Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
fce4eb391b3cfd30a8508dcdf8342929_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fce4eb391b3cfd30a8508dcdf8342929_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fce4eb391b3cfd30a8508dcdf8342929_JaffaCakes118.html
-
Size
16KB
-
MD5
fce4eb391b3cfd30a8508dcdf8342929
-
SHA1
fd272c44602f8eda1f1fc4f8fd9832f72ce1bf4b
-
SHA256
d341d011959574ddace4ffdebbe94170c96fca35ea942700d62118c07413448f
-
SHA512
99710cc9e8984067d06887e0e746b354b6134164136a2042bafcf11cd9c691f68c175915cbf0baab908dbac3311dc2100996e750c60c49270f6fef0445f87640
-
SSDEEP
192:SISrrTTCQTOQTTxH122+3M3TmL7u0TLXIQueHwreJvA1G63g:SIYCmxHcSs7tQjeHwrSht
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000001c2e092858a32df33df3eba52c69e24d253bfa009ec9d70b010e011eb6c01e72000000000e80000000020000200000007fe915db3c266855474aef6f375a215d943940a4119faaa6adf9eb0e3feb32ae200000006791bccdc2a286d2aaf859caa6ff194879f77ffd272aa707b0638f9db1bc1f2f400000003c37ee3c0943c28b5cac0b3769876d5e51856f52e4d2c40414e035b17a96c65c6a36015d1fade9a30787a26692bf3edce8d4da68d9ffb2312f69e31b3a48dbbc iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0DF0121-7DC7-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433710050" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05c0978d411db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2740 2792 iexplore.exe 28 PID 2792 wrote to memory of 2740 2792 iexplore.exe 28 PID 2792 wrote to memory of 2740 2792 iexplore.exe 28 PID 2792 wrote to memory of 2740 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fce4eb391b3cfd30a8508dcdf8342929_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d720096678462eb198c31df33078c2
SHA1dd5312b37a793c408e5287d8e363583907a9ec77
SHA256e98584730a6e74dd7df9116ba60e0c3075e8a31fa3ff850f4233e7e1e9264574
SHA5129dbc0929f950a30eb9f4d8d44648149237f46468a95a9b40e73c689636b5a9959d24751b823f216ab24f879a7520b0bc2abd7f86d443da37ced84f788c941e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de588f9e59c000177ee2eb66dce832ed
SHA16aa2e7aefe176902f2c63c1fd437b4207744894d
SHA256d0a4e09cc8b518364296d51ce3e61a14dfbaec4056a028fe6c4513818b569c5a
SHA51217d1eda3e7e32ab8dc1876eed9eba4229561932329f0387f4c74a300f9bf603f909c5acbeba4acc9aaf426c54f3f5aafe9b9ddd4e0049ad069a1dfdbe1ee8635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523335c373c6fe386fe187e383b81aea0
SHA16f177466f5b163587aa16abea4d137f08d34c6a9
SHA2560df3c166f554dc3da2bd9f86f444c75be5b4fcc38f3e21f68fcec05ab3fa1086
SHA5121608d8ffd67397709b0205c07c609246708bcb24f4a2063859539c44249f32ce88e84cc13d78bd256de54a6b2f4d3ffdf3c9dccd9c512b584762908de566c278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d9a7a2890a45848382df019d53888f
SHA17668493796369099fd36aa52b4d2b1b37d27ec5d
SHA256ebf823010fd0fbd4a055b78ef8fd6e273cf674110157bea489bf078710c0c809
SHA512896c199b10f86783d9c59196be89d9d896d5390fbf13d369db92d1c9a78c9d119e89674543c5ec36b7588e92ce3c2675881af7a6461b3070d66838fad0984d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e928b509faf16ca8b249e24cc6e6d0fc
SHA10556b3a772b7490bfa222a8cf2de50bf95780ea8
SHA25616e36837b0a16f913c43668ba01cc138297573b90445934326d116241f0f7b7b
SHA512f564e5d0876facde07d2a0225d22d5c277a75db5df106c1341392c4ee5fe08fc00e05cc32537eea0886a5d66c02b3f34ce0f32fbdd6c7690eca7eeb690109b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5fb4b02379f861e847b31ffd0a0d1df
SHA1fd44625222789e612352c308ad7be34fbc644782
SHA2563bc2d410bc4363587b1e3f450e5d140bf5947909301b23ec43e2e1e1f4c6aaa8
SHA51208f93e6028b9859726ab4f762414624ccba0e2239514a01f0fdd2e174129f44af675a7ec4970972f6a9e10ad41dd80432ffc4365b4f16f1466618fca681f56de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f64fd50f04d9aadc5fa72eb50cc721
SHA1662039ce8ffc7f6d34f7250a079b18411f0a287d
SHA256fccb95fe2552589b57ffb36031405c1ae02d6086f93cf68ce634eedad57c15da
