Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
fc9679be151855fbb54bfbe19c0ed9b5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc9679be151855fbb54bfbe19c0ed9b5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc9679be151855fbb54bfbe19c0ed9b5_JaffaCakes118.html
-
Size
6KB
-
MD5
fc9679be151855fbb54bfbe19c0ed9b5
-
SHA1
4f293161f53d82c98b95255498c4c41c1ab32870
-
SHA256
c17b4028cd1196f40156a0d093df9766ef98d76939557b7e45921aa5310769c4
-
SHA512
6a358b403112cb89948fd96026d869de0ca6aa0ce84f6b240e7c77c1c8771ab922cf88a07a43cfa70a91ea0ad7e00bbf25f050f12076d0755bdfeb8c474c8f7e
-
SSDEEP
192:SFlr2fytyWpsLvskUM3W3BWV6YbwVL93v6TjHsjtQRmBkcTjlcdFGtlW:SjrKyIBskUSWr3v9JBdqKE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b24fa3ba11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000704aea25ce790da7e82ad8756e1f8977ebbdb3b91a33b63dfaf05fe048639e59000000000e800000000200002000000066c01485305605df7d83248b1e5a6e2e4cd8020857d6bbef2d3f19bc9121fab120000000c10f26067197c41036ad146efa801f05b1bb5664a73310cd6aac8cc50874931840000000dde4e4d5ed27016440b271ff4150de48d66431bd83a40933a2fd80108e235968dfc976507802e827d2b5ca7bd9788c31ae067a2a9896c8823616de4294baa19f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB982A01-7DAD-11EF-87F4-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433698960" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2728 2716 iexplore.exe 30 PID 2716 wrote to memory of 2728 2716 iexplore.exe 30 PID 2716 wrote to memory of 2728 2716 iexplore.exe 30 PID 2716 wrote to memory of 2728 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc9679be151855fbb54bfbe19c0ed9b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b34dec7db685e2e129fd65bd17d1e73
SHA1b63198da0ec043ab69e998a30c728762fb146e10
SHA256fc3d0fd6569107936c99d2c6000da6f08f11de7394cd58a162b0a9f20a372624
SHA5129bf57c347fae2abab4f6cc7435b86b27f927d9022c590b7e33cfa63e88156ad0d4abe8bf74526807151843bd630d7d9b9fb9d15b49d8af4effc853a4f0c9a280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eadb04ab18aafbdfb4b681830e03677b
SHA158de6bfcb1a36cf6bbb08c62c3c16c54eef4184a
SHA2568caf0feebf273f68c3a0ecb18fcbe4e9f5e695c15e937228597941012a8d38a7
SHA512555442e5436e9f54a71081f984b6a6f19a1a9fef836613d8465de516c3ac9f49c50fe1bc786105b3e0d0ea642ff704e384befc8f9b936f2f7d9b7597278f97c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e714edefda8a9657c48b868701beb66
SHA132f447852ca77edd983184c765f6da91298bc4fa
SHA256a044c85677b8d9572d343f7f19daf2a2179fb273bd2761b39f825985c049aaaa
SHA51223655bd041d6d5faba0c2c0095b8454395b7ce9cb4389a4f9821bac5fd38df62ab4f27162dcf78a6325e90f9271d2caf4ea37ba294c04c282bd6f475be9207f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55905431b82d74d2554a9944d3c465a62
SHA1d3ada0d41bb1ab6d66bd58e7ba9315f12467d43f
SHA256c332626f6181fb29c4c3cd84839e99dbf36ffba2c23fc1bd36aae19853f38c1d
SHA512fe6155febc743ab1a422ad25f82fff748ced91398b61a1cb166382760c894621b1b7a337995f18557bae8d0704df13c414709be6bc19d8e56a9e2cf38e6ca7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7140234aed45fd4d68a59ea4c27e83
SHA1ccd4dd4fc89c8e88f10e08d461419f05f74895b6
SHA2565cdb9d1ad321397c57c1fd54a074fc28787df00bcfa686b6233414bfa7b5fb91
SHA5129d5d033528e39b27f28154e4e34ec85f1c2545311093f864fae52faa18ca0422ac3d0516ddd657ca417670929332a3a9e55211511f5d67fa618f50d62e869c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da79d2b35ad630caa79ccdb33641374c
SHA1278f13866e200689c79f49cb9e75139ad5288f55
SHA2567aa5131636a38de2d8840cef02c274eb00270bbb43a9da2832d77ecb63e424eb
SHA5126739533237ba62cf2d2e3394306635719f2af847513bb73c1526e58f6af64ee070edfcf96a71604a46180d15441e79de3e6d5f11c1f6cb738f3584ac22ceb803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77944fd6219a9a7ac52b3b1ac5663ad
