Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
fd191f2eec30e69dc1fab6556a4ac26c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd191f2eec30e69dc1fab6556a4ac26c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fd191f2eec30e69dc1fab6556a4ac26c_JaffaCakes118.html
-
Size
12KB
-
MD5
fd191f2eec30e69dc1fab6556a4ac26c
-
SHA1
fcb1d1353d1edef5436abe86d41565399fce3c7d
-
SHA256
8456485c9f42c717b641b62d3bb5af1271887a45170f3eb40f217d574f3b66af
-
SHA512
9efdccb829658bd0976862fada522ababf9d37fe0599bef6a0dd2a1ab1162a525cc00f9a3ce96ecfe10eede99e896d931b933db10d54ccf916c213b8d9525459
-
SSDEEP
384:Fz1F8ieb/7O7CfYNs3HD3p9kYxgzfyHEw:FzzkR/HDjJHEw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433717638" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C451611-7DD9-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007690b3a070ef2e90c75520a98d849e1b897e58e58e8b7b29e85639e661b254a1000000000e80000000020000200000009651bb7824ce5f0144ca4192bfdee61df74c46eabfd528ffabe5f4172cdefad6200000004bd30a3278b7da66b508d98ba4d77c3c19a891f54934585c33315233e4e1425c40000000cca06c4ef8f14376a148ad4ddde509094c7c78e7ed725c0d646ce39539d30195b56aa80ea544fd0b18c5d1c57a401a0d32edfaeeff29ec4a8a6ea1e39d24f1f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504e6f31e611db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2112 2532 iexplore.exe 30 PID 2532 wrote to memory of 2112 2532 iexplore.exe 30 PID 2532 wrote to memory of 2112 2532 iexplore.exe 30 PID 2532 wrote to memory of 2112 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd191f2eec30e69dc1fab6556a4ac26c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75e92e6f4c631bc6a944b05155d81dd
SHA171e388d8a5634026dbc99bbd4923e2f0daf5b416
SHA25670d3420c4035b60e38ab86740fede23f759e365a63d434b155c145197f135c34
SHA512a32814e56daaa4fefc0d8f5ee251d2172a28f218b0f81cdd1c5c05fd1df9ccac498b8fc69f2682ab4973a6fad1eac2c3aaebc017e70a6fc0a912c220054892d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f11fb3c9afbc6c2979ec29a3edff47
SHA1155c3b29a63331886b8f77d220aed8a86017680e
SHA256c578d4bc079bfc5befa9c4625664ea9e596e49d5c99770fc3426cce21d6d99a8
SHA5126e4e99bfedca728cb18a638847169de5ceac6aead2d63f8d20a99c6a59cd81d7c31dd5eb80c71bdab6c10dabaf0327dcf0ef8109b3f8521a62090d15882bce9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c422eebd1ad2aadf1d5b21480fe823
SHA1e1ea4416ac3b5c6f92130dbe476610d1d845098d
SHA25653292dc48370420704401649c5543b746157aff541531914caea43a22d0ef2f2
SHA512738e5461897c435eabd0cf832542af0881ad19c9761c82738e9bddb900bf0db4d87e40529d3ed77d481149cb02cf70818509955954f5321b53c2359626731a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5783c6d8d77718e372a860a5dee95e
SHA195a79b5e29adf603d11b77e83283405b8a6f3739
SHA256e9c1b9ca713f937f100263d4e102de4a785ac954e4336dbbad281e5082b50ff5
SHA512bbf4ef00fcd96e0db2bfb8b4f316e648d6e134da69f5012f3dcb810ca202b2d8fdc217ce59b615bdb2c34340ebc1f010147ef854e27a767fc06b602f397d7c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500310bc7ba9354d4c6d24861d6450c42
SHA1792769348648212cad987dd2e29b7fce2d609a20
SHA2566bde1b3f9ac1d376fcb0a0ab4c2d13748e4337d5d208a49a669b8c011f7c927f
SHA51265e3770cf5701f6935f4c1a8f5c2a3c3989f7a5633af1a03e9c710a32e4ef9de1b76abaeaaf04aa08c95470720630b7ad465ce735a937f5841399b27736a975d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f08a47bb8050d64795817aff654b0a0
SHA11dfb6bffb95de1cefdeb70f9299bb382eec42af7
SHA256fb46c89e8ff2c78936a806018486a49c3c6bb5be38d4029d08774d52c8c2688b
SHA512338616a80f2d9f21da46fbf5d740ba013b679887830cd8bd8055ebabad721c5f985b4a916c92a51bfd15f9f3f9ce4021d8d61363be8b87fe254921a78d57342a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703679b2b6fa4d7b7697262496c5ed0a
SHA1fc45dc31d9c1b8c01e97ff5f060b9e1d62645cf2
SHA256274143afb874ebc33943879292764199b7ef9467a17aae22504381adfce3970f
SHA512698af9ace65fe8c2e3b68f7cf71763c27203993941abc23a3656afc212a14cd25257c4dde87da60d9f363aac9fb1f527132deb13ae4beebdeba06fb2322c98bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ef92189edc8e4028212b1778e42321
