Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
fd2a8eca427490295950aa62978e9ee5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd2a8eca427490295950aa62978e9ee5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd2a8eca427490295950aa62978e9ee5_JaffaCakes118.html
-
Size
3KB
-
MD5
fd2a8eca427490295950aa62978e9ee5
-
SHA1
87652e47c1bc660f0e3f8e868c28a6d93b26d039
-
SHA256
595ae91682b75dad21b55b36ad6e5f1f52bc5a8f83f9ff7647bfaa29bbd0f6a1
-
SHA512
fb35d05467ecd45f11b88489e3eebccc6d2c8796c7ec671c7251cb9e0384a38172b2fb4f09ae2f66d7454bd4ca257e485d30272e3df33189679dc876e2f34379
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ca9ab0ec11db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433720456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DBF9C931-7DDF-11EF-9982-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a5f5a45a0d46260bbe1ec129c29ddabfcbba5f8410f3b86f83bfa720ea43800f000000000e8000000002000020000000841ae396b4c753021d89aa4464f069e63cfc037084675f08b4b9d4e07a1d056d200000006a59679de8ee4de4fbf8a0235226051097f7a428771cda76c5b27405e67b682c400000004b015eb2ded571d82e548cc4a64c96822ce3476fba4e65c59d5ac2fa828e97fdb4717470691e1c18e9f3679988ce30d374742090d20568e86836e181ee620250 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1436 2520 iexplore.exe 30 PID 2520 wrote to memory of 1436 2520 iexplore.exe 30 PID 2520 wrote to memory of 1436 2520 iexplore.exe 30 PID 2520 wrote to memory of 1436 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd2a8eca427490295950aa62978e9ee5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59874fc8537ed5ad1b6b6c6307aa1afc8
SHA1b9e0ae103b2978dbf6801db4200002e9d381b9be
SHA2564643e97a08bace480924052554fc91fa3ac254d19788f1e751be249e9aefab22
SHA51296cf65bdb9d9edbee5e1605aa075c09188a7bc35fb0a6bb6e88cb40d6528713d8a4debf3be98101b355b458857977f7be9a6a9cd5cc74a90ad832a08ab0da994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b20beef7b3b1afe1e6d9e97587020f
SHA1404576da64bd012f6658c35fc812f470ad900cde
SHA2569fca1329a7457de4c71a2a7faade73f7f67a3169cc956f88afcddccccea97c9d
SHA5122222d55769423ac168145f78d6493d3a2bdf9a2c4a42aa31fe2005de2741865248db86798b034596b10988389dcf80e90c43d90581aa1cc48865363d72fd951d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ddddd9f98e12d384bc0ca4436a6bfb
SHA1cfa06e7a68c2e6c9cc4da97c17ab05d58709a388
SHA2569d111887cb7166280f22b701edbd60658b645cb30da652c4686cef9d0b3455d7
SHA512fcfac81a80222c2e2abd7c9f04f94fba7f1dfb2d57e0f60888c15261a22f5ae269f3cce4ea1850bcd75c3d7af0149c5b4219b97e5daf8dc6acccec878967e2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a1d948a859fd05c65958df9e1187cbf
SHA13e2190d32247e08f90ad329093fe3879d9819f9a
SHA2564c03cc00270b6533bb70687239970174127eabfff53ebe575bfeab1044914ebb
SHA512d64b6955dedea76d47c188cfb37fae2f72612a30b854658c9b6f3114e0988699a5caa0843ace4731360795aedb49513acbc3a5a13393034d251e487fdf963040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d68ab43992fc1fa20c804a1db2dea6
SHA1de9792b2eabd5f6f2049531c07a4ec1d68974b62
SHA256daf9ed90975d2c197db3b7feb01c462af10a6506b4a3decac3425de28947b5c0
SHA512d4d1749b988c53c29309ecedb330ca052acbb08bfc2806bce987df17779a3c4d32229c600e6296488062043274867c35af27adbee896a7c12c90459d9f7b4054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326c00441da758947c479d2c94b5a3c8
SHA1507e06caa12de2f4754590baf83b027862e33965
SHA256e6f9c1101a381c0ceb6fc889ea91d30900d0649bcfeb7c49d58252bac13fc6c3
SHA5124633868e092fd76c900775fc54f6c84e68619a0289bcc07887b69d642d55f665db52851a1cf42045327f3b9830c5f58f80cbfde5aa7dfe2a258b184e8ae4aba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c39d9a28e4029a3bf904ddac2342c74
SHA1063b91a2890e1fd4a7c3a625d228a057bdf9d015
SHA256db529f927a098f12f8498c1adaf73990e6b1f5472fcd6c17f2f25518aba55183
SHA51278faf210675d4b2150879b2ba11d8591b91516f4de871ca6412a8ef0b1df649fe769925db3dd5aab0b7251d3a109415c76b506faea1086122bed63a37f2a051c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae3e5bda6e5d4fb7179c4456133aa74
SHA17fb425962c98b41bcf46e550b93caebd0d982420
SHA256f6d1f48aa4c964fe2e603cb2a62c5536731f6bdb896045b9539685cc80cffc9e
