Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
fd2b87a72664a1833bdf5344e8fdd944_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd2b87a72664a1833bdf5344e8fdd944_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd2b87a72664a1833bdf5344e8fdd944_JaffaCakes118.html
-
Size
4KB
-
MD5
fd2b87a72664a1833bdf5344e8fdd944
-
SHA1
7ea5e0fbce4b7991b3cc11559546b63054ab971d
-
SHA256
1872b4e0562f06b310ca2c9c67401f133aba9e9d7939ae56689db1f17285749e
-
SHA512
0ed0bbfbdada6cf4f1221771ef0c75486421c3e5fc0871ed33b1257ddacfd01d22bbabf596def251fc0a435e33c404041af61848cc6d7dd6394b6bc127476947
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRdMjTJd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433720622" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000ccdfff68aca971383bbf083720396fc8bca4ae791499b11a27ff210e530476d5000000000e8000000002000020000000e6edd8ccfa5718f6271f7a43f74aa6d4627eb8bf32105b16d021fff42bfeba8820000000c54f74a7905f21acd473cd149f9a6e41412c7ea877310ab9725b838a3e8573b5400000008e3baea65b8afbb91288dca8c7fa5a5aaa601842defcb1f42658ba101ea9a9a4ab3dba53f38155b9657238d20197bf5514672ced2e524c12ce1813a5e9cef36f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EEBC5C1-7DE0-11EF-9982-5A85C185DB3E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10266713ed11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2236 2520 iexplore.exe 30 PID 2520 wrote to memory of 2236 2520 iexplore.exe 30 PID 2520 wrote to memory of 2236 2520 iexplore.exe 30 PID 2520 wrote to memory of 2236 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd2b87a72664a1833bdf5344e8fdd944_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f816c08386a5ce70a499e809788c0879
SHA1c5446d1bd9e63030bb6102c2ce71e1da6a6ffa90
SHA256b24def2552f9cd32899b64f8a64be1422410845554c8a987fb3e1fba511be2b3
SHA5125bd39cc4db8ab0fc27a239f7faac612885c33dbf3cc5c594b27cd903dd0cf9c2154effb9d030d72954381c6d3ef5229e3ac79341b83f468184f58fa7624674a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4a6a279fbb24f63c5227894766ae62
SHA18f37882a10c493510fd7db85bf6458a40d3c02c5
SHA2565046be772a16c71737c9a53537d150ca8f3ff73a7b22df60047fc3e665ac74a6
SHA5128e57bbe46df6e7f8e80912fb8ef7572a715cc1fed246c19f34c1cc9f6f7206e9a9dd4031cbac88177e34f02cdc25cd08b98722ac4dd6dad36d7c85d7f46ec3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da59e31fc5ffb84802e5aca307f53851
SHA178e40b800a46d0be44fbc0c6a1f0bbb9f0fd952f
SHA25636ee6761570be027617239eabfe13b67686b1fed03b3b7f40fa2149065d61d3a
SHA5123792988286cf703ada297fed3e44cf863fcee21ac9c90939553f21db597289318013d748cfb10612451e7da093a31b2a016dfc9ccec4c49408900da81477c28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde6b96910d5ed8155cfa0b882b654be
SHA1a7096944ab2b3c4dda6f193d62534d228c0b9172
SHA2567b8ebad0ffd7106229155bfeded7beab6d9b4da5bdf264c48cd1be36daa54070
SHA51218cdebdca63f04f8815dcf17fe9f7ee806d32032b10ad43053d305c977f93664e906e70a1e7bff1c550c37cfd9e9d8ceae5ddbf20c45f7e6a65b798c28d18d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3683b56add1ed2e3816f6b9992ce9a
SHA1b409186f1bb8156d8a5d618ad333ae480aed8520
SHA256f4790731422cc3c2a9ef13cbf2c95a9881226f6c07ff2e951e5ca2e85ad050ab
SHA512cd84239dcef2a5e2f8999d3a8c32beebc3bfc32391ca38184d26a8cc4a5c634fceb208bb5d0c45ae20df6d6d647b0f959943cfbe2c632fc24846329e7ba09f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba61c3aba41d2ed3f7b9df1ea65f5263
SHA105f02f62456adf9e5f70a552723b46e8689f8c47
SHA2562429e6a6b1aafe120c07a6770e4c443da316abb7da008bb7bc4258fda0851d72
SHA51208ad4f66f2b2c12b574c37b3af5de6a089b16fd1b5c584f4cd1f0eea455c46369e70b6b68550bb184e3e612d4d1ab0e7734346c21903a98fa017bba1cbdd48e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a120b37e89951f914cadf754a76d4793
SHA1f8e56563bb3f3981540948d61bd1cdd56f2e7d24
SHA25608ddd5afd125f55b0ca8302f6cb644d9a808f058ac23807869d8079621df5269
