Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
fbef6b2814299a5ba6b836a3795066ba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbef6b2814299a5ba6b836a3795066ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbef6b2814299a5ba6b836a3795066ba_JaffaCakes118.html
-
Size
4KB
-
MD5
fbef6b2814299a5ba6b836a3795066ba
-
SHA1
a3d4a28b123fbdf74afd7cc9c6fc34dae12cfc7a
-
SHA256
fbb780f7c21fd4232909fd4620e021594d97f6b51c546fb4c3028bbc09817298
-
SHA512
e54c8d2b84128e8d0690854ceeecde025bb386c7fb5409ab4e23d99a50cda7d2317781d187dbc4e7f90c70dbef2c54a9a1830142ae3966ed1db0d473a41aab00
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oTENbXc7:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000e52ff01ac3e036154d422d5fea82356ceb96244f701e1299159876350924a6d0000000000e8000000002000020000000ace5523b2af090ce23bd4c9e51f060e8d95f5076367c9fce15bf22c18de5bc69200000002d42bbd53409f0e424c1bade13bddd9646ba90342f533b7fa0a1b309a6c0c7c2400000003778a373c622859b2e4efe1a30f8bd8da900ba17eaae97a15f655bb37927380cf07d48ace553748aecc5be32c06373afe0ad837aaa4fce399bcb149cd439ee40 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433675471" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E3F35F1-7D77-11EF-9AA4-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1091d1f28311db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2464 1660 iexplore.exe 31 PID 1660 wrote to memory of 2464 1660 iexplore.exe 31 PID 1660 wrote to memory of 2464 1660 iexplore.exe 31 PID 1660 wrote to memory of 2464 1660 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbef6b2814299a5ba6b836a3795066ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bead75e1621271c8f8ed189c84075262
SHA167c581335239f91dd7d8c6c42bfc8a7d03973937
SHA256262b98cf2f4f523793aee3d25b6e9ca5584d3c90ba558c3fd3bbb7ac9713cde4
SHA51257970c4765a8d3f7a0b8b3f0759b46755346184dbe77568819def468a373cdda7fa94212122a44b0655d39eb159d00a2cd8336a01160770e4fc65f0b361de2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560fefe32dda0a06bbaaa76d58f7e1f61
SHA1d308ae0dac7cbc919bcdb8f3ef071e5a27a659bd
SHA256c806beb82abdc4a7f49a25132a7041d6732feeaa754a8049e6919aebf9b43d8d
SHA512edc9ce68aad88b945531218adf7be24f00f945255484fe79c9399f266bb8835767e98549212e365531ce60ef91830843666f7af066e8de666eac49281f0613e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595abf90af6e120d2122d6fc36a936b4e
SHA1d566a3971b030ce420ec31d37b7d2fa316726a05
SHA25679094aa0d7ac28b65ecf7e2622c48e9256bf50ce34b232030112aaf2da30f658
SHA512f5684235ba2330406af9f9bc57e8a9900a3a658d029c09a44819dd5d440e8721e634bedbee900ec11ed4e7a3cfacd454e37af13078caeedf4fcb2ca82592faf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52790ef17eda131090d6bb64f5a2306d6
SHA10ef663c1ef5d9cda280cd217d5505ac621bb048c
SHA256fee032d95279a56e60c4a0fc91eaffdc6c1a8f815c51c140b59416cbefeae1ac
SHA5128058fb776207e010ddc885be9e8f62d1a5c1e8300cbe7e0748171d4fc2ef8c82771f01092f2f31b2e7b6c5c6ccf68aa10aa362a095a5b918b9b5bf3d0578a0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961c6e117fdac8ea34e7bf3353c3c155
SHA12ad5719eb1c36bd35f78f407743499edd64849f4
SHA256dfd5e5b940585d9d8d26575657c459204403ac122f8d319e92170ffddfd84ac4
SHA51279c21cf3e35267b9abb4f864f6543d8ed3db74f5aa5a6435aec0113cd5ae4e9e589c7762fcc127c3c22ad0515924ba0b1002090554125bdb6b37d6ca4a8faa14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578371904adf72f74c42e0f2d692e4702
SHA14daa463a768fd621888ef76b859392a72be87486
SHA2562474bf41a582a3b5cdc80c7f2a51b725548020b6f78c14c7f1bc43613a6caf10
SHA51248e294dd35eb6f6ed00cf3a89217bc21361b537255e71455b3f93596b0f04ef8b27721389b73a4bb8d2a779217bd1c11e1d38453172228b0eea42fa975ec6332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ccaf0d5864c47f6cfa77dd4b668cea3
SHA1e5fdc8ff07275b0e71a04121cd1191cbf9d7d170
SHA2565a77ad54fe1afb10d0f0ac8f69c6d4703fe166e94f6840f9348630e1920176be
SHA5121af92080429f96fb89ddee6a21e711aebe7aa878001abea8461bf68463d1495ab7e39adf9ece2d143a7ef3a6cb2a678c635ea21069edca2b172307d718d0936f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50252052cf56ead9c2bdac71a98b89c19
