Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
fd22af5976c267c164ec0d78b034e758_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fd22af5976c267c164ec0d78b034e758_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd22af5976c267c164ec0d78b034e758_JaffaCakes118.html
-
Size
1KB
-
MD5
fd22af5976c267c164ec0d78b034e758
-
SHA1
8d6811148a0a9f08ad276351bb2b46554485913b
-
SHA256
c8c36dee20fc1b3e3b878a0cd1649addca65aad0043ed6a6e27c3196a21b1058
-
SHA512
478c2728d909e796824f7a71dff11e267e5c45d2b4e1c314f7ef730f8aed6499ae778dcc6357d1158ae2243593607c92cdf7dcf5314c0f9aed11e2630897400e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433719077" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A55F8B11-7DDC-11EF-BDFE-E649859EC46C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f063287ee911db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000baf3664dfb60d30ef65a216845b29705dffb56f352695499b389d11936575e4c000000000e8000000002000020000000d047e040b246274098aa8aa07d43debe3d6f41c710afb3ccc43bfbe02c29b82120000000a622eca81b30090516e6fcb2693f602187a1d0c01103624939b96f2f90eb188c40000000b5fdbb7c89b0bfc44fe5479d9c148a8b2e7920745a3ccb8a1c0e1d734c7a2948df6ff1a3a1e8c30622131d157e0b9249902f4f8ab4466f0cb6e9b1108c8cec93 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2216 2296 iexplore.exe 30 PID 2296 wrote to memory of 2216 2296 iexplore.exe 30 PID 2296 wrote to memory of 2216 2296 iexplore.exe 30 PID 2296 wrote to memory of 2216 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd22af5976c267c164ec0d78b034e758_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea5fa0e4f4c04f064c452477ccaf05c0
SHA12896c9e0488327ed07f38468fded330a1ca6b6d1
SHA2563bfebdf81f395e90d8e0f3d021083f0fa4d1bbc6aa281501fc008887984c4473
SHA512f66c226b4b0fbf595b32ef6ed1553760c490d262be7139b4653236f9cd01d82790e308ebc2fd9005482587ed017f010582f117a5885fe8f2e5316268151d885b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7994c45929da02ac6cb9c8cbaa217d
SHA1cf8b51b09a77b27d47809f6515e9cff54eb544ce
SHA2560cad652682dc68afdbac83c94a18432bb5ed11da935393eb7c2b7e68b62aa5a3
SHA512c8fb2898e863d836d77fcb5343f16dc4e40c7a53ccf74496a624ad4cb967f42f7c2abb82b9b989318d04b37c27f20365087863e8f57583f60e3f6a4fbf2ab175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e464ab042f14c4de38c2ec758d3e8d9
SHA1ab010db8a82d58be65833d4ef3e618455374e671
SHA2565dcfc3e278d9bd59857da487a7aa26ccfb70cc3a8a9ddc6fa9beca03317ac7bd
SHA512444951455fef9dc7f2c5ba5490cf7bcdbef872326116a7db469f6b61a676905a847bfbde4a0a71876623b2df9adcf09d736ba9af296607e4864b4366dceb85e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6fd075fb3be5de252d48d986bccab1
SHA17ed0d52d65852b2af63797cd286a44ee08034ac1
SHA25605ddab02b34f11872af047d565addb4c0998238db91318ed2b42c7ce4bd63153
SHA512f145fe3e3c02413a6aad0277d1825e0faae222cc31b59123eb1ad21655f3ed56642fc5a43afbc4f4d1fdbe7af3bfd00b8b34bf251aee0e7c838ea3041148c0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257338942881691fa3b58698518f8abb
SHA1543809589b7590c00cfb83bc6778ec96b0417613
SHA2562b9e6a9cd7494f546a5093b85197f7382c2b3ebc1ba605fec3c9a1419f98780c
SHA51232fd366dc1afdf11eebd5f70eeb04b18b1abfdc2e23760be61eeed99f59fa4507df2b6bdfcf2cb091aaeed54f4d58caee2e57ec12caac8785ce2dec901e205df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e112798966979d98e30c7440d4390a16
SHA1fc668470838c85837b21d4208d84ec41a0aa3ee1
SHA2566502a4b3f04603da6745d0716d82bb81173c0a6c6d95015a168b9fec1a2adb9b
SHA512d3bf317904c6ad577d1f4748e9abb71a26373118908d5736b8fa30a81c10d7799ccc7d86f3ded03f3ec10a5e926610ada7cbe3d0fe1245024ea814a253cf3c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f27ef146ffca9df0695f6f600ac3341
SHA1a4be62c80cb7daa4e3cf43d9ed57ecb27186a6b9
SHA256d0753e972a147c9e339a1a0943d9afb39f9c46afb9fa35533b3eaa9a7356a675
SHA512a36930913c75cf3a328a73c696af063808b0ccb773447f0dc4ccf072e5420d3a0d754934f7d6f2e14fe353153c049222808c68118596aff8c2f9860879e236c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8f734582b5b842f31a2a70d086fa01
SHA18a59f8019ca781292d703e60be4f57a72b41fe2e
SHA2566cf64f8d8d0c06da93f037e54f54a7b4ee236d1257cbc1aa58da8f29f219cca8