SHA5122002a56f3959aa2cf5aa3132e0d1bd3aeb277f192b2205a37be1c3435b32af0973f2d99b28961acd62cf2463561a2eba7615d19110365c404828b3435363b01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c48959e4859a3b25a72f80c68d8e18b
SHA1aaef0247ffdb4c7b6a86326b1211652ed9ef66dc
SHA256056807e0f268d1a4d134e293970dfb0f37b699b40099805a155f78df1eab3f91
SHA51281dd4a4ca8d613947d950fe9a2150f1d77356af1ac5a7a448e86c913b00df0bf9e54fa6b80d684ac4e58a95cbd38b650365aeb033d740957f8f4f6de70908f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f475913487dba3ac26b55d700e4b7b
SHA19399df9eea33c25964bb04f515e9abc47778a0ed
SHA2563b952aa19035ac0d24553eaa8457baae552c22d728bcd9798c8f7bf6ab4cc30c
SHA5129e4692ab225e3aa3acf3b5aa37107f58d8498553c5ae79b7cc54250396a0bebb2d73a8913544e9f503c562258472683a1b56ed30bdb5e8320cb6c887f99641c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f93498bad319b5d22c26eb52b38443
SHA171a23bc0d5087636efe1e5b07ab937b8cff6b2ea
SHA256e6f72fc3e562ab3d0453fe8629fe2a54decd12d7df746b03abb50b8d168b21b3
SHA51223bd17671a55b864f0ece4beeb31461a28b89101ee37375933287d014fc8131757309c3bca9a69e6937718317062524b94bdc6078d6705e9ab2aa06c0be5d59c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567527ee5c65ad093137a5beb5e69f17c
SHA117fbe07e4d2e4f1a941098d0d54d26ab8a634d07
SHA2566c9a37abab71c5f574340500940b57b436efa923dd5442f852f9bcf972838596
SHA512a86011a107d0ff3b0a9ee6959156f412e438d3dccc7a8012330a1456252003f0c7c81bdaefd9a4f69f199a5a07c4ebdbb8644ab4e6a7dc4ec6c6e02cf2567038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409a13711f31961db560b3e5c466d9d9
SHA1c3a4eca75249ce79b7d293a4c0532606a2cd188b
SHA2560593e9eb2ef3abab45dbe6faa3bc8c45cfa07ed598f996966b81d11a590258cd
SHA5121adc129144898a971e8fc91c6fef48e468ccab1e7a16f8a88e043818c988cc9e5fbc0841ea41ee7bdcd581e38ce69ef66f9b65608b68eb8f76ad6cb0637290c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9d5eaa00c2830fc6f96540aa237c57
SHA101096af46d4800afa3745205792f7ba0a327b1e5
SHA256103af6c6211e2fc50d8349dc00476ec69670661f7d4a9242e155cfabd3758275
SHA512f0fcd8f5c3126ce19b57bed62af0557ce5b572c3a30a30e2255b9395b15968c64dba701d9e19dd87c3fa4c55569079e063a402398eea4cb11928a45d0edd3bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55430978ca49f9640dd44bce4c158ae
SHA132467760432b4b318d3afceef1ff651d1a5d7f55
SHA256c61d433eacad344c185288282dfb35c1fd9206df24a521090a9cb1223eb9ab49
SHA512393a8942069f179b693ee88b898396b3fd6f93e1142668caeea9e9d2d07082e7f61c048cb598cfc683f6fa294355c8c35ae59a6886837054d113903357e1d628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ab3852f68812c1ab6cc98be5a147d6
SHA173d8ebca3e04ec5709bfe2df506a6b29823db8f0
SHA25615638b6992466e9aeb0987bddf057d070d21f14a875d93e36c273553f5fde674
SHA5129ea804418294d7d1ef0df419369204ef2cf81c48a6e0c0a2eb932e3d6ab557bee8269f1c54d9e0f8f409f7bd6bc73e107123e1a806076c9c7a3df2915c532a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa084d026aba6d8a00bd93ab14d9550d
SHA18563e597ba5a736890fb2bf28ec5f095415a1358
SHA2565ee512d82bfacb1e33cf5f8138d94ba200141a990a317ab971d7fd79c4b597ac
SHA5128b255afbfb8160f27e786bdaf0d98cd64e2246b7bf41f4210d04a6d1c2dbc85a3f1e2f1f2ab08620abe2748fbc1e736974ab48a0f64e477782005c9c41a7459f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac80f9046896862e18d4497fd75dc079
SHA1534ee93e206abd014c7c7de1a0482ee4c63ae308
SHA256a50626eadbee04514523852e4441ea173c67a177f400cd1184ee8c8cc9947379
SHA512b8b60da35039f2281b9c57c140e45644f9c642f8fa66d3a78cd1163e5c64ebee1816f7efa6f648b102ebeb1d806329865e77e26cfafd9c1f890af4ab0dce7ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b21e036ed1c2c7c55e71a142bb30332
SHA12ae676ace0eef537427984edee2b887974790c66
SHA256344f56294c11ad7e1785cfa9b27b3ec8216d4c7af2b0758bea2a7f7c1c5397cb
SHA5123027859059725fba82fba873acedfefaeccd886da4373be1084e495f143021c845f6a9739b691f7ba9668dee90429a7e8cfc517df00c109a6f463fec18cc8ccd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b