Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
fc3b83fd035b8ffb8cad8a7e78304ba3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc3b83fd035b8ffb8cad8a7e78304ba3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc3b83fd035b8ffb8cad8a7e78304ba3_JaffaCakes118.html
-
Size
12KB
-
MD5
fc3b83fd035b8ffb8cad8a7e78304ba3
-
SHA1
aa0537479153dc01acee8c53a20b7e63293e2aad
-
SHA256
9ea031e1b95373b30cffdd80b51e959dc39f87a4c7b4f3b0d63c8af6d4c91409
-
SHA512
c9c224650797a3cc3fa3564d748c2d9fef863fa33940dbc12be67ecfa36ce716968cccee928bd6c04af088dc60097417ec5caa8bca96fcffb2ced12900e2b93a
-
SSDEEP
384:k1fE66qLC5kxepDOFfyMtMiv4nqe2lfie2l9zB99SBAN:h02chl47NrN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05b05e89b11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1385FC31-7D8F-11EF-9A25-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008ac9983416253ffacd653fa63b97ed3893a848e6b490fa72735a2fa622bed409000000000e8000000002000020000000efb43ababca966965b64043f4fc0115064ba41d2018ece025a8b2d5943b2349220000000b1e9deab724f13931792e2757bde37f883bbb96abf0f0ded524afe22fe73676b4000000028abc18648e028a99d0c6741c177374c536a5762554781c111858a1e792d8d07d8042d4bfbfeec13e74cfdd40a5568a8796b9e51b543fad08bb1b599c1d7918e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433685760" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2780 2168 iexplore.exe 30 PID 2168 wrote to memory of 2780 2168 iexplore.exe 30 PID 2168 wrote to memory of 2780 2168 iexplore.exe 30 PID 2168 wrote to memory of 2780 2168 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc3b83fd035b8ffb8cad8a7e78304ba3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae707c23f798361d9818b0fb105dd755
SHA1cd955c48d4b40beb8957475ef9e768fad279bd77
SHA25659c5f8391302eba7d2dba686c49e0fe47269e4c3bde069faa7384149cccbac12
SHA512542db20904da7f286b97ad7e870ce4ceb6631a2436c1c2cf435f51448baa43d2d1030a97263f40c069f81236451b42363c2450bce83d66c0d6b84606b194ebdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41a5034b4c620d68325dc36342a96b6
SHA170958f412789ff45a124e5ae86fa34762b735f6d
SHA2568274fcefe15254c83b8008bab900dcfce61f4527d0623bfd64b2bb069699c65b
SHA512a6e8392607244614de5591c29096b1b2227e3622dc9d9ad30b94b9960b072add984404b0a08c9ab904e0a09658fd9ff2a2847e22160f139c8df77472d000553b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e0b74b9eb11699091632e7c1c76655
SHA1f3091604cbf7494c8f176ee5dcb25776824cee3a
SHA256305c11097ab6838887a488d12527a66a31495d6ef7eb0a52f3857816d8ce058b
SHA5128a991849b033acc56c635feb2973c9b40c18036d68412dba10cc524ea3a9d820ab36f0f4ddfdca02f6ef36a29eb6f5199dd2c70af987d597872569a451e5c5cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56959ead050bba3c408e65dc4f089435d
SHA1150b19638bbe8e61523ba5758683c92f00e24b5a
SHA256fd5c7fa689cccc2557c604af460af38ddd8043325d9f5054fcf9db463c1f0fde
SHA51271768d361437d2ac31be853b82b834e79fb7c1ccd4de394190465edb8f136aaba8788c58f83a6ff955b92f8c7110dd63b516e57246b48dd2e0c5e4534e3cea58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f921f5ead3d93a6c97a01828bc0dca1d
SHA12145cd267c343958a11e5951b5a2d8250efca266
SHA25684089495a360d1471ae650a77d98c2949d94fdc3868b7b87f2c496ff9004ba73
SHA5121bc1250ce2fe37281b6098fd15ec9770b017c728663d5be131897edff3c612d2a50e2c3aa7125798dcc1b84665109ce9fa1ce05e3155e9e8988fc320615fdb70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61236b894ee051dc4808888ffc71c3d
SHA1093aba45cd588c2e4192a8df62ed67a23be873dc
SHA256547eba8f296159acbd41ead62287282f293eca74a57f2bbf0f831dd0d375b563
SHA512a48aa6f12b909cf34f5d662709724111996c6e9cbbe43d844f8fce4a0e321dafa681b40e2f4c6015bb6bd6ebcf9aaac6ae09366e2743b5266acb2aded290a612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a15f4fa7954336e59f528431fdb98a
SHA18149c89b70e8a114d35e80b4ec880519ad873772
SHA256e4e3c8514f8a592de9be6fdc88e55ee69846ddfc403e1078c990757a0565c075
SHA5127d4505b67567743c7d547ae0b20966c5f7d484f423005ca800f4385f502edb05f3f06be91fd115849104d4cfd25a7a546a9238d822d329f68edb7e58df6a680e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d09a4cccc4942eb4e19362d8f20eefae
