Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
fcdda858927c58c08e69522e0e42a80b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcdda858927c58c08e69522e0e42a80b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcdda858927c58c08e69522e0e42a80b_JaffaCakes118.html
-
Size
4KB
-
MD5
fcdda858927c58c08e69522e0e42a80b
-
SHA1
e235f950475c81847025a78cd54fdc68d49542f3
-
SHA256
45025f3c8e890fefd64de05f0a7c2a3a10baa23d9c6d1d6b96b9adea91cc2541
-
SHA512
a6b2d6a13b994267d9a8ebff05ac2b9cbe7aa3c35aaefc99fd523a37226070de83258d9d0e9576da35d2d617732ca6e4fcf5f2b1228eea74f0c0b0300a7f5e26
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oPMCCd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0092ed6d111db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000000b96bfb762c199e7deb6d656b7aa35f99f42d30327cfc78acca9e794e214415f000000000e8000000002000020000000a4d214e614941ba25035e001e1f8f4c892ba5e8cdc7e9d5af75e24101f866f9220000000b9d4e0ba621f4a86ee8d161bcb809d2a6d922b94ba9b87bbf8eb97ddcaa5f1c340000000d005287420d1421135d00bffd05da0eed6c4a77e93a9ba7fdcc95f9bdc05e44924550f9681ce12930919db10c17d16d818440c7d0c5bbf20f0c298524c4b1b0a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01C30CA1-7DC5-11EF-A96C-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433708924" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2552 2744 iexplore.exe 31 PID 2744 wrote to memory of 2552 2744 iexplore.exe 31 PID 2744 wrote to memory of 2552 2744 iexplore.exe 31 PID 2744 wrote to memory of 2552 2744 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcdda858927c58c08e69522e0e42a80b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f765e865032dcb3badc9fa2a5c2b205b
SHA1ae09d1a72c28f466cdc0a06454addade8f479afc
SHA256775a68ac1dfb655d5e07c7e8fd8be085adf6a503207b2136c557e3966d248860
SHA5123e0eb569ca33bae2f5d5f3e162e834090056cfbec3eca73a342c1fa018d423e7ba6b83d49dff7312ba948c8f8a049cc52ada4ab6a54eafac174470117c43d35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ce84dfce6487742efcf23781f4e147
SHA14f14128b347f585e871eeaa4b5491e564b08aab8
SHA25637859025230b9fd5a4646de81acfdb7a1bfb38585b459381a6dd44c1ed018520
SHA51230168374e4dff1c66959b29363d1d317edd34191c9b9a3c0225034318f7815ea20990cbf85295d62b670d9a96b237ee645344ad011ce12aa33e89c0b54549323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcaa9577a819cfea77b13b629a0315d
SHA17ba3b888cf9ad625aaaf92ecda44e3e1b1012cb5
SHA2560e49a3301728f0e97539a641af0bceacc66180f736e324c108efc0c49138bb6b
SHA512df6a2d44dcb75a460a15863f4c2acf3340ed98c6ac34743440abed68c21f25ef7155bc2e8bd72920f1c15760b6eb17db168e542a688b5f60ec52efbd44f94ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a84262f61614eaf51ea8a9db4fae6add
SHA10b9298894fdbea9238831224c906ecbbd4394071
SHA2563238ee6254081c5e3769402d056347c1a9ee4f3666c87a8bec62f4fe72962a55
SHA5124667758bdee8886f3b8f126b91b16991aab935267c81cdb4bcefe1dc7429be7350e9521d120f0244d7177f9ebebf66453a249ef990eb770407ba97eab0067cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acdb8e35defcc704b026eb0aff63dd0b
SHA14f6ba10a1eba3fd0615e8e44c5a5f38766176f84
SHA2561a020c33d50e4f04aaccc9445b42d90999b9a7e3541f57110d356b6683e25322
SHA5127a2447792ebe28d3ef783a0e21929870792fe7a9ada100fcd9b9237977af01dd5a6b6965c6eb3c1084c71b973204ba51cb9a1c856c6a73939ea176469c5aaa95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f940560b0dc71f0aac4d922f6c7278cc
SHA1921759ddca8d63523d2fde8471346ffecbc5bbe0
SHA256ae2476b72fe37c7a0a6c1c3c4d9a9586064661d8d751aa7963b72bcda3202f02
SHA512ef2c44801b9e41369a900c46ef23362eeff98d58f2d4f41b15421499ce47dcc598f2ac6a2d4b85f523140ff24c255e0990898b347448c2735454982c9397d3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53264a59e48035180de6cccacbc165f39
SHA1f62368dea6acaf62e6881fc9eaf1a48f2727e44a
SHA25645a8f7ce6f389b758395f3545863921e49efeef8ce3068d0392c02bf397990d3
SHA512fb2cdb0e49cc3b297721d858bd7cc5cf36850b273d33ca0fe5aeae4882e370bfd1c4a4e1fb613f06c1f3af37399e10ccbfa3d64f8febbf2faa694c7b8eb4a242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2b12504738c5c690d54b404ba5f835
