Analysis
-
max time kernel
136s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
fd75a59176ddeb747a6efb6b61b821bf_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd75a59176ddeb747a6efb6b61b821bf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd75a59176ddeb747a6efb6b61b821bf_JaffaCakes118.html
-
Size
181KB
-
MD5
fd75a59176ddeb747a6efb6b61b821bf
-
SHA1
600446f3b516be98472813927535107f547fa4ed
-
SHA256
489a53521272d5c839fed903170aeaa0b0f09c893a475026172529309b3a01a4
-
SHA512
14d1b5b2320d90c1810b1300428a075b0cc4a46a5b560cc013dd7dd13da887f7bce19dc6e7eaae02bd0a1513718402b994df9ed8898150ded15113e0378f32e1
-
SSDEEP
3072:S+TDndMyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:S+TzdxsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30737dd90712db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433732016" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5A14031-7DFA-11EF-9CBD-4625F4E6DDF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000cafaead3fba5918a3fe097624572db6d7d2b4d59bee36183a24c82ebb935f8fa000000000e800000000200002000000041ffe4faf620fbfcb8219df3fbf825981039bfb759ed499df984627dda8a89e520000000a89f2608d8fa28fc2103054546e5d6acbcac8ea299c3fbb9c26de637f8dcfdd840000000252d1bcc46d1e68c39695eed92fc18e202de8309d1662c4d157edea3397df3d7f5741ffbb13e9c9fb0b17c297a30f2d5cfb00f5cb33aa46c57191c2c87e326c8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2704 1628 iexplore.exe 30 PID 1628 wrote to memory of 2704 1628 iexplore.exe 30 PID 1628 wrote to memory of 2704 1628 iexplore.exe 30 PID 1628 wrote to memory of 2704 1628 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd75a59176ddeb747a6efb6b61b821bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed33a337456d9300d9e94f9958774b8d
SHA186a33f5181418d8c102ded00765f2dad05690f18
SHA256b59a0e05aeb3b7402b422e8bf540dcbcb42e871aef3f7f8e5023d80a2c97e29d
SHA51228fd4176f4df5906695eba3912970087a19b828fd9d634451b09e6d519481b6c4670b8133f83f22838b68b18a21d4a82a1faea40f5ec641ddd2a2ccaf0d19863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3bca46b3e1cd2305884a36591e68ffd
SHA12e13e5befc39ddbfd2ff1016ac194b486f2037d7
SHA256c0828eb74813f6ad508f390b8534032b54e61f835e96c8c2e87f1918b4cb4964
SHA512822f79bdf32af9ebd64f723ee52fccf36212821cf7dfc6c79094d1dc8ebf1e8b80b1904299f3cdf7bd298d8d42dc96d361e393a30f9ecbd1cbb4cabf4c4642fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ff1475a435c3cc2f2c206ae51272e6
SHA1799225486ae5ca895b596adc972c7b438510bd1d
SHA256a9272d1f1e4e19dc8531311ebf85ff762808952480fd0cff60da7d861eb0d4f3
SHA512eae2970ca247621c98f3c696dd3373608e753212bdc3cbf68c21d8fd5bb28481161950b816f6dfb76bf34efda1cabac417399f7c1cdaf774d23608ebc4182d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892387a4c7d0a6eb1c732eca6d102a28
SHA1fdf9e225638f95c33f648e21013eaa3a20c1bf6e
SHA256076f75b20c37ab5e8f928606f412bd9ac28665c83867cd1d787c633057c736fb
SHA5127791701b92ae44a0269d6ab2756fef21cf7c915bdd96b170504244de713ce06a469b2136355025e6956ac3642507d65e36a4cce72ef79150d8d69fc1660ebfc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d87c4b1dd45b8b79f3869695eaef912
SHA1d93e981137c5321683adc81ede1104d806963c47
SHA256cc555bf7afe03a1c6bfdfdd438105a8caa0a368c9d109a76d3d3a075aa4218f2
SHA5120c5ebb56c417a80167a53a6f82fed4ff79028c952249744cffcbbab6fbd62ce3eb336556a62835099f680ff4fbfacf8686ec3d396722023603c2096385dab5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84c956ffddab98ad3d097d359b74eea
SHA196ae742a78702cf5872da3c19cc4853d62995b6a
SHA256f0f5d113c1d1a69970d7931e745ceb0dd8846b7c31b42729215ee8bb0b792160
SHA5128e386aa2b3512ecdacb13b8ef07b716911806441adfd835e912acdafb80494bcf63222e0a4f37544fe7a17ac2094aac8a4552ec57333441c546171189cae6bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52723659a8b5f0d678589c9bd14898e08
SHA18658d6bca7210abfced001343edcda135102b127
SHA25693af20b5ea19619bf5340d13af5bc9d5cfecab03927a7fa44fb313a7e9c50508
SHA512d27e6eb7e49c0070053078d839532b4fa4cc0a5778673ed1a25ce31742ad56a6bc69105416086cf6ef0c0cfdfc09693da04a07e5408f56f88401acb08f96a195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5518a116e0ab26847ecf722e63af9bcc6
