Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 10:13
Static task
static1
Behavioral task
behavioral1
Sample
fc13815754fa41dcc80ab044460068dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc13815754fa41dcc80ab044460068dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc13815754fa41dcc80ab044460068dc_JaffaCakes118.html
-
Size
65KB
-
MD5
fc13815754fa41dcc80ab044460068dc
-
SHA1
b0a6049811332a99b779deec837c80b505d0ef87
-
SHA256
8dbfd605093f829ccc675c9691c2431d8a407b822e119f40a5b041550dc928c4
-
SHA512
efce49e1327e1db005e8056dbba783b1a3e2677a113a8f973373fc23754a3116d2de11ea22d0b77d85a3fb9783c9f8ed10e4695ec6ac71ae0a2c8206f9013f37
-
SSDEEP
768:JimgcMaeSXDDLx99uB1PiZcwoT2ICZkoTnMdtbBnfBgN8/0OgcRWQFVGss//IjkL:J+AUtwcNT8ec0tbrgaUc9NnjUl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106bf52f8f11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433680298" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A9FDF31-7D82-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e3822091af7d9146a59a743b58d8b791e97b565f6b8fdc93ac57aa0b9844ca66000000000e8000000002000020000000928d78c8e197ade2f7759641b9ad558024dec668371a65a31c25b05a579050d22000000059d37efa99edd6f20209d752582f7defe1fe823160a2d4b55f803269ca96acc94000000027bff5e02d8781aed3c9a13805ceab35bfa9c486c9ed72ede872c8d5cd2e65df29e24ebbb5fe0847b628ffca618715afc72404381073679c54ea5ed52b184ed1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1188 2052 iexplore.exe 29 PID 2052 wrote to memory of 1188 2052 iexplore.exe 29 PID 2052 wrote to memory of 1188 2052 iexplore.exe 29 PID 2052 wrote to memory of 1188 2052 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc13815754fa41dcc80ab044460068dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf54982033dc4b780a353458742d1a8
SHA1855235dfa695134115a02f1442554f2e884e8543
SHA25606eec8fdbfdba85f8d411a4972413abd69bdf2bff48825130e9e01787c53ec42
SHA512f4c337bb0b918115dbb318712891ca5bd3b4d3d250510960489b8c823ead55771a504afcde0b8254fa460ccf82b593e80e9e442228882a8cdb13322bd6e17525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6aa8a561e6d4a08e2cd32dafff963d2
SHA133033d3d56c147c96f30bbf74ce89fa2bc48350f
SHA2566c660f5cb99349efbe626a08daf095728339c65d266c3126b52f014042ac59c7
SHA51238371f8728f39d3424a94e5268c3bce4e665942541489881be6171d449d3e6992943dbe50067d66b8bc4cad6c5a6e80674ba5987fa64ee1f06c4365351f16419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b456d4f6780a20552153ac766dfc2a1e
SHA120f7f6e34528bb5ce9c3e9424e472d2b8bbabd50
SHA256ee8d009b2a5a849ead3bc96c3bc69b51306ff7c7f15bfec0167c59f18b67640f
SHA5124fca0ebbcf860dcb031ae8e33e455106b19780daad03ce9ba70f26f94d3c26384d05427368c6974bf34671157a140841cf81df1aa9ec6d714344693220af97e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ae4085d8409859483cfdd15a02d563
SHA14d4fb90eaef01baa40a86a1973bc0143ce5092aa
SHA256eccb9bd773f45361596a205a687c285b7fe77977fb15665d64913fe8767ee5f5
SHA5122804d615a2d89bb1e2a218669c5d97aaddc814096dd3045d658470b607d69bfe0d9676150bf56de442c03768d8ddd9601f97d0d85bcd87656eda3d2b5bd6a5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19105ad600339548f7dc76376348ef5
SHA123f4cf2728f2898aeb9829e6e45c7d3d0e6c8a31
SHA25685e9e91f3518d1bd560687596dc4f526b8a821d02a16c716846feacba58db15e
SHA512212b2aa87c1ad06baea9b9761761deb7359ab151ee73c153ed1eb3f6ca5e13989efbf32799b8c149a96a7386327315ae8d660ec8aa5acfa26c9f4c7400754e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794b551796183caddd0a38410954312e
SHA12eede2b7fe06dccc879dfea2c9a734adc2188abc
SHA25684e643d5754b7ea78826e4087a3d7957fdd5c2cc83854a0cf12b81182b895b9a
SHA51205ec59252bfa3f51c7115aa6e757ae9f9d0cac19de81537367130e84c3586c2072574e5fe8a6160bf025a36920923ce96c0a89324a808f96f409667d019ca53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59762f1bf2153042e18ba37d97f347f6f
SHA1771904028e07b535af92b368f240752b477e889d
SHA256be86ce078b579b951e6dc701c82a6e3e81651fe25f81237127316c65e9b4510c
SHA5128ee8e40561819d39a6e62e4c2898cce2958b3866677c98f937d296019d3d832aa9337f714516149283300d3a8bd1c0390f7d127ae38736b8314a347a26afb909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743a0de3d16d406f1ff9fc2b1e81f7b0
