Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
fc0975c4ae65ccbec125e87660980d34_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc0975c4ae65ccbec125e87660980d34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc0975c4ae65ccbec125e87660980d34_JaffaCakes118.html
-
Size
32KB
-
MD5
fc0975c4ae65ccbec125e87660980d34
-
SHA1
2413678e774acdfaa0ec11c1ac080c2ed3ba8771
-
SHA256
d4e07f07d78279d120a9161135b610a11ebb6556239deeb45e76fab4b2d15d45
-
SHA512
1cd3b7e28067a40a4777c54a117eb8fceee9e5b7aa92be5650160fdcaa06343ce01ddaa91393739c7b80260ae9e515ef9dfb0192795b01b10a6a1e5b97cf3e95
-
SSDEEP
768:Zcd9QZBC7mOdMYupC5I9nC4D9jTXbwGwTweMkiPd:gQZBCCOdK0IxCOjTXbwGwTwBkiPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B499361-7D7F-11EF-B9F2-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4082bbf38b11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433678901" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000001d310be96ae670b005441cbe6e2845f534c7c1b43b572980fe6e56cc12526b28000000000e80000000020000200000007f6bfe2bd459ea865b20f717c6910b78c55b07b9a7f4d4ef3af66d1db58e517120000000739208a111be0ca6cd663302acbd9f0b37a7a6e6519f952e401d4e1dd0f5f61040000000fa96639cd2684b8391cfd88c9b54052c9955c2000cd5fc4a5afc9aa1d6ac96f163ef235ad6347f1bfdc63fa4729a360dc0b3bd8746d326ec8a81325aeee2e45e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1076 iexplore.exe 1076 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2428 1076 iexplore.exe 30 PID 1076 wrote to memory of 2428 1076 iexplore.exe 30 PID 1076 wrote to memory of 2428 1076 iexplore.exe 30 PID 1076 wrote to memory of 2428 1076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc0975c4ae65ccbec125e87660980d34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c737c2156fab5997fdac742ca133a7
SHA1d97115fb51d84bd0840fe0dcfe8f775706b4af04
SHA256bbfd6ddd56a8bd59a5ca33dd2e5b3009d3f5f72f31b7ac47553be6fd701a74fe
SHA51240ceb38e1b9521cd68b62d34bf0189ec816ccb491ecd3be00d60cc035277e949063eaffbabcaded11faa1bb785dac0148a776faa9eb993d0fbc6d3337d514e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e386a9e23bcc77468f885e0388bdee
SHA176803c2d08096d229de72e16ba1af51e4a7f00fd
SHA256155281f3858379cf9fda226ad007dabeecaa5cb52ebf8c3fec003d509ee823a3
SHA51278dc4cb5121a1493be3ffe6db60572b3e1c41e25bd8f3085f17d9d08c69c4ee01d57a3bdf2bfea99c19a2a102aff5238f12fa30ab080c97e5de5a1d72e3345f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a4bbd341ff7958c13e941ab20e6521
SHA1a446f93edb5952ced2c1a10802337135e10f5150
SHA256ae5c7ec9cff2063811f82f18ea8b3ea128204f7774a2a22f5fc4f5eea565f7af
SHA5121959234185dd674c6d0d0589ab1ff12bd6b0a84b17072e79753799055636c38ef95a259d72b813d26d10ef5d879abca16e399d611ea7b97c3f4174ea4c4773ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebfdffac027843a2cc272b2c3cac801
SHA1255904383149ff8f363c73ec120c278a338c3f5a
SHA256ffa494f97c1e9d9a60af7fa1d9fbaf30ba253996cc2bf54543e81e88f0d2f31d
SHA51211e2086df19c785c2eb48b6a36c2e32cf40cb8cba3b7bf2fa9737c5c295fda6833a44e3db004e195a265be0d784bc1c51d031244ce12c0092414c31a39054d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50923eef79323647631f74c6b1ff81570
SHA1e3b60f0e1a2a7e8d51b2be0acd949a1b228e061e
SHA25695928cfc3c6360ce1f7d716f93dd2bfa453a45534d87739dd319c76c296050f5
SHA5126aa17587316e4c83c5c9d09dfcbb41dc451d9b1a5709eef3a8dffb43d662134bbcdc3b3b83b3f97407197e2f322e2443491fc9ddc11815b96de490be987c955a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6bff5eef8fba9cdb61c8a4cd6947572
SHA16c3c455ce5ddcf01ea3ef8a4281e5ac8f118f211
SHA2561412f1de8f9a52cc0a419c70bd4b16c75547ca91f629afb227d71b875fc42b50
SHA512d1b318e6acfdf052449be25705a24a3651318d4f70823d66ce263820d016cf75c3c5e36e3322f525e0f03b34fdaca8a5029ac53cf2b2fc540d626ac95396733f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b686207dc75d426f0a10def98723b59
