Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
fd1a0041e04bfccc56ba4f441b7d8736_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd1a0041e04bfccc56ba4f441b7d8736_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd1a0041e04bfccc56ba4f441b7d8736_JaffaCakes118.html
-
Size
7KB
-
MD5
fd1a0041e04bfccc56ba4f441b7d8736
-
SHA1
6999d5efaa100d93534696a6615d01b61cd18fae
-
SHA256
1d61e42da7e952158c61436103ad028d07f1a08cc58b776bd512e69ba0c82164
-
SHA512
8693fc2007d08d311b78de9726359d9e93f092fa46cd777fdc45dd06fbbd383f2a568676c0f873483ffc8e8cc98b852b8f832cbab58a35653c600fd047f01a1b
-
SSDEEP
192:Qx8BFw/0AVOJLnqFdfb/YpU4bMusALO8+qLAyKlf4bkOPn:Qx8BFw/lEJLnqFdfTYpUxsLOTqLAyKlI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b21ba57d0320f49640b3fff245be4c742c39ef11c95e4cb1333a6a8ab72a9ef4000000000e800000000200002000000017ce7663efe054b716cf361aff2b346c3f3a202459dc304fe3a9b8482491b084200000005a97a93e1293cf837c30a74031a6a6102880185e0ad06a014ce31aad10f34c24400000009c4a575395c37d0a805e94f977090f889db1dd3144cd91fe6f9af46b07797711a87ebc92e6c743ddd1fbf3f046229e56ab27d92cb28a2700371217234df15675 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903ac482e611db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9AEF8B61-7DD9-11EF-854E-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433717771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 876 iexplore.exe 876 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 876 wrote to memory of 2356 876 iexplore.exe 31 PID 876 wrote to memory of 2356 876 iexplore.exe 31 PID 876 wrote to memory of 2356 876 iexplore.exe 31 PID 876 wrote to memory of 2356 876 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd1a0041e04bfccc56ba4f441b7d8736_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263ed22f01ce85dca9f6ef241b4c39c5
SHA135cb87bde44b87c182d907503bb786ad3651f52f
SHA25652763be9f4d8b68e628549703666998548d49f01c3c81750350946acc0fdb6f1
SHA51283824dae536e3916526447f6463c6648b2e0c43b993eac11373ddc7f1ab42e4317c6b170ddf61d2c44a3dcbc1cef22535828602304c6a60814108a741124bb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5dac0a1166396caad5397b44e596db0
SHA17be80f5ef2fc1eeb2c8f550303a45523e16332b2
SHA256fde51733c0880e9d71928d3e289f08ff3b224ee221f3accab79ddd2aa955ba93
SHA51272b2410a092f8ad5fc1931233556edf30610989bdd4e5d5bcd766e3011035539643bc9aab1d46b59720c52c6849c30f6c5a75099fac0f4b275d03ca1b76ba041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c5fce7882d3fe066a94c0d3bb6a698e
SHA1c60baa298ec972e3cd7df883a88909b76de2e8ce
SHA256fa56e8594fa7bfe946ebbbeb19791262b22e057a8b7c110d13c49fb468a2831d
SHA51272235d146bd985e8e76da516096e3cf59dd348af959d5299cad604b030b6c17ebede1cc4c7a06a3b99ca40aa7ef03d26aa26149e7482fc2162f8b271bf3364b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c127062541583eab539328b780babecd
SHA1e34f12b24934c20ac5a673c2959817aa7686ed4d
SHA256122cb0f7bad20f1f88b304ae873e21f98abf1f03ba85165816f291504ebe1917
SHA51214c58ee5939e188824db860b0b55793d0ca55a6a58ee9075a6161a7cb5bc8fd6ecf17cb43196703129c0278b5f19fd07cc21335560907c1b24a314089008e14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54567906fea10309d769fae79a1dea929
SHA100a5159d23ee70993e844e12ff1da6b6b7932506
SHA256bda5aa09805ff42ee9f180d18bc8ce34f5d5633c8caa6d73b6ed5272566c8259
SHA5125deb300827c1c883f8c950eaf945132fdf0009105df9c16ce6280f3dcb43db57de0f815746f0da722558a20744a558b696bcf0e955adeac673f3fafec70ed1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225cb3cf975c37a50072165c88a46200
SHA116a50e7e0bb8122231cc130a32a2371928e32636
SHA256ed84349f9f9452351c80b36a0a23fb7a1d321dd0a8fb67c45fd0500d05cfb68e
SHA51257ad0ec2ea235fe74ee8ed4b4661f5a3d9332317082ad829cb08db136f6509c5e278059fbe2cf61c7cc68b9e7875463bf761d8366af83694f311f373f00d4eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d318d05733d9c851b0004468f8c88983
SHA13968c0b309e662f17b1e7cfaedf38ca3cf674b20
SHA256a27fa45a1dc15d42a68a5cb55262e7dfd76fc08a9c00ca98a210b33c4b388329
