Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
fd6b5e37cd27089a55d12d7c7ed7a675_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd6b5e37cd27089a55d12d7c7ed7a675_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd6b5e37cd27089a55d12d7c7ed7a675_JaffaCakes118.html
-
Size
67KB
-
MD5
fd6b5e37cd27089a55d12d7c7ed7a675
-
SHA1
78d3715986a8961207513135a13a45d2a703c345
-
SHA256
5148932bd374b02bba781cf4879ca4f9331a902a2ce24f180bf6386ad826f3ca
-
SHA512
de38defbdf4d595c9027c0de06daf9372d826ef799f0afc85428b719175c1815c1dffa75bc18c7eebe552db7ef87f3a131764baf18acca6a7ffd13ade0a1b818
-
SSDEEP
768:JiSgcMsSZ8tN99OIsKwjx/8beEGldoTySqQCZkoTnMdtbBnfBgN8/oygcR/QFVGF:JmWgjpWC6TYPec0tbrga6cuNnzIjv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a7c591e63d6c68a73e438c0f2090b58043275f112ee70783bb70623e8183223f000000000e800000000200002000000077cf4c17c2b465ce4184693c72f4d6d3c171e4cf507d9e61f0134b50e91799c120000000af33518434f94a89a759ada5fc8350586554d5747d0abaa6b002c0ccebb7bb2e40000000993acc488bd53dad99c98990b66194830ba9205dca4d4e60e0b2a089e6357db2fca84428b5b0651188a01431c0ae5a7292d0b8ab7febf1198855c9157edd3601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A628321-7DF7-11EF-B20A-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433730467" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e086000412db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 3012 1724 iexplore.exe 30 PID 1724 wrote to memory of 3012 1724 iexplore.exe 30 PID 1724 wrote to memory of 3012 1724 iexplore.exe 30 PID 1724 wrote to memory of 3012 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd6b5e37cd27089a55d12d7c7ed7a675_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37fad93329125d02677e03f1b3f8965
SHA1c2835c8367311dc596c04ab03d0dc9e585821fa3
SHA256fe6c745d65b809136ecd5bb1d0a277e8af61e95c6172e2a5448a8aebf49a9e93
SHA51223ad616517b908f1035236bc7891890353475b43edcd1129aecf52829193c8b0f21c34132a2c27edb4187d6dd2e2e97269b991f8b6b7d6911ca47fa730546c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7484ec9f20efbbe4065e1f13fe4357
SHA14e152bbf35afe3080fc20fd88945a54c0ab5221b
SHA256f7564d7e8f704fef1d3cd9b1f48ec3adc7b11e287839375f8fe5740ecae7ceef
SHA51266265722f3f7a7d1a0048dee6cd25e1f4966df398e04f1ceba6e3157022f439d799566285f22b980d533e5abf920349a84cceb8a355f77def94fe8edd1155284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee76ae256b76bd50c8cf214f8f7e6bab
SHA1dbd2ba83e63db6b1f05e4be5f66b33b37aae89cc
SHA256f5d93b8c9c4f49414202af5a55d00849af24e90a60f6f57763eccd045a930512
SHA5128f2c8114eb08b365ec10d754405a5516ca439e013412c5845703c8f4a769b3476f905b608275c5452543ad68b6d13f555a6273acd0d67ab9d70a331a8054f879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01d42c33b041a6a160e5b6344c5081c
SHA1782c44498fee034f2f4a0c5450ac82e52023a6a3
SHA256fdf447602b25206bc59283603cfa32ccb4e390166bbf1e944c474e81bab2eedf
SHA512c049f061f83b05b834ba192699509b24f326855e7cd7db8366280e364eb09949238bfb22f31760542c0831dec0babcca26de82bfcfe7552ad4bf5ff30b00911c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c9be6812ab88665fe4936e2888563d
SHA1555fe45e9475f990a3acfe32e049ca75fb82533a
SHA2562e86c9fa5c992bacd0e12029ce2979f27d071621baaf7cc2d69c394f3eeb34fe
SHA512032fdb277888d1c6f3d6635ebc1a618ae84323cd823a1c96f92098a699e91480ec6fbf2d47407b874499a4051e9a923023ee312817b729e15165d6ca311d6094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed2395e348416d3bcc9cf8852bce829a
SHA114069cc30db2d20f9bfe3e5cac1bbfe247642231
SHA25680152779abd419f5db1432913cee46d7dfc6a497da8e597ab05ade69a5a6ad38
SHA5125865840fc46d8ae125295b116c01aa52d2ae067553e91ee6742c5d999061ac32e2db3d1c102bfb01993a09d2e7824ba3506daef4e5c5b8a920e6f933506f569c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e4e9c9850aa7b4686bcecaae8191fa
SHA1eb3ad4caf52fa3b44bc407fc4fc496e9648cc1fe
SHA25663534a776c738cf1bf1e004f91801ae334fc76dad8670b041b271e3954c0f9cc
SHA5128257e70b3e38c234e95a70c7e767ff42a946d0023c196cbde73be700a342ea56ebe55544e427ae59e88c2957acd4f1aa5bd5a91bd403a42c63bb892bab8cc011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51def0303392b8f87df686248445690d5
