb0104633
SHA256a10b14b14c6911fc314e69971523e97b135bbb51b9cad6aa327f2c62f921bfef
SHA5120891d9be46939c9f423fb84749183e7e4df473f25832ede57ee39ef5dfe73f5786e5512c33f3c6d1da9210a142e995ffcf0f82d3c862aed4a9e250cbeadcd415
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\plusone[1].js
Filesize62KB
MD52b72da5279576c62e6e3bcdadcfb86af
SHA193255909ac2892a54fcbb2a4445ec1aff46cac55
SHA2564243c6d726cd3e7056a4ee7efe04d9eb84ee713bae54f0374d6f8d71d0822481
SHA51251954e78603f08d4eadcfb58593624100eb8ecff1bf3f7cf4c6c43b5cdb317daec90e6919a71f12e850f424e8ec7e0bf51a9c782beb5a3b7ca6a8c604a522872
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b