SHA19660d8083509ac9608ff37f5e315dea2c9205e7f
SHA256a5aa8e9dd03583ce4d3fdfca99cec73f01d7b564ace70a026f362f876851cdd6
SHA5122c6d291b51a5454b06099ad4137ba18f32e33e086913de8197a1a18cf484a6a66213d4e86803e02d51cafede9762118aa2fefe4296a65190cdd79c8c68639869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e492221780a6450662f2b8865fd2d03
SHA1516d876ca98e75b10039d393d8648162a370d7c8
SHA256d3e463dfecd7ce6ce8d8411a2707a82a6d3dff8938a268d431f82353c940e4d1
SHA512b44c4b54096833cc1cf2e9f60298b09bf64c359044f760db7d0fa3e01068a7b274b07b1b10cc7e58759b8af8bab37ee1490777c4d067b980e9fb363f894bf1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d54ea5996d4b9eaabd363d5a2fa18a
SHA11a05bd5bbadb2a89efa65ba3140cdbfff345dde5
SHA2561cb3640b72426367c0b013303367cf0ad3d1a7f4a8c2c72dd574426d5c0f8f78
SHA512f8dfbdaf706ba87dbcbc1c657eacea0ca4eb319559fb595d534bd50a49ebf88ebba0dfa9c14dd71626a099901affdd30622c41c0429db5f3b941be25820414e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc42ad5b527bd8d795bebc65b416175
SHA1d283964157c8d84d3beaef8c4171ba5e5126e9a7
SHA256b39c70c148eba3bb52daf9a2c0c2eb79d50e435b7229474f52b55f30065a1aab
SHA512de96f8f8cce5d6fac196f67944956c6f67e4f2da0aa3f1f18abb8416261ec02803fae7f76945515d04ccb56cab991145284c62ce66d6e75685926c8c0693abea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6df17a27e37b9c5d1b2bf0b7614b6fc
SHA19d730006eb833a20afa8c351107b9400953b870c
SHA2560e676ef6f653365106c4e241ae3ab1e537f9f17d9671f9b81343c6a7121efea0
SHA512260853f43bdbc3af66ee000027e1290f836b73960b739054536cdd178bcb373f691417012879b1561861a80a9ff8172b88dc31a5a803b2763c70887a534d8296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50088070b606485ed3f2860a848b8180f
SHA15e6f509ae1bb108a50fdd520013b0cc748adaa88
SHA256f1ca882fee8e708e92d6cbc18bbee9a667457fcd46048dc0836440609dbde0b4
SHA512d8c2d504f34b80d919dcdbcfe9f7f50ff76d9540ab6765a379122b902620e4a0a4d629cdef5ca6cd2e0a64dd6b56c226189b09f0baf9726229e41309f81c23e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb4d6e877b7c2f2e149a4405e0a268d
SHA181bb610d535fda840c28a9716502c71527540e50
SHA256b637cc76aea2068e55f73194c6b2b1cc3edd8886eb51e9f2411ce71268728723
SHA5122365c1c7ce29b810dd2d94d70e8f19c5e5df291d8de6d191157a89332577d97d511660e5cf4b189753eef7107b2b71efd9e6c81c21247de1d9df03813f7e9439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3432af232cb65b35d746537018ab8f
SHA1ee2c39d0720aefd8e2b3aa6f11719464953ce385
SHA2569f5bdedb3d36c3612cdb0d49eee80074bfd3bd475ecc0e77a6875e5ea1df83c9
SHA5128ed95c5b114c353087278ea5bd31b71ae2aee4feae6a3438dc160b9972e8a2d71b21cdc33493ae737df7102c6fa1f0ff9981c40720ca4e194aaafdbbaef96c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b81f2cbe6cc6e886555bc3989c564f2
SHA1b48d69415e775c514b7650839ef2bc90a894e86f
SHA256cad58546c9a358b1be2e30e906c231d8d9a873ef9727caf29d78b648630b2f06
SHA512c2792b85e0a951734212d6759e3140e455871d370355fdb80bfc53cdc1ae0de50aa510ea67b6293d698ab74e860274b540b17440274e0bda68748834e49752ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb23fdfe0316d4d833bf3deb25c5fe34
SHA1ee2ee475e30015cc4ac92bace7393de2d5f4e988
SHA2563c70febbd005b7c6fabca98053b765cdb2774ad1b95d575b68de58a74c49ca0d
SHA512358ab3cdbf3e846d66444b630519aeccce0a2b0726f7f79a8d26c2d90389679a106ef07c7df9d1e0baaca629492525dbb113e5006d13abe56efff8c7961dca2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389820965012a82fb8560d9fbad75c9f
SHA1368a2d8c778b21bd757d56ae6c41b14d294a8987
SHA2562102f7fb17dc89eafa0b1215b12d3a1aaf20d3c214a1837e5563ec87933271a5
SHA5126a0d02281a8ad77bc30af88396b77c278d1042fe8567340e31d7a59e4fbef513e262442ca7c52989788c344965c8c9fa193f000a4b0ad045b8fe0245dd1baf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b902b7d4b3b15a8021a1cf5f77638514
SHA19c72669008d61bf6f8246afe651be96d7887adb5
SHA256182a8aeb7917f4019e61180060359c815f24852e2c6e3aa1d000acb15db53e97
SHA5129c2034823974da4c2967f36ed865bd539c18d4ac73efdb9a0bf9559a70891befaefa26219dea2be3fd018a8a279c00532160a2edfe871fbec8dad8331adc176e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b