Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
fbffcb0f8b0e85adbdbac6b61d983aff_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbffcb0f8b0e85adbdbac6b61d983aff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbffcb0f8b0e85adbdbac6b61d983aff_JaffaCakes118.html
-
Size
68KB
-
MD5
fbffcb0f8b0e85adbdbac6b61d983aff
-
SHA1
d83bbd312b31c5bd7c1f2321a17e2ba6c33e6b53
-
SHA256
060a0b6e563cbe12a467874685372394fd356efee1418475fa7d02c73b2d38a2
-
SHA512
90c01f18a43963c3089bae30c44270037c91ef3f96f6f5623fc2b345c5aa5b10f485c4b023433b07381f7100855d3595d320dd482df07dafeb1df99bec299393
-
SSDEEP
768:JiqgcMiR3sI2PDDnX0g6NM44954pYoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JY+OAVTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000c9bbc54bcdbbbf432a64424f5c1be9fbccf36ce8170d5cfce2723fb60a398ca9000000000e8000000002000020000000751d62b4411bee9248f65685021392e9795f501e257e218d8a7c63398e6d4ff120000000b899ab762d0a2c7cb262a365bd4a6680c9de8d3a424f6ab34b4b2efa9db821a840000000cdf7e3257afd34af3ce5fcacb1aa49e3f351ad70cebec55c8fa1ea7c5313a9ecd2963298949ea46611326c82154f2f2c6cafb86a6eac6af58cb5b5ea85cc3656 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04f7dc58811db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433677539" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF650841-7D7B-11EF-ABB3-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2120 1992 iexplore.exe 30 PID 1992 wrote to memory of 2120 1992 iexplore.exe 30 PID 1992 wrote to memory of 2120 1992 iexplore.exe 30 PID 1992 wrote to memory of 2120 1992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbffcb0f8b0e85adbdbac6b61d983aff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51ccbeb1f665c04d892ae08122c1ebe
SHA14b6e5d7a819e4ebcf8e8b44abeedcc39ae6fc0cf
SHA2567a5adca1e4733bfe2f5586642206480942626e88992bcc5d327d077dc5220d7a
SHA5125b3856db2e0da9e2522980ea2e41b9bf03a54238036c39a36f2c32bd9bc413b4c1dec8db53a626ba55678819fadc81b7ed6b6719622dbda6510a3974b314806d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a865a0ef2bad8a395f4ba5ce17598edb
SHA1d8b68cf2079782d5eae35301977eac675684090e
SHA25601bfedc87e6e50459b4315f935022b59c95651f2200d5ededca2ce15a60f5ac1
SHA512dcf3fc903b23fe67f0f6818ddeab1f07e37d4f401c514f1ae65297f3108d9c46b325b28f8a7a140fc2a30aa21f7e631656ca03b825b9294298b1cc333dba4273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dbe0870468698dfb5784842c7f5b5e
SHA1acf68741f6da946387ff90877ba0a745eb00feac
SHA2564170dd2658c8b9a998d85290cdae5591586a67039411786cc05b66b2c45060c8
SHA512a416ec6c2cfbe4cafd65103f627e961f284dfc89011235247f8b391190cda2c2056d48ec3ad60eb53f40b07785ba28fafcbbe15eb6054ca9d0a9af209d70e6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553719973ca8981d66f1fd0569d884a55
SHA1205fdf5cb1f4569baa0ee46f142d3f941aebe293
SHA2563a1f9dac09f988ef43b23a7f4b46b5a92f6a1bbe260b99cb6ed19d69e8c56fe1
SHA512ea39bd7d8a26e3923bcb3f800095c2df00f4d78d53aedadd08c20acb2c3a47ff03ac9108d9c5d3b26abe86755a55459ad5c4e8e3d20ea26edb8a972f7adb946c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd9701bbddb27ef0a586a8a244f8adb
SHA14ee68d12e39f082a84d5c410f4bc6f57065322e2
SHA256a54929d92515af2e4d372b1489980251dcc18357d06110cd8273db670ae18ebe
SHA512f3c1cf3ea0e8ecc3c43caa564d6046d1caf3bc44543d284ea9cd1ac8f34ce853f97dacfb038a79b3d564ad824c74f762e9ea7811ae4aeeb4ed5077e592f0f858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502446a48fe2108971597f6e3d6f6a317
SHA183a99b08bace17c2a97042c628c7bdcc9e23b3f1
SHA256e79055c72c9e6194eb9b1d4eead89b4093649b239fc9176161da35e295e12aec
SHA512c16f1dd82f89468678d6f99699b2b4475beccae80ee53a079cad51505a5032a9a8ed1424fcb4593ad8f422a101e9f808aef055c1d8c9773b0a1758da7a4b3203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3fc4ed9537fe22cf3ee7992b1c5f74a
SHA1111718ad81ea60078fee35d6bc67a7a72ad3210f
SHA25602204e165e6a366ca97061894a34b25797f343ddb8ec6ada98d0a6d14f5023fa
SHA5128223d485008e053471c3e977cb45d0d9f2957b1c1faf1402a0144097db3b98a2a6df2d8efaa5364536d03380e2fe793e7735730e2c516a923021592af994a65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ba3b109f8359f440133c0c25b21ff7
