Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
fd6f03c842fbc456e8f3419780a23a14_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd6f03c842fbc456e8f3419780a23a14_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd6f03c842fbc456e8f3419780a23a14_JaffaCakes118.html
-
Size
134KB
-
MD5
fd6f03c842fbc456e8f3419780a23a14
-
SHA1
a0c8df658b451703b53387bcfeeffdd50473af35
-
SHA256
42df4175eec363506bdb09c27507ad3654cbbf3cb8e820b4ce5ebfd859a8596c
-
SHA512
67c29d611be8b710dda0026bc93bcbf193fb0c28e2bd11cd1dd8de412d0614efb1ea15109baf96caf238517d32da24baa25806fd737342a1222e12dd87910a6c
-
SSDEEP
1536:aPaCHyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:ai+yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433730996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05ed53a0512db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{663FFE31-7DF8-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003fd37f7b87e30f3ac453434b7bac359d1514e384c2cc8ec8505756ba407ce375000000000e800000000200002000000023d91f6a2cb620caf1bdaa13534815b06442e68ecbca656392e850ebb04b3c6320000000574f9c7a415bd8381b47b1f3acc620e54fdb1989d48b2f89e33c6d637e75087b400000001ea003f0e006bb89c6b8b5d71c463680392d11c6ef4850d8152d571161c18157bcb5e882814bb4c4c652dea7529173bb1a0930b1fce8211bd0067ba8b463eb7c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2920 2368 iexplore.exe 30 PID 2368 wrote to memory of 2920 2368 iexplore.exe 30 PID 2368 wrote to memory of 2920 2368 iexplore.exe 30 PID 2368 wrote to memory of 2920 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd6f03c842fbc456e8f3419780a23a14_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57772fb4d40121882e2f3600848d97e44
SHA1f3a7aebe33f6a33ab7083e9dd3e4d463d80946f2
SHA2560714e2acf56cb3671348cc9ab38c8d53e8439f9b7059138d11147c9f5daedd8a
SHA512c2880cd03870031c5db16a8c915a5cdbc70ebdc067ffbf95c37fc0109ddc2b1f30bf0edad4f9ab8dabea2a1081ea17ba2b1563983b29b96f578631e168b37aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b95c15a914e31e1db2b60d1cb1f1d0
SHA11b9f357365b31e416fc82c71d01acea680edb60e
SHA2569b58f0f6e0fb27daea3b47533ec7434d245ef74e6aa66954d64ec13def7d6bd7
SHA51224980eda08a5ef4e35b71687bd039c8b743463ddfde15b730abda582a0ac9ca83200680d856c78b7a8621edd565571ed1247a325334bd326b6e0b815a12f611e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec653ef6a2ed93d938a2ab7220e21c8
SHA1f9dcfcc7639ddaaf1ffecacc91568b0add9df85f
SHA2564a04e0e3e6b2cd9c88fe40c0f3c7c1cddb3143ddf4a3315227b8cfde024a574a
SHA51242b176c30edb0924ff1836f26e2a105d5a74c1860a19ca542f697d7df8729247bcb149adee973e2431bd6a7909064c770a85046d555c9e79fdc8633f508245ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e4f1fa1f1a5118564ffd959a42adbe
SHA16aeadc9676c10d45a7b1e74d60cbf9e904fba3c3
SHA256a035df9f38fd639308688279fc5123e39fa39a704a22b404543eb84400d53dd7
SHA5121a8d7c94f30a15cf6539b7a724199df3246b88462b739e69f1f348476fadbf823a799b826a8d1b056b94da18169e279f435072e756db7e78bd8a4f104d81fb9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6e394eb4ddd14804c3e06ac0bf0e2b
SHA1770b01b36872a3c718e0c07b67f1f3e3e5a7c6a7
SHA256ce91c470958cfa2b3e240d37e80221f15b9dabf4efc3346ae63645847cfce32b
SHA51263d4c26fcba873e0f9f833c0545bb056c5e3ec89c3b74c8a8e5abd406e4fab551c1f895d5a3d4ad539f1c1b2e7c952136d64a397329718e63aa74ab8576a8460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50224cdeabba3d86479a20c65e90f7fbc
SHA1b5cc4bbdba4016b5713f0a2a0a447c06c741fb49
SHA2563907c2af4f4b38b19f8530ac5f4e9be87eec418474dd2c838461f76bd156bd25
SHA512b5fdc506829c7225210438f7e88722dca563a06579aafce9787e86aca22a843d3a32f2311a025613caeda528b1971b6459e00c64c049d5b253fd075ab170a361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834608e4734f9f0e607fbb62415503b8
SHA11d0a031be1353683816ba02925e632b221b9237d
SHA25656791a1a3f64e7fb436e42bc5320c723f9be28d082685eb22542efe04b9830b9
