Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
fc0ca71f2f49266d71585f8346eab57f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc0ca71f2f49266d71585f8346eab57f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc0ca71f2f49266d71585f8346eab57f_JaffaCakes118.html
-
Size
169KB
-
MD5
fc0ca71f2f49266d71585f8346eab57f
-
SHA1
4f0b1375a0019404ee3b4aa6242742431e9b55ac
-
SHA256
0bc994cde92cbdbd0840d53e2e3eda3bff13825edebeb5bcd24970a88cb7a1ec
-
SHA512
828ec44bdd527b9cfb3479124daf237dc99c593a99395da2f9ebf54f20e51320d4da416a463f854f06a49e00f2690d175c6a5727bd978ca2137768c8cdc3542f
-
SSDEEP
3072:SlyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:SQsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433679362" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008632f82cc17f5daeea6f3b5c7b9bf6394ae787660caafa7c13221703978ede41000000000e8000000002000020000000c904dfd1918bc1ea8481e5059c8b28b2053f66a9a3cd3b11800d46ed33e617d12000000092f9e69bd9a4ec59d6fa34c2d51f6a1efc1f366ebf92c5f5679361dd3d36b54d40000000973497e232b9fd5e0dcf3cd957cc3f44b3673014f7146b229242d31970ff0d3bbe1ce23e31eceb378608934a9b4a05cb0e9b346b97a1a649eb3a2174bb69abd3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4040b4f08c11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E014601-7D80-11EF-A0FF-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2784 2648 iexplore.exe 30 PID 2648 wrote to memory of 2784 2648 iexplore.exe 30 PID 2648 wrote to memory of 2784 2648 iexplore.exe 30 PID 2648 wrote to memory of 2784 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc0ca71f2f49266d71585f8346eab57f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dced8f804face600739857ce8efd0778
SHA1e41b909231ebabf538d79fdcf7d254f436935de1
SHA2560e24234d2c482be1f8bb696fc68bf721db6d9c0b452b0baf1ab71e658442f0c1
SHA51209270750f297140046353bd8c0c939cb9a18569a190697efd1537ac920e21788077de364980af5abd68f77617478d77faec85a05bd7cdc9c9d8b21259e52b358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a330e1b0a77e0e4df303ad97e683c0e
SHA1df0ce503d4334e71dbd9f35a49cbe1872835c4cd
SHA256a5096db34275971fec61f00b314fcfb9a2781f2a52bf12620309c60c165dc518
SHA5127b43652454c7a87571bdb4d1178cf1e355b237ebb3fcf2567b3b5c5d34e3a7b2035fefdaea2f326b4e79c4f4f167378df3fc7b6e3f296f1032b2549c9cb87409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1494fc37afbb8ce8a5d5e7dec28604
SHA17437ce3688cc2f0a84a130e61ee2ad40cc54ebfb
SHA256d64d4381fd8d7977a455e1ad3b44f847b0f25b1b044068d50a658c59e1505f96
SHA512bc09e9d6ea7036d4932b7d7505adcf79c0caeb6295358a4e948949c379c41ef1e0f8dbb33a2180e587114263309240ef9cc4d9bbbfbd76be5d847fb464a93263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c889658d01c39487f354d93d1c9a76
SHA1cd01041ef92a176f5aec1945fc89f3a51faff0bc
SHA2561415ae8bbece925776cc4e0e249f7e94e003a1c9348105492fbac8c8ba8f0366
SHA512554213138f323c69075452fef74fe877d4182f8ea30572db1dd6b05ba84dbd0f6d3cf06c25d3b9891e9160ddd5442f983289982de1601dcee736c73920680635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73953eee4767ea8375de109fdf5c443
SHA18a3243da28213465d3e5aa75f64721506250be15
SHA2561f09d83dc2e9d0854f88d58df6a39497bfa96577fec126d538ed79843ffb7b04
SHA512602a6a98b5935abfae85bc7d56c70e622feb33e58a29b616fd1ec2ec63292a3e9c0204745d50c40f65407b49978f0fe38824d8080a5310a5bcd8a711bc17416f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5cb5712ccef7cd1bac63d9ff684466c
SHA161134db4f567f810fdf56469dc1ed33d4437f487
SHA256afe978d5dbf7b19766c17a55f0b13c9280972fa6947bda2045f1dee9af7ed378
SHA512a3b2fcb38ef2bebdae0fbf67be81b55cdb9dcee8bcf143916974849fbcbb10cbf118085ecce26772b09e58477d6674249e45c65cb816dc288b219f2b243c075d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5668f8935b2616c565ea52c67506c818e
SHA1e6e71bde0d234873416251eda1087e590a582f3b
SHA25691c69f77596b1255aff89bd28173b770e170e4d302a407fc25d55ac05a194e9c
