Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
fc9f3289af8eef8d3ff405625a015127_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc9f3289af8eef8d3ff405625a015127_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc9f3289af8eef8d3ff405625a015127_JaffaCakes118.html
-
Size
29KB
-
MD5
fc9f3289af8eef8d3ff405625a015127
-
SHA1
77ff87afec00e992d0e4660ffb30ba6f0f90f3dd
-
SHA256
660ecaa9b98cb0a206ce1143dc678b2da0f33a50bdc98713ba61cd664f399372
-
SHA512
74c02bb1cb7eb5ad18d7839842ebc5fe2a2dfb45e80ea903ea03bf9054fd48f77c8f6d56b34b3af8f6b1325468f45efa3278a5a49973abaa5a1f074c209cf1d7
-
SSDEEP
768:8vZ8266kh5WfcluQUfhvYcq02eCN7DMCNubz:8vK266kh5WfEU5w06MCNA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433700171" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000fcd16cc32b0890ebccb0b7d069c5cedc3b3ed0b99f412300e9d9015059390874000000000e8000000002000020000000c397008f31e8e53dab9fcc0fd12e4ebec8308dc28de945ae79e67572b6c61c7a200000003b6fc84d917d82baf0beb8e842ae26269ede999f58e5138b4176195abf396a7640000000899af32866e58c83073b85fca6739eda6059ea7cd4dfb150c29f1892f32da2335ca7678dbeda761ef2e503fd351f3fe8b8193426486c394509465f873ff53924 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01bf076bd11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FEFFCE1-7DB0-11EF-A641-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2416 2120 iexplore.exe 30 PID 2120 wrote to memory of 2416 2120 iexplore.exe 30 PID 2120 wrote to memory of 2416 2120 iexplore.exe 30 PID 2120 wrote to memory of 2416 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc9f3289af8eef8d3ff405625a015127_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c4ce1a7b9ecbe365b9a3bb0abc65449
SHA19107c11a371a49232f6ffc8f3f99d978873a977c
SHA25659560faf2ddc82583fdbeddb50f991c5426a21326f26d3f1354904f8dabb418e
SHA512447409bcb12e76bd192fc77af29968d4d6e6151a371b3c690f98fd55fc1b278ef45181d84fa9edd4469f8722a44757d632e205817ab24ec826df842db4fa89c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b9576c9643ff4c4d7943be2ba1f22d
SHA1a1aa9dc02869954a26321a0e13c48b09ee09aaa6
SHA25618cd53a723c5835098b490076e3abf49c8f526a901101aba3d7d4cf7adeed812
SHA51244105f332d577a1cc1e5841fb7753bea0446e04cabc00f92773afd7fd239e6b9653d7f69e36b3b5e14f3bd2c4045715083f42422ac31aab0f39f6686ba409534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50defaba21d6a12b7649310d4e082843f
SHA109052252d61a8a714a219eeea7ca3846f9bb437c
SHA256e1a2a507c0e3ff8d29c396b0652c591e8502efe881101101fb393ae7cabe6393
SHA512d1093934f87119d7ef65e9e070023093ea374205f7824a40d867b9c70adf1da1fdcd94cd0aafd8469b98d46addb781b9d5070fca34aa12b1772b8f89f18b5cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb889a5a9587c7b9c612e3196eed971
SHA16352bdc71efcfe8dc4284dc11352f2f3d3cd31ff
SHA256d95ef6e707895431510cdddfdb2333edb6d6d27245384572d6e9e2dcc684da2f
SHA5123a3b88acf08936d9194c1984fa2b6cae9f3fe46befbdf39cd5dc3a7342e353d75347408dc1c3c666c65e7519bab9fe67d5c716a09c3447fd7945eb37d5af2635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1c8be946bef3adb5a15f7f12e50263
SHA1590bf3679baa7eee6a5b546529dbb187d32e5cde
SHA2563749400309e1b736ada2772008abf5dbe2775d13c596df211428d06c0b5d6034
SHA5122a43563cb2bd58179014c64e9352f599024224f11a10e4ffc142990a8da1a31aa871cb94bb168e09bb33ff39e7371ce914f80da5d37f1cbe4eda6de55f1f690c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6c8a2100ff9a21b31ebd5ad23a8103
SHA1df74ec846510a94c3d5922d71818ef1ff2703e27
SHA256e1a521e969df603f1be884693149a19f4c060c9c3ae7dbb0166665f0ea520ba2
SHA512d9b265101486ba2332d81a51e62dd2ba921ddeeecc9d3f436ebf7591ec54f0033b6af9f2509a66012153c9d512a901326ad3d4c091c902efbb3b11610138bc76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fbddebd39be11cd2e3bbc266b621da
SHA11ee4d23580fc19b196abdc6211ad7a593063a374
SHA2567df370f948445177a0c24faad412050282bf6f1995e3e94f4a0846374688adfa