SHA18f819e2dcd56a9f768f1328103ace8df02109c59
SHA256a41c034c9e54945366e07f6985b67c69c8a0a6a39b618e0c0a39d18c853c1259
SHA512ba6f2e90140cfa7c65191491b6b2ab2e0a59c3f9fcca7f0bb708813f669ba1138151c7f34a021e0e360002a82612f607f5d1e9e30262366cb9c1665ab6bf1186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594561f113b0e279a901e41bb2087944c
SHA1ad1d488d6a477518964ecdb5011746aaabad1f6d
SHA25688db81d58cbb2452a1c26dc5fdce5a9d19f2b115fe550b8f8d873d5ec31d2cc2
SHA5127df0adaa26df18ba35bb0ac7fbdd63c303ce734402f6ca88e7cb6e2735e5897262ffcaca3f06a41460d2534c00ccd17cbad0171aa2412e9f5966ed1d3d39fdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad3f6eeed82c6ca71ba5ba9e3aed650
SHA174ba7e00ae99257b7480e42fb6415b8fc32bcec8
SHA256631378797953082da41a978bb98438a43222e90b015b0fc4691736c2a2503095
SHA512114b233a5a2520bccfcc050dff9413536022d0c757e97f22fe59f973836eac88495a5657761ff2fa210e552f883d98ff678aeddc36cbfa95d011523491e89bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14b53990990900afd037fae3ce80fec
SHA1103d9547b9976eb95fdc4794eb518139620ed3fb
SHA25620c26d925bcd353854ed087cebcea79476211435a7f467a2706e8cd8938bf126
SHA5127a99d9d586f662b89f35803c1660920b47aa8d1c3e6cadb4befba6ef6ab83296c0da167cc1db64e8f19a8c5210e0e32f6fefd0ff4dea5536c3541a4ccec5bd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6b32768847e6be5ed1a6280b4f1655
SHA11bcf4d68034dedd3fcd4e8d2ec6b24bfe7c9e9f9
SHA2567f91ac0db818a531e6886a59aa886465c10ac0cd61a89d1c5a37c943e8f5d249
SHA51271fb8900952bd9e76c79f8f854a9494a1f76838138c55ce0b275e548efa981905c8b7495c7816518e96b1ac314413c234391dccd1b2eebaa76416f6faa95e470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abcfc3634c2751a8f13eb85a9c77e3d
SHA19ac9b1c975d7ad47e2d4d6b56eded7a512fa982f
SHA256fbb28d7740379bb010ed457c7247a3fd8d399cf88aa75f21541961fcfbe055e1
SHA512c2be38bf966f8c8d9683f11f17e2f53992867b6c85cf926268460532a19e55d914615aa46f914e9cd791b67166e85377915957f32fab37ba88d39d0082fb30d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56477739aab2265777c8e85f64326a49c
SHA10025f3d9a0fa209a45f64b02fb84ea6d0fdc1a1f
SHA256b5d78c2bcb0bbc4b9c8c1d8b7377f7943ad7580210514a57507814958be3e46a
SHA5120a59a99cbbec09aa4cc1d8e48645650641cf83ce9247f2425c0ff817d57263be306dab6f96c4ec1e3f3638bfce605c9545c82d84e8cb6ce96da1cd8a3dd82982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0218469405b99d0eddf68c5eadfbb3
SHA133864b61c2586c9116bad4cafe827808295c0c5a
SHA2562d7e120fa70bd638c0ec135ba4fbaec374d8753e5f656e45741bd7165c231591
SHA512d144e4e85efa5e7a01e0bccd13bec81e5a25628d46755128ce65a05b8cb9450aa61426eb3ea4bc8e2236b65c350c2cf67122941869379377efdd60d8d18ee98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d03258408bd866136fbdb503f70b898
SHA14aeb5efa189e99815cde00aa2b36eac419f1545c
SHA256d6e75ac7a15a54be313e3bdd48bd231b30d41f1384cc77a2fdedb55aa8ecdc01
SHA512b04a4b8b6bbdbf9bf07007f373d55d4139cae5d91b0c0ed2f22850b3cdee8afe630e52309aaa85ef59fdf090c240d79d72c5038bd1d29d7c85ed95a943e50643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0276873881beba25958274b7acf0190
SHA13f9828312abf55b7300a1f3d3467155edc80ff3a
SHA256b49ae3f04b753a86ec0364c4837ff877aaa7e37d138104f0028041a9733320a8
SHA512e083fdfd6895617e95278a0a71252fb40fc4206acdd1c760f5af15251f09bf8a0b7ba4a5eaf5bf157b3eb553cc024a9c53f44626ba5f1feadbb40bb125b7c1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f9cb4d216c52177da640d0ca44d580
SHA13992d8e9a9fd38689b6ea5104784fb4eb93189a8
SHA25690fdb7515c2ca533de4cdd2660b131bf9692428d32f66c88b444d7291e2e09a5
SHA512517baa0fbb97ee41fca3313bc073a92d49d7cda91e9d5cb737404f1b996f00a80d45fcecd762fb9e89cfd3d5405eb710026fb55c1a065e13e30fb4427d73090d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b