Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 08:47
Static task
static1
Behavioral task
behavioral1
Sample
fbed769f7bdcadc48a030485e4cd02ab_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fbed769f7bdcadc48a030485e4cd02ab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbed769f7bdcadc48a030485e4cd02ab_JaffaCakes118.html
-
Size
70KB
-
MD5
fbed769f7bdcadc48a030485e4cd02ab
-
SHA1
882194482e3471b507713d636b561de08d51ad32
-
SHA256
c85379e96772b8beae25d448dee68d8a1c4f18de2e6fe0a2ece7532dfd0612f3
-
SHA512
fcf514bc4f273765ed2d3ce933a67dcefd785c83fbba422aae5585f33cb2c394b355862184c0d0f6e6dbbdcc07c7b1225aa3f4ec33d7c8904e4f1fa103365edb
-
SSDEEP
768:JiOHgcMiR3sI2PDDnX0g6sVa6PTpIdIiZoTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:J5Av8sTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57B01081-7D76-11EF-902B-EAA2AC88CDB5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000002ef611cddfe638b30822b10f41515c871c8fabe2e535a4cb1e3c7baea5a22f1e000000000e8000000002000020000000430625507c9d88aa9093e896f5ba2299349c1ec2f153cf82ae74d8ebf8933af4200000003c40c994392f0f1e592c2d76a975a483b5fc9640b333d11bf7135ac5c178e2f040000000f6be509ec77d392ade4a94228b471c5c2fff8e6efeae2242f7e6f9e0b3f2642410957b8eeb70deb2d544fef755a74b22ad88cf7b83a498d5d643ff0b01960596 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f050e42c8311db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433675137" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2680 2532 iexplore.exe 29 PID 2532 wrote to memory of 2680 2532 iexplore.exe 29 PID 2532 wrote to memory of 2680 2532 iexplore.exe 29 PID 2532 wrote to memory of 2680 2532 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbed769f7bdcadc48a030485e4cd02ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccee3bc1b3f1c3463fbc44b39a8e9627
SHA1671f23fe9651d7f14c3f951c646c5d3328a78d0e
SHA2567bcaac05a37dbdfffb365cb4ee37b08371ea20bb61b640a1c7efe57070185ace
SHA5122dcf11023d0c3440c7af80312e4bd32f20f3938c581b5b2603f611bc966dd3103078b6c7a5388685f4d707fbf6d61d86f0ab5031ce5ccd49c35ce9459122a135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5e5144a7319a204bc42d2572f510f3
SHA1a3aaf583223771b3dd7efd99e6b2d1bcda468ba7
SHA25668eb672e72a44419778937379d0dbb16d02c53d3ddba1a92d9ce3b17d5aac3c8
SHA512bdd346da82a3669b68e57d48c7fc10e191a22f7129d300dc4cc5a58e6ba30dafbb8f25f6e2ea7fbdbce980665a4e11d3176fd89f476efcfe8899a0698a942eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24b93d8358c39e5a5f22d8c2b9f75c4
SHA1071c8afd54fcf97fcff313c038ff8e6df84f7ba8
SHA256b1205a3e4a7a93bd7eed9936879d76ff06dad2e71d9dd304115c07e9b9198f60
SHA512a0097839e4851757c01a6e18690e989d8add1c043a9dd716a32b36898b2cf6ce85f1635425c7718130b14ad67de324536a257392c02dc342ad642a123c2f5674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c6b5ac791d30a005e8cd4690130054
SHA12660b56ef86191e5d30b5d087afcfe6a16e9bb12
SHA256c8aa5f4dc71b0606edf7314784d950adf32a4f5a8d6b28ac84fd9441cf37c110
SHA512d5744eab0e8aaf47d04970bfc27554e62dcd4be9735a73907a0f7ebdd37daaa990976d13942dd607ff45b6d29befe431ab405c703a06c98596d412536856f9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c87f2f94f529c23bdb4f670e15d5acfc
SHA196fa85c6b35d2bd0f82ab38230e01d8f2071ab43
SHA2562a86d0ffabec9b07e96e9c43ca25af28436177c43c3acbc3dfec022c87a532ef
SHA5124ec8802e3e85a57be298fcd4b4863077576f37364e21e8b22bb69d02512f15ce39e36d03a704044e5d142cc055d20dc80d3f5ebab67cf0dd628016bc86ed24cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54023d3029f873fdfa287303e7da1b677
SHA15ba4552bbc55b7a833007d8dda2eef08c8748fce
SHA2566cd0940bed75449596f2589682794e7a2e55428085dd1f801807f9ceaa694bf2
SHA512cbadc7303497b7762ffe39f07018725b244f1725fab81432ea9f73df0da9aa3c0c1cbc7af8e2ec295c36017dd1205e8c57c365092812c403df8523cdc73e91ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5b3d8dda8439b6df50e2b172a2276c
SHA1ea0b9ab8a4952b2e6be5af633b58077d8abccb15
SHA256f39ea9db4343fc47cec66f37ed2e0e9fd1f9228b320ed491c7a94d207f527754
