Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
fc896201cb61dd1e9440f13530c0d6fa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc896201cb61dd1e9440f13530c0d6fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc896201cb61dd1e9440f13530c0d6fa_JaffaCakes118.html
-
Size
26KB
-
MD5
fc896201cb61dd1e9440f13530c0d6fa
-
SHA1
b9eed0f5eefd5b795815959e8ca1294d5145eae5
-
SHA256
d077de26623045141b715fb3bbbce831c93e5b1d8c8e89f5088fb3a9c3b9d13b
-
SHA512
26cdf127dcf7cdf3aefd6efd7ebbc6a6174abcf8268d7dd07d4f0850bd4dc22e15cd1e3940ddb1f9f8919edb19d89e3d5e21eae1dd5ca4320a9aef3c9a7afc2d
-
SSDEEP
384:F3tVE0jSJPSSoH27BpAsLy1MadgHORGD4jWNsVXT3TKMwC2nOV+HKDQc7a2QIkEJ:3VUHB/+1RgcWNaBG192QIk3u/O7O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000080926bdc748b2f436c459bda400951785f910d0844221962b5cd02197e6cda11000000000e8000000002000020000000b0c575d08f57dbb0dbaf979beb782d8174f519aa5d2eefe5067df3bb4ae7b73820000000d5af965f156ae3f77eec5948e673d26679497ed1b488575165ae0fa4a7ec77294000000060f961b104f0a4bce22759842bc8836474cfcd01a12bec6062ecb172801e7c022b95f601edc0a5d8663e6545dba9bb79eb62a22179d0455887eeaf3c01f50fef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0CB5F71-7DA9-11EF-87F4-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50612589b611db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433697194" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2964 2720 iexplore.exe 30 PID 2720 wrote to memory of 2964 2720 iexplore.exe 30 PID 2720 wrote to memory of 2964 2720 iexplore.exe 30 PID 2720 wrote to memory of 2964 2720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc896201cb61dd1e9440f13530c0d6fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ba9c642bdba7443a455cd5016d80e2
SHA11374c44195ebd02c02f344e97343bdff61e6445d
SHA2564b167f042358cb10c11b433806eec438165307c31cd0a4649248c0fd158a130b
SHA51206771cb3a70a2af1591811345dda32ef64e83fb2d1a65c80f995cc95b38d6b95d3b0dc33e5d9b8ec727c71f1b81bfd8f1dc98ca3d2f469367af654d68d11a592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51242315f29b0c0554bddec97981d1763
SHA179e0bc9c40efe1623d1d85a88b896b5a61dba82f
SHA2566bbd24c2d8444b60b0d871b129fa9bedb90409d5073e78c0637caba8f6ae91cd
SHA512f998f019752c025d7968116fb6d796f8600bf6df496bbfc9ac5e4f6ec40a335810f286ec00277b6df2005bd1831e69bc1b7a0a8c6a756a9ba2f732df8fc218a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64a0a460e4aaac9d6f1a19017b4c6ee
SHA14482a32e4754d5e6254d49703a2eeea3d9a3ca31
SHA2564539e195c3397bf23a3e119e44129b13155d899056347dc4ab99226e5790be8a
SHA5120adea23170304ed1831cec1827a7a1b10705a043ba4a3190777319d6259ba2789fead218f5eff1678a49b1a0974507fe1e2c7831415923b483910c5012e3d0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc6572736819ce0ae2c379b0fa05ddb
SHA1b90eeaa390b7b05d0528815f4c2a20214f5be69e
SHA256880f3b55048d251bece77318edf95ccb50d0d899a86345dc8978c04868c4fa69
SHA51280201fb255f27142769bcd9eb01bd99acc6869b85ff60a71b72f8465cdf5496a87e54525a1bee9e564aa0727ef0004a6ca7fef055d4666dca4913dc734e23ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e7918551df397cba404e6b806dabec
SHA11fec4ffe3c459c1839b77685b18f5cf8def48a75
SHA25644df037195461e80c0fe8e352486e6bafccd36f20ccbb3d9f4dc1ebecd5dea54
SHA51228d6ac8fe27d990c7a0188669d1eff6ea3158f9ed2fc855afa45c7da9d3cac7904511cec8563463d038e14cbced7d2b59253e8f16797f94cf60892fee492d4e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6627cb458221506ab80a6f5bf7d80d6
SHA116b3336466bfadb4a3fc974d05bb0fb1954afdc8
SHA2569aee855377505faf08638d76403089ff91b07062217dc506ace51a42aa0043c1
SHA5129fbb042e0937b3adf72154bbfa0ca614fede131e663b3d07c68cdf7ce454bc0ff59fcc074062c6e2aaaa5cb1bc1032c09f63e959b78709b43de6319582f52ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57540c23abe11f01b9665fe3d445d0054
SHA1998bbd14e418b8fca73989cf40ff92e4c57953fa
SHA256b77bc306d3b8cf8330135118e7db9ab6a687df0211f0aad6bd58b5218e22e1c6
SHA512c2040b2c46558aa389a43b8ed65878a27305fb9a03a60a7d3b4e3af4a0fd42667e9d3df14979e988b7d06e040ef1bb1427b5c6931575c656296cd76c5a22325d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e59bb16f38f96ed05e278b578ba62c9
