Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 00:21
Static task
static1
Behavioral task
behavioral1
Sample
fd701bd9e74bffb3e4de25f46c108906_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd701bd9e74bffb3e4de25f46c108906_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd701bd9e74bffb3e4de25f46c108906_JaffaCakes118.html
-
Size
461KB
-
MD5
fd701bd9e74bffb3e4de25f46c108906
-
SHA1
a79b8b4e9347cb79dd01dd16d6d7a6beb455b427
-
SHA256
62f1baf9739cdec3124b4201c8c8a6baf3ba48dab563cc4a6372d4eabab5ed57
-
SHA512
929df31caa64fd855b80627c5e40b1b1f07f33b25575dc7e13e4f8ac26e853acf08a0a203890bcf5a398984af21c9229cfd62687a47d54382286a7825b4743cd
-
SSDEEP
6144:SIsMYod+X3oI+YcRsMYod+X3oI+Y8sMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3Od5d+X3U5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002ee6291bb1854af7e3ecbff15de1243788b6d6ec5a1e627455242fc334c216fe000000000e800000000200002000000071f6e63d61255608e6d819f0888779260a588838e60380658cc3925f2b4ca5c5200000007c656241477f32b5076443a2be1928284a3b48abc1788dc957733573d2bc07954000000062a2cc473a35092610e9851cf174ff046dc06e039edcbc6ba9b1ed962cc6d64c0399b0bf9cecbdf4a29b197d245eba91b3d63baecc25f353ff8d89f496efc2d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433731168" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC321391-7DF8-11EF-98DB-E29800E22076} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109344a60512db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2520 1928 iexplore.exe 30 PID 1928 wrote to memory of 2520 1928 iexplore.exe 30 PID 1928 wrote to memory of 2520 1928 iexplore.exe 30 PID 1928 wrote to memory of 2520 1928 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd701bd9e74bffb3e4de25f46c108906_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff1264a4c8281f32923a5b94d57605f
SHA101edd17dcf5b520e21ffe088d1d879a00a929c90
SHA256f6190f2150aac6a917f4d029685824a190d0a8bf6c86cd064e6519625185006e
SHA512a0363d1cd173fb0f52d65f48acd5b708c3df47882b716ead491515a3842d08355eb7ab246810029925afe0a85ad0e34dfe21ec7278aa44a56ee276712b5c300e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6655bd5731a95e580750d39f494ce1
SHA1b926e7372c3ed8d2ed94ae68b0ecfc0ac7b29b9a
SHA25628e7ff2a22589e5cde1bded83d7fb415fb2a20d0c93b0d76f83f394a6811111a
SHA512968d15629009675eed10d1af0fcf909d3dcb3a2c2ea1d3abeb2121e50a5ed6b9c6cca41daf00db172844ed7bfdf73ebe1da4b7d7afd90c36223ec3f6a7069ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e974acd27ec0cc8f77424a4b0a5cd5e0
SHA1c0664ced0191b0beac47a014a68083efdf723350
SHA256dd3ba66121c4e61a658e4d10ef07e4271912620a0a38293156102a082925055c
SHA5126003708d339e2e61921e3b540b47d7067d3dc0fee024557932ac259a05ef06a26885035e68fa09402ebee7baf40f54bbae48e7cfff05f743141b179c203d9187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e958e9fa5b1da34182e30bead2b96a
SHA1cc825892f6714c46ea2bc85777fd9ff24dde526d
SHA2560717f9670b024b6e5ee33379c9ec19c92b7393f8d1f1729bc781f1ccbad0ad39
SHA51275aec96d13c559a585e30cd4d50b1616e9d0deeec498889bfaef3415fd99c18132e45f9838cb3915152e8499dbb836ae225f72e4aec151cac15ceba7ce4a5067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54334c396b7c8e600d42cb68cb51e4763
SHA182bbeb63ee05a2310b703cde8eff6bb54bc64def
SHA256cffd4729d8dd5d7764d8e545701767eacb07c3679b6eb6c75011078c134c2431
SHA5128e328dde0112210a6a28c089337357e0df4b637805510f1016757d7397e64a7ac56ef95f1918babb0eed592146372701f67de489586b6cae18bcdac3beb1fe1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc570d61eb40d1b1e8867de16469fd3b
SHA12d577883db9defcbe746bc8c09939a56d1943f49
SHA2562810c6932ab21142273e0662a25031e7b7ad6281c845fbdccbc5a1ea9cd6d95a
SHA512e198ff2b5c652bffbaf6cdf33ce25d61df8de55fdec710d80b11b1e738752afed87a5ea6ac42d22c5419ee34932860ff400ccd9e3983d96f566ea8ee8f3c6df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de84c7e8e47d8d066421f744b0ccb7d3
SHA103c653c259880cc97f7718cdc0d9ea9125615569
SHA256ab07988718125af7e2d352fe7a1fda9d553b391f3147b0c2d41d263b90eef694
SHA5121e248beb5f3ce79786009488fe8f321023dcbc39f5e3cd7a66a35a58ee0577cee257ad8a553a27ba8409a2462413c6120e538d460b5dee25caee577b9d30b61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d2f42bf973b04f1accbe257c3d19c4