SHA1dd468538f8387e8e97cf9836184de43eb11d51a7
SHA2564a9fc0f6af60642afa491f2c79a1cd259c08da0fd0f622479cc8f7f596c9d992
SHA51254341db857219543615601ef6673d7b6ddee1c16467aff90786d29cddee874e2a1039f3744bb511b123e6aca7854f6aa8e7cb20491d7c298430cfa8783ceb78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c00ec3a150df25cf8480d5da51a198d
SHA1e03439cb359515d61ab056260234a08af89d7b00
SHA2563ac6b0cbe43eed5ff8622bda2e6f167fe8a39028bba2823f07e3b78b2a6e5e39
SHA512ccad3146c67e7d51dca6b552dc38c93edb7329efbcfbdd1ff73ee230d888520f238ce6eb1d91ec0a63081ca86f76f2b00601602786c3043a523114859af5ef38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5713713dd1825831284270f0a2efdb0bc
SHA170b8e1c0d8a8d8d36d4d5ad7346f37c6a1f38962
SHA25638a4a8e06698f0018b7d4696c1d3431cb4bf3b265e030732ea7a1c8dd220c51c
SHA5129176ec47ccf1ccceb24cba8942e2e812e3f549f596cbeae2fc6e81e4ef4f8d7c02dc07c66bfcaa3cc11f825bf2fe32f6ca4ecec13c1d8be048750a996325bdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298dac387b9ac85ec82696e69706beda
SHA1f813eef8927e6d783ae2eb0188e33c7e33022780
SHA2564ee52b622cd5c06aafd7c2956e4b04eb5a70832062c9204b56b070a884de37cf
SHA5125556e716bf9790decd07997593e726f74257fe82d57cc89c33cb6f6b4af9d374a06aaf66b7def186ae95670234b7a7d419b9db3932d148431d2f4982b0d5e698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce93f2a02ee79fd37ddd7d455d2b75bc
SHA15beb403cd0c787889f33acffd76e0113417202a5
SHA256a105522e4c24a6566d5b2943b10f8fafca23d43e4ab53ecc34185bd9c29324f5
SHA51202458f266f68d270cac1d98fccf8f72ee483072769817305dd8e0faf6a062c2970ad7497b63f10e0b6f17dce876c813ce2de011916fb7770320a4f3e66bae92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5716aa160dfdfd9a573c1f60d279974b0
SHA12970fcc0af05e77cbb202fe7393f616fc3208ffa
SHA25627c2b97f68ea638c2d7883ef6bf75f6005e058373302add6c63220d5ee826b9f
SHA512a3180ff952f562020329e70d8a361b45f741f162494afd1b74ecbcc1b30ebe725df05cde7a944b613e6b6d5b98e259edd63b38c442f55b5757e8077c7871ed50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a0921314b732f70bb8d161e05056384
SHA144f825470f18145ca02889976ef13b643945207a
SHA256ae894833e009ed202945e66652767398da645da1b7c69ce8470c1b162926d569
SHA51215994d52342091df30980925afe1528c25cdb8a14d5bd40306411d7f3bd5587e1e05906d778e82bcc66e78965ecc66a6eabe6c10efba74771bedaeaa8dd197e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0faa6e01126bafdb3c73df109f3801
SHA182efe008af476f670c1ec584d46fe28cfea20862
SHA256cb9c766bb0b5e86e68ba56f57845c76a3e1dc24e4fc0f1a0a7f5f80f2e4b088a
SHA5122f3c85113b093b5afb1335620941a59a50337fea7d8d558e4eb3e7dc9bfba6d316d826bfeae1a48032b592ded8cac367e04191b2711ee1840a1e0ee4a54e9e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf84c45e581faa199f6c4494867ed03
SHA1dca7e995f11e766c3fdc43e1f8254fbb1be0db32
SHA25662b299219c485d65bb104e0a3547e00a763347b8979c610d044985ded4ee9df3
SHA5125260bcfe02328febf89e500c7a2eaffbd4b090bdfb7f0070d4bcfdd0eaed9759ac7f13d4eae03e6ee8e75083cb85ea6fc96a49da71dd77f794120d7bb57b92de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf8c6402cae8ef891851d4ef183f67c8
SHA12bb7b261ebf56aadfabba17f5f76f69d6a134c81
SHA256d34402e9505eaffaab0578e2f349a046c96d4b2c7d93533249e4a657e3b174ca
SHA51299e3e962954b4e55c01a951415a0449b53cf536e44caa23954df19a4dc4eb875550d94a57310bd93a7dfdb20215c389d07e601d664f5e383dd8640b3c68e7124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a331205f591993ccf1c20faf38d394
SHA19768e2bb910cb1be84c3c0d2316188f679da7fd1
SHA256aef1960df970023f9c0f8e11352fded5bcc4cd45803aba1fade355bb5f2c050b
SHA51271f909fbc15333f7ca18c6aa6fed7865a6bf480548de49f1fd280d9b8df91444cc4dc3b3649b21d95800d0eb6138409eb661dbeecfad25f7e9c19bde8ceaecc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048867761c55831d307c0559073565ad
SHA154962a39364bb3035cfc89ed978cc8e66f6550e3
SHA256e99a6ee1e94bf746ec64195cec58317a859a44d4e17eb1066f9f9de56ea57cdb
SHA5120347a62011653fe5f135d063d57a9933726679587bdee351b2957b03889b6ae754e111f126281e3e4b6e26c02a821cbc88ca13380522899d6c780d5f78eae7d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b