SHA5121ff92cc391d69d2cd2ca732b6c144c22fe6ce2fadbbcd25c31c32850cac727c75e61f327f32221daf85a57ba81d7bf56c4c931b94d667bc7dc42e72c2383d57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ffb3e9ae24d83da1627bb5a2effacc
SHA1dcfe0ff3cd5616dcb23b8e44ba0afbff6006af40
SHA2563a4d2e758d793a8645783ff7fe133741affb93ff2a7aae22bf89ae11784eeb19
SHA512b91eb51907d4bd37cde00de1d0944b582d1e3ed2282f77588c8ffb12261ada1df32a0dbb86efbaf6aa4a635398d8f7364b02d6ac6fcaf3760a0259e60740abae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23ba6fa8a04ffd6d2e9d59e0bda5dde
SHA16a55973fe3be1e9665f4d32810a49cdd5eadf774
SHA256522475cdeec9351468bfdc795f8a6a1439a33511ac48c55f37b1256b7220ab4a
SHA51214f31da38810a69bc2556a4ae0fcba76652ea1509afbf6d8ad2f0115747cd1d229271942460a8e6908b3fbf6aa149a9a719b2247e4aee63a704344cffa5c4e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5885cf1147921bcccfab60197037b128d
SHA1bbf500397f072d9c935306ff3ebf73b13d270b14
SHA256aa399e668d7cbea96e3b667dc9a2c519dde90291af2deff123c6ccccd7ee77fd
SHA512acfd11663a9222278472c5e998d7cbfa1fc9def3d53806b2459aa629a56d7f3d21a0111fc40cdf96d2930a444eb687055a92ed6b351ab95ab47a0f9107e26b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da18258ae76de32ef48293378298bda
SHA1bfd1977e83b1099ac2ffc0769f59f7f419f5bc29
SHA256672b16fe4aa0165c5c8f9bc8ff6406e3546afae1ef4db692620c382dd1540dd6
SHA51225b059b534ea9142c21b8a855fc2b779bed2a5b40decb3670e9d3f0de48ba4a359575081c331d8c9c065b0f58140ee237fcd69630e781cce0f86ef280b62c5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25769c0cc778129a27525b4e186e56f
SHA13d865bfdab3d7e1ae2c9881899e402b65793780b
SHA25645a8fb77c8935761308765e241a53227003a350ad6a9bcf8426d424ea60e4c35
SHA512549753206440108f2d8149fcc9fdb4dc626ddcb432234f9f331632dd15fac8b90d2e1aa53359c266fa78970f603528eae885f94c435b9db73b33c65ed436346d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ed668308e21e069c6e0f564c3c8a0f
SHA19ec2724f8b4afbca385aa8e45a6fa7213c39b6f9
SHA256f9568ba86245e772a2be58d41b38106a5999862d60b315751bc2308ccf6acb7b
SHA512865c522925f26749cf87e50cbcee0ea2879efcd622ef7e50fbdd64def77cc239f1a291cf71024803332212dc1b88e2e8506f5fd57108b0d7adda96df7cdf080d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5091ae734962708a791d271c05a3278dd
SHA1a4a4da8867f54e049bcd6ccf64647c1c7e50db8a
SHA2569810331a731cfc590fe792d0eb9179a266412c1c9344f788b4e81f1c1cfbc625
SHA512d65f7f51f0cd5c615f4c875c3392d8c7287907164254a25b287b29a7317cb3ff1c11c654b46aa7d7b7694d4c1c6dab196bc803e91cf0eb9cd0487cca665fcfbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b0ea20e82dc6440de738189708d19d
SHA1db19bbcb5f0a47e899f70ac68725a4cd490fd5ec
SHA2568308071b851b8979f487df2a96f711bad2de8af69cbc744b081feffad955ca70
SHA512b48645da597a79f036383957388864ba531fee7135964f713f3e74bcdcd159cb7f8aeb67d8ca443b1a9f32578710b56eeaab396641e0549a4468fa9f14aa9061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752bb83693d8c3aeb49996ab56b5f4d1
SHA1f051bc056c3e79603b1f706aefc007d43a0a942d
SHA256165a601f91dfb7f8c981753d42d6fe52f5bbb511c1a008109f1db16f7c442deb
SHA512894dec8f186666df807e8f6393fe28219db85194a63b9c067e6a4626ce2b52f33fddb1f787052278050c7cc3b789043c4779c42e84887b5c7a533f0ed34f73a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef160bfd35dff4d0cf51d2a61ef6405
SHA158517ef8969c1b1aea7178445f995bad0cb731b4
SHA2564c9a0bd87a999f3a37ab7492675e587f6722b51a8b07e1cedc088e9225c2f931
SHA512a6cfe3b9d62e2f5f1142def1828a33d8f7582a3de24ea2caa9658193855ee13c157f5da1e5dc38584854a0b4d9a8f7f1db361040338fcbe9b66547979b52532f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ebd34d98e9a62a49e80269d0021540
SHA1478c0e55426585925275f769b44516054b0661b8
SHA256c3c4d5b8b75060e8d9cac56d6a485798b1d199c59efdeb5ad78070deeb9f40dd
SHA512bd47a17b6998939bfcb1e0a7df1129c9d606176c744ce69328b479f52fe66fce99f1e9937243179fd2e538610de0ebd41e5387039a528990f8e10d6a6ca448e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd91547cca73b00d96e08adead070ad
SHA1938b12978ffb5249f72ae320056051bdd74887e5
SHA256ca822b4da3fe2b616526da3f9e19504622ab1a79ea7b907e9479568fdd209e72
SHA51271d67d2c1c283e9a90a99bf9af031cb1bf77f9a34aff2522acc1d8324c9e55fd9e9d4ae36eabd88c2a4601a099deea947d23f1fbe54823c692a6061cbb2a358c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b