SHA51256d47af529f66ee216db3725f1a16d758515c15c426334c12bf17c13cc3aa4a7e50695805698146abcb2469565222547a192d15b180943bfc2b277317c32bc02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2bbe092be9380f521c4a3c14d39202
SHA1e013f9d7b32d38d539c0e2f451d856c2e4edce27
SHA256cce6b1335af1c682d2838e7d5487930e30ac6803f47846480b48b972cc91377d
SHA5125617c6d0fa82e7be2ad97bcd41e6946f73104d133262d90be797e6a504aa42d96f791d7a7117e87dc6ccd117388d9294d1d3cd445e488abbda59c171d0ce6e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596085c1e762efa326f4dd2f5da212095
SHA115700e3dd19eb534143195ff698e7e747d7afacf
SHA25626ef48f6c676d54b86b1009b412a3cbc5887299fe68e58ad82efa169d61b9848
SHA51233ae2ea4bcbe0c8a89c57ac509e87789ca0b177dfbf94b7fb77ee05e164a48185d88d7d912028883082a852ff7b5a7c4a552d22cfac5f7d32baab55e904a7f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abafd754e0d16a1943e2dc258a741da
SHA1fb5610957e9cedb54fdcc0c447265869b2613338
SHA2569f98ca4a0d7ca514ebdcf2c30f254b7ddebbc774af0c0c7487b1d3602883d58d
SHA512041ef2b8eabf7e0c6bb651c1502627eae93965f46d107c925e09a4778f0feadeba252d6c8d8c464968518d8f5d7757d4157a1d79691d4f3a465aa6ccab8cbb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54013cc293b03150fd7620c9f513c5b27
SHA145fd13d69bf663d54b93f3981113ade330c81522
SHA25636b269ba5cd9e0889b2c6ca0f7063b7b2958fda49b51e813e5ccc7d5d4d2edca
SHA51285d2579aa6bfcb0ba39f1e88cc1794d69e9574e32c939cdf707f72adb657a7bde98b9e95a0335bbb08ffd1d8cba43a0b1b70eb4cc98b63a9ee2c3225a9fdb751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82238502189cec15d53dc415bcad59a
SHA1cba91e3c394ee34ba4445131598ba3ede8c868ce
SHA256c1d720039e02e9a2305dfd51675ae615b4778c9f16d745c3455b09a4360addec
SHA5127af62dc7d5c3965dd44b5daa493b4a986ccca8b3120728c07c5f4df1dfa93ee141499ff5117324af1be22130e805dba7d556530b2c700eeb6a1d4e3f7352b131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535f8d6153d690a60823ac033a0f19dd9
SHA1f3923357d7d9d71ef266cf8885ca1e8a6582e807
SHA256bddec2db83404475f8cbe1f2c02a635753dfb4c4cb760a797b55d64d98f96c19
SHA5124e1b699976608b53a955255077da532eace8cceac71d44cb882133986ef2ea200cdf33d81b3c216660afaf62423b892c65dac13004b5994d74dc76f92431ecdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529643450c8442497d873c95c70b26dcc
SHA1b3f5ad63545b6ee48a0f6d3a39c74b4a4f1663ab
SHA256cfa330fb493def6d3f190f2d854671bb3916e47445832124edd453e6cbd7c248
SHA51274995712f251b42e0a2efcb66833c4cc858451798fb01513f03cc880b0a14bb5280c367ce6b140d62c40bbe85f4fc5aa7196287c0f6f11b0cc52988e9f7198fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843824e0bc6d85aa1d6b14294d2ba165
SHA1b2a01dd04430b4e8398ceee98612eb47b7dffe11
SHA2566aea739ba50640a77b666c2d0cb8042a91cb0e2cb52a1d84767a3b9c44d29394
SHA5129659e6e31a13074fb72534be1ad70a272357695b9444c516f706d700351d46667c0aa1435ac679487da94acbae0cff303ec166d42ff017decf3ef0c23fb98523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea8da7e69649b1b09609245719e0716
SHA1722d13bb154da5d471b9bd5f044c4fbe1fb79e13
SHA2568c0b0d38f0eb9fc0316aaf89e1d8a004125653b7440b073c0fbd8a731813489e
SHA51269da30c74d562a067de8b1ae580d1ee0623f5aae4d53064c0bb01348458f4163d210bb3de251ee1ad9fd84fb0cff95640c72d1f8fc29c38d6d35616e93ecb2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463ec45131f95cac7e42c1ff69dc4bd7
SHA16fbfbe4859887b5f1acbdc27c4e0245852cf0218
SHA256e7efdc2dc39accff4897bb4b3dd2e654878b407ba0a3caf930fcf47dddbd1f70
SHA512e1e79f2cc1c96097b59271b6d0767f878d96b9563d793318f2ea54bea9ed054162f047015b98d1ae9e437c9751983e6b1b334e8aad41103ade05c235c06cd2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3fd93333b9bb1e2888dae2b4ba9bc6f
SHA152213179c704d284f95f1ce80b4068e5cd20c47b
SHA256935e98a900c7eeb7870ddc31c1b51f9e300a329a2ef663055f7b0e0b7e4cebb5
SHA512e42829052598de8c3f37fe1ac533241ef418cecd559b01300f4d390e79c4bbc2be50275f525fc13383abc18310d3e64835669649472b4f2e7794ca5a98f1a25b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b