Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
fd1be425d03dcff1f927bd7bb90ddbb4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd1be425d03dcff1f927bd7bb90ddbb4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd1be425d03dcff1f927bd7bb90ddbb4_JaffaCakes118.html
-
Size
22KB
-
MD5
fd1be425d03dcff1f927bd7bb90ddbb4
-
SHA1
3134a1087cf8f41ccfe900dad7771083babee5c4
-
SHA256
a5baa025f5bfb0db5a513c571d5bf88db5769843cc10f1674a5a84e6b133f29b
-
SHA512
965fdbbd4895e2cb45cc5a49ad47034ddf9bbccb52b71b320bacf7f4ff88b0d38f61c79b111ebb8e41a47edf9bea324af75daa60a0a982701946cab82671dcd7
-
SSDEEP
192:RIfohtob5njnQjLntQ/snQieKninQOkrntq9nQTbnYnQJ5gSMKnFnQ7XnPnQT6nW:KfoDDQ/F+B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c058f642e711db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000722eb27d17dd661424deba9918bdb1543a2099b7b3b1f97f0cbc620d5630e877000000000e80000000020000200000009e73ec43bb9de007e41745198ebb8b913777ca1ca7dcc7567ac23e11b5ef7dc4200000002e6ef3b0daa4b4f838730934183ce3e71826a8635141f92a456bc288f1fc2fde40000000e8b94bf3ad2cb00d2ca6e7d344c40c33ff793da5eb8c7d0c77ee5c4e258e0d3410cb3a8f3b9cbb496a75ede53032e900df18b15b472e5abbd271fa4d3fb51941 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433718122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CBF0801-7DDA-11EF-8EB4-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2252 2156 iexplore.exe 30 PID 2156 wrote to memory of 2252 2156 iexplore.exe 30 PID 2156 wrote to memory of 2252 2156 iexplore.exe 30 PID 2156 wrote to memory of 2252 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd1be425d03dcff1f927bd7bb90ddbb4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f2c6c4e5e80e73811836c14025e41bf
SHA13539e350e34190b6930841d6c70b342ca0b3cb57
SHA2564c4e0fed9ab34bdefb2a04f9daca09598e839cd7d3b062aaa0dae30762fcbf5d
SHA512ebcbe10cc809df1277a977d3287b36437666e33d9510e55f278acc6476df6475777599a49c50bc1c0c327e89af2468e8f6a4da291f66083661aebe6b0dad3d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4726b0d817cd19b1c41bb11c9291e76
SHA1f07c24f539cbbf170bebc3b17ccf1bf1dc02da6f
SHA256d626be8f491bf2b22b0d8e757af96724a3ab1352a745e7857b25ecfcfefb0117
SHA5127667bd4d771438a82cbeeffd89242e4e4c5585c7c95b5b35914a08f4fb6584fd8734dde5e54d35e8997d8fe08f85010dc1a2950ce4ec69b7008a792eef3ad266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f634313401aec010bbabeeef212e9f65
SHA174549ae6d54955935cb08533f296cb9075620363
SHA256952911ba188ecff3d51c971d533415ee544c5fbec95f112766a7cde567a738da
SHA5120ac47558fd4ddc95d3fded072e6c3aee2193e61fd7b918b957c8f98b74449235502832bf40781d9c870fad6ef865451d3b336cf3b3032304a15db8721816a395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7969ae8fdcb063b811b2f7ea98d6eba
SHA156dd4f7baf48a0d844cb8219fc8451dba648bd23
SHA2563b0a181c1d4277fa223478b7a4a072eb835e9ba6ba85006fd26ecfb2510441d1
SHA5124db75d3c55c60e715a8b222b626f75128d7eecc08794ddebe6cc90490b7f97da81385c8b2cef2f920f3e3f6952cb2af665a008a048bd11687e3b93e6bd5dce6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159b55a3e911480b67904580d6ed89b8
SHA176ded9d5be99c0f9d2ee615283bddc3896971673
SHA2561547d3f4fd6a7c8127cd23330782dea28051573b073f01415398dca063054c7b
SHA512438d114b2b570634fd9fd1c03d22fdf1388cb538c0e52657c99c4373abdf6b22ac1756c824c963c78449ef7eaf8f0f1b38832186dccf648797cb227cdf4a1a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98f04fc1380ec1133eb139c78a374ed
SHA1263dcd2b6b68c190aa2205b4c065e8ce6cfa9bc4
SHA2562bfa66bcb37dafc7d213fc906a89ec20e9d0afb3f1179c953411162e6801742d
SHA512ec3eff1f0626698ac9c0e1439330494aa65f3e77607e79f56cb074983cfc2cd378407fd072c28fcf25dd6def302132ac47b6e6c0c8233f5391a8dbe6f0aeafdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66d78f4a65074306a029daa6e066a6f
SHA13c0e7a96b14baa47d64c217c14139e46c7f327c0
SHA256560a6410413f4ea51f007d543c96ec7f34dbbfe9de8a6cbe15e35c6aa6da8206
SHA512d58d5cafb75e4b4cdfbf4a00c2e2c16e96a1ae17f902ce95b4d13d6437e5ae3c004e560fdb892215de1069678ea37b8ad2e50c98027e9bd040fbea7071e54568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58489f8ac5d84da91c9bdc402dfb4c34a
