Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
fc2c7710b7711feaa4b6877637b3cd48_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc2c7710b7711feaa4b6877637b3cd48_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc2c7710b7711feaa4b6877637b3cd48_JaffaCakes118.html
-
Size
196KB
-
MD5
fc2c7710b7711feaa4b6877637b3cd48
-
SHA1
15477893613a682e7c82ea6d6598e5527c21ddf4
-
SHA256
adb4e07137d035a04c580b770ac709d08fd96e4573e22fa7d55ecaa24d09ce75
-
SHA512
b056fbdf81e55428f53d2e1ddbb9b26f0187d7fb21552bd41da9e2d4fc0f18c07247b65d9a284ea0e789ca4ed72dd4f759161ea4bd732bfa6e3485a63e1ccf6d
-
SSDEEP
3072:GG+yfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:HbsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433683618" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ae122b9711db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{163147F1-7D8A-11EF-AA3C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b21bd905671ac6bdfe34a8e409912f261547b7d0560de07230b8a60c27232e84000000000e8000000002000020000000454202dc52537033cfdacb5913894c96b113d9f8a7d0c05b555b5bed6d7850e120000000aa7c49d2e8e71b07df871a6749f31e213101a778d90dd8ec9844e47c36235deb4000000035bcff750eb90390c25f4bf7d2b598e19ce243e20d643d580d57d202fa4f8f91208df2e1ef4a1bee37d78b3454d42fd22c54b1f98180568e28d052f35f9184a0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2460 2072 iexplore.exe 31 PID 2072 wrote to memory of 2460 2072 iexplore.exe 31 PID 2072 wrote to memory of 2460 2072 iexplore.exe 31 PID 2072 wrote to memory of 2460 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc2c7710b7711feaa4b6877637b3cd48_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4a79a8a778d24eb83de0c2b1e26dfa7
SHA1fdad1d2902debffbaa20ab0c12c06868b9580d13
SHA2566fe961e81b5042914271a4682a11208009aea1a389f89908c7d2785079dfb147
SHA5122bd527a7287da74b95dde8a89edfd45f80c0e4bf97ee9dba7dc852d7b94de43f8879cdd816751597b757fd45be99f6bcb24628124dec402ade5f3e594ed4c08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa8cbabd9831d7d8247530554a66951
SHA11c7bbfc29284fd7df332ae49e051003f6aa34be3
SHA2561c46faa62f029e73c9135f2fe1ea97db067d0e49e2e3076af244fe4430cc4342
SHA5125a3d10d03524c5f569f5d6884398487d03f6c5a56a462cc3d1101951baa1e9fc436476018cd8e8035670bd823ac9b74f12f127b84e65168317dda4ad47bcd5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558072f54569b5dd3770bdb97dcb638ff
SHA13436c5edc32c88070a1fc657e0cd17897b63ad0c
SHA2561f1b0ad5e2dd2839f1274deb6a71eb8832799cb95f20aa3250887e17693c550e
SHA512c00211c584a111ac1136c101ba73165dcf91c86dd0a4e76fbee6417fa605d62f2504582b289a04cbccb3783489b61123ff7db4e7554e919efdf555018bdebac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a47cc26afd7fd6075c09912d04a740
SHA1c4dd112b28330e7298e8e56866f059e7d43eb905
SHA2561cb0e2431373147f4b66f1b843631818d15d18a6d5b0be4a48ace119be1f6ae8
SHA51214d87b8547ab547f4d0968253c83812b5f0225474ade923f82699bc20119d59520cd416960244aad8861a93f47c0c9bbb6ade06bafe72bf88a346a092c041a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aec649f3d529b06e1621df8848ac0af
SHA1072ae524a0233a15360c3065a4906c79aee24157
SHA2562a099b42f0a1efba2b0ca804003879fe8fd21cfa31842cc26362d75d5e192762
SHA51230145a7f44fd540ecd1b260e2fc2e51b148d38161e2d8c695a4d69924c51abb13bbe01e84aae567aedfadb4f50b921703aad3ad818f2cc433c60234e668e1ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88fb0f4f02e0a0c930fe1b5d6fc40d4
SHA117692c930b704a48191d510fe17d6fb6a113bdab
SHA2561eaeea78d20893a986e22bc3b12e231aed06f7383f1d157973f050d2ad93e5b2
SHA512836b47e8b44282ef0ae556e585066dfe835197bba78a6fcf08c3257a1d10b6c8a03c6b279fc1c2d4a89ac4f3a4d77996689804a97b8f9887255780616e4a3626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538066547a530113b8003f4899608b6af
SHA1812722685d640a1840f94c655aeacf45a02d7bdd
SHA256133ee953e77db809e7207f448f53de466058593f2207253f75fd6109e7c136ba
SHA512144c557eda1bd68e04c64a6200ff8322055d94ab1b0e27112c4f9b59685461e65291453c1b126b17eb1897678c33be0615d2e4b3b3e43c24e4c1b809ec073bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a58162afcb0ef02b8d08886178d65f7
