Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
fca9d70583527ed587ae7a47e157749c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fca9d70583527ed587ae7a47e157749c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fca9d70583527ed587ae7a47e157749c_JaffaCakes118.html
-
Size
91KB
-
MD5
fca9d70583527ed587ae7a47e157749c
-
SHA1
d5aa69ef48fcd16adcded88b43a49c6e5cd864d2
-
SHA256
3b518c3d89d96f2aaf1f25e7b9e92bfefd52ecac21f047dc9fcb7d12411ab31d
-
SHA512
d0115e2fb1af2aa48086e8a034bf928fb02c726a846a1eb1668e4ef048f581be905c1faccaf35eb48034387e439491ff74f3255b7fec3e11a1eca1b153b569ce
-
SSDEEP
1536:PM2HaskrRRnJWUvES1lX1W9K9An7rXNvP0T8wH5zpAmtlAgU:PM2HaG0X1W9K98rXN3AtBAgU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05b67b3c011db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE3FF471-7DB3-11EF-A96C-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433701563" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000068f55080b431fc4f765eca808c0d7c5b360295de1bc0f6c85f8c789e6da234da000000000e8000000002000020000000b3dc4b35558461025e64e0e6f5305f138ff7400131b267df918200e5410046e9200000008eefc24cd5b7aa17dd41277c4c77bbfd5bfae822b2fb0d4315ca201d0aef0fe64000000015990ac64839c6f979968000de30e396ecf348d22fd51cd260db545de8576400c7c874e87e9fec6edafc39ab199e9159e2e17c950966339a72691c36188fa2f3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2676 2744 iexplore.exe 31 PID 2744 wrote to memory of 2676 2744 iexplore.exe 31 PID 2744 wrote to memory of 2676 2744 iexplore.exe 31 PID 2744 wrote to memory of 2676 2744 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fca9d70583527ed587ae7a47e157749c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b419243edb52d7441b73eaa86e595bf
SHA1beae42c12cfca58860df208a894e6e0d020a4ef5
SHA256a7cb925bfc2efb4235504925ef6f134b56e664fb414cde19ad236229a66aa33f
SHA512b87f53721c3bc4f0b8dd7770ab5b710081c8744dd1234c7d2baf20a05adfd220300c4052489bcd7082b8eefaf087b6611c3967a1e6dbf22042ebaf2fc46e87ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c267a64b2a380ef5150d357f575c8b7
SHA1b5fd676d03b2e46f25c1d386d36a19d141cc55ac
SHA256b9b2f840213151520fd0b4f33fd71dac2692a073f8e093694008f8fa26c3551a
SHA51246a657ac6aa417f4e0b643eed38a79425d8c3318c45672194dce3c45134537912d27044dcfa155ff10f5b14f4116af0bcf51c3393b27c21cee8d4b518ae58c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd68a071dc5ca190bce308c9300cd5b
SHA1e82405d66ace68e13120827ff09eb3ce362d49e8
SHA25605ebec33055397fd08a5e81bd1cb8fbdc76b1591cc7999b83b0682a8deff04b7
SHA512fb9176606c4e6e9f2419995b3ad447d09b8c4237533dbe46ceeb0456291cc04462c0399d95cc12ee6eba8e59221b2385fb4286f4ace5a665585c6538a8ec32a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f4b5cb00b787ee1826eaad778c82a6
SHA1820eec2652e51ca57d7a6003b6adde1d56e44dfb
SHA25683f4f400595ebcb3788c7c2233e29a13f44c72078c654689a9059f573e09d00a
SHA512ccf5b6c412387f9be158c476ac57c4e1afeeef68e0d6bece1d7446ef853acdb80bb6e408d3f949cc8b28d1919700603bb99b62d4fb8994a4219865ecb202e46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505114cdb69d3985bee56cef8b37b01e2
SHA1ab86fba3764a25ba3431419989efa704a83beca9
SHA2569ffaf37a67556fe603f6c13cdbe10dcb2afff9f8088edfbf0c4bc0d48c814b14
SHA512c428f73ce115c2774fb1a51553ad2e43b710beff2aad6f566c076f69e952886eed0eec6a258630c01e30d2ad846f9086f435d704d6c327b5d22a722e28afdd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8777ab8ded9b5898706a6bf29226d69
SHA18e8d480d4a883183f825982ae185d4a55b8304cf
SHA25604ea359835d7da099c42d33af1d187d3ebd2b1df6ce9ab7c24a9dfdc4cff7ec7
SHA512be8811279d295f8c1970c6e8ba6b799e6996191ea1b4386c46d58eccaedcd319fa7c5095145503b956c523b3a1f66d8e93b0b20c4bb98bb428e6cf3d4f7fbc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394b6838a4b2a82c8d2b8cdc591f65c8
SHA1a47d6594baa1a659b613ae50afc95ef201f2dece
SHA2563acee58dae7428621b82219ff1ae6ffa66d791dc623d9335da5c0d2f2cdc6823
SHA51274742e7e3612db5be35d4f99b4d3481b5dd92b97136c9e206007b2b1420f2645cead11d0b70f6fa5390e1d057b0da4c74c746f9bfb9a21e135980737ac6066e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8bd1e7d4585c4eeb7400d6e471fe91
SHA16e54defa28be6b776ab8f532877e429bfa9cbbae
SHA256b4f8278e8a05acf22c9079fbcc123c39e0b88d67197c68a3da28c26c0577b361
