Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
fcb593d4be683c02f4ace353477b88c6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcb593d4be683c02f4ace353477b88c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcb593d4be683c02f4ace353477b88c6_JaffaCakes118.html
-
Size
19KB
-
MD5
fcb593d4be683c02f4ace353477b88c6
-
SHA1
cff69d52c2e1440ab6f9b31c931910ca3e86b01d
-
SHA256
dcf5d48341e3d5244b0a6de5aa0c7b6e6f048283752a8b6c601f7d265b70a9ee
-
SHA512
9f6122019e6bac23fef162a656a1cac7b6b6bb7f4e4a01838d5e5596051a70476359d2cfbc35bc8bb81bf2bba752aa1da14e6e25631951565cb6cf0b29b45698
-
SSDEEP
384:zif8KhgES1VBD8cuQ3Rpxf/emLxXucfIk99heczVc9iSdx:zifVS1gch3zxumQOIk9Saqi+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01680F11-7DB8-11EF-82B6-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000024ddd08d1ef8e7b20c9041073342cfb23fdf8452b224d6b2400edcbebe4cb13c000000000e800000000200002000000048afa87eb93805d0d3462253672d47348d48ac4da1f000421778bd198b9f21752000000074380a4571a3fb162e76610992eef036ba97af4280ad5487c1cfdadca1e0a95d40000000387e18fe3042e203f466176184e00164585ffa9730799c466b440c4155c847688b564d3105d9d5190e3d096f3af72aa4688b91a21fcce25203eee573dfb97a9d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501615d6c411db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433703340" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2616 2764 iexplore.exe 30 PID 2764 wrote to memory of 2616 2764 iexplore.exe 30 PID 2764 wrote to memory of 2616 2764 iexplore.exe 30 PID 2764 wrote to memory of 2616 2764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcb593d4be683c02f4ace353477b88c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56466503ffdc61efe4322ad821ebd2d
SHA19bcefbf306067714fa0dc7fd631ff0938beabecc
SHA256e9df42931a6dc4fdd855eae34f4f9aa40f0b4ed2e53efae2114fcc97247b5fe7
SHA512926c62594891a7132e32fb62243d8c22a38e9a55668945aa73e768d4d3ba74fcc8144a0c3cea73dd24f27fd1f9d22d74039b3ab24b4f42744bb3ec371a7fbb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559dcc78ce1bc12ba713280406026e85c
SHA1c67f0883fd7378e19c1150e65283aeb964867f40
SHA256a70176bc87d0c28b5be8cde540e3705de2ac26c1397635bc91985db60df46a27
SHA5124c3738e183fdfff96bd58dc931bb6f40da44e4488804f04f6970ab33a815f0aa665205f629ab224f2d419d286412b7accb93ba8c9ed7e489f76aadc36b405b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5963d0d8119f8533fd8922c631d4082a2
SHA1ac7f69642da11dcac93028e0d99f4373dcc3052a
SHA2564183e87c69ac764e68335db5cede69d7927edcfc6212a5f365f68e7cd4893ac0
SHA512a155bb711a762af258ef0bc67b739a3813b056d33fad24a1825ad7094867be52ef75186c459e13d2e19f3074df85928d98acd3e41dd6075a3eb80412f4958eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8b1149fa61bf625bb7b9fbe2c70468
SHA19cacb1d4a90386cefa21154a0571bee4c17bb93a
SHA256e9dc3e2ce96c7d4112d4738520c371fc0256bc510ae9978b8cd154256f838403
SHA51202760b61b990abb3a480527ffe477b88b4d5407a0e79f5bda63e12e6f844f35d67cd0573715b9f9b4fe7419618f4e6994e08894e7362f72146a8e2a270a9dd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8ebed2a073d19434a6756c804d39ae
SHA11141575c9890d1145c7ebf94f756fa82dcb727c7
SHA2561581ed67571984c5251de1e7473f75daca5d13b939523146fd828a010e5651be
SHA5128f18e21a6328f70f677fb35a473c323360169d85ea194f8e11d0950a147a464ec5748110098e3052c577c6257c29b24db154943a009fc7056bedc9a3ed2ac206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538fce0fc57fa36c7da8d90bbe2502a6a
SHA1c217f8b6609af116a701fd7ef3720d56948e8319
SHA25644b014643d1fa44e5b7f57bb4603b8039ec0c2b17b95b7d396f93f9a36bbc9a7
SHA5128c707168e79751a421bdd010ebd30dada9674774c6f648b43b0a2136199b0bb1d5e3bfacaa771dac232b1dad90715713b3ff2029ee1085040a17dba9b1613d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab096be10b9bfb23bc4488d1e49868b7
SHA15578fed5ff0ed4ea009e5c40ab8ad70f689e9b18
SHA2565d2306386612c63ea645c42cd4da932125f9da143ec5aa702ec559c16bcdd995
SHA512243964781aab30aaeb37adb14a3e8fc3e9757e4063e54ce2140cdb875cff5e3632e9e446e623cda2efaaea11712de18a43ea5d4ca3c5fc6dcd71f4aee629c7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea5e18be3c8bd13ae02d408b2594a63
