Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
fc35f1240320621bbb393788f5131fa0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc35f1240320621bbb393788f5131fa0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc35f1240320621bbb393788f5131fa0_JaffaCakes118.html
-
Size
25KB
-
MD5
fc35f1240320621bbb393788f5131fa0
-
SHA1
b581de2e3a468bc8ab594b938c4d55f3dd717bd4
-
SHA256
487078c874db1db05b805810819cb13fba56dbe6b34f70bf5052034c96971279
-
SHA512
42f05198b3ecbce07a52aba719ec766483818c52aba7d33b34a8d87777c1bb846a8f6fc05f2f2f378b4dce388d61d83908b4e789d0ecc13efc5b65d0d8c2e0a2
-
SSDEEP
384:+3F7FQFlCLFb71V4cCgHqqRUL4FCXrvnWRy78z6fnnfq6j:+3F7FQF4LFbRVZKqR1AnEWfqe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000078d106e5ed21a451ea9d679556fb0a00f7297b52315b4452cc4ea2b88acf3180000000000e8000000002000020000000d7845f8caed1616bd53629e9fd8912da28239e9d927ef03d838cd0b7fc9b9df0200000002096cf1b84d80cd34e4aa39601041f47ea61f53d1ef45a59361f661872d625ed40000000082c2117db2412dd240f59c29dac91362b90e2947ba89bb3b5f278d1eee7b783a561f56fd5951c6b729d794a720cbef92305d479cf19dde1e09df45d2e6c34e6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433684900" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12E50B61-7D8D-11EF-848B-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0064d8ea9911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2704 2748 iexplore.exe 30 PID 2748 wrote to memory of 2704 2748 iexplore.exe 30 PID 2748 wrote to memory of 2704 2748 iexplore.exe 30 PID 2748 wrote to memory of 2704 2748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc35f1240320621bbb393788f5131fa0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517797aba2e5c1dddbc84fd31d643488b
SHA18185c02776c1af1059310a58852d17dc44d4282e
SHA2565a69ca612b877dc38806b6b4514829937c57b830983354d14dab6be22f6f12f5
SHA51249e554fbc5362cf95df7ba6fd75244eefbedf7290f65bdf88c1d277a5809562f5010fec181ca988721043235a7adce2274dea4fc74cfdb032dc8a2f7f55ac26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f16ddfce4099f07c7be1f2cd532f9ae
SHA10fdab46f9c58066ef91591bdb9ee0fc9565793a0
SHA256bf6ef5eb1754ec5670181448062a2a12de55c2c7d8f571926992a2238b8ed734
SHA51245c5d75b6b112af7d66854938c56dca71a94b46e4495b683b76321f582508967ed8db3794db1542e36ab7939f70762ee8419f1addee6332b5fc6762188a7a556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475b9711c533cfd338c01f67f5d36bcb
SHA1b8523fb0a71b3b0ff9e3234a4ddef49e70cc894a
SHA2560886d369e09bf1abd4418ff92843ae5ce90b630f77c680eb6d178c9ed4fb3d88
SHA512ecc6ea20c287725d2bd14efc920dd058392eef1ab882b36c6a1392c113af21ef05d1ac22314377a180a4e75733ae2b082219135116d1c6d78a4134b226a072b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce558b2338c526d059b03a79f09dda9
SHA1c0ab64ece5083372ef48f2257ae255fd46ee5a91
SHA2560636c4bd25a45b00093a7694aedb4443e1688494141c73a574f8e29d72215c9d
SHA5126f135f533e2ee375ad71b584511b322372249a329646b47c0e6a30dc3795ac814699227303dd5567b28afa0efd6e083d471ee06803c78edfab6ed1d4f9ab009e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b7d204f1768d803aa76067c52fd68e9
SHA1e2e9a7a8bc441597d893f64e8a69b7d2c9df5229
SHA2566fb68ec4812b60a62018df90ae808bb10f0b37056468718938d2dcd659b13343
SHA5120c58759fd1ff07bfaf7d93c6c80a7db5d97a96147e600f60a19b58a3ee15b4433553dde58c4361cce3746ccc35af7d3354bd7da28022ec6ed907519f41aca1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce267235c25566396b6d55ffa5f8730e
SHA1d1daadca2e07836c1af6c8ed4341627189366ea7
SHA2568fba6da1c73c45d2fed9551edfc24c930696fc57ecd2309f74f9529d077834a3
SHA51269ffadb4e30309782a6c283c02e88be949c14bb2e1eb7547b41b758a7f2c1c0d4d064a1a8e4e74dd8bcce0c5b0565363f43a919aaef78f3ebcb0f368c484b997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277fd4e973de94e0130d7a7ba0d8846e
SHA183500b2e8e683091021531fa4206c01d9a46d49f
SHA25638b13009a279d1decd1055ecfa13d0770723109e92fbb64802c2f9035d67e154
SHA512b6d18accb14af3e7382cc969eb84e9a385f418dbc29f432f1e55f9713eb40b319a80ce03e532402ae8d281b11d722abe69f770e2d83ac908afbe7ca5c3c262c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfffdbde18463732e74feb058c74de6b