SHA1dcc27e2a05b85a4f6212078c95e36c69848cf639
SHA256f8a199b66f0cdb0f9dbf14015cc8ca0d0176cb03a86405f2280e0efe8e659d11
SHA512b16652875ad32bded0a840d2770bb91bfaded456e377b234572176c9c35822024dd1c123d9732803c5a62744ad6f662aacf53895ef108f904468e79181a912e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e0b9c732cb7c4249350f14936bb39b
SHA159e913e9a7c7e91a41e2956d1d968f2033d3b0e6
SHA256b3bcbc4c6639b428934c9c0edc6008534398140ab942948ceec02643a0be6a71
SHA5127a65d539000b0912e2002a68864aa106e90d27175fdbaad688adc010ebe35a1220a9b9cc956c292069f143fd17d497038cf066a6458a1a533260b2b130a4bd82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f6086c1599401ff0f6276fdcdc251f
SHA18093e28983c110d68047e7862b09de38b6cfae47
SHA256f53c35a8a019d8584bbbd28aa23ce1f7f299232a4e62802b9176fee2a74f16b1
SHA51225434d27ddf999e93e2586775c3bb083aad82e02cc34fb0b79a93e8093dfbcfbc6d09c6e049776dbb69b7c4e64d48c9af02ae9ce6ccc0484c4e2e578f68a4b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c01d9080252bab59821a4d6a6d843f7
SHA1a3345961e6b4d03f7bc0482f05c12062af7fc28b
SHA256f32c8ce9eccba89e979b92079647a95fe9d71f1cf09a6f64f542b9ff17655369
SHA512f7162319861ec3e03138db7e6a2159024cf1234004de9879205d8e3e1552a77833d11ba313721d0c74457165b025428cc1968aa815459c1f05ef93e2680e483e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf77c5f730f9733e337f89663365a09
SHA1ffb6eab8d92a806a890bab6ba644c702cda08e98
SHA256a99ae047f23267278322955406de6fae6516e637265c26cc3bb515db8afaf000
SHA51297be7ed4f73a001f7365b624ca6215c778b950dde952622c1984e62a07908475903a0a0002162a5bd0be9aa3751072fcf83d48692acca4cc0707533fcf8502ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50918a5781572fb90619b622211fe7a24
SHA11a9874e07ac5f2a6e881624a3428ec071ea606d2
SHA256bdc8f1ed81f2b59c3e044ffeea69c957f9002312669426f519491f290c2393bf
SHA51251c3eb524a240d2103d4e9b5944e21ebae29f102bb913df87ec63515ce0d84da66ee5c5ae48a7b3d424bfaa5575a6a2d273ad26cb3e0e793da0e598e6715f48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d912120174ea50dc6b25a14f503b8051
SHA1307d71e76693f0a7997f4cf6e7891669bb543527
SHA2563583ef98e8e7aa318208ddc52162c6e7a6cf09abc85d4b9ab0a93b4fee5efb44
SHA5122ed8959dc3aa405cd1899369839188b75692e84010d3a968ad983e58bb6cff2889cde3425845dcc64f3461607d851d65de4545a6665fdd158572a20c7373bc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c1bed7e72c85a1c0af9749ef700da0
SHA186792ce00e0c5c499fef6b11c2bd2457209756ee
SHA256abacdacdf743a64b5284168bf675f5b35c2791dcf1a36aed8cba5c43f5100bc9
SHA512d7060f2f0d0c6f67d88beede54b020d2a3002e23464a72f35ac5df8da9eef5de453b5dc738e89986557da4d926b87eb377389bb05a1512ca2a9f5f90befc160b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9837e9609f6c11fcd99225b94e489c
SHA13528265f6f58f791710c65d98b8c7609381ea742
SHA256543322fa567db8a80b2ed6aeb3f58b785d4ac45ab8ad974393a7799f7055f6eb
SHA512b55b06f24f6a54cb0700d05db1f6cbfdc05ca40fb1113837b751fa526f3f1034ad677056321cbd6be0633adfc01546481b5d1d03ee92385c98ea6bc94971624e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e733ecccb938953421de8d73df0df2
SHA1cf0a5af78c80ac4df43f53b4098146ac3a30e7a4
SHA256a5b3e08bca8407156bd2ad94dad4363436894a38378a984ddd8c412ff9ae0517
SHA5128404415aff0e37fe0d787870b7022605da5d81d7360b09e831e0047d50249599557b50d8c9b9d1b0ce889a06454cbd181bd033b04953a460e568d19a17c6f706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589dbad59e843b5a0e5ac7f8fba48e6df
SHA1f2a7e42f87945761c0ab31baa1e68cc066164377
SHA256130ca1bf3f4601e346ce5c6dc014599b1602366fe5b7d9b94f292f6b37300993
SHA512ce4489255349ad7307a5fec51437567b0d3877785fdfbc6795fd27d50bc8753e5182793fc72756f3edd049dbcefaf28486a6301263a22278426d694292541bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91e616dbbeb009b8ef27b1d6ec9e521
SHA1580e534c1546aa10f01378de0f3fc21cd17911e2
SHA25618c326f20e677f36ef5de58da037a505a12cfaf41a3da03169190250bca02774
SHA51299a42378766c93662b6b61e28c69c51716982b6c3afba2b7b90462cf73c3682d4375939ea1caacbcb6b974c8e8eb39e832fa2573615dafeb72addb49297af923
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b