SHA51208fb2cc4d47f6e3b3d59b7ecd5b9408a36d7314b92c94afb699513f9f1128e91b46115d1a8fda0dfdaa8f7bfb36fd3505aa74ab34f1281ac65a874d71d939d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d120fd320b56fafc14f2bab313adf701
SHA1eb9a99d2d814bd5c9e2b5e058d70b952662af224
SHA2569fc01fae6019399c5d48f2cb6ef82c93776f391d5775384a12eb3a1a9d330f36
SHA512406bb7f05fb8bad65ac3a7c61b80b3913ca3cddb8097e4fb0ecaadcd0e43f410dee2e371a143e4379b41fe7c35ca856e2df3b615bce71d93cec72ff8589276c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdfc048229ba79503b2cc403efad5bfc
SHA1acd609040889ad2c4ecbe114dfa6f635691cdf73
SHA2561b00df9233cb5ae3347c7b3033b2f410d2931f09ca6f4e54a11ebe210a6c541a
SHA512a432658fd43928b0cc3f3578b47198c1e97a84aa57b7ae93c33ca9e97bacb0cfa3a9a43ef2b462a84a336047993a5e73378efdd372643926c8584cbd73b96521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543f905082d6902a6004ec709881ec8f
SHA124f58ecc3744823e749d6f0dd34bcd2ce095412e
SHA2560ce09be17dc38acb008791ee5eac50f28c195725d5a55754639ced8899b2781a
SHA512ef87712fb2ecf54b23936b2e375deeb42af453f87678cee3c044acb6e77a9cecf100fac2a0c6cb9633448dd7261ba431e89400e5052fe6f407cde86edcef7e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0c52efa52a45f77c13a4a8a8fc432a
SHA11a270011cf3df044dbb4d77ffadc9065fd65644d
SHA256feadc8d5e38460abb3ff8b7882d1069de9d706f8df40d235a401554189a2ded3
SHA5123528137f661610248a835c988013f8d6a1367cb12bfc172bcc20ff57cf858aa6e802507da30ad0f6092849a2e94df42f9dc77d5b6dc6ab5ead1d08e48e10a333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500ae1923bf2befca89764453c6ddaca
SHA199b8aaacdf1173ad63f3024dd3ed9e792dde706d
SHA256b628787f185bc21b52082221f091a9de6f366b51ab8ab7df50bc9a0effd63f53
SHA51208f9fa2e7db595e1cc5f67004e51298d2e2d534c362c5c124b183be1021617db66af09cf642f4b3ff949dcb99336e7ff6b139d1549a75068f942e5af2b611c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32d372a42471ac42e78447145462de3
SHA1d6277d8980f3af715643b789ca582a458c992304
SHA25603da119d3d50efd5c8e716d0654204ae7bb6abef20b5d0de4fedea4c1c391a5c
SHA5122c1945b78ed95af28f8f1e3afd9d7752d7b8811270a5c2909f61abd88a47f6b24a18857aa0d0caaf24b8bef23ba59cc40ec06a53dcf4805e8b23c3b3d6039c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1953b4700d4dbe91ef1195b1c24b86e
SHA1d28c478dc0e3e3e76fd44263b29f0d493c6f353a
SHA256bdc0bdf371586c9577e5ff558cd1e42888f10c2e6f0113316725db6be3f0ec29
SHA5122071a39bf15962a1b361610f03bce938d349c454ef509d66107df0b4830a4c1767069e4b4676ffb932e02b1abf167bc457ffae5a1739b52fcb2a45dc8ea792b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a3fb543875ad51b9b013d3c02729d1
SHA10eeeecc4b85f1b28b57cf4fcb6852506ca73ea6e
SHA2564faa2d106a52172fec2f9f1d4d32af002b3ed9592cd5ec41abc8e2284fd26bf8
SHA5122efe217da3fdea7a3b8b05dbc9cf2f327266c19e5236a3164bb230cd393b3b232aa0586a138cb09ccc14d7577f850fe2a6bf9161c87f83ac32e9fcb6ab5569a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034bbc63ae2825c015bd1e5f9474945e
SHA14b343674afa2be569541cbe31af7e3cbddc818a0
SHA25654cf513026ba6eccf91e13857edc2f6b190a675cac8b9d5dd82d909a192b1129
SHA512cb5f5d00fd29a5a18aba60537fb848129dd9495f72b0f698c27ae592827bb89a868d29debf75a569a365596c0198decbb9ce8873812380c2ed5436c5887f997c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59060c316babf39f4c51c0d20bb3ceb06
SHA134fb2ec6c5e552900979cc20b07d6a8464fefa9a
SHA2568d1dfe218f74d93b83e97057a639c8b4990d5e4873e90064c2cd39e5f0e2302d
SHA512aa791d1d7ed15da1922169f670852bbccc99eaf6883e363fbd976bd217a1e9b92cc02bdfba764a9a5ec923577abc94ea4f52ff9fc3e7f3bc25b4a18c665f1309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5815965889912d72cf7fa886b65f905b4
SHA1ece729dc5d5bea61416b47998fd66f8fde720a9a
SHA25624625034be217fc3df9074ee2d199baaccbe9503ed73acada87c5bdf1ad603c6
SHA5128d219802420e635cb4a09c16f01929e2689be95b4c644dbf04357ce789c846b5ea4d90db62f29b54ec45cf39eeda249bcdb29d8b61e301c772b37564c8172d36
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b