Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
fbee790d82cc8ce3e2cae014bd584b81_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fbee790d82cc8ce3e2cae014bd584b81_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbee790d82cc8ce3e2cae014bd584b81_JaffaCakes118.html
-
Size
28KB
-
MD5
fbee790d82cc8ce3e2cae014bd584b81
-
SHA1
706f10e55e43454f5d04c0c745d27fa0aa77e0fc
-
SHA256
d2b199999c93d4299a5a66613d3eca705e6465128845ccc547310be48c3d5271
-
SHA512
fe5e986ad71e6d6f245f9d5d4de431a88b45933eb5cafac00cfc4838d25e248d92d05a087c6e3f5bd413e7fd2febdc2d912adc12d112149d1f9eb28b2bbc76f9
-
SSDEEP
768:SydiOVjJsqrmjkQb4J06/hfupy92YvXlxZSSZNMlL:SywOV6qSjkY6/op3YvXlxcS7MlL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000adaf50fe8f375a5ff1fed876468ee35b31750ae2d89b2f6e3630b4870b1b1768000000000e8000000002000020000000017fb6b8bbb2304524d3c2434378da81bd5b02f1ded3064709cb8757fcf9f0b72000000024c6febcb81127f9ee56e5ef9edbc140aa1474c6995c4d5c3c479aa7130650f4400000007d0edcdb0f0e3e3f4f6dae6f63dd02a91d7f000511573a0549f7df0cfd3c5d3da70d4028902053cc5c5186282793f98c00afd6d04dad48e02bce71b0cab8a03a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433675313" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFFD34B1-7D76-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f6ce988311db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1768 iexplore.exe 1768 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2184 1768 iexplore.exe 30 PID 1768 wrote to memory of 2184 1768 iexplore.exe 30 PID 1768 wrote to memory of 2184 1768 iexplore.exe 30 PID 1768 wrote to memory of 2184 1768 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbee790d82cc8ce3e2cae014bd584b81_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a2cc3cf2f5b7348e1f86d4b13fe13baa
SHA115f9b94e4f715f3b96a1ddd7f96bb0ac3538f9d4
SHA256ccea9f801abcb386b6943a782d5e93be13b79b75761bb8a3629f0d2d30554498
SHA512ddbe50dbf717a8e744be35714008735914aec44374334122bbe1ba1db77e146c0636a6489493111a0eb75b5ccf944b7ab9813641d24e215f66ae5ef6a7b76b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56358cadb8b156019f14f05395f9dc4d8
SHA10880b341f1b51423bd6ec830848516ee8251df5b
SHA25608b9d99c186767a7d387422f7f6270f1176701eebd8cc96ca96307ffc660ad90
SHA512512e2753c5d11eef1f204d1a74109e20947b6827f98058cc481795fd58f2a898d8b939076840d719c5079b90dda0772c73f027c87af0dfa261c0b62c17ba60d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b6a3fe879e76b5829e6ecc064214b3
SHA135b79df47f6e7be9e028081ab3eb109cbd1d4b6d
SHA256cc821fd9b84cf8f4672d62d79b106644b3aaedb7b047893881e3114981e422b2
SHA512e4b3bde76102c089b57919b5c0ed5fcca14503d577fb24f07cefe3ae3cff0fea2be29a4cdc8165f63fbc4bc5c0f73dfbfa441047814405b084cdeb25becad8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f917a6c4b76c04ad96c68d5345ee6564
SHA167824f6cfb6778b737245632901018c5a3c4c898
SHA2564da06cd1f0a4a8c0b25d175e0ea59d38433a3a8b22890edabbe67d458be6af79
SHA51206abeb492d35f36aa2eb4835a5bce153d005148374f6b6001511745bd0be2651159d8634bdd556c13b820e6711ce6e305376411ffac4c80fdd9f435c9c70addc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f5274915c76159968f2525669abcdf
SHA169fa21168ae0880119dad5a39bac6b5ed7f3adc5
SHA256a8622a9d83d9bf81cb93e3ee681bacdf004a1927978796d9ccd0d4886c118ade
SHA5125cbb70b7db08876969786e31f142e949e26d616288194c8a0ae25b05f7d27fc32bdc4d5a2b23b8eee8993fd52ca694bc11a8838f1c659cbf3542dde8c8eb43b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb1a38aeaa7f3c4a83754b4979542c1
SHA1919e760a42a81a9a07ed3cb517deed426a7924d4
SHA256715f3ad9fd5e2a8bf57b2d6a38cd778a90e317b4203dec8cafa003270df47ee8