SHA1054875089404487a106f140208b853d192b847ab
SHA25663b247ee1e59b2776d6f4e084b465df06fdfb4c7f19bff2d496e6691b6319e4b
SHA512efb829d1e9675a72b2436c4051b7e3f917f7fd31499dc7f45f446a91824c72aea2eb22e87c8f0f9aba6492314b2c4853aed46e4d78d7e1a276c55b234fa9e7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa14aa680388699f5a1150112a4289e
SHA140ee28bc4075daaf38f6523f592ada4f3093a0a2
SHA256228537344bc1cf6183e4ba025eeaf41f5128b0d82e452119e8f04dc00fdc5c1e
SHA5121d2650f696e81f06909a12dc299481129159a2c815f3901d43905e516f1c2cd603370acdd5d4600988295ee4bc33fc7d2550e69122ae55d1fec0e8e5ef5b33ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c0eea9a2038182e85c565c9587e5c0
SHA17c9b06fadd95c77ba34e9eb06555b0b1e80f2b52
SHA2566ea06059b897504279628dedd2a7e3adae49f138b935a8451c875ed9d3a59136
SHA512ac43059480418d745bd046230212907112cb3e27f39afe332a14f1acbb04697f1667a8bc4815561ba82f040fa1fe079afd807f6a5159bdede856b8de29da8568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdfffaf717ff63be460c0f14076f137e
SHA186c79dba2a98d68012ecbaf02603c88c4cbd3d5d
SHA256700ff984e779fe55603b7a73f95d4c2a6bf6ad1c94940f7147fdfc5724ddb7eb
SHA512c3f7cac539fe3f82aa324f5068bd397424c2e07894e52f1b6bdc030370489f1c369218d829e15697253d9d83dfb62c92cc3ced30c26e44862ddfc3006ca672c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1a0d11d68cf8664fe029c47d945e7a
SHA19b6fe3942fe8925d16cd6341c303dcc7ea6537c7
SHA2563a4fac77b19885a891c14eb1048db35eda517014d8b05d23b49ee7cc2cdd05e5
SHA512b48c68e2f2b9be0d9c7a5e0849cda3424fdf61446c47cbf6441a04cb38ca62f82ed09a81ff1c7a29bf6fc5135f44c7048ef1aaddd42744fd68132f6ac7f4eefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f11ca8aed84bc7db5c930a3c938f2b
SHA1bffb150f84af3be4c365c6426f9afcd09531a5e4
SHA25616d85474021fc07bac49ede5fbe2c43160b0d904b2618260ddff94e381fa1a99
SHA512d46f14b781b837f1c1563396a78cbf34ae84cd990fb032cdbee581a80ac547b61e614b112c4388d0bbbce197bf63ec9feaf97552cb97810d1bb10ac51276f8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fa03d9da3634ff69155c6b17e744e4
SHA12d023f1c3952dd6dad27973cfc7a38c2e776020b
SHA256d430a488cd77f1c47152d4b2be429af03c36bc982e75abced146ac81ccd6338a
SHA51234e2b2be606a74ca59c250cc113d0924d7b74615070bb38703eb56715e11b6fe30b2a7c4272c2829c3ca321d94f9a087f60ab7b870940120febf61ae7c536402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59869967242d8a105074a16ed6fb734f7
SHA13e3d4641624b5669b016d7d91420f9eb282340f4
SHA256df157a6d1b31cc42bff4ac6a52a1ffd03888230f69180bceef5563ab714dbce9
SHA512a5484635cc5fdd0bbf9a9f6662330a351e433b3bd8b8887322989d55b4d0031043710ff8ee551564bc7f856be2761cbfe7776e5b6e0cb6c7d83e27f39f31157b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56642362e1d8dc526e4f4343e190b0c5c
SHA1c4f4d684c05954af6cfd8c96fe2f9b4924622e14
SHA256258883f6e989d5c2585ea53bc3c5e7ed47e1b9d7942de08997fbb6ff948c9f33
SHA512ccb74e52657a5e318c85d9035b9a3fb4036fe013c0006298c69a98eea5fc535262b95ee5065126dc9e4a521d17475fb43cb0ef300b046171674c1c65f213cfcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8950649a912f29c3f3905b80fc8aba9
SHA1699fa3d18570a0113c869660b3599e14280ec0c0
SHA25607641680900c9cb9e15822f5ca779ba7d8addc228ab343620a9cd7d5a1716206
SHA512f0708decac2107e8eb0f06e561616aaec84d2715decbe208fa6ec3f47c2abbfdb7a77f040708842000dfbbd1165569e4698ac865ee11cafded94e009db81221e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01e7ef74da5b8dd21b5a51591c1460d
SHA1c925eb89a2c83297fd2b491f1349283ff8bb7ec0
SHA25669cd1103e2e289da9e846996933dff1f43e89418769bb3238802786cf2715e4a
SHA51295bedf284aa97fd8eeb5c1ecea9aad84f8ad96aaf2b01250ae31e2cf93f039f76705cb6b2749bc3b4f248ec0c58d1fe8edf31f95888ffdee3ff2f1173c47471c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aedda3b1d4bc1ff12f182b453576184c
SHA1d2f46c066a6e4c65545614a737205a26fdf4fb98
SHA2566ecf3a589557ae6b5e02ef7c17c79ba56108f70342815931511a581a31f7c98f
SHA512761e8f1b8003885042e4f91eff8837d35df4d8a35f77f995432fc7d058295f257b43fc2e4275d0d605e157fc59f73d3cc543944cd8378bea88bd1dab7a59dd12
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b