SHA512d3a161d234f191c9d490ac85f679e3bac905edd65516175266c31ebf7debf96159e0167f436f7c6b478daab3c127fdf9326985ee508619e912c0e5b7baa489c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd1f3201627793c0ee2311addd1f296
SHA1dbf79ec623b144081dc78a9dfcd3240a8520f599
SHA2565e1401b523f90bf614977404ca11ea47ed193452ff75e90ff57747019da7a837
SHA5126023f89a773c2fb1673216a765e9fe2b303c40e2d20f5119ec7789bbe9a6490aa6964560d728918a5ae6801ef75ed2e2963ab42034393861904ff53fa1daa0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57632a411b1b6b667da3ee496de398c7a
SHA1b162549d60e22af0c4f5c42c0c3ca6e16249aed7
SHA256395f0c2125bd16fbd516adc4fbcd1479ba4534fe56fa260ab318dbc3ac65285f
SHA51208166bffead23b2905a59e46fde6d2032a00c5836ad6efef81c72003dd9d02652974369055729278b13c429f080981133818577b2ce979f27e8fc062c3cb5a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a883b1f34030044c1feb6b3a0cdc1305
SHA180106dcd953de3c18fc432785d50b3151a11362c
SHA2560ed7d0bffcaa96f1e4b0e130b5560760792a422fe86e233095c70eeb66cf0b10
SHA51224b5e7b8c040f34abb8011ef975d329f77def5c4226da18eb2de5bddd5b8cd8fde0b888c5182ba2f0e79254c5d9e33dbbe61bba43c4e83835bae4d5e097a2566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5741be7d35eda917b04100bba64a2a5
SHA175d0d15a686e780211c9e3a46e88de98e1a2c293
SHA256ad7878d9f1a5231b2b486b9f8f472a86796d785149666f3464905a6054110dd4
SHA512cb8b3468c1076621d33b89b70456773fbc3564547d76b0bfc1aa6f6f1180e258484abf1435da5f9e412ceb31e52a124d90d3b53122f78252438e1536b69836cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49589224e4c23c1cd2b41b9ef34043f
SHA16dae5da03306ac7d466dee77bf3b923da3294f98
SHA256b965e35460c268e02b7fb5f373f66f4bbbbaf6b562263f40f92cf7277356ea96
SHA512acd12b7fc7eaf48c6bb1e2306ca553fbdd15d8e88ac29ec5e1f41f1da5f61a8414098dc4bc2fd5bf016b41c51e81d7974759da9463ab79d9bfcb35122325f5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6b8162e537d4e2e3a776a6b1041859
SHA1e1c72ec839379093cf5138caae67f7fd8527e017
SHA2561abeec18c0df2c69471c14388a13a5a75bde808eeb43de1f78c3c5f16cfcbe19
SHA5128f234c6489c0700257efdff7d3f1d3e4df07a494978084346700259901e93e080780041008020553df6ba802747bc436c894efede2b799e60dbcd4e099940cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c52724d91b59e71b51579756442746
SHA1d758b4ed31737e9463ce3224dbeb6a12215c7cb6
SHA2565b722e3de3dc36a8969b3e1dec681795c1e512ee45c349a2e081679ed5aac4ce
SHA51267868296ed19cfe7e1de5cc8c0b8f87cf8d9bb7bfe552df4741c0a9774f824f4fc6a199adf03148d83f18c8af03fbec3d928b3ad0e33c5205ca9efe2752220ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba63cb3500eb2655bfa7be4aa24a1ea
SHA136d390c147c82c2865b7268807af185cb6cd982a
SHA256c8aed073eca1db062152484db0265a01547f5c22e3766adc529011ba28ad8f7e
SHA512fe4b257641d35e2ac5807a95359ae64b502495e7d2486815bc482d6d194a9027515daf3d4875d637595e861d377206a79ee3b83020e2516a03664eca9687db5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba7d8d131de11dc07cfdd10d8531b61
SHA153eb73c6d6d6c7964e863755606e72934d0bdf19
SHA256c53d0c77bdd5b9e1206b76e23fc17302946ec79105309fe53ab652228e45a22d
SHA512edb83e8f759e9737648278b0fb0221e9b1cdbd033ec6258204bcaa83fc46303f4dee0435c53740543e45198b22d6fbb3d744b8aebef3cf3976513f7d3b828667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55130dc62b8cdbb285a79aabf6600c53a
SHA1d4d609a0d1caf12845ff274a3cea05cd30c78860
SHA25683f4e197e8656ac88d1bc77355204135bf89fa597b81581b40998220dc11c372
SHA51288473ca9df49ce01daf33177ee6c29267862c70f4a6d21ddc0841ace99562940b80d800d30d5f208fad7b7a255b9d1831bd09c99e12d55fa9e100aa761744cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501973a9580f47b1a5a3dd62e90a18ada
SHA13c1e78f2d4718c5401afe1ee8053423d7c52f7ca
SHA25602be50f298ef3cfc3db5647975fa657f581e38cb68a2d26ab650bec5ae0cce86
SHA512a59f239d92438891349ac121251f7c72fa6726156bd4b90cdee81bbbbfbd0c2614c0f7aa4392d5e38b93dfc5c94a346629fb9dbc00ff20ac78b9db8f7c316155
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b