SHA167639412f6a0b75dd6a0cb947ddf74bf49a369cc
SHA2565d4a37c4ece43af69c539a64c0f9be10b750fa7293a21dce9448399152c59f96
SHA5123ea7280f8380c49e44dcd2683ac66635094bba57d75749aa10c3904337a639cb857f3109b85bb0bbbb26803ff19573ad63be3aff1bf23c1aa939f8da1dba63da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd8ebe2b984ebf0e728d8bcc65223f7
SHA1f379a03157dab0a4b8d41b73c72e02e9ad7338b8
SHA256083d8f2d34525e1d152f9e9dc5c391b86c3fce3da23cdcff65cd313821cc62c8
SHA512d2abe59741ed01d8acc2ff5cc437ed57a43f7282bfe8ae7bdc9cebd48ecaae926d14eb33a47ce1e3b888e02c604b2ec19f7220eecfbd1c48a56652f17b271f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1d5d35cff226dd24cc9e255b1e0960
SHA1610d27e524b0123c1927d78eb5ddea48dcfc38b2
SHA256aca31e4b216c6a64ef366b76763f2b22ccf959d0bf618d3b4d4e86332e21e686
SHA512d432c0901dca5a801260ca7eb55af794f1f1947cd17150c06725c55993213bf6040be0e7a76dc006fe14dbc4559a051e3857e7384fc261be3ab55425ba11fe40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be17453590ddbcf96ac9f6f2962e6ef
SHA13ec1821494febff376403fb866b3260a841c320c
SHA256ebe9147acc068af453ae898b3f0199730e4aaec952e6a99c9863ed33a303b709
SHA512e76fcdd98188dd619db91a9c4ba5a01e7af116c048a3f7616502232413fd66bd98b766a75ffd74b44902f47a1a8ef0563bf88bbacd64496a188f4b64f10a97fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342842c3f982fd706509b72f8bd8d501
SHA17fdc58ec99bf0fc4310d61ab830e71d324547ee2
SHA25639cd2ce7be70efded3c33c3df30e05b0654559566b0c70f794e4775b1f2d3f21
SHA5123ce9504c59ebcd361070e0f37ed5d0c56e3e9f12a8b4ac24dc5d6fea372f298c16881f5cba12549ccc2ee402e704298ac0cc41bcc0073a315265e0c804b1fa3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a879b1ab80b2d4451cd1c1ad90a062b0
SHA16a14186fd6c673fd523faaa768af185acd44427d
SHA2569f13256325bb7f880b7f89b8d322647e99cdc9b172fcf6b952731f77eb2b6df9
SHA5121c973d1705e49224256b02001dd4588ae0f386aadb965450c6539e7fd6b8979e39fc2e5baada709d796e20e99b426976b7e259c63a7a2083841b63f6c292935b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9062aa7a58964d0c3057b99550d8713
SHA1bad2b305e6b51209bee8f0e666cd2f6a0ad31808
SHA256660192a872bd044513b1fe0f778d19a69c64f6167d9b98c5ce6a870006a0dd0c
SHA5128516468fe56c6a8556cfd85738bc4b07febba378dd9effbfc9c55312da350fc3f514e1d4aae4839736f270933fbaef1983642b8ceaaf73f8fd0a642f56645196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3eafc2e8a59890d860d3391a9d1ed9e
SHA157fab31426011ce0c8517a71ca91d3b4ac1824b6
SHA2566023d8b5c7abde2a79525a644828fad041d391946a86720be8e2be797ee3f811
SHA512d15fd3a76de76122e22aa7122aa9d781907a4efcdef94bf5aa45cef75eacfa5c899102e711505bf4b67a6fc4878d28a6b556bfa7119ca13393a2d2efd5e6f97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8152628035a4510c4f787e89368d48
SHA1d38944dca846f5c05943a2a6477e5f8b420906ff
SHA256b8e065b0833f42814bfb87c2a3d988a39ee72552906aa33486c1edc25bf41ceb
SHA512dbdff9268aa01e92c57cb00bde2be1347227353a80e19f06a49ba707b3d75616867eb96afe2adaa60f2ef67808eb11bdd35ac7d40b524599764a8b94b084caec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c39d17fc0192b985aa671a4d0739b0
SHA1277b2861c561c55ef13f48420065df101126a760
SHA256b3cc8958002496f30a4827e1819793d40b9b74e6414ee7481f70ba5939f791aa
SHA512b608b19470f807a7747deb3f2381798321e8c5bb5973ee5098f2fe12bb4bbdc80b652bdbbb1dab7130a09c7a827dbbf8c7f2615c73e34a6bdfd606b3b7f2a3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124e85e27a61873b501e37416eb4258a
SHA1eef3e59b2870f23917004f4dde7f323bc4fc254e
SHA25615271a9c7341d1268f09a802b7ecef62e395251470bc448ee2d9e5710fffd9f0
SHA51233b3c4712c12d13fa33bb025a3f90af3e44049e1d9c21354d528d9131b15c20db2221219e6acb65e8ebc1cc9468e6b3b0a79ff877a4cfca2064761910a2b451c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f147dafcef5c632fceff10d490c144a9
SHA1b1431a7b945cdc4adc9f17db9dad8a6e7a03e408
SHA2568b472fd0eba479a77a56f88a113bb1227144935e1d1af3bbfc38bd61addbc9b2
SHA5121f99bc3deb8866a50d3985b19cd4249c7734f1228f49e1f71bc8051311f51e5d9e721f87107158dc0b42d4763bafc490e75c46d86388dad262d5082700dedecc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b