SHA1244b1e4b044de9d58497925c183ea470599bfcd1
SHA256cdd0b47e00809b93af8a389d33a9c261a90f0688822bf53db4ba3235819e0d0f
SHA512e75e23a8f4508c265034262c97ef241fd3a025be164b0bd03f9a494d87860bddd449e4012a2cd07d2163c7af4e9f87bdceedcb68919b799fc58a8f8d5009adc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877beed8c3ee723f9dcd9af93b7ccb34
SHA1dac7febba5ab60ca95f9466002fcf722897f6b5d
SHA2568d1208f334ae0ffbc7da5964228f363f36baa919b05aa23770404caa69f6949a
SHA512fd7551a62ae7e743c7ce8db59cf4741e06c97bc5d1df80e922f94bd0cea2a42e6150c86ccd3c821e6694fab14e2aa175281cc09e22fd91ef647053287c0079d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0dc651ac85ca81dbce53c3ce5df0f5
SHA17a0c6ea6b7fa41d5949ce4597a9bc6f31768e893
SHA256ade686b0eeb9819b0c7fd7ab1159e4be606903c477bcc1cc296892437c3c6188
SHA5128bd85bd2124014eb120985ce4f5a16638bf2f07afcffb3fb325483683a9611d0216b3ee7481f140c9c1c60518abcf7e1ce2acfea79898c914883f52ad28c042c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871961e0ab53e1c4d43e20389175566c
SHA1c1f20b75a6df2d1cb72871348c65234a83f9163c
SHA256df266036642489e011a467bfbf187c301b0d667c340ad04e40b6de0cfe45ae85
SHA5128c42715db075f4e770d852e871ba1d56325b99f61c40eebe2ae6d7c76d371dccf96f3d8139ee53899f93c5425f714d0956eae484d5a9d66cec9ffe95820c11eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0d1922ac7fc118f84e127c91037a47
SHA164f0cc397c983403bc8d3bc152b4dc29db694b72
SHA2566f8ec34f92e01f46bb4104eaa346fd9d6aa509239d49f9e41085b51ceefb9b38
SHA512708199537a844a276aa01c93ff4a4d1fb08abcee45a66f7ac85b4665c66947067d41f7588b6ecacbefc8fbc9ec99e83a99e4f78718223ad19977f5087015233d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598476fa65fdf70f497eb24ce830e0a09
SHA1d67c9903523874323af4e59ea926ad76f531721e
SHA256392fa93eb8564334c95330dac4e2787e030cb8fc3bfdc3ec6f408d93039ed276
SHA512ed9e66894251bf4a7a253b08a37982c48f34d011ba0a00a958d8ef080afd2003e9fa185d56437cb73d77cc8b0061eda41991741881a336f1639e531c5f6e0adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcdf0de5c9729a1904a0e0afef438b94
SHA1145ea429008f8b82ba8732c3ef3f79df2337da16
SHA256ce5d664295d5710eeb4c2a3963dc9188e94128c55275fd2a9358badaae48f0e2
SHA512dffc4683f76f52973d0d4798945051f59f607c6bfc1867d040c48fed273815b3d885c53f595902acc9630fb45a3bd878ab744aadbbd2664ab3ae4f84737cff67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8caba2894b0ff096185853f77cc345
SHA14631dd385eb99bdcbcc4423da7b5b45c7464108e
SHA25602fda28a2a8e6c1c47a2c7d65d2f4da640ef6d71f39e33d648f082c1ddffa931
SHA512d7ad4f2ed3e3b07b31a3969a8a5fd6632bdeb12420caa3fd49941dcbc150fec09bace4e36800b118a35f784c69c70950b33dc75ac046305e01b815102771ee63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591db9f299dedc2c2a34a9aa72f8b27dc
SHA115f530b9a09d5d46c700cff7b0bb7d2a78e7d64c
SHA2568a276eefca8c5abee5f0af7f7da9d3a7cf2e93dd2094701de90688d1fa68a0f3
SHA5123e7b9d236ab5e7ffae05b51ddc9db6d5be3bc6866f4440c974b05c079845c3f614450436e788b8dc73c9582a536cbb7f9dbaea060f45108744a17ebd7a733f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804784d1ec24366c6ab54387aac9c3bd
SHA1dc76a32f26cbfcae30a75e4225d54c2abe8cb2ad
SHA2560b46b211554e9e25f80da12ccb5f45a8c7a4a17eebcb2c5cf020fa66676832f2
SHA512ae30a69ac371e939bb09aea32c43a9a98e9ad6be7cd3dc27aa0f8f9279f15cabe3860c7f1851396cab54c85161bb95eb2d3bf78ac22d6cd6b28abdbbc785c560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a5067fc4caa61336bf6367cbd8936c
SHA1432bf2f1fae9c9cfeb0752143141faf4cc6f1130
SHA25683d0c1f35dbf6aff4d49a0d8a92f347db20f55b80957e492a3028a5e241364ae
SHA5128b7f2143d0b0137abd67216bf857fe6f4e0b6d88677e9e54a6368cc8a1d4016b6c570c5c822971fb763a8a5013d1d33c9a58bab36e80c8ba07738ef38acd9966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92b3eccff9b99c513a1185ae578a517
SHA1706a7ae30ecfe866937065609ffa0d894c9ed2c7
SHA25688a88592aacffdf95bebba6dd4f681770aead66b1685601d72ee3547d563859d
SHA512372ac74506dd4b1af27847ae7871397ad73ec697ff4bbca7592d78af3da1a2bccf797220d16733863957276eccd0db759c91009ecda1c4f219c12b0540432b61
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b