Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
fc03f462dc4db1ae2dcd9716197833dd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc03f462dc4db1ae2dcd9716197833dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc03f462dc4db1ae2dcd9716197833dd_JaffaCakes118.html
-
Size
55KB
-
MD5
fc03f462dc4db1ae2dcd9716197833dd
-
SHA1
b3bfa0cdc248b1ecd64d45d1100360defb363967
-
SHA256
90251f50aa623d0e70958f3bec9f7bbe28ff170d241c01f3543ae16172bfe6f7
-
SHA512
e5b41197323638f3a398916103ff0a5f7e89ab7e270e7bdba25a5fb63657c9dbd6b2b70ef8e941780eb8f48084584003545d2007095909573af83a6236e4e416
-
SSDEEP
1536:gQZBCCOdO0IxC8Xxxbh3hZZ5VHFpjhtDdsi8Uln6LshX1OSsJs11XIsAuYa81kaQ:gk2Q0Ixlxbh3hZZ5VHFpjhtDdsi8Uln9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433678232" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000c65612ee3092f4739ea11137526fd4cbbebfad24b544f3f770370e2debd3bc4e000000000e8000000002000020000000027bb9b4646832de614047bdc5f441a50662fbfe7186f8f5a4b234667b95a4da200000009f729eb1604b1559964fcf569e97af52fe009874383f189b2bf0696be05bb09240000000e08af7394478e7aec20758638c28c6dad82da58732799b750c3f0624becc37e68acb3bd4f633c0d24adce929ba0936b4f7770cbff2889c01d6cbcf9d9d656ebd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BDA7AB1-7D7D-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b027ed628a11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 iexplore.exe 2476 iexplore.exe 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1860 2476 iexplore.exe 30 PID 2476 wrote to memory of 1860 2476 iexplore.exe 30 PID 2476 wrote to memory of 1860 2476 iexplore.exe 30 PID 2476 wrote to memory of 1860 2476 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc03f462dc4db1ae2dcd9716197833dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50866c6cd5d159be021f7e5870add4c85
SHA172d317ea0a65b279feb0300fa830211e60b78cb5
SHA256aa5912c30204af9bdb36dc87100bea97d78f17a2e243787ab24d2f0a1f249dce
SHA5128893ceb2c07b8a1019f137694fe89e5af214a6d862ec2ac7126c2ff9d0fa916d57b7df48a8b8c1cc47b78bf62af5befd8db4cee072a694d9e084819d99ebab4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c206409e3627561fb2d35267e8dce5a9
SHA1e7585b16c178f0a57cdef47042de59f6c2943a2d
SHA256bb0b8cb4cc514d0afe5edd9161e69d5b2fcd606aff35bf4948fc7b14d76417c2
SHA512c1a783caae46160ad8017e8d811cd1754fd01fd588d82e71094861d62e76854d921c19f2231569bbf0755a3d59972216288a0555ca84448b812ae27e56a69a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5610f7322e57df0d6e68f0824a8c07720
SHA100ffdb4dcfbbc9fdff85ba9714465ddbd5f7064d
SHA2560bb4f8549de400c9daa5d560514acc0abf94edc6544fec1b26f843829b7a0c84
SHA5125b2a784af2b8e883e273ae5959813f07ae7e0ae26ea56a4a86c33e1d3cf91d5ebe14edb1fa33080a96179ff80804dbf41621d69fcbc877b934e0e3b7fc0e842f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b3ad7d69b8172290a8ea5c9005b9ae
SHA19fede6af86dd0da7cd7309871d1f2ba0b674ad9d
SHA256f297a1a29f9c42f0e660ea80697c1f7feb6c3398e073773b3997038abc8a8b8b
SHA5124a549de73e45f4c33096effa9c2de47406f283e609327137e19c9090e960790fe00c4bc64ff2237528ee518654f89ea2cde5049e47f2ce42032938399b3890f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576a4501cc73577e08cba61cad51e72c
SHA1d7812bf12cc330ebb5713d8c8e170fe2bcff9cf1
SHA256ba63a081aa144db71bd9b3f1ca9e9d8b7b4908adb83ea83d2503ac3ee7b45743
SHA512b7f246b20bc7c3e4057c0cc5abb9b83a5d606da0fde752b29adcf6ad8c79ea7475f4f465ee989c980b17e19b64ec3d863849939364e2e980fad4cd957e9daeb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2aa1f4fa8b6d13f197a8f7e0d6d032
SHA1c48826219a131621c4c0ca573a1a0704b1d30253
SHA25696383d4cfe2013bac538bc8e830ff48af60a9ea60aaac35c108181581ea85a31
SHA512351fdc8ca28657e1de79d6f3a78c0b2c7710f28e37ca20b0e31689d2363302a64ff408049e64157465cf6a45fdb76d3c2c990f96605fea887984df6da9fed89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1a56c1a2e7c1942c56cc6f5ffef645
SHA148f6a44b48624e13ee33f6087fc2be2b72356344
SHA25694abf7e98054e9d29dba8e6de0baa607b1f676a8b4b5d9dd2903bf498eedae3c