SHA142229c64d4d9fc38543bfb8860a884933ccb6385
SHA256c95f358615b4e17d168a76544d6e9b29a75594fbfe8eb19f37a3a03f39ed1a50
SHA51285bcbcda8c9797eb2cb28ec77c8f1483b5ea9ae10400021dab988acdc939bb32cdcc304437cebd9d9914216ffd047339eceaa22289f2bd9de08313ca7b6ebff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b154551fa1bd1409d9b6cc48a587b135
SHA1d76fe1cd264de5d49dcc3e7b88e6d2af803e357d
SHA2560b944ec1bd15b75baa7003ea525b520b390eb77cff78aec859e314e4bd0e3f70
SHA51274e4ba6c12eeba0a7034b29fa25c5567b8ea579b063fad35886db8e7323fa02341e9c663e4d3392f6c42c774b9c8634b605fdac8f3716e3850630659211d2bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec4a7615fcbf574335830c065d7800b
SHA1bc96e4cb523f4d3c64bd2f51ee2c878d805fa9a1
SHA2562887340467c4cbe745b10970810b6da447c76d6719c62801cd34c8f2f88ab765
SHA512a6738e1bbccdf108f2364b20d56dc4f4da9187601c014c07c46121277202154cf920d6f12cbf161cc1da306ad8d5f9ba4e3d4119559aa45486c54f0df38c63c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560909b6cf8af1dc80362a1ea331861e5
SHA1d77e3ce1ac91c4606b683614c9dcd1b6a720875a
SHA25686e3df54bdc12d2e89ecc05930d67a4f2449290a8e014612c5809f3dc4a04753
SHA51240abe008dfdeaa24d5e059071daa5494ef0b5b8950bf63c5569f6aa4349120d6abc87180ba17dc25cc1dd8b7e56ecb079981471e1979b1d08a2d8fc9c4f0778a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582060d48ce43a0bf8c3056be1f1047ff
SHA1ea50cb41e665696e61b640638b3d5eee26d67f42
SHA256cb7d50bcc3d991048e29bca84efe5d8bac15e335af33bb4259a63e07a8dc4265
SHA512262bdf938979d904eec3d8a8e4485d9fae8f2da05ccad429773b60b767e4fda1fa0983d6e9033bd375dc5bc8fbf5e3b8dd1d7ec5507d0c45f144a6d4afeeb609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f7f0008b46816214c7f4defd695d1f
SHA17efde63937ef040129bf00d696aa1f0dc0ddddf4
SHA256b0c0a1ae9eac0ed2fa4a7cc066ea6a16cd3713902afb0011ec345c4ca4f7f942
SHA512c3e829c8e26c6f8309234d5d459bcd44aed4f82485253706675447f4d91a0eacf4cf676401e744c4b5f5c895652ffa5385e3b137956a58d9f0a4452622903dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557135e0279f4d27d5c4bb48e3e26ff76
SHA1f666c2cf41b3b12c59bba73c1b2902eb11ec44f1
SHA25642ec7452057c0795720168bbe53364b7f33a5a38292f09ac3ddc541800879156
SHA51290f20e5c5b665af7ae39d5b585e0bc136f800a8667d067a4ade159e0a1256197e6d043a343c98dabb9ee9161ff46003c5a99ef68a9fdff387645e4aead454c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ace119111d9cc7b3a38fb11809b6e84
SHA1a606a16606208abbb8718d43d02a37da94956ebe
SHA25674d848f781bc002eabfefb641f179c9d1059fbb32e8efb5627a5e05180e18a21
SHA5129a5b89f185a5e4b7c66d808117a32ac451f9bf0471bd0efe14a2fa7cfd72e119658ade653f4caabb7da928422c3b314ace71d5426e9b1e381c11f4c747506e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8057ad5817658187bc22b4a191f45a2
SHA17732b1ed0cfe72d2bea5cec4a6974132ca46dff5
SHA25628d8d3ebb59cc8ddc3758acc30966786a222a7c481e27ec026deeb6d1831f25a
SHA512915a99fc37e4382c4cf78b60595f105ca73582c2a8cfbe50b1878f6d7e9c9fd5f2082bef6a315d062a3f604274a4f92a225a0ed9e4a7a5e8ab04c894c8e0ed32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588a61f104c7dfa5ea84bdf675d2d2d7
SHA1ed394d9363f9c4493eb6a5bec85d7b35237e075e
SHA256477bab1dfa855ef7a55f5e350068812a89e39d893fde3081f03eba37f518478a
SHA51279e6f69459cbfd8dff09b13d1cf68dcc936aaa2a084ff291e042e542b62f124715384f8590d37b176f63d974cb1575b2c46be11b2ab93a770aebf554a2caf2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7c26301227d0c2895209a20e4597d2
SHA1525a0cafd7ff9c268fc6c618c9e1392cc81e0703
SHA256dbc8b6d4eb4356778e706291252949e1c3678cfa2b284e38b22ce11158307de7
SHA512e3a2244c9f3fe52ce05f0641dc963d622d26a22a343728b9d4fbeb902220d2d8dbf7f7603ea6f1364d596bc5602f36933d88d9093ae4b42587d2b2fb1ffe05d7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b