SHA512803b3a17da40418fdd4773a05afe8f635a0239c432389165560e663ea46a297c807abad377335f1563403d6ad5d78557997503375e5425c4765cf8aec7001e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5642521775d568fedc93aad9b23fe1f5c
SHA17653113c562f749aa19d6cdb1c42bffcf75e2723
SHA256a04f4e42f14989db916b369ce120c83bd7c4445fc7118e18e917fdf5c319e889
SHA5128a0a54108b7a312d225a8f4219c9088a19598167ebf1903d82cd82468cada9771816f323d8de1b43806b4f2215fb3cd087988668ed233f8b7ba8a8be800b6226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0ab7dedcdda188a130418e5dfb9db4
SHA1079111b4aed751d72af12b691312ed6a3a891eaf
SHA256a29b6fc9c8cd7d1eabe5d6c583317879c7cb181da69d643460c7a279434ad715
SHA51288d75cb1bfd3d85c3fcdf8bf93e4b64982852d69172999206de243dd278473447aa0b23175eda589fc903bed0a437edb84530c74dc9f3660fe84932b4841ed8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1ccec5e86e76f6ef65f600608877d5
SHA129a20d497e44312605805a3bf4dbf5253859e68d
SHA2562f56446d02101ac576f7debd4cccf8bbf7a7a8126fb6d85b431ca979e5193c7f
SHA51266f490aeb2357e0672c8177313e1581c7e38cb1289e44f35a912c0fa1a0c7b0eba6f4c25d360f2f14426781e601a2a271289779814ae2cee4135bb26b630a1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3660d084896eb9816ee6c031c503e3
SHA14abac196bd36052afbf9a768b6f593c8071ca8a0
SHA256466a4071333e223de2e96b3d793352b82de0c3e9999816f1829b968e697e4992
SHA5126d4fcbc85837c99380474e6d31af06470f9a7ac9b17206ed0bab9da4c27fb28d650226c0ebdb9eba47ee289d4d2327143cf4577e0bded3de8ae47491e27d9b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055ce33a10a9606977ae10558fcd3326
SHA1de07f29ff2f547af19cd366beea19dc7c6b807de
SHA256712b6967e091353a2fa177163393c64280bca08fa35eb9dbf1f10b10f19f4bde
SHA51228c676e1e5ac7aeb1bf668268ff05cd39e0bc3222788c6ea5d129e3a8d3af61fa5ba9727d9af39a34799eb7d791c0cf5e8e4c5cfaccf41485a0d2c33d870617f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51760e480b38f3c9344a91660fb96dd40
SHA1083b331de92910d169581ad63f5c10efadebe3c0
SHA25615958f4c4c1e37ec9317eb7a3f6158860124eaa34b5375d60cbb84ddaa8387a5
SHA5127d067cb6f6f0666ce23337cbbe43b2d64c156bc2085e55ee06cb9f916fdf47182547655e2ded3782cc9ec96d4ea1504e0653dc91e8d4932903b7c7b0ce243c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d569c3be7256ec3680253d55b07ea22f
SHA1e839a948194b006b062696f8c5c02bf8d10013c6
SHA25677e63c7ab514876ab55017e600182cb61c0a5c9546a9b852b43a7e3401927db8
SHA51255ecaced29f02741371e49e58428de110e1cb1f96ea0ad9265e829d7d38e06c8d82be93461843050d3f40f99017871b9b3a71814dfc899d570f60ab703b10e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc2b6cefffcc4dac4feb3d6a77771a63
SHA1ddd50f18416f930bed25c4aa97278cd9b2738897
SHA25633ac716a97757bf2cb1ab9596a2bf5e0c7200fddde0cea84c52636e9569e1056
SHA51259235362153dc8c0aaee35d61e9c001f7b0b2800bf07daca1efd7a3ed047640a41caf9b6098b7c1e4f91010f66536de7bbfffd313c8452afa8738129a0b0a411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506df09c8a25e0780b606f5b22e7bd5ec
SHA1521e36426f6f3faa3d42e87ff9db685bc51ff994
SHA256fbb7870573a49cdece6307f2aedb4a2e2bcfcfb7d8fefaf6ec2c2197eb638e9b
SHA5126a130f91594695ff85b6b49da68952ee2c273129924b4733d97b71efcf7f4ecd8c784f0671d9f69216ac968b8315b2fa63efb4f27277673b8eb352e2b7161323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1afb528d84af0e8a86054e902a6c16c
SHA1d641a8feb673118f4639c2401d5db18773079f7b
SHA256b7fb72b9c233f8b2fbd9f1a68d70462cd82783c730096a345cdc7efb14e6d023
SHA51247b2b5ed2c84107875c7fd93791c3372fc504ada72d18666c28d26504ebc1d76af2b9b133be30e15d898cf21428a38d0dba2069eca34591477e0bf99cd03e9a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fe9394629c879bdb9ad1b83d9d1a04f
SHA1436a88a8d6644c0e01e9e82b7d55521ab0bd77e5
SHA2564396863ed5860ad77996807287dfbee11aa08d487cae9fff34c311077339b0b5
SHA512dd5e9e11d85b820f908bea6a8b925285918f6f33318bf6a1dd59ce99b20ced244707be87bd67c6198b331eeefa3f719825ec12a711b3cd5032d5ef140347ec2e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b