SHA5129e4d30c27fba6bfecb73bb94188f227cf7197a388764aa5d604528f7d8cc02d289fb7c175a32c43ce4ace42619821cb0644271cbc72f2cc74b258fd26762bc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a34115d30fa7ef39ffe280354800f83
SHA1e834b3181e2da524cceca89e06180a00e5c328af
SHA256b4dae3f31dcc565a514d9a42715b6b3ea19da088410bd0662ed159f467d9fac1
SHA51247cf41bb3e020c222fb81edbc314dfe19830421a227ae86aaf548f8b8eb6d3d31f2ba0424e8ef9a49989879d49e0a0ae342e0155c685970d810bc603f5f1e703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd596fec551a00c7f98d306bd2d49c88
SHA1e80a99c8b3278edecf1e04c6c1b8058866f1fb21
SHA25619aad7f8c63514c8d5ec6fd4baa8e7121555f66f90e3a828fdcf3e26710e5efa
SHA512ca06d00ab0fa86c877ac5bb6fa5642eb9dfffcee92aab95e1980960ceefd965f13c0c37d67adf64dfee6f1b0a5aea2df77a430a7dc59c41b8696e76a9d75df94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680e7e76f77ef22cb56715fb2da44009
SHA191171d19a36e23da67a61125c08db0aac2e4af21
SHA2564ffb2e0e7f546b32edddcedeffb8dff17866e6ca29f6b8f50a8e04c50695c684
SHA51263e36855c9499286ada57d21c58f1c99c8bdc252c48e434f58fa347d1a97e5752b3c4b2e8943a65e9d22a0142c2660aa09192db97e37bb56870d4221520cc290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc610f028db87bb5f3f82f5f99f6d8f
SHA1b68aa5484655b528c41a1e86c52c8a404f5d9a82
SHA256bdc8802ad65fe1be3a4cf63f8596e1f6a2f20dca5c9e4e96db223bf7d9f0a128
SHA51289a1fda41fe5c7a84005a8d404806715c3b6dd7da4eddfb7029971b2ec8f79501b179aca274be21c3260b3af88e8b501e20e5bbfd2374d513d0a29778575a1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5717942957546b12452ca8ea4f3cfcbd8
SHA10e93426634f8f812dba348103774be1fe9a81102
SHA25657c7a007880505b018736980096bb2c7b9d34fd8051ad4e59688624bec24e1ff
SHA5125e36c6c13f6c11e4d7bd1edc60c6ab0d1ffd00da488793235029d931519cf33849578ef33fba933cec32d8f32a2381e227e3c86a284e908041faa3c1ec7b66a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50efe0119c440536846de022366fece91
SHA1b3b08bcea6e499840a4efc7e54d1143cc6139ce0
SHA2566c50409f84fe2e202e1f2254e7afd13f3c6703521aeed9ff5af2012cf752a16a
SHA512a3c28f78e3eea96ca560d45fe1992a2b4881f08bbafe3ad514ce5704ebd558744795aa8f5e836685cd6ba73b1f811f14706f320a3b08ec291618f22420000ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f597746bee2708d57007cd93db41cb90
SHA1c7a0532953fc8f1fe700999f7b0ca13a2968cfc4
SHA256fa29e07d573e4753827ae1427a969f07f97b53746dbf2d44adf4b3f4102a6879
SHA512a241743486312fbc0e940d27d93e529535d71c207e01d0a0e89017d70b39e50e0d6ead68b2ac8be160e39abe8ffcfa5e151a203bbfe37cb80a9019fce6e0a874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f1728d18ac9c20f0f226aff1f54a72
SHA1006080c7bc48cac3109bde978af5c81ee22aff9a
SHA2562a7f7176c250b414eb352171bb44a2667e097bc7fdec00ad55602297c60a359d
SHA5129a7f3732baa12245576c62afe8394386c6b47a65e2859533c44be8433feff32f8efcba96ec1dbc9de8de0847d7b0e416e7aaf5bfd8872c5a5dc894f46f7617a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504bec5b5b203df13cc0d0a48ba3e3491
SHA170b779af51c2b5a909af9e4ecef402d3e60a36ba
SHA2562df4b61363c33d81a673243b783587f2ddada2e5da36c32aafa7e2dc10bb6ed2
SHA5127d7a333ea7b9f510007fdd6ddd3e8883c9139b7668bb41df0302f1a6d0b6699f3f3bbf911fc9b19d687a025a3d4f0083ab2139753fe69dbae20ed8d29513aafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a5dddafe78daf254969b16af832c30
SHA14249df960484a8c0de7235514f2fa4fd1d916f91
SHA2560fbb7071f5bd9f22d73885287d93b2b779b99f77ed300ade72007e3cc5ec6c42
SHA512402b79a8530b0d1173e9e8c970d7dabc69f32b7437f3881c495a885bdc54c6086494bdaa79a9fe53889e85fc844f5e20682306d6c1054fa4052094cf5eac28be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53795d78a3fde54f9fdcf13147f9dbdb0
SHA1d97a0dc4602c95a033ab69671389dc2a7db9cb93
SHA25619920f05974494e16ab49091c833c235f5f8d80cbe111614ba0ef54608e5714a
SHA5120adef484fa412a27cf8916322ab3174d9e127fd4735a34256a6933de0410d9c7bf348ba5d06e4209152d0194df7388864a9785d8bd745cb60470b7e83ed601a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b