Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
fc6482e785399831723f8366b5c1e200_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc6482e785399831723f8366b5c1e200_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc6482e785399831723f8366b5c1e200_JaffaCakes118.html
-
Size
3KB
-
MD5
fc6482e785399831723f8366b5c1e200
-
SHA1
3f5481208d429306474b7df975f5d550cbdf14a5
-
SHA256
0808b9298163416fb06f25a10481703dc7c86e990a315690125ef1b8dcb443bb
-
SHA512
ece966a02c2e7d931ac6e212528b4a99d88ed58a58c29c66522edf2af93a8241663b390d3f4a44c04b18202b2c47eeedf001b2df55b92ddc881080c181719c17
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E68D371-7D9D-11EF-BFE2-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000007e789deb382d323368ff8ea25601a2303351fa0066901e30220a7c3b5518ac32000000000e8000000002000020000000b1c250a60ebaddc5376539243288dc1df156d5dac319696c2bba8f71d6414af820000000f2812dc634d50f631a1d8983f58a2e6a528046bea6949719458ee35ae2f1d1b9400000007f5d3fdef12164a1495890d9aa5c7aac1bae50f27c264a200fddf0787f3b607e89b8874e2fd55ab4d3867f426449c016f219ed7e8a291b3108bdd5c11dca37af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433691818" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e60a03aa11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2884 1580 iexplore.exe 30 PID 1580 wrote to memory of 2884 1580 iexplore.exe 30 PID 1580 wrote to memory of 2884 1580 iexplore.exe 30 PID 1580 wrote to memory of 2884 1580 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc6482e785399831723f8366b5c1e200_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4978084fe9370e4ca87a615bffc001c
SHA109f2186b17b8b3a2d6b6bb0e5461470946b6a946
SHA2568641c8cde4d3363997db9b748a046f1ae3eb2b3689f5f487024c1ced7b0299a3
SHA5128e95fce89e13a4c5d884b43059967c406e0c0e57b450b0a4079a2473c213588509447dd3a79119f624f09aae6a661d671b7b486019f8fa79f27a2101b93c4f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0ece29c91e674d462088466dd2d1af
SHA1331ff38893cfcc87768df184e7f1f9ecee5361d0
SHA2566a3fa72ce977b9a84664d17afab1251e9119169a6ab3ba01ddf2414e94a0cd05
SHA5128be91405ba7e1341671d824a541684a4948058d6d5e7178e4c24dac0acfc5e184872a152e9ef44dbfa69ccc7958d296bc74059b30ccaaa62564c4a141c4ece07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd61c790d8e3ad8b9e2c7e6df1daeeb
SHA1910e09c5e31d6f4dbdc0e893b471c0b4a47cc7b8
SHA256b5daae4e2d0ae1ff322030e2924fcb2ed0985f2f48c261156e5ba9f6ba2d4c10
SHA5121d0eff59fa177aa6fabcdc2a5147053f521d98329cbf401419927b1bd4ffbd6332ad4774ea1e725c4fba1dfb9cfa06236ec671839fce57a982e04aa30b9d51eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3f49d89c5c241d217cf6ea0918cd46
SHA1263853242e0f9e85f0bdb320cfd077633b7c3278
SHA256e4264ad7a77811bfde445317b34263f3fc419d1d2123a336c9dc3059e35acf10
SHA512b39e612d97e79716b10cd908089f63a21166d9be8c81feb33c4b621c305b94727de9c11af95b125d4fbdb27be1ecd586f61e2dbba3d206e752d84829f39ce838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b386043d30df9360679a4d596535707c
SHA1781308821113302b62b74e5d219aea429353d963
SHA2566b8a9aaada0898969d091466b4b5b2becda793a72082e996235c5dc6fa5a5c82
SHA512e474ffc3fc592dca892a69115c871f96d09fe6eb7e684b1504b785c5b9893459db6490c78abdbbc64c839599793dbb620be3e69755f7a48091f780bb7fb7e72d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5284a6805065af0d0ebe3476163492a3a
SHA10afede3e0d554f8fc88e1ae85a2e3bddddd0096a
SHA256f7f60ba97d84472b4c96a416101e4674463010137c94b738019a905c13662fe2
SHA5122f81887fbef60c45164c16b30b0dc545658d1abece4f4d9256211d3a85ef8e96baf6872dbb159a6a0e30e7d16f2c481b33e16599fa59f954a1637556a6f8b650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586065808bf3110aac325a7290a19497f
SHA1e9202a68db94dc14de4bc39526e81c03a0cb98ac
SHA2561916eeb83e968d39bc7f99b1a6e4ccc2d4cc96529b9675f6626fa2cc303e43a8
SHA5123a4cda56f2c9c54ae10038274a09b4506813db44677fa5f4c36f654ee7760f03f589cdbc4288312f55dd18322fc041584b9d5db0b8c9c670f7fc42a72fb8bb99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303679fbc16a396ba1ef6a7b3173096a
