Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
fcf2799385c6313b0e65acd5fd3c5506_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcf2799385c6313b0e65acd5fd3c5506_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcf2799385c6313b0e65acd5fd3c5506_JaffaCakes118.html
-
Size
9KB
-
MD5
fcf2799385c6313b0e65acd5fd3c5506
-
SHA1
75db0dd9b325b33702bcf7080f89c6019baf9ebf
-
SHA256
175312f949b8bb02d45ff8aacbf086ed50b040a342e2d52127acec14c7a04bbd
-
SHA512
8a9458d9b81e092a711a61031be8b40fc98ca3c8e2e4c88a463a046a7d8ea2e64ad08fd138218e5ca4060629b5d4d8cf57098fe80e130752a76e19401930c336
-
SSDEEP
96:uzVs+ux7DFLLY1k9o84d12ef7CSTUjGT/kPs2pUlVHcEZ7ru7f:csz7DFAYS/WjUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000001eed26633997a4fd8713e8bc9cac810a48fe502a5fefaebb02ff120f1400ee99000000000e80000000020000200000009cf6788a700ce4c2085d96e7e55e2b3f3231bad69aad8b379b6bb5d570d7200020000000dc733ced6a9f3195f8cd3c2f54b070987d178a1b35b94d45af26fc1a53d08a3b40000000e34afa051ccbeb88c2daf71234887efca7dc641d1e202ffe076967793d0c43437a098ee03921dd9ca8c252e480d984c92ee3f2ad869720a91f88db856f68dc35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433711906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a071bcc9d811db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F32C1401-7DCB-11EF-B984-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 536 2196 iexplore.exe 30 PID 2196 wrote to memory of 536 2196 iexplore.exe 30 PID 2196 wrote to memory of 536 2196 iexplore.exe 30 PID 2196 wrote to memory of 536 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcf2799385c6313b0e65acd5fd3c5506_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad4f3df48eb01bd7bd2ca7484c38fc0
SHA1b95616ef3232f68e1b54568ba695c47b8683064a
SHA256480a6e562bb1f9dbc8ccb51fd3d4ff0c0263ead7540e1cf8349c728069c3493e
SHA5124349599423da31f8a489d7b37207a72ebf127f3220ee9d11529e5dff93bb28093f3d33159faf7f8c090818db419736b79db8b0b33f67a0563e5868acc4aea95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9034fcecf10d3588b9865d74d8c07c5
SHA19050765293f08f327e315ddf17d21fe4f4523c15
SHA2566a912a91ab11a89f034a5802973f1be098eb84d197c7847548ce69eb9623328c
SHA512b156c71e22b46b703d23cea71be59cbcdb010dcda4b3ef9dd9082dee5ab72249753aa672b45f5f715c40ae5e3fdaed9ea0554081fc3195a6544ac2ae1593e0fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54531a823e6bf02a7423797933165cda9
SHA1f06b859570415df36b67f9bd8f441cc3c35833b5
SHA25680f9c0fdf381183e9992420bf57e0e8a1a8e86a1dcaddea21a6e8ce3c8142ee7
SHA5128a796b978671991fde1f23c8c8ec55f6dc11a661ecccade8e400cb64e3cba953825c25eb66e1f78f03a4f0687532c29e9419f96466fd3eaac1ec806758af0b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e25b10c21e66a5df6a9ab6563e011c
SHA1a1cd625b684f05f466d0f67b3e31f5570ff21f32
SHA2569ec8a8c109a165803fd4a26b24eb75f1ba5d03d88ecddac7c3402edb70607543
SHA512c0366e7a593522675eb3cd2de3a99a877c3c1cfc281225210202cc1ae75246267694477b15c8bb92c93f6aa8ad69838c9857dca6733a58a976b47f79ff7f4b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fdddad96244534003ca134b82c8775b
SHA117e34f185460bc473abc76d2fd19410943893126
SHA256316e7d53bec4b29417b31e9592f41fb4b7adc33b727677febdeaced71325b46b
SHA512ed58cb5e17edfbc8b91d1830c1594643740240be6a7e89576f635a0dda01bf95177b44b66a1337f7aa5b32f74419891101defdbc2e4b0a97f923e0317a2e9566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc30cee0dc48815e1a828125dc0a6f4a
SHA1f993901ad1d1bbd3914ecbb35fe913c9f57d1578
SHA256e5055f4112ad91cd1aebdcf61bec513a93f76df466c002c0c104bc8620fb8d47
SHA5121a7195a94e27641b56b76cac1989e56355858671fba35fb18ae6a006b05d6335ed8a07e56b1103a2d9934bcf102c8a3443b6611e8eda027a4826354bfbe859ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542be4ace1d5f259c2b1b00d41b1ae190
SHA1b8eb823babbff2dfecd96591798bb9278aafbf2a
SHA256c389193d8eea5d90cd6c9c7337f871aad647bc8f3794d701b431ed08128da00e
SHA51235c77137dc1622410ca552fa659c288a2767a016b80bdb0ef71f10cd44c6dc92824c7adf4fa533e60a427501c9a372dbd9866b8a0edbecdcdde74fc649ffe047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214be99a41c07ac2fef30ed6faaf7ba4