SHA512eb1027f9674d605140f1a42cba481b10f4cb8cc2fd492cd441669fa50754dff9b90576f52740bb43539777013aabe55b7760259d4e16139317d199ffd1b2915e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580dfc4af8049b7c253dbaf1928ddc48
SHA1b6be5c271ac0c86a0a9f0a124a933e7ec374270e
SHA256bf6159bc1dba6f73dd885f7f8dec124062e08a8825d6fd84b2cb5112af85d2cb
SHA512e77515cd42f216b800a8ff7a865e1a48bbe9d212c6b1fef085621823e73782f575f3b3d9f6e5ccbce6f9e918333514d8a280c2f16ed056902a2aaf4d896ae0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a12764b0b947b8ef04fb469bc151276
SHA1c7142f71a9e8480f98ec974a03d0d66bc87c03fc
SHA2565bbdbfc600404dab4121dad7f1310df4a38cf2ebbd63d46f6535487a995a0375
SHA512bf3d1b02ff1d81d9040a2212010aca0cd3173814e884248bae59302b0b0e8a9d2649dc0179c0eb18a43ac2a58a49bf205e12d429cc873888fa00f320cbb594e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c050998a18bf5be5a429da2b2e2a533f
SHA1d4e1e0189af9f456d86a095056030946f4812752
SHA2564b1021ca93914a50509c4f0d3304f2879dc605cf70b82f8008cde8f199b635ad
SHA512bb57b16f42507a83a51ee358431b4ad82134d1a73f82f951291876e409960571dde6961b3685fcc4d8373c864ada2ed5304c522e1c67b701cdffdf59884774c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc512acd172a2787f07e4f16ed5e871a
SHA1d809a1b2c4d7ca05458dff04f03cbdd8161a1951
SHA256edd8a55285007ba020eccd4c6c9f8e15bb8136c45e6ec242679ae0ecf727d087
SHA512c034a20ae310c34d949044793e1401e7fa1b2092812be098f63d14be94b821b11978a8af8550e9517ea85414bbb8275c40df6466cd44394141846f02d2cf1212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c425410c52c4f592d09ec782724d7c9b
SHA19fd64984113b0b204d5e94d580e9d4f0c1212d7a
SHA256f046d59188bea58ab120e65b6db4e8864c6f99a3a12b76518d75cab507b19b9b
SHA512d04068d0fe3482c1a6a9eb551bad9b3e587c0b032a21e1834c0377a6a8efdd23b1d8f6f4fe5861c6f35bd3050daa5bdf9f44148feea62a1c4e0be9588431f868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14639cc6d4f4b1510e4384aad7d24c6
SHA1167473bea48019c516d9b31bd847d478137b555f
SHA25684842ad063f30b92e38e5f33e69713b0ca3abf1abbbcb59483860fa2e65db577
SHA512df1682d22d8d38d1f759338bb7c02dc22f9bcbc23a37d4544f567c0a2a6f14efd92f64d22fa39968cb50d542b0630e9f53dd28e5ccc9220b11c4540ed0dff5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572efca8c6fc8ad0f10399b36158df69
SHA1343d1ec61825d434dab957a752ac9af3cd2e0a93
SHA2562952d583a03c3795de6b2ca27c835682103e77028cc4e314835b27892e1e90eb
SHA5126f534c4827be9793003e760220a15c307791f707aca718504f75823c1eceff8935ced648a78ed162f2b717e266257b973abf03cecad989648dd2987982d0acdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a92a098059c7118b7f210ac0c65801
SHA1158999fe0a7ad054affdf66ccaa54fbfd2f35180
SHA25660744f31a7d10fea7122d8f88d7cf5c95c4cdd85325938278c96b2df88eec5db
SHA512e6d4879460f861db117b78de67f156ade7ef581969ab220e430b9afcc482225c79b5318259f96849c71c177bfaa61dc7d10c4717db35dbb31bfd0e4a07ad2a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55baedc3a0007da8115650e060b2a0389
SHA1529a74d89a67dc5f53237c87675aa742fa67c443
SHA2568a0b97060d4d4e5cd4845c07b7c80acd622d6b304f4800fd2c7ffc2217a56c95
SHA512560aa465a1f8513e6aaf191abbed3e8a897f999bbdf6c076e6831e811e53621044e17e91c5a940fac439be89109ecb6b1061f37bd040173b5f6b1e10eb4b0286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc9671ef384262e5d873d5805a0c5688
SHA1ee6ed2c2ed3778f70ea53aabcd0c90d079f78de7
SHA25632f0bedc05246c75cf846eddd789f810e54bdd2290696ca9497bdae713406f08
SHA51228265eb50e171c24a86fc39edabfb69aa9aa4356bc274a2459b2cc5f68d0517ba3e4704bbca4c3fc7c6d36de3ecf04b7f280f3f056a77ad0b6f3371c2249447e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e81d17b2b7c72a21af0140ef984491
SHA1c9731b296a1e4b48192c3a88bd24ee0b200e529b
SHA256f1443d4e45c7a93c027c05cd357ae27761ba87562645bc9afb878b65b4a53d12
SHA512ce397ddb0272db57cfbb4292f0bbf782aa67ab0d72bf3870bf7eb3978c5fa256a6baf964c6fdd72b83501fdf8fab97516c94db171d3825e15ca0a1bc37ae397d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b