SHA1efabd41d1096477f35da584b2f7afdc4791ccf23
SHA256d2d6a9b561069b20c52fd7b65f5912f176d319d10dd5a578ce06fe859c1bbb20
SHA512202bd02578fec47b15731641733b909cf58c566e2b068d2526c11a744416730502b5965b7ef9f58b170036852dc2c2f0056417b92b16424f6345188a45a8dcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea108a57179ea5a6f426fcba2ad4aef3
SHA1e8e82de925e4f238e379c267f9adeb406389fb31
SHA256d9c4f663a84149a04efddb76ef5d93da2bf96bcec63fc7fecc400bc271d1042d
SHA5125f2e69152b133d636846393892a50e42c9062e531131322236554228021a3e291ca9b39531b1f7cb831b6d8433cb6656bf6b50c9d165eef1561feb7f1b2a647b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26b3ed4cad9a453767fd031fbab8fc3
SHA149cee6c2444b84177dd49e7e30e6cfc4ec7f89c7
SHA256db3f36dc024e08b8f54050393318015c27241f3078e24dc77f2a682a32860bdd
SHA5123ae06e66c8ab9164a0331b677d93c9e0d92ce35917a8d0dfb22583f202802d2f2eebeeb67d678371e1571c033a5b786fd712f9e0ac363814189d9e4fcf340905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c48c0546a42e0d867199c71b46a5ed35
SHA17362259a7b6949067bd86e00af50d492dcdce8ab
SHA256bc811cb38e8bd46c1c7ac46b42e83ca72c48527a9294ee5c0384ec09b8737c30
SHA512dcaf29aeffb5c6d63473828c3920061d2e0fb0977c96587c7dea9dbce2ea56a1c4557a90dbee043d81f637f2bd5af439e30a1a96817ff0635e30dccf3f3292ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b0df9a44e77046f268bf588e496e99
SHA1e2930138510241408bd7907f1f8057d8a6c9be08
SHA256de97855da7b9abdeb9d9d89369c58a7e3e5540da75ea3c8702f5eb0962f6dcb0
SHA512266d89c9844846db65982ec3268a0c5266cc4231e33dc1fee906acb2ca93adf5e6fcff0181b687c5f860019bf825e2375af529f959f8dc52efdb4c9e99f14bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5733153051678b3a50c302ab202e06f6c
SHA17e0cd089e5865c8c8de7d87bbb17f437c27f7049
SHA256d481925769940a7e29027a006d4641723e4399c3a770e0a44475c38c6549461e
SHA5121b24863b978daea6eb3e8a00ecefa9bba0ffa45028dbd0d17fec9613f92548660d190ec30155bd323621733d433f4c66ca6d7297c664e4179db18f2a0570e390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d3184d3fe4c574c5b8ebe22535f682
SHA1afa1f3c97bf93064e3e55e598b9ed20cce0e5769
SHA25632b67c9f6b59ea0c38eb9cc460633dd4e3bf31038c4607396c3dfc3e36624b00
SHA51275f377e03154770c5742492f209ed174d85b0c9962c5f019ee40f39b101a52d2c78f450371d9990a8ada44ffd4849d6bde0f773210be3d386b81a6578cf20760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521afe848fc93bdcfb7e03c614eb90c0c
SHA1bd31424302100089e63d0a8439b1ae8dd3ba533f
SHA256d2ff6c8e08e5f013c88447399acdf93005e4d453f85f5161396696c8f535c30e
SHA512e121d7f5ee25067643f346a01d5e4347ebddf3735f2066f804e94dce9fbb8c2098b0d95aa7afeecd8948c4a7e433ff4bc4ad143172e648123c765288626bba5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675f2cfe117691bf957e13ff03c07c95
SHA13d30642c29524b7642a1e66add810a70e1d5b250
SHA256b85e105bda3115852eed325cfc975979afe3659c5407337990d9c101d702d378
SHA512f49cb43da117d5f6e688b344d87bc4a821231d84748423ba4781d68aa1e3b0fe646e8c7f6fad54b3f271b08b25b0ae3a864bd21d040ed68e5e08c4c233481edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be41bc51c77561d6d9bb90d5901c62c
SHA141e4cc5296d22cdc2e26a8fce6dd51ae934c4af6
SHA256114d2842bc9a0412a6fc8d83e066e460ca8225857f8eb69aceca24f7f5ca74e2
SHA51215588b5ac123161c54d17aaacd1854debbd068611d126b0d0b2528f5b2919a6166ca9254d5a9f97eb78fa1538712c2557721ebf4b1da5d66f9e6c5db8bc705d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf3aeae97c1df0e7978673ee86007ad
SHA1666a514ee6a1d9ef0e1d03f95f14dd55f31c8673
SHA256b7dd12a8e25e132e20eac246a4211e8a36cd8fc18bee7aef847b043442b60929
SHA512315506e51b7a7d9dd82259a78b2423a735453a3184f2dda423c20e0d4df0ab0d4f5d5846826cf5ddf85138597fe8f61c67d73ca9c59c29340af49cd0097bd0a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84ba2b91d7768d71e9b0d868df7fd96
SHA11160b91f8ee37b750adab717d01a46611c2eb8a7
SHA2567e5e3fa22d2f931390f27c14653b5cb24a2c62f8f60ec6943ef30d0ba3f8cc49
SHA512988a71fa4ff39ad16f853da693a4ca970b79596ab9b78646486ad9fe2f07a72cc3e6d4c6fd8eeed227773ebc5a63116dbaea56ac143a490f3fd3cf3f159bc75e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b