SHA5126fc17e50e81ec9f5bbd5f0c7d0bf3b34021c4ae3c020caffc4ceb8cf59e5d718f0b4532315f6d87c066315f1c84aba5803a8f3d0b186feeb5a95af4cdfc7a074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992dfdbfc1561749030ee47ff23a4243
SHA1e6e0b1e5822ae4957130b7ee42724025060bff94
SHA256edccd22194a780b14b721f5d4152ae4c9dc5e2944660b02343ff6c29a1338558
SHA51227391f55cd53b6e1e17c20a19a84437c80ecf85835ac688dcbfc4bd867c54c77b74fb8c2584a09e8e954638f3a8ab9541a05b95a57539080cc462809999d5f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5489e403041fb53303c7aba29832db
SHA1ec3fa67eab00dd23aa7a418a44490434190fb053
SHA256963514b9b1878c9d1bdf3db1099421f782b88c0592227702e6f508435294050d
SHA5126dffe3cf363935b65129ad6b744f3e24e1db4397d79b07619e08176a798c4be84f375a46fedd997240dcda1cfbb4b0b71d7901d43997bd6af5d9ba1a8f1b5a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569ae3e20b7fbfca1f78a8eddac04985
SHA1e98518f00786581345f3b08d84ed986c92a07a54
SHA256d85bca972910fc5740b821dc0ac805284688566f8662ef329203a758b8838e60
SHA512dab6df6bd75b4f83a547c2d062192179aef7f7b66badd15d030056c7ecd10793742bb17c424fa484a2f4cffb0ceaeb7931b4ffc3e912b00cd66d1b71e8cb5514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba9d3406aadfc818b8bf42f29d2c83f
SHA1824f0b0ad3d8cbae90d79fdfa7fdd6e4f02a0fa2
SHA256762c48b78e9b35be8b8b5448df6217981f9f01d48e94aa0e98d24b1c7e8c18b5
SHA512df6cfa86d5e6ac350c6844857b168c45e246bd0d4d8d07805ca322a8fc178fa1f565320a5b7fcff791c7bbb6a392e4d633f4d605fa1aa74ffe185ee93f89d02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2539c8c9ef19db2a137291faad1c5e9
SHA13a722a9aa3016b5133474daa21792a8054a36c5d
SHA256cf79e22c1eeb2d6fd5d785e289c98a42b02d0b0dc8211e7b4847e9baf2ef7048
SHA51258a316d2c0591a976a8c289e84ab307769427f211525cb8b7286f01b7f331f7a52b86aa815c0b0d3a49b1058603b2709c73f209f8a4b514856a4d1e663fedf48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e85796c581f6a08951c3cefac370df2
SHA1e43ff9257f58ee3df77ca1583492f3c6703f42fc
SHA2565e45567986701856408f07d40c097bc2087d53ecfcd67953dee1f68621e09e18
SHA5129759f683e3cdac0802ac3c50c16c5b86dcedbec4818e5c6b01f9e0c19cb679f3d016c1259cdb49b7f3967270f0b48d39b71ec414af2092bf16dc8930135b54e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f109ba6e8038d9ef022401abd571c1
SHA13cd405de1cf1e417dbe4904b38138712a69d4cf0
SHA2564e3a0ccf0f637c17caf71e884c08e16e7e0bc4df0e713d0a6c644731501b8a2c
SHA512857dfbfc345eb8b36045ae5949b997c1f73434bd296a232d01480b7b3293484a5e1b56b13f16cd7d835e004203b5b3270785447a57d9572d1c97fbfec6d04ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538087b4d3ed0e254832b5aefb71a733
SHA1a971e2335b072dba9b158db38fd153eff566bc30
SHA256a736ff34fb1e21fd99e3f74348bf061ef7153c03677085df54e56b640040bb06
SHA512ed5141f54d6b076fe034a07a3209413ea34b143193e87ea788c55c75981de6d8dacee32c0f5eea6e38c0eff95721304bee668a06cf3108cb1964c71a7ab86e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f044025edf5ce21316411685179fabb
SHA19c88e352bb5a10ee367481408960434c2386ef98
SHA256956bb8f6d3450030f206c5935729e12c3f68286ae2db14ba6a4d0e1717c4df53
SHA51268d918235df91faa3ad25e9bce18947ebf8b7b332b4715f246187245c18e0b420525292369f912e5dd2c3542442d58843bc9d7bd586089e2f434998734ffe50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9cd0e5e3fcd4091c0e3e042b5eee63
SHA1ee521d505c8fd95697f5e5ce980752123a46ebcb
SHA256833f7a1804ba07b212499ce49340c02ada95b168050d79b653ee6c69e68deec0
SHA512805e664b0e1308141b0db0eb3aef851126e97a9744adabf3cc34989e9f7c41a0df533b0d8aacb393e76bbe4fcef0935b6c01d181d43b991f764d3884b9d914d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e08ab9d2d011b5873a3f06ab69660d
SHA157dea42003c665b48e99802e001deee297b5398d
SHA256338fc70c11528e5f102b587640a1cfe75c99b9ebbd7452286ccc1bbb38b66abb
SHA5129b6e3c318150ad30120fd338b0a875252578e423f96c917c2e17d6c89f25d9292c0a94e9acdac5a9cbe0e4312d7fc385e39d98b6e8aef13712bb522f19cc4120
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b