Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
fc24ac339121a771e3051592bdb4cd78_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc24ac339121a771e3051592bdb4cd78_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc24ac339121a771e3051592bdb4cd78_JaffaCakes118.html
-
Size
1KB
-
MD5
fc24ac339121a771e3051592bdb4cd78
-
SHA1
58002436075b4a7e44a1a1720d478db9e1573c46
-
SHA256
bc9df46575a45156e9599a958b885e1b2113b2e1102ece3822840bc8a07f95b4
-
SHA512
e28128a1d18f0fda37e706454a1d93843f2b3b9753d0bf72605c44cb1337fe0b4d0417ff9b981df792b201be3aaabd97423d13e35f498a71881e7986d0aa3a52
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b8e90b7bee7b769ac1221859413912ad52a7e8e2323ae53f11fc72f16e973bb8000000000e8000000002000020000000251ea184ef05a4e8a0ec24ee0ff686770e6b3d1bda9151c28c9c28ac5fb0e4bc2000000086a396cef7d5efae88a2f3e1369e96925424ea59d8fde03b3183885bc6c7923d40000000d553aa53641459273adb5aae96ee611cf14fc40d46531a061a90edd082b8ffb5feb62935f60472e47fcacedcf719aa5b71725adedc4d91c6865de9e80f5fefae iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433682580" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC14CCE1-7D87-11EF-B462-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0232d829411db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2148 1956 iexplore.exe 30 PID 1956 wrote to memory of 2148 1956 iexplore.exe 30 PID 1956 wrote to memory of 2148 1956 iexplore.exe 30 PID 1956 wrote to memory of 2148 1956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc24ac339121a771e3051592bdb4cd78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541069c7cd07c93906a88f68559783074
SHA1235842753f90ae582445e4e74d355e8afdd8e204
SHA25624e84893d1711466f223e08a5830ec505d1ec03705398cb8e3a83bbbbf43b4cf
SHA51238fffb2c4a14d26ce0837a63e23992a2575f0baa051c31243b7e5982424cd3062f4f1ab4afcb81f838a21ea6a8e9b84d11673f53175368438fd12a8b84dab255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e795bc2777ae3f0188750846e7a075
SHA1d609937af581874e7f253a988602094477606502
SHA2567ad4f0ab39b5b84870b09125421d4587e79eafa385b423d93f5b6f6ad3744d79
SHA5125a06df6f01be76a8d4f6f0221e78e8f4d188b945066340a9a3ff39d0b560bbef21c11dbfe47dee3e9ae4ab77f8f97a1638e605ef05dd6c6cdeb6054a5d786914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c6f4bf0e09b7582c49a548caa6ccde
SHA1820d28164e7c308722085f902ab3e1956e442d79
SHA256d0026b8a755c27dd9cda9c987868a925e4c0d6e4072f7619ac3805452c9b6a94
SHA512ea442f667e80ca1b635367d6b0cdbb7ed573e1486f7a018ba2d76d57e38f95dfabe9ccbb1aba0d51e0b02f87f9fc7549b95c6b5d55d11053499f982c647ced0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a385e9820b666072f213438664d3bb0c
SHA1c42509a0c1f8c6cae77fdb2eff77e36865e9accb
SHA256f1c1c6278b58077c72110bae4eff34d090abd01a2492dab256e724d0cd0dc020
SHA5121952df425ba1fa96ca3505b70e21151cdde05e095394fc75ba805d5598ba642395cf90c79fcaff9e9e7771be7d646fe68a35162e54575abca031e33a8d419b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f2e5f01a1f6e2e54634d67c874ac3c
SHA19232c3b95e741348300a482c12526e161dc9b4f4
SHA25609a36ff414d4673a67f4f9fd07516f73ea8e35a63dc52f80b4eb67ee9038afbc
SHA5123c003a3f62dfe7ffae89cb2145dc4619dfc846665d970321a6e998fabb4490e7d09830fa5672ff9ba8b74a4c03d8db4d414409128dce6cb6b5209dc6b3d33daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55034b234edac958a835193c146599496
SHA18edfc7924c4a5960f201f44e81bc884256171aad
SHA256e5e10055716bf72471a1e7ad4ab7f72ec88773db0a1709e849dc4f5f67ffc4f3
SHA512ce9a2dd2868c11e82b40276d89b8a78c1c717f793626786bfd1927b1ed71ae86f634013f5c3204e7a7e58968aea5f715a53bfd8ab69525b67d30d4288fe48483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1a1fc1d82aae6e6d0101d10dcba116
SHA1ee137b1927cad01e6066f7d3459cedc26dd6bc3e
SHA256d465bf15019cf98347e2f3e87dd039fbb78b5c742dd9e5e33419bb8d5b58f265
SHA512445220493129cdf5bfe4e07379664412dde99caf10ad45c627271f2c9a374bf4b6a07ecd613c66728f9b1f985fc1027e8fd8fe48317f06e8413bbcbcee59dffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d21b082c254ad910d49298b99138032
SHA1a787d47b602b99bf19319f3dc8c5693cdda3bb62
SHA256db98424cf56e2352c275d57e24d5680f8b89b0e591d6bce29fa8f2ed73e01f3a