SHA15ddf0d4781f3d37c998ac6c585763471c8575fa6
SHA2565817018bc2037c984f4bc706f3f4b311ed6243c6450c32a3d34e0ee4aab2980d
SHA5125e607f8b6e03bd3708d646d55bac2d70a1ce7f1c9128f2ba03bed1ab626db3c2aa368d1b6e14e0293d63e9fcaa9b50b38c664ad015e74af2fefb7d5a6a43d0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552856220baf485df47f49ca6b4a361bc
SHA199c0f4a8a27ddd71d9641a5f66204568de6812f2
SHA2564b76709b3247f3b3bbc798b26242f71ae410f0758b568315053cfa6b29db9e59
SHA5123f5708b086e4b73625d1728c8ccb72d5ee2b6b8c8f408c3abf503256263edc55d0b5a8f7ff496b9ad984df3891120c9a00ddf6e7b10ac9237f1b3fd02bad1175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589130e21a2947e4a8144dd06ec7abe74
SHA1989508a53d953ec6e47e2440cbef282f66bd1e7b
SHA25650eebe39db7daef89122e564aad64cf30f6625ede3b0bf12814c8cc851e322bc
SHA512403724cab59d9cb930d249ca2c524af2d089ddf5c3fcd29cde9aa35da31836cc63b1be8100c714cc44568b1d4ce5e205a1ccdd437e8c33d234f8395f61ea5680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ad7907d9b4962ca2942ce68a6dbb39
SHA1246dfb672a1bea3e77d82b85be54c89116db0995
SHA256f31d5c7892a42b0c79f9f03a7e764bb2bee4cb9c8f952b6cab73acc0621b19d8
SHA51201b51eb580139941a9eb675c28b5541777a29c09cfd61c9416b6820f949172a1dd77e4a18e43c8cfc02044bc018a69d743723382f4d85df014ba9d74b9d15ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e301f9e87158e5c8e91da75104e55ec7
SHA1ac7134c643994f7bc6a9a12342f826b2603828b5
SHA2561b666f2f32f25bd8ca13d72d970a44455aa8df919b7373daccc5ac15f3e4a578
SHA512f593a8e1eb866bf2f725540a28365823833ed84309ba79ac60b3c35ea37f7a1d771b6f6ef192fd0c3adabfa4c13010b76df87b59c9686520506ca56fe55c656a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abb1493522ba1b3e4f13cb58236a90b
SHA163593a0b35b810b9b8478d8412fddea3a22a65c3
SHA256b9e84fb7ee945b2fb29fe827d7bc23c31b56caafd5a16cb539ffdc33f0679853
SHA51288caabc3fe682edbe0584803dfb121ce3fad1c03d7f60669b5d5beaf8b977d85fce292d893e911f7f98448dae9e0c106aaf170de54c4f8b65f8cf9dc19bbb7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a366c7f1ad48bdae3aaa32ea3abfe3d
SHA142148de104bdb6d0bbc22b17d5e375279a35bbcb
SHA2560669cc8f3acbef72c10c9f0b0c71d7b800d5f1a81db1eec159b08e2a43ce068c
SHA5123f63d78128124acae525d740f61878b8b25ea6d0e975afa411537c771e8550852e5888a01511d1cb156803e6c7dd955116583dc1a355e5fbb23fa2810a7e8c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb07ef345f4f09d4d5930dab2cf71a4
SHA1712508cc44591ead4845c7b01cac4529a01090a1
SHA2561e1c4c5f9134f2aa3e2af51e5e43899e9f549e17b98048fefd5f9593983c3f7a
SHA51296b818076effa8f72939a807a534db166fefa15ee87a5c2ada3e03c2f1a43bc4c679b065e82037f82e7383cf882b804eeea3f82b1ae2695cb0aded129ad0d724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d79d11f8511047b0082129391be5db8
SHA1b2bf244c6c549acb92d8b7644cb6476a1929459f
SHA25650bc39e26ef90b725d7fa05c73f6de03b4eb3bfe36cc4eae69133630af7fbb4b
SHA51223fcbabab1c03f3f5916c61f743e935a34a5af930fb0eaef21b413a767d436af6bf9568fb387028f6b132491336d98e47acb4e4951c824e7c918d5abacc59d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82651a1773e3d6db04290e82436c8ed
SHA10bf706ee305cd1c6dc5e73a109dff5b7a71c05dc
SHA2562e0eae211ff85f89ee8832759264c05d88ad09bfd3a431bcd51c5577b0a5b8d3
SHA5121a740eae03de939bec947e5147414bff583d17324db1e199768db31a4ee547387208112cd71d6a8f88feb75e6cd89590769af333d40805c8f78ea70e25ebea00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4641c8bd593941570eb6268c5d8f8cb
SHA16a908144afede4fc51a8ee55cd46f2433fce05a2
SHA2561f16def1944ac50b6ffbb3a91faf74598610d46aab58a62fe65a8333722db5d9
SHA5127d529a6db40b2dcb7f6bd96446076c56e1f5bcb9d5dda6a4a3fe9a0be2e5f4992ba8f98aac24a8d3bd68e63c77d210f1269443d6335cd4687f598be5c8f65e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c2a2129e3cc35fcf34be4786315671
SHA1911175719dc98f4950da61473efe5af55e6bcb38
SHA256ff82c7a4a7f83226d838ec2d9c614577600a17d869d17e68d40eb842a283ec9c
SHA512d52406f0a3d6c7c678eec0b30cbb78db49eaf6b0457f639b91a898efcd4cdf7d17f5bc9e28ebcad2a161a953e1557c680d56440093286ec42dda9e5c2057795c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b