SHA188054bb05b2c2d65a4c6a47df56701febd561a2c
SHA256e1800133a19b7c0f0e75364bd5cee81b0eab56fcdc02a6f74af0f0dc022fe1ab
SHA5120a9b2e1fbe8f3b2f03240ea54cad6bc02fe6afe727f19e081697fc8ba35ffead5729dda44e161686138a30a32fe7c7a250d233122094f8369112400397fb8f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519712fe95601080c28def7aa57a596b7
SHA1c03b8e27039980ecbecdd2476713ce126a3ca5b0
SHA2562931f09397e559996fe7e77442adfb94dc82aa0e4f5c2bb4d50befacc82fa9e7
SHA5129fd6b1d67579f6b58d27b9c21e51064749bf9f072209f3a6465950f8336fbf06e9be672bd58efde46e01455753d4fec10e0b3056b39dc559f1d5065639255b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d6b398e93dcbef5923b54aaf78f0bf
SHA108fa6c3ab5a6179499c7c065dd2753f4847fcda7
SHA25623e4f4335a07e18ed04bf8389ff38235a7e555b86ad18161d7bbd8b67fd14cfc
SHA512ac528b8cd40fa6edba857b5e6066375f297bf3114694a8e5b69898a8d59713d2028976fb3d813045f209b08c412bf31e988e4abe6406e6d7e77d68187092acd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca526bf40777884dcafe49bc8ec57f5
SHA12d8e2e4f08358fc4026a569f4c1ba75b624cb0c5
SHA256784616bb64311d0d6b4fc20f35bf11cd42208fba2f5bb216412b9323799ab1c2
SHA51247eb30c83742c0d286b0e4425adc967d7c6f138e670f1373e0929930c877e65a790a2d5bb7a4f310da3ac019bdd61f04e3e78dce586c0c5aa9e94300ad38717e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cf72b2dd6a6b6bcf4e3191feeb28894
SHA1fdafb7f020a64ba9de7acf71a281731f9bf615f2
SHA2568a57de62bd1a1c17ce829d2ea6c5b59e4f93b085ea78e9985df6266e2eea2157
SHA5126d7f64047ee8e6a53b221d429b589300f6a0bd70775a16835ee02acc89beb31d6929a2da1a3efbc700b4886a3fc7d31e1034177a5036a3aec505cc511586d1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b9231e9fe95e7e6172d4f7da12e489
SHA11b9bf5d51e320375cc96c0d98da52fc3a8d8c966
SHA2561feb179c34b8181cfeb3f8bba6c116dcd3e13290a90b49f6e345162ddcd2f986
SHA5123c64c41e4057af1cbe6c7790e31104d9805c9d4c8eda4102b32b4822133a35f27566d08ea004ca44de5bb0b2fd847497bc063060fea8bcec7547edddfe067a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e98f8860bc1e03b59977a89b00ca8d6
SHA15b4fdbd2b0a641bc034952a162758ab149f8d80e
SHA256b70f8c4fe96263ef92b5a4d46e113f05c3eacfeb8ab734865a9bda9e5a4adee8
SHA512bf68d7e371cc4d987e10976f4d6ceed3cbc690741cdcffd219640f1f2c4e3846b826cc2a7de0de57fcd0a9361a04f96a1ab01ac22c4343768106bec45f7840b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3b9882922d3b3d470cf01f45872a78
SHA1fbabcd3b36d0efc57cfe473b60b030310764d744
SHA256b49a278da6f9e57058f3606aac8b6709872d7b37d9f74174bb3cbbefc246cd78
SHA51206d923b4f5e20dd7057475ef9e9b04372c05bc259d1cdba50b0088e2cf37850c648556db01749799828f041668dc0d83940be933c3b38563d3204a2ac8be87c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb72983f893eb9abfbe88e996417d0c
SHA15c0dff7c2a92eea793d35ff367efe1c62dee72b8
SHA25675145efef2589875d94a0541b5234c42b35bc47293fc934cf631518c4f27deef
SHA512be0a183ead395fa15a18de76cc11afd0e36afd6f91534852a16ca72c237b52489cf8e1f44c3eac5ea40532cb44de8a8f858ad1a95d31d529356f3b48e44ad27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8b1c2e32f1ef96c3c67140147c5f0f
SHA17c6e58f38bb6cec74c41564813eb3412faedd0c3
SHA25638de1603b513f2c6948a36460b13cc3969aff1181378efdf7b99aaedb5cc1da0
SHA512eca4c36c5ec602726de316f0a82ce7ea1f295979f1aa03dbe61d76b75617b3e40bf64bb48d25eb677447797539fce969d6bed3c51ee7f8197f7415875f9141df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a74b4693b2f34b980900e064136807
SHA16cdc3b5ad10dc9080f10a93f80d99244b7b7b7bb
SHA2567c3c884ee5ddfba4b3aa9d54f336d5ed513f0db222734dbbe8f5c60dc3b19d14
SHA5121697fc07cd7524c612be9d04f97784f0ea2ac04cb6566314b101a8710cadb28c7d257cd7ac4afb5224ae450ca0f4b6cb4217f0d11e12a32d1dd6ac1e92fe2f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d0c48ea97fba5b81a9c839888260a85
SHA1f2a747f44f87c022a49b99849674c40a7d6da79a
SHA256ba821816fa6170b506e908fcf00501c2703fce644b1360c51dc94ac30d407843
SHA5124ab77615635b0d14401f27d391ed7498687d3ec6800a448cda368379e2638b69ed60ba61b8558468c2b18011719bce08034221102ce1acbbf41d7f5fe0901df2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b