SHA1ea4de55b39957f5818f67f9783c3b51011c2c258
SHA256b2f6ec37399e7e31250260bc5262d9dfaa9ffaf839fe0d76cedad60728d885bf
SHA5122ec92ee72d1541ca41235fd5fdef734da6af8bb28a4072646fc07deb0089b9127a252d890b49bc308f427de96b5e9cc956b9867a4fa1d238522780058bfdf18d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c941edb86cea2dfc0a1e163a233529a
SHA1e657eb80f448db12741192a154e48bf673fff163
SHA25668a2f39668ab6a6042421ee63013e89bcc13e4e17542d3a63cc31adfdb80cb70
SHA512e525079593ae62ed8b0ee50eebc9ebcf47ff9e82256e54a9e5d79b2c214004d54553b154309b554cf01d58b047853e130cecdf40747ca8a2e28b72001bb17e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cfd2af33f7ee7a964eabeb70fc3da34
SHA15825aa8a3d780958406c6ad3aeebc15d1b035da2
SHA2564056e495122d952e4d05082d43de0366fb2daf08d00176408c4f8daa8bf69f9d
SHA5124721138829ae11ab3f5b0e5c26f6fc5b68c8769016ab026e82ef7fc40eb63b92c425b701c1a9371c7457435b8b95c29e0534ccefa214c2e19a8d01a09af35914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a38dac86c2d51b5d35650d4bbca4a1e
SHA1f9ec054d58b83422e72576df4ccb6c9581db25ec
SHA2566b2095ea974470913f5c07a3f1c705467eb2a3c3c6f7f2415f7be09526b3fd8b
SHA5129cc5db4a7e41eb94baabad419f9c9aad3746a09359e74c6dac6e0c64eec41f875168b5d9f0015a74b28355c830b9f28999b0b54149d92d2c61bf8986abeaf174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f85b7f65690e086a7f2ecddbb68143
SHA1c098157847179a180bf88c56e1e83dcb3d6ca623
SHA2567fb4eaa437146dbaf473691d17bcbab726e9462e3dfed4295dab592be0d49eb9
SHA5121e207b8155e89bb2335b5a20a56b7f578d3522fb5112e6c2312dc7ff3f7d43cddd9c5931eea701a0ef68af904860e5db1c67c69fab97ac53e0ba5380e73ff20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52960342bd831c59b7d00c2c81876d139
SHA150dba7d8c4cfdea8cfa88eb5fd4f3bf5af9d1cf8
SHA25692c214984ab42accb9739c689b69c6c9727bce4a9c3998b7fd32f3d2cab89b8e
SHA51223c720b18b26e48de054d14b503d446e4518453b5e94ea6243d3712337ad02794475d20f03ca86d4ccf6c4ff49e309a28c189071b8e2fa04aaf2234e34bde2d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab77c829aebcff5f5afeea62864514e1
SHA1233cf3b3da2a066227d15e88006ac7941540feeb
SHA256332333a01c8f55dd3e3b358d1f3c95a1e1710f998ae6f4f89c14b40b0cdfd4e5
SHA512694ba6527b4c9ff182fa7f963032f9dbd21be966349c4ba53fe524d27324c73469893b96bdf6dfa669633910437ca790c712a7c43b32a9ca069faa35b3c4c3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a551c7b3614920fce58b53a50d5cfb9
SHA13829a543d9d908fc56777cc0a4b9d548ff07d1c6
SHA256934744b15fd852eaba5f11494d5b7d485e2ed28f765ec98f3d47d96af916ddbf
SHA512b32a12d6c047cc0213a0588bc8fae86331c5f1fb542c8f9f9c8c842d697bceef61f74d0d371835222a078a292f86aa62cefeb6ad1ddfe25e495a1564513eef02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58865e60b762d5b922c43caea669ecac6
SHA121fc3d382f69dd19702d83a244d043c7ab04d12a
SHA256efa28e8bc708cf1df701bd8444e36e73b66de720f8b429e5d420286ec25e31fe
SHA512f0c542e6861c60148dfa56017657faa668cc250d93452380d146c097026ae64e73dfa2794599397637b1a40e665bc1496290a826ee5a74a696e356e31d8aafe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53212d217459b649ea801990345e70025
SHA17107068740f684c47197aa407f070d580c9aa51a
SHA25657c35930530d1ba86ac245e3f71c850775f599be32e7143a95ca798a24cd64ff
SHA5121a77a1e61e67aef27dcbf6fa79ed910e62374c20d533fb54b2e118dbe32081ce00a13eb78fb6cd5f9e9c48789d62ff1bf8e998fb5b2d23a44767a12d855a388f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4aeaaeb2f575b6cadb5aa01db3fe3b
SHA19a31dae766c26c789cfd6136aaf29bc5ca135cd1
SHA256698d54652b01e764e5a68e0c7daae0da08566900138558633a3eedcf94670042
SHA512bb2537e121662941a1916dbe1cf3aabbc07d079412412d47eb802fc8389aec4b473a04cbc5883f78cbbc075616898b10a0e7aa7ecc0e7a2f65f16f6ba899ace6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd94cc8f5fe3103ee3e020bc9d0f395
SHA10e85359a52a8e2b8a955b646a604c217485af089
SHA2560a44ae18877732c53839ec3f73edc47bf613d5535cf59f60851185d4b6598401
SHA5124fb987f7d7a7c3137635e24ac4add291c7a6575d3325a7a35db69f3de0dbb5e9a6fe7c2c0ab3665be50e15c353464b759cbd40bc34f91c098b3aa054bef1b037
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b