SHA1ce09865e7979d2b2ab35fee61ee2c9590dcc857d
SHA2562b4b819d6290b90ec9ec65cc3581d41a70e1f0fa9c54700b93fef15a36f21d06
SHA512aa6d97068379051f00ec3bc584b40b20aed92268399baae410ee52d6faf5e48e64386c376aab089b3fd9a3bf3f4ee86a857924eb86ba66ff34a8f630b841b1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d376486a16d75a63223456b4bc36a4
SHA157524e895ec1281a1fbcf86534f1096725474fe0
SHA25666604307b11ee2cf408c853ed9e73f06e2b74090463f058dec1053c2f5bf6087
SHA512a0334ecf1e92f3d1f722fb2a4dbf415f9cb4ce5d46d14074077a0e82cfb9bb256a4f6db76796e1ace463f5723ed819d5d0d95b81ce37c341eadd731bebf606db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c85f6a6e11825036692f3aa5c9cb95b
SHA1bad8c482a6d67525bc4a66e04e3bcb6bf67a7f68
SHA2565e0e8b7dd5b011fd7b30757e96c3daacd29e404640fabf856b8af13b3e2fb184
SHA5122a6154990587018bf686aa2c8ee34c345abb04e560e46c81c6318deb63be39063d2e38240ed32089495706fec6d82a5420b40cc336a69e5e92a8a4f49a6b178f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0c4beed4a020560de272b44fc8d223
SHA1e6a1e06df4d6ebdd37eb0d6dda90f02edf9a344d
SHA256da678f8aa6c204131835a8eb9cd539a0bf0b396b8b0ab244fefc749e730d6603
SHA512fd023b61abe4f843f56d27923307184d3f2f72bdf674e5399ab706d2bf5659dc3fa727f2742d357dd9116b21efa30523848e85c65c68954a3ffc178b034815e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d934d8bca4707bd44d5e1faa30abeb8
SHA113e6c71ed42cc167b113c83fbd0a65cba1833034
SHA256d3fca395abdab86555f4f5c5c7d7839627a6b517f155fb1f4e36ecff272f84f6
SHA51214642ca26591a29c8aa08b5bcac2934b9b8bdc8e755b594ac65f8bcd8aed6fe1c0297453393601720ff5f5886cf5341c3958c123c04bd2141ef8c449f075620a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509622d78c5aaf75c4ee0d4b3618882d3
SHA19fdfde7804181fef3518248645545e8dff277286
SHA2564634e6a19c65df88dfd399d8a8fd9995c5e69081d21440e88962a5fca429442e
SHA512fef641e3929c897deae9a7553ce8bd8adee812051b01acb683e5c08a347bff40020dcde53478152b0f04c122927017c846fe33418e428162df3b23c009ba1d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d78fe735db9ae6d3e20f374f259c70
SHA1fc522797ceefee035affe6e9362651cefc580feb
SHA2563ba5199ea62a0fc4d5716aa1d5dd2b7d5c1336a759c85a6c3f6262c0fdb8348c
SHA512b7c1b01368bc0eda8cb5f3226bba26292dfe19ee5a27ec8f41dab2961ff5a2a09c1bebc41050d96e2bf1b9112ef061cc2a155bb686db745a2a8d9be4019265d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16d98fe67a8ecc2979954bbccd4d38c
SHA11828bcef70f2af520e9c8ba77d3cfebc681e1db1
SHA25669a03c8fdb43b8cc6dd1b6c0e5000b841376fd49610e05e17b322a420b0693c9
SHA5124f40bb3c45fe3db990030e78ddc3d41dfe1d6b1c0710e201caff8c2a74b6f27af5e9f3abc3d1ccf669cc4ddea279e384f1d61daf72d28f0d8a58d420b1aaf710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58eac4a3d20daf73f4c1344d0fbfbc8
SHA1a5edd4ba575e14dd6983d8844844220d2eaf5cdd
SHA2569f8ccdab3a82305c63de0d36d9127f743af7b8ff566325ed33f2581146756f07
SHA512651ead3ff91067b29c13ab3859a78ca42adeb87910b528ac351fafa0f53fecbf526b88c8f5fbb489392108649abdb5db47c7d0d9a8820f8cfcb096099b794239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54283bc4c759b6f80804d9d995628f21b
SHA1b0160fe5bce571861d11b68483d3bf06c464eb98
SHA2562554837493d17239a17f4dfdedfac14f03362af3df4cb59c15760c551dce518b
SHA512f5f11f2bc80c84e513eee036ae793856e8cd4e1d315a8a01f329ff6ef8a055e53e0fff037cc6eec109adfd09d4e8a12641334293110b19bb071c7b9c3fc130f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c2faa032fee6be2f23e3d555a10452
SHA1f5387f78a14fb6c64bfdcb1e9507db05b3812e3a
SHA2563ddda76fd6e64035a4ebbcf1d501db1217aaef00368b8365bab95df9a9336bf2
SHA512d36d37ab622d63e12c5af4776e5935b9037a69dd1570609f6c76d280b37d7f0db3fd8e936846721f235276be315adec8710ee5575fc26a7612c66be773903822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567f500dbfccdd9103e7c759f6a28948
SHA1386607f4ca926d38f3cb68177a43c732323312ed
SHA25608ffb359befd289aa5072429a6d2b4c8fda6f69fc816af72de2513792a96184b
SHA5122acaa6f5d09dcb7bb04a251a6d045a2b8027247ca22594b8149cdd28621a15e1090638a375bba4a8eeeec2b1f3f0e7d24760f4677464f1bed23817438abe3ffb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b