SHA512551c92972c845cef1df2c1cc7130ee6ca34e7993b23ff24afb229c94f3343288123ac7742076d583c0949f85dd8f324e70dc9cf44246755c1d12f33082623c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55079c1bb7d0e8f43da186c707a838230
SHA13e33184b315d18e70df93543c586427afd9e97cc
SHA25620d20b9b2682f851e3c93e0507b83bd0669af0983c7b660a96ca6fc3e0d91cd1
SHA512bd28d0301af95379286333bedb0635fb34b07219711f1d5431057ce8b05450422a2f9ca2a27a720b9601a196ff13d62f5e9fe1f47b43d74bc67f9a67142406d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d96a611a048c5c5eee865baf2b8ca6
SHA1b91c5356107f7b68349747e1be0f1c01e646567e
SHA256c78cca165cd7e1f477cb8c6bf557f4c186e534fdda45b1dd6d4f012b61847be0
SHA5127164810562e0bb3104f695e519ae38197a78d18084e88796d87c5dc121e3398d9a77ed9497a662d597c9f0e9da7d2ad8f32c9dd0f5ebe1876f65bc52247a7fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51223b1b05eea2f95a45df8ee09c0438d
SHA174a5c9de56d35bf84e9ef8672c6e13f2b9b9bff4
SHA256f3a5dbe8b623861cf193912665a20bbc689f5ea8a1ec4791121013dbb133d913
SHA5127169d420f3876e843376997d4ec06e077aca29cd644f37e8a211cdfae7b9193dbaa70f0c1cf668a89aa2a808d005cb86cdde08c9ec00b5bdbf76cc97b17f68c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dbcde42c9e33fd2f0bdf03d4fa672cd
SHA120555b4f851a4d6175782fc5c97bd85c74c34ea4
SHA25612418c34108f21dbcef890671c5c4e6db9e7e4af59ef19e14f345e4cf8285c4f
SHA5125d08f82bdf09e003c5fb1893c68f91fc1b6326d3dbca5d5436980a0059bb147063a8590f51fe640cf0af48bcaf94e4d2bb81d7e473585499da151b66a1647d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ed71b15f45d0c5cab953e04126f97c
SHA17b3a3b4817340db5edf59ec74f917095448c2f60
SHA2564999a7880db064a6a57b390ba41dc79a1874145275323725bc108cd95e6a7d89
SHA512a205f850d111a56394aff2bf8a8c237e02dc2f71ab3d54a7a96b7d22ae7596f23a2ab202a82a7976f86b75e0d7e788e816f951eb8a22940116fe94c4f3c93a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5bcf98c9c338cca9eb5342a5c2f78b8
SHA114f8c8fe58284df7eceb09b3d6d0d9d38b1d9eb8
SHA256017b9d31166dcd7d45561a345a14c3e17de8f05c5ffb2b6bcf40e660d296a7d3
SHA512cd63c91c9478172afca71c476deaaecfa147bdea3e86039096d89f9214369b4ef1c53b6598bd5331e7cea3c219372d85806e0a001616b4712f560e30207351cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699d62dbf83153e10d30ff418a050aac
SHA1643769899c21262cd3ac0ef946bbe1a78406c6d9
SHA2560f65df8328f0d7e033eb35fd68b762f5af54659efa9bda437942af62a11cf4cd
SHA512c4063adf0281d6708bea10c98f22113898a3cfce234c3abc1b9975bdfa153be1e218e37748247706dafe2e4ec226ce62c8e9dc03b9b7ed3946e507e9dc846646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537df1a77d2bf33626b07d8dc6b6c31bc
SHA1933ed72a87d5dc33fa76ff7931e945900c6295bc
SHA2564aed23e06d70cd910a3ae54613fbbb1a55f535e04dfbe81e438dbd95b3c2aa57
SHA51291f2d28169359c06cc8851f9658201a10f57394deedb580433a0ddcadb7d39ea9a13bc1926160b7e3f33c3f9cdca085b4a251d712af9e89a5c2cf3e39e913af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519cb324d6090534866697c47b4c8b39a
SHA16e9df8520fab6440cd0cfbb2fd4b6a05b3839e18
SHA25650354dfc0fc41107eba0ce11553bb7930b635d1f5a6175403b5e16844118ff56
SHA5126f68a22d485cd60dce5482cb2cb2f008b833a2588b4188d6126dbe78b0dd36c2e9328386bb2097e16e82754f7f54b19416dfec40a3c1cda754fb48402ca8bd6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a8d5a1b6741455aa58baf817a6d280
SHA169b81a36724430bd6d4f7060838e3a88a837b276
SHA2560c475cc1d713dcc1aef60095790c425ad8a7c9991139c55c0d2af3c847741085
SHA512d41b30cd634325de6c028ec17d8f6198343f9824f87676af9f1a35e0e1b027168d4268c54bd4079b8900412fb8535f95bad69fbd87a0ba39b602aabc829f953d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517465737c0e546e295c95109f795c7d2
SHA12e31f57f521ebff49f05bb711b7cb0f4c872aac2
SHA256f64195500c29985daebbdbf5691067419312d6ff6b520e39939e3c957eb688fd
SHA5126e7c57beadcf68399d8d99381772b3c33513860a83ac35860830f36b28c36deea41b8f1a776462161cfc7576b3ca20432d412918fbd607fa03827d0209246370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd08e6bfc711f0d8cd8145a914bd358c
SHA1a32d0824f39fe3f447da16b668da878f800b2b1b
SHA2563123a26811d94384828d684167f3b7f2364243a9ffd720e916498c8b1e278adc
SHA5126bdd5f4c03587fb40ccb3031518382afe83d6278f4edcc186f9353e8f383e4bc27e692a9ccffc29843428915809fa362feb0fdb949c21aa44fc3396dcf873eaa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b