SHA1fa037abc6a2038f23393f627a5bd91b538e85631
SHA2568ff68a1c268b3cfe791864cb0526050543c439a15f3c45b41dd131ebf666d2c0
SHA5124cac2456dbbf0119d5759466282b4a6536506cdccb7bcd5028af8c231d8f34b9ce3f8ecfc4b96901c2f9ab748c7d3a511ce44979a335461031b3652936ec9034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad1ad05d42819248abbf1786589f788
SHA1de1af6509a75bebd05481e48951fcebdd8532380
SHA25668d347f00e59b5ce274781ea93e81a11e6083ea92d3c1be29711357a32580298
SHA512ff2bc3c7e3ffac9819b86f63a12173fb9926b66c02ab75a1cf35bd3089521890e44dce418a53abaf23a4485482498a3926400a78f2a393e2cb1d9fcc0b2fc5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab98abdb0075682073139ea0c62a28a
SHA11ae44886170647adbf8ff4c008025b90a917e94d
SHA256404c309ae9757a3b585d19cda8e69411ca4a061679053f9e16e60ae62f96b5c2
SHA5127a20eab3d44800f8a7f0ac6cf96ff35ef4892dd48dde29191cc9b7deceb3ec052013318e68b8f33a03c485bd7fe92bbfd19a2bc6fae3368e593a9a9da015f070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8fe732fca5da04c1d544708fe328c6
SHA1075f86fef46f71d637b2bc38906781e18b5d874e
SHA2568a0d5e23530db4b19ce18d9b3520a7b236aa6ce9130c80c8d026fc08631e7b08
SHA51279db4dfb0b1fd9806fc26f719108a4f1babf2714001389b8ffc1e15ab51c2b5d6a9eece56255f1d6053c8d7d62cb232c8d9ee8bf224c84422d6bfed94388434d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b58eacbf7d2f288083d12903a4fe5f5
SHA14ae71f805198d9fa1131f74c7c81edcd9485612b
SHA2569deb434fb470191e94354a990390b4c464225837e54bd00e2d491e77cd13c575
SHA512e8e83b9aea1da87566cec7839035546b3f11d3c7e2e7bfb4288409b708dfc6eac0bfaff23a9f9ed9ed3463d29c5d6ab8da20e576854ace477864f1aa1edd83e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908a348c62a1f903ed54749cab63f0f5
SHA104407d2d522a9d7142b040226108911c545ce920
SHA256d49ff7e5227fd8ed223a356c8353dbaf0a370e58f5f5ecffaae0f9f11d432626
SHA512fe9f28000d8302a312e17085d36abaf8e19a27d7323f4b6c3e9317cf568c681c73c9595f7599f67fed0741329a47d14654f4fe054b500f1d25be0fdc80beb162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96bb9949c040d17eb42c1434d7d3dee
SHA10d0063dcda0a11b83c84dd96ff90f8fb277c71aa
SHA256edbadb012e3781f31ae52b6e553fce604ff24569100e814f266f505c6aba19d4
SHA512b6ac66f0429c283c6d562b427614252d8c95e0b5e54b84c6722632cf75e93113f71404d5d3c8a8e70c01c1b9f07441f8d6c4e3f5436bc852fa82781dd690b8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb042aaa8db9a8e962a03cf127e710d9
SHA1a517a31938f5bccc8b8e840268e86f120a8a2a87
SHA2560abc7cef5757475378402ce3f0111266f07d2756d9428da567bb3426b5b45986
SHA512d8af5dc493abd73933a6891d2d13bfa3dfd30dbf13f49b5424186924a577480596eb76696a684a2b73813283a29abb9e7f82a650797d7f98d81384d80447ba78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567889511ef8a4fef85da8c35037fdc92
SHA1e624a913aefb013a0a7a05d35bf24f778c94ae00
SHA256646eff67b78db6f58eb4f03c8de74b6a7e146c8dd481474eeb665008d8dc0922
SHA512f66ed9e573823509ff4ee4f42578d8d473a988b6e97d9db52d515492247f748e36769f3c15bda3a215ec608d3af25d00ab5a2c1bc3790890079a4d533e89fedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d208c9ec8a8f10d799a4e6cecd00270
SHA1fd7c989615ae959108040b78f803df0df2111612
SHA25617a389d3a00a365c35e8aef58f25d975f752ea68ce3693d96b7cb75db5060f28
SHA512f03c4c03829209515de2961bef89826e796872230198ab3bd4e01157bdf6cd818322e6031754f53671cf9f31e94273606b1eee7fd6afe87035efc5f4052950b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685a262851741dc93e7f3b9625f6d080
SHA1890d93245a6d0d02cd637ca1ff507055d6cde61f
SHA256669134963530ba84a135493964dc7a8c118d135088c1f4e1c35864bd5a57a5b3
SHA512e93dd8832a9baeb2428f911ad1b09094b2bdd57592066302b61d7414895b30e3fbe279c8bf41fcbee29b2e626dedc95f613384e3dc0999dbe33feb6d2dca64e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589bcecaa12d8400d147d058bc595a711
SHA12a6fad1d060e8f1c15a92b4be8addf4ea40156c6
SHA2569ab35a663269c99ecc259d100108a7a99b332d6308cedcb6c07f8d8c698a2e29
SHA512551a30f2c2c760e513e4d514f1a554b5f1f3e07a05c175824a3d70c54d01195454398caecd9558ecc553e5c7a85ac94b0a9c212d68fb33efd86c2881eaf2e827
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b