SHA17b80bfc08fa80096568800b8fb2d7d380b4251c1
SHA256a314b4665b2f8fcc87693d64649dc0ca8286c576df7a216715ca731ef72d01be
SHA512b1beb95f73bae18d54b50959294b4cd4f563c99913a6abc4fb8c251da4f806418e636c315f01682eba91c46d7b17aa9f0c810430b53d11cb0cda2d334c8c5a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5606f524f08746dfbe1d81e478446f1d0
SHA101e672e5436009fcb6b769997e4384edf65ede3d
SHA2567f1f3ac6286f4c7fdae9253d547eb0a46f09fc77df72618097f35eaab3d1c8fc
SHA51276730415b43dd750eddc879ad221b1cc368f0e4e9695563b2c8dea210f153afea36c07aa0da2f0efa76c1e53b5128193347eb6d88d9bb52c51931c7fe2226ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550fd0ad8fb57885252c6465048054c6c
SHA117b37c49431c23d9c918a96910b81b333238e0f6
SHA256d0b28bcacf207bc519846996ecc15ac9f3b673c3d882e025e7d06b5612973546
SHA51289d127f45607c56589630c30f4f5c5e528a481e2cfdc51d1f34bbdeda147c3601f7f0121394f79d497537cb7bb1041db3f15240b4917519326c9077bfdc415fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7faa9dacfef1907b2f58f097cfedb99
SHA1256ee4c3d249a2b205c980506af932b47b4d0d01
SHA2561cca05564e327762c7ebee80005e3eda9269bc363ac38b74e818fa6a5af7eb71
SHA51200db6ab4e4c95e309128f2be4d7e44d7e5d6c847dfb1baac2f12fcca0230be4a74a3c3e79f04e9ea1fbfe28d2f3cff64f1cf440f231c234c20f17ef81239227b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5260b69adfb4acc48a937b5c8ac41ab3c
SHA16fb853fbdf8ab423ead5f163ad6eb4779294b515
SHA256cfb01c5416fe97d764699d463288bbb002e1d08c66314302c523f4f6a133485f
SHA512d549b4d100e82a33dbc0387ff4bf85a2bf2203f0aeaa276ca2e99de630b40fbc34476e9009777626ceda9946548012140dca7442b90813c47836f687d1e2549e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300e236ec45add8b2251603127e227a1
SHA1ec82e7f44caf9f7a351cffa274b08373c3c881f9
SHA2567432e80d673b2753d2171bf28c28d4a359e40d46e334efa0c1e929e7221be72d
SHA51299b84f9332d6d1be0aee07e5cb39459ea612d736590ec624bbb81561221268c0f55a4ac296b3b221f7c13981c988ae6aa0591a3367a1d5653653f4e233c36af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc90cb2ff4e817373e7c72e34c1d0b8
SHA1ecc2e17ad68b539686b7f2451d7f3020d354854e
SHA2562aecb1092ec9f68b5c4117a50aa84e2f2cb05b8ae7c6b7518925c1e0cda305f2
SHA5121bcd82d4ef7ebb97a6ebc57d4a2e99e6aa5af9c375c66aee82aee342bc7cec69f973e20509e5a5bc47e295107f699940a8a432fd2acf11aa9ab13640e01393fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a562a9929a562437807849ec23a867d
SHA1489857bdce567a10e35f5e91edd32085b9d11d08
SHA256568ccc54e2cd951f8eecdfac51e9ebce7d8b633d11e674463a19bb673d8e949b
SHA51225fbc714eab73a9904637a9a206b503ddf4fcf4afad5e57abf444d54339d69fd8ec0054c52aec5c57b7269e86bc0035346ebfe2849941d140c2c57a9c3d9c20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c15d11dc7cea82c59b20006cc7282026
SHA1dc2a3c9c63d0b2e9b75c7383eee0f69664fac31f
SHA256b61bdf9577b5c0f59c36c242eeb884f74d91653d1411336fb341ab82bc516ccf
SHA512d08c80c1462c7be4a27c68e5c01349bae45ef3710d2aa4a11bff049e5564221359892f872af78704becc3667fd62497e53bcb4c5841559461f28d5ea4006b1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbacb0d7eadb5dd9531a003345bdf41
SHA1a1cc274232fe5f5ab99f77f24fb54ee29a24e496
SHA256c8057fa38e2c9e3c3722e2e861b76142d579a0e8e649c94fe6609703f2b3374c
SHA512dee29366202f177735413accdace01c1cc99e37dec27e464786752d3ada08286bcb675698e13242e0b32f49fdb2f600fdc993813b151aee8dc8b898e2b7cbeef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2cdcaadc11021931771bd7200dc7159
SHA1df50b3ed3914af301886da9cf41e76b704f6035e
SHA2568796c0966d0d0109847034d3e14397e4a677a8b41b0a79fdf0c08378e0dbd794
SHA51204d2e2904aeb1145b1a0ea8bc414cec39e23c518d0f9d73577cddf3217778e68e474f02910e0b79b582a5d3773587aa89943ebd633842b06cc65b96547bebefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586cf1765266acb8698dc51c7eb42eb49
SHA1b71e0e9373077aa4228e70b26bcf41a782407b79
SHA2563cdf471a37a8ce6a6a6ddb032ff747600f7b9e3006c5bbb90de0f7f6c56e4047
SHA512606c6438ac989b69f2c6eb5b3a37c8be23acc8a32c21a8955c86c951921a2f9e2013184152eea43a0e54dce9129194ded147422bcca58e6c50acfeb325df3279
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b