SHA5122c4148515d11a22e068dbb1bcc2ca208bb5ddc7df4bdf3f58ee89c5170b916032887fc39bf132c9ead5e672c7887e8d7dada36fd26f06102c6729a6b28dc8efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c06e46b73e1625cbf64d98f4a57d5a
SHA1fdbbcea8b9483e9a9cd9f4a62baa77194733d272
SHA256b8e94a67ab19249148c2c4187700a720cd0ccf8ad7ffa455cb8c34eeb3ae5c1f
SHA512d5046124a089526ad3142dc5dea193a2fd2dbbb79990d4a122f1675bdbaf257c8a54750213f30e3504928f0c5a86ad35a7018d7bde3075cafae7492841259424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598eadfd5fae15aed0ef310b97390c0eb
SHA109d71356713f3d91d82a9eb25f8fcd0208514d25
SHA256950e4716b1c7e744bc52db6ddaa8986eaff225911161fb51ab95add6c60751c0
SHA512caa8bbf2fc89e1b33dcc67f9941328bd1743e5b7048eec43a35e785842c8a83e640aaf9389c998a523884ac202cb6bfaabb90c5d22f239e785380dd207bcba2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e89839eff6c43712a34134c89f19ba3
SHA11c02f380d9404592abe5fe1730803a1f11d8c816
SHA2560f569f10a3dda03ca2ccf5337504caa65952c45463314301a021b73a3e088826
SHA5121171de34cbca79b57e49ae1854945770010d41df6df13e272e1260e8933cf7db6c6e309a3cb4a6209665c90899133e7145cab9dcd8d2fd7d6e685dedbf542694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe4bb216fcab3f8e48c7d0b130b1b69
SHA1362621b39c5971fd10e7dcfcaf0ceab23575b2d2
SHA256574ff4d6512c61928dbb8c3d93444ab50caf18f419fb31da777082f8d7e104be
SHA5124cbb08eee6768a60a26e72ff7509617bb33cd9aa1537b81649af8e205bacf96235ab11ffebb773f9ec27eb3a185597ada76c5c26df79056988ac305974b2e1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cc18ba808ae9f1787fa3ca60b0f06f3
SHA1ed9b8b758e416709219b87f1c2f9392af38b465b
SHA256efb802a3cbf673b7ef490f1196e52ba5a437aaf5dfe911e570be0f66b3ff89c5
SHA5129215bb9ec8db44ea6532a96b3ef2346050dfc05103d532f952bbed68103f5e64d2d36edbb1d90cb858f2cc869027abdba31c33bea8dd1f2e69c0ff818cc44afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51486f322369123ddbf576a330f0f38f2
SHA14b0d562b3f0544a2d1037953891743be7a5e2c08
SHA2568e47b3055e774b5e29fcc219a18cc92f5514a5bc9a9578f45f04251702e965f3
SHA51214669bcd81be443a6d18c0e899239390f92922c735c8e7d7c67a1f86f12883fde2053c17f5c4e46c87923da4fdaebb13e5ca06578f7ed08095a28fad2e82d787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b729f6d0093b68b108210e2df8602d
SHA156550782acbbc0d7db9a7641e5fe4037e8006250
SHA256ee3a11a37c88817f2ccf85b3df172d3b907dafa393e8dc097f70b5a843b7d7c3
SHA512ee0a25b4501dc1a6adcdde1267bfe51d10be88ba5deb0f3af2749bcffc98ae58729d4db99cef2f03f44b37f01a6f60e19efc8fd2eca48f6f2767a6f19259b6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513dc6ccfaf52bcacf4133ee07e653ac2
SHA1255e2897ded8dfd6ba0b6f18938297c58e6aaaf1
SHA256e53df44c804d53b517275c9e468d40b4782257ffb426e623aa97f0f0bfa4784e
SHA51204ed4366ab9f9921677e480ca8eff89093b1b6c28415360b59b1dc906dc53374670b475b57ed6c72106c5ee82cc709074d8583faffb11244beb3574c2c8eab60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57d36ac11d5185f073a74814208b61205
SHA17563bb90c4da950ff2eae2849c0988b0ecb1db24
SHA2567e8c4db05f971105b2ffca82f3463c364f1a51f3db0f37cd9f196222a4b72254
SHA512c0571bf53ce954b1a46ec7196817a06a3a81b70bb5c5fa11b29be0290d30d8f10b971ef14339bc2a325bcb827527107d9be956b061156c2c461f387b5998d9e4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0E1IWGZ4\jquery[1].htm
Filesize795B
MD55d8d79c3cb9af023240b1be6f5057aaa
SHA1df22980677b134e83d878893f7c7984e0d78a240
SHA256e8b101a7c7f64aad528cc734513cbeb02243c0af37930dc0f3239749cff184b6
SHA51266f432b622cee0bcc06cbc0f833de1471ea36c295b4cd93eb848d97e69c2252acd2fc8972db51ea35475a424f4d6cb5001325525fb04f71b8704eb24de1c4008
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b