SHA1da2fd87e1759fed71945330a73fb7bd06093934c
SHA2565c6c07793bcfddc7ab5ad3ce831a49ad7709a90aab836ef6326c4109b81a2ee6
SHA5120ca152bd1bc45e2ac6eb1683ea2b853d506649b93e295ea6add56d1d1960d2a9b22f89467d2e236d9b9a3e290199a60ad4dd171b667421c2fe52596efba9aa1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d9d626a2d74ca98b704fd9fca86617
SHA18b6eb37a98e1faab6b5b78d4df0fdcf14a2cef13
SHA256f8daee60ec94f4ae66942daace4f79ac740e3648dad1a926d287323b4cfb3c0f
SHA512fd2c5dc0492b3e4903bdb9d97fb89216078895aff9606cb31b327f87276dc786dabb16e2306c07f37659a10efead5c7c20f9e75d26a5c6e52b0599850a3dba54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157d7490f091148913f3732194480c9c
SHA19211bc0d187085c06c32ef929c93133c9010233f
SHA256b950e98b07b192c792f57f1819b85aeb8abf00c3f57db594d5165eecb76384ae
SHA512be33b31ae6ef0b86c05832c73955276071e344f01fb08d1e6f977cd57d534e197be1b230b133557e518d05bc3f23584b7fdf9ec0a198c9d0b746280577184bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5074da59986cdc55749b451c270b63a5e
SHA13506fabc326adc4b5119d7c38f197d4089ba5b47
SHA25682a620c9957de7c7e147ad5adca6d3a5a374f4245fb3747851a0163079c37c6f
SHA512dad3bbe906525e01bdcfb4ac87ada15e1edf1c140d337d6a4ccb0dee0753f74c90ee52704ee6f6c58a0b49e1a10ea391c51e79b0419180feb4d7c7caddecac14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfa10c884f8ffb787ed2a09ecf7a1bb
SHA114045cde3d168246918e5b4d391f79ce859577a5
SHA256c6676048e4805bca390738e2188456d02bf1710a9cbfcbc08510d9db7d2252bd
SHA51241eb760e5580b940d9cd9a18a9337f0d4e244ffad7d7e2a9da3fc6d707831db9cbbb05e890e268c485daeb39cdfc0f966d1dcce17fc102d1d0b43970a02b429b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52815403aca5991de502993e034ea254a
SHA1d7433ed5164d9577826b14d13b31d31335e4f22a
SHA256297c2ea62a9d6c32f6a84361e85ad6b408e5ba1535d09f88119d49ae062e2a77
SHA512e45788f592afb7dd3bb2a976114c0c42f3bd4fdad68f7ad79daf09d2f38fe47cd40d6219cdb4f05fe0375a4744f9a1bb31290c5e460e2685ad91f0113034ef33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53feaa197aa8d6cd13f375183efadf3c8
SHA1f357099420a3066596a365749a8934f6bd30f8b5
SHA2563fe988c1557375d249f396e28f08c430dcbfb4cc063061eef10cf354676c1f11
SHA512de4e1d7ccc2a96cb194138cb7582f2454d9bf7c2288d5b735feca07f95e4cebce1fb5b90946c1c11bd266e748f6bf03b5407e3b0dd1502bbeff4a984be257275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530732666eb81b71eb50d10c256495ddb
SHA11d2ae15d4907744a160c29fc8ef978b78595b702
SHA25610851e9814800f89c52ffffc2ccf4aecfaa57df4968fc210fb66cdbd37f3c7e7
SHA5126d91876f5acad07cc993bab2519e70636cb8dd463cf3a7b9dc330be7ed339eaf3ae3973227f0c4e4d8d336f65ff1fed24972ab1b805d0770bc732c53b1de58f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d40e470f552608b4760aa90e0248b3
SHA15d27a427a79b3e32e861fa37e3c736cccd7adf12
SHA2561d7de531702409f133be9a9d7f2c80f91d997415acfd89e71681c323eab3011f
SHA512cd4b5a147bac4633e064725e8bc1e6af4d480edfe21615055b502ab9b3179bf18c9ff9fee574bf593622471f8e38ceb037f756e6b2ccb78c2f61c1559133e085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368ea27d79407dd7b0c3707638672b71
SHA10caa5a9dd3867aebf9ab22e3439694a2424021eb
SHA256ed3f78a94a05e0157b6624b9487e791c151eb2d60e52db8cccd1acb3ba0409a3
SHA512558937d02858d7b6d708b0d971cf795ef0e6daaa66f1bee94fca44b479bdfca63e89bfc692c301bc0a4f46572b97998b8cad0232a28d8cd98aaef89954a96513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b183581a1fe10110906b9e068756dd6
SHA19f939c90829f988efe263c9bb5a3c7b9733c28bd
SHA2566dd6d9a80243d155fe684511203487c29378f59a8ff8dd1d55a310387feebe14
SHA51279c007d4223a903038c1d273350bf2ff79fe2854a17ae57f6887e12e743d75bd7981ac8bc0255d0c830dea944512a3d0a9f70c6a5b04d5976a3b0b26cc431fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41543e66e92e7e771938e94b3c3acd2
SHA1161c8ead24634ce897a9c99bc7cd82af45c90a44
SHA256db8c2007365e94740fe775b782c0d7e99f78f17e523fa77d660251d71f76c8d1
SHA512baeace3528a04f10f94e7cdc102182ceca716cb7946025a04abc0d66cf6704f9a39f8a6a346707885506d8403351047110065060e227649e5da4a828096f33e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b