SHA142f5436da010ea67cd79cd9e09a04fad93342168
SHA2562646cf0871a02c49dc8a3b05fe1d0c993c60e5bbb9043341ebeee389789af9ca
SHA5127961f0813c421f78e1b7d2869176c6e77f2dea9f6590c95bd0820e3df6e552c5ab13943a3e792dc9bc34c8ecbffb9861f2b4408ffaa8394acfad9e5ae13a1519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5437ca59f348041d27042a5c51f02a119
SHA153652b49064c22fe4d42a739559165e06120bcb5
SHA256931a13e50aa03f73cc058233462cfce18df4e47d192ef89ff3998a856b3c025e
SHA5126131ab0d661804e9fe2782bdd97cb32bc64d5b17e8ffe1da941a84d11047945bf3683212975544ec6990e05081ab7ccf4acdf531cada77b0b230fd67267e09c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e796146b85442d8f581a89492313df
SHA1320ed202695cf81b71f36806d0818a5ea7947f7f
SHA256c5da0c9924dde2c1dd04ffe8d01af12b6434f5f530246d1aa35449caee4142c6
SHA512be5c55d2458507f7d6f0292b2a81022c869531666ff80df0ecbe75f95390013aac1b99d22fbe1a7b9d453f74aee77f397a28f104910143ab44fe7ebea644739a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969b0607ac602b5b1fa89278e13cff31
SHA195c8e75150dc99878c3d0fc7340b2ee0396c7534
SHA256a7ed22173f6a09debd0ff032d23607b76e53ad0576740db17b6aec2fc3893122
SHA51221437f879ba528e1ff0cc1be2cf75d698bfee0abfd918db8e02337d2370e5c27dc6b4a7a80d148ee8fb191c1fa227e9b8c0e9030021f78646f86949aa4f8e5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405d34de24ab413ac6d104c2e72efd87
SHA1284961b14f09826a3b8a7fd63a425379c92a161c
SHA2568fc05d439eaa631ef7ba329635f41f4dac5e3f3e303365c0970a032a8f8c8500
SHA5120fab10820342f36d7586243a8965b1406dc0c767aed9f58403834c400a86619ef87f0a0b5bc9388d66c5d64f11f14b8fd5db3d5297c5d9bc4062686010aa69ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af37f96f13f3b27b5c6def00dd50617c
SHA1a927e990999a1b4c971250f3f0b0737bcdd239b4
SHA256a329be8dad5c0e22e73ec95c8f367b9648ce11b20f15144e0da7035853d61db2
SHA512cca5cf2de6f9ef508d3a95c276425eceee683b6bae5bc810d67d1f57d0c2d9e4dd076d57c5df6b37eef5aa6f56018f137fdc241f6d956dbc6f84a0e56da67984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf71693eb2a9b4f13e4a8f8080facd01
SHA14e3f5a7d804642545115c5cbd8e17e659aa2bf26
SHA25634b5d4886d0dbca4bfabc5a52161caccfb0d070180f4b714d4098583b98a81ca
SHA5124ccf0a5148de5fe679376786f021f8a03e9f94642cf1d3e07f0b78f103039b9e0fa1d0305a59f99e9d90a8015dddfe62244ff81bd4fb07a2642be0e826d6c250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276887c6d25dfe0d543f808e9ca996f2
SHA1583799212fe19cb26c7f15568343197f1b10a2bc
SHA256d99ac89a89a403eaa52f21d5a08edd61fb9b186ded69effa17da507c5e9697ba
SHA512602c83e66a050619a40145d934adb2038bf1b8fd344ea650d4201bbd93c11bf1a111cacfa9d18572651bf708392f8bd5bc218d90e700524d6c89992e3c79ffe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ff9a62a5e66a0376cec2b366865e3b
SHA1a5b189698909d19e8fb4a53e5b753904a5ba33d5
SHA2569efaaff660422c0349130c2feeb6097b4a38a01da461e01d69b9e667922be12e
SHA5123af3818ab954c33c433e7f08eb87c6a5d444b06ab1d5aafe13539a26512739ac3ec2f9187e84884917908cc0a5e8b17c8cdbf6283cae43e0b223cba4df47a320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54772b0cdeee181eea193c806b88c5fd8
SHA1d8d4aa1e47fca6bc4099df14a384ab30596dae41
SHA256413e0cf5144806a0df4201fe21f2b2f2f7005d8dec216d2039970324288ae1d8
SHA512edae9b1ae0728660484e9d23e4c463c98235ae1dffdb568850080c9accd4eb2a7bebb01b2f26ac53cac676967123e3331de3307fe742db7c2ea5d6b43106787f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569830b2c9a73f84fc8fba0fb5615ce6e
SHA19abbf01511cf3652009afcb81b6ccc8a1634f186
SHA256025a45281eb312cde70ddef2a43958f48b0c84483517cbc06b194e8f6740ed3c
SHA512093f5518163c332eadc1665f3cd03a1ec6b77e872871b967964dcf876fe5d824651cd4dc2d4f5435a751bf376fae658a54f383edda40d20748fdce86a784ac92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536474fc7aa851046deac0091f7e29a2f
SHA1dd5e5c5ca8e1111775615b33754baad46b965d88
SHA256dab55cf96126e8b3a6851d10c155e24636eb622f8b0303ad7333e7950ee5d10c
SHA512f0eaeadb60803c46d57d9f20fe488545cf61ae4cb44589f12c233fc2b33cd2e6f79361b0bc2f2dd99a3d729af4cc2a5404a2ceeebc6adea9e4c1dd4136ac9561
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b