SHA51250c6ff7d08cd5eab129e4621cb339f4f5f36fa8bdc5c28022951352306123352c4c3d79f26712e5e497106bca80e2855ef8da99b196e9a05ed6868b945ac7aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8a5236cd87ae13415f6ac969415701
SHA1e5289edfa2bd0df6cd389776c1b59fbc2fdd790f
SHA25665c1eaf576df51f2cdd7d59a0805a1dd9d5e9e67195ba8adddc5cc1927a0ba66
SHA5126075bc1297a4eb9d7ce9aeb7d7175e4017f37efb227d8ab89acdc3607df61116b21b451bd926a260a92472d669319da5f0a039ec9e62fd17fca478882f612e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead8c40f614b0dc5680e1f624bf1b726
SHA15712f5e106472d409f2249b80ee61a36f6612b82
SHA2565db39544cdcd7823fd125c72ca1cd827c8baa322fde91ec443d45a52657e8b07
SHA51247801c1f11c5d0ea57e06ca7c20b11133f0346504720e2fab394e06a66ebb1c4151b36ef67a31ec27fa5036f89ddeceef68b69427f751e9717b6735cbe9a2a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b0ad8608321529d58f6488c4a1a26a
SHA1ed9fb4dfd57c144274f45fd750a7c298dda16bdb
SHA2560e9921780f1c510c338186d2ef4771156f1a5689659afdf08ee033cddd1bc5bc
SHA5128b82a81858f4f9d9aa4ba4971ffde5154088bde9ee4fb3db43566f3b68cc9f7bf5dbbb732e80c20f1a829410733059f24d92740e9bc374df180b54a955c1d042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c07e4661ca2a7963b001d2f05ac305
SHA186452d28f3cda1b091ee6ac22a27128aafa5e7d5
SHA256db2cbab8d3d8adc452558059ca8b77e055350243d269e485a40e097617c5c538
SHA512c129304820b10c2126ba17443d8af3493ba5c9a10b450cb5b818501f41c9e4cf5d5a32c7431c36b8b6df8d65979777ba9b1f3a17ade4161101954cf755b404ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5670ef45b5714c32d0d3b84b21b46c983
SHA103d5456151bf8949c56c10da580a97eafe7e2a20
SHA2568a51b67a23dc9691103786bb3e97eeee1fae9575f2a17cc9a72bfd90cb674604
SHA512d4c21ac3e46359c7d4df9932f3a23dbbcedb29745dfcf89153074c98871301c94f04afaee6237c2aa29fe20d3cd2e743595a0b32a3b2f8819a50541f507c8f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041cb65f15c4356a140c3dc4155c4188
SHA117c02dc087cee3ca01361276f9ba2d0642fbad2a
SHA2567951148f02ddaf10972f25e32b34beeb7451187978310c88b75ceba3f78a169f
SHA512895813d9384c2ee10ab489951b3aa2ddc4b6128c6ee0b94d703310e538197be3e0dff8ef8daebb70528f4a27e7b148519ba62024d3df1f3e4f51ad37611f475e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7ac97fdee1d76f563af16ceaa0fdfe
SHA17ae297ba1d9b6e04abf9a8620b9629e1b0b7c38c
SHA2567b12bf9b2adb377cd50b8be466909e422c8cb519581a0f046bcf11c5d7415b5b
SHA5120f2cb9ce16b0413b27b0c002f5ceab4c9c48cd6d68a6a4d3c5955f9a74a2e9cc6522eb00613a54cc0642d786845e8f0a0707313c550a8e653f99c7ac1e4d39de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fddb8551ddc5ca2023c9243b09494d44
SHA1dd034cc3c26472038ab788c38c59243434bb54da
SHA256cac5d809471be9c9c048dec5ef51472ddd93cb592177aec9b049626c3fda6841
SHA5125fc0ddb3e798895d81d9d21f15657c68b7575217a9d1c43a40979030aa0dcce254c9b167b40eba261694c7dd9a366025c6f139ea1ff8e1e714ceea3e55dea873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566aed09f55e965d85d90152f3abb02d6
SHA12e1d750d3d323250a2627c9863aa144aeed6e436
SHA25687e35c5aa88d3993734b1515b8986a4f1431053cdf4f503d57e87e347eca84f1
SHA5127c85139f54c4cd4b11af9078d5370bc89b7767f16b1f7fd29a21735e145ccb3e6a708c374b02dc6eeda8ca77867efb61e6530b80ef8c1aad3c297247e6df49e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e72cee76e876ab41743d4fe14db23d
SHA1affd88c65264070379a79ff8eb230e79ac1a7354
SHA2561ed5a98ded79463e83aa705d9156bbed85e7b65a28bbd2259c27235052471062
SHA5128c833c9b2478def60b4b262c8809e43aa160b5c916882b391b82610185c60393bec0f15c8e5a876fc3738e87653eac0e75263f40fe775b6cafa8b7a77f8c1249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7872319275da27f1603a5caedbfa95
SHA1c4da4d09112cb4cb232f29beb13055e443f691d1
SHA25660e639e2953248f3faeb470743d46b2eb1f702a030d99c0a863ca93bf22e7043
SHA512afe1910c2486005bcdbd1331a0af4ff56bb6b0503c5222d56efe4dc5a7fad4b187c06a8c0766e6598dcd65484b16f498e8f3d41c84afa5b426ce457e53da91b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3672cc07f86b29cf386ca0ee91ddaec
SHA1c43be242f82127437172fa3796217ceed786ff8c
SHA256768db5a1148b141eeee56022903799579f73782d247fa5875489450c7426b2b8
SHA512414832b60b0a6d5c97d459a0e73eb135489bd384fd3cdee548ff08409bf85f657e50f93088e6a09ea7c96e44ce6707409ce25b928e84badd4c4cb1852fc6cf98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b