SHA51261423a6d135a0efbdead1aa08b825fd0c5bbc31a1b13e98ab09c13f88417bad6464b152e94289e1d0b94811bb2bfecfe6e48e807aae07ae3fc4232ea03269249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531728212372545a38c2a62864e875681
SHA13b0ff44424e2f6ef64abfe891d6c38d66c76db1f
SHA256bd3431553f931929b6c829aa1053047af0364af8fb7e5c4dc50c8e03413a056d
SHA51251d2444d32f0c6edc5ff21bb30830126f4966b53f430e28f0e6ed900e23b7c31661d7962ffad6c6033e02d584b8fe1f1528a3260d94c518c85c658811b945980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365b80943dae27ff86661738bd91bc78
SHA1c236bfecabc4702be3e147baf5a4edfea2af0b35
SHA2563e7ff778eafddf6f8a024806e7006d58bb8bea55ee5bada0f77a1a05e9d12bec
SHA51280526e0dcb4fe7a9a68bb39c156e2af816c7e84728c63ded3b5149aede94625acaa23592555f5e0e52e99cd0f8150f7cb9c593669f54b4d2021ed0386976b634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c93964be3a091ef162ea95b4cdd261
SHA1362bd9f0a9605c050615a68c2e1255e7b9ce4ce8
SHA25656c4e31d3f2e3a4a80d6f66f471d6c2a62821b385f51424e42b973104d4a91f0
SHA51247d71b9879be72111ee38da15025901c5851123015483d5686206c20779677ec53d6cd75c8e8e943f7c3c3d8dc3a0d9830b408989010fe03c4c96e3d15ed6a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e247c08608a65e7bb062f0c9139cd1
SHA196a8f4abd99dfccfc7a9c7ba4bbef41fb6c00d7e
SHA25608efc19a41978ca61bdea8d85f4a74efd844eb2ce18736b6e7424ece461fc46f
SHA5120b93d759b433954826562c6fc622b9bf80c23a2b3b7bf0fd83c7c044845e9f1112cf3232386f8c2d41ed16e073b9921f8b06fc1ae1f8741d915c4e5ee43f4c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5a573caad3f4bfaa55dcfda4059272
SHA181fc4f74fb6e3f28159276a5393b570d1f142b5d
SHA25631d86358536c32dc774abb3c7a57c6a0c146c6aad43ded1a0f341ca5b10fa613
SHA5123c0b5454e8aa1600fc91f0ca78c18eeb2e3cea6221bfd9a6ad3aa5b6cece43be1bd7f539ceef08304f4e4f807792f17902bb3c7363e6ec3d5ea8a54dbbece692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7b2c4da855da54a609b40a4cbb877da
SHA1d3f668a2407f0cf4aab5ac1afb0a575377b3febf
SHA2560743dafbbb9dffa49334a506c686b11401f30e83f5007d4b36d96e3d63d51853
SHA512402f2f68042964073c47b3c4e4ae80df04327fcd917805c9615af763b600c86355694e12a8c398da22aceb04eb202b6da33a1d83210b3d461b8ba3305f86efef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236fa9d11824e12b5511d82ffa9d6014
SHA195fd6a356086169a9f2afccde512bd51f9449611
SHA2565a6016e5461665d7a4113da5d53c465481ecb012a6c7b74ffe81ec3c1529bcaa
SHA5121a1b43859cb4f9b4ec599e28ecfe378e00e7de33ff0a3bd35fe23a5a644ad735952950487ee474c033b8101b6a1adaa95fc3dbf8ebd0bc39add38db77a6cd1be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d613d187be7f975ed7703bb6a29f75da
SHA1723d6a8ba95aa48c4f74e7eee8afc0466b26fc70
SHA256bd3f43f73040b8d95e3b7b1410c29c6b0f1bf7b86cc2a598fa100a91cb8f7357
SHA5121689a20d95bb19fa04a57c51ecaf2db6ee642c7ee435439ecab8c23998681b7649291ad3cea5bd0703668a10a81dfe4f30eacdf8b656a0bd909937a1876b5d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202d309ed84827ab8746dd886021d548
SHA1ca9b575aeae19c13b7a00ca6ef458a63f8ebea65
SHA2567226185e1dcf593054395e2dcfd50ebffc12f45203056d914e89413321a0a8cd
SHA51211c6432f069e67a70e5e845057c42feb900bd552d5ddb053788bb9d534d09376cc43e4a545d83f8e8e318ec466c8e23c483b59e8c232751ea64e2e9d77804b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764af26dddc55e24adfaed4e5476f166
SHA1eb12937ba3d8e739254a1a36aa7bf16dbe418542
SHA256f0e28af1638115c96821983af91ff14835ba5f8604ab42ecf87e7c133ee72eff
SHA51241c628adc479e8cca7b4da89156573a8e3f63b92cbb54b77b31283e6e541230579c2d920253740993016305c09ab7678256a50363db430d9eeb5a85b08dbeb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b284d4a2e7f9c371a723b2f5dd96a5e
SHA17698eb07d1563b341d7524c30de4b9804bb5f404
SHA25671a60bf192161b1edc4a1260e9c96b5c3db6032f00f046334f2e24051a4a70af
SHA51234a1649ed48ddb5e819bf094cbb99017d23f00d117df0a30b9941a96ca5f865f49433dd6ac718aa838afc28d98dce952f0709179f101dbcac8b898248c8da3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6bf0cc4de674af467308f5183f449ee
SHA145e7171032311dd3915e0c13b6005015f061ca07
SHA256a377e1adce3fc8df920e9acdb541cad4b5d808969190f0a820adafee8e38af12
SHA51218f5d13555bf80f7f74a5eb5e9cc8e4f2245aa0bacc58098a8c74ea10f65b51bf0f6a634c040f5b5ad7c25470479398e4450663a6fd4d3de606a8304e3103d56
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b