SHA10997ebac1fb5a83a7268a41d476bdbd7b317ad3b
SHA256397a083638e8e8b2278ca9573d1c97c55bb9542678159e6ec249cb1a84f0f181
SHA512f1b1e7a7d0046eac0e3b8bafada98d930e62c46b1704ecee3bbadf61ed0c6b72cce75f741002dd0888160d2b1585f18c14a3cdfa8a0dd4686dd065158698075c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b46495c3b1cbfe7bec1302a62b646ae
SHA14f7fb5d73ba6a9177ecc6079135d1634043f90f5
SHA2565aede89ff6137afb495d69620e413cd88d53f1fcd8d8dfea25cc6c342bd9d5c9
SHA5125cba1240a83a339336f0a4b233dcb8d2d1b908fb24fb68234ce3489f7226a6b75d80a5e39aad94b79ae16b72ba8a2c5474dfb33ee798ba6f87c3b8a4ccd222c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db23ac6a11e80bce7ea5a52c8c487c83
SHA124430df289836f361aa81e05c47f5f8e38586f6f
SHA25604892211c3354f4c97cda0699b21209b242c6fef451170964c3ddfccaec31969
SHA5123f9bed3f99a8fc34e7ef2a005c393e1fe403725dcc1f4c39aa188f12a96ef7285ad2914bc795fe71d90898aabe53ddb90fb492506e4cac517c0abef4efd90b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b95d72fc924c4820fb92b059ce66e4
SHA1c0276d77d0d7f0e005753894021e2625b6bb1572
SHA2562540284b502214f16de656c5452baca174eb3369f68467609de0ba53c555e914
SHA51237ca6ef174cd28c0e5a6fc42791d0bcc13c6530413fedbff25a559349fd1ce98c929ab6718039a908bdeb2dae604d385a4ed6f8a608e158ba677308f36fbda13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee81b4178a7b23aedbe51d0ff16ad67
SHA13200a50d033262be4edfa62fac6078ead9f01b3b
SHA256735e71d65370cfce1c4c5f663b4fff8b5040d50759caef73aafe9e23121493ae
SHA512059f850f588da87d7926b651388eded0040ea47e613bc901a561d99ecb130fbf9a355bf94e94c017e7257256ca1249bbba688c31f385cd43222647547c6c0aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e05a53b0571f66f172e0b9a60296565
SHA1afd7604cfe792583c4da0913190451371874c111
SHA2563bd756f4b28d2cc988b54332b5fead9bf5c023ca33a03dbbd1660897e38f462c
SHA51240d7c10092dd8f82ba3f077ec95b4328c608c68d37ba302aca1a80b8394078951cefbf53fb250b10060f6e70cde28ab2c5b8f379ea7090948bdb7d96c2f8e6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57377d87096ea2a71a3806e76c50fae06
SHA18a23cf84a3cc138cd53c14cb23b7161985dd4872
SHA256d2f3a4612bfedfa22e9018f161f8f3cef16cc84dcbea06802e87804e113778d9
SHA512300d86b8e595767b16b9c7b6ec5054599206eade10d999a3361d7ef0f269de57833627f2387ccb08b61edf3ab9a23e3a2e97767c99a4c13f5cc52624bb8cc52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a815155ae09f1d02a054eb128abeba2
SHA17e276628526c88ad14fb562002537e797b1f9e31
SHA2567a666d67008bb2fa8234dc4d19d573c74a2f3ec72e1ad036b2565b4f631afe8c
SHA51239b3681d3491558294f3da3de4e1db68af2ed4427728be86eb16da763976eb289999521b4a4d56955127ed79a715869da94077762ca5d8ca1a2ad725f624d431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd49750f608055b44994c834b1b3a98
SHA1400f1e6101dc42c5c471f946a91b2fdd59c5197d
SHA256ef134f235fa45c9686c8cbd61e4aa9118c71dddef8aff32ce3fe8f7cd23844f6
SHA512efecd6b883a270c4a9b8c7017de63bec7c925028e7379d871d2352f24a38acdfcf043d87636c577b18e62c35a14a0a45f41c4f1a59ae5d37c66d2f47101ddf48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8b9000c633e6a979a8f5a3773b080b
SHA1081711995b9d551b54c13a6931996f9c735e3d30
SHA256deae22386191f13c7689e4774a59cb275df7e82705f09a65658583d3ddafdeac
SHA512cd6f33eeca058499713dc01d0178076f96ff72ea7fa00a60ec73b56e7fb94636fad525f0bd983270889a757c615f81a2ba120b86fcd626e4d43b498d60cf8cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595305f23449797cd6574862e4f4acd51
SHA10316cb591701af00f78d470ffd802c195d3e7320
SHA2560e1eeb1063e73ffaedeea23368cb51b660c626c2c842126f83c910aa30bc2c2e
SHA5127641cf874ebac1376374d000f0489cd0a72c2fb2b17dfd9d67f7e35fe74855df8e7a84ede48e536252397eaa964ab28b4584d6384de36fb3fbd5fea7dea741bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa36f3803acda193cd6b145ae11e8800
SHA185f7b45928c5602145b773f05799953771b5d27b
SHA25672cc50aa581188c4a35124e99678971f5e3ede99e59916dc273c15909482eb69
SHA5121e27607fcbdea2cfad811b3c5ddab53a5c8207525f3b54d699acdd5be0c51f2f0d0629461f2202b4ec3304399dec9009cda8d7a7193ed573f6bb075b1c76accb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b