Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
fd9017781075556c1d84d3fbf0177f56_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd9017781075556c1d84d3fbf0177f56_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd9017781075556c1d84d3fbf0177f56_JaffaCakes118.html
-
Size
105B
-
MD5
fd9017781075556c1d84d3fbf0177f56
-
SHA1
1e988bc8682420a0c695d79b30d4a44e308664c5
-
SHA256
7907c983bb771ea447ada0ca0623f603acf3a6a6d136ceeef68a05fb6665f216
-
SHA512
7e37f5e6d2d2c91d8c2ceecc45dc25cb7e484534d51317dedac242d215d81abb140ea7dabc219147aaf8981fe5ed022844cdedbfdfd2cbdaae2fe82943620f60
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ecc271210903a44db0fdd7c7d2af2413778f0dd4f7820af2abaea05da2d34f8d000000000e80000000020000200000002b9678e75833268d9e007f2df12a68efeac894cce6ab942102a1b09ecc6184a020000000fc3d1007a5edc5ed29b99481aa7e85ec8e1042258d73349d1c37557e4dc142a440000000c8e97e0776f7101acd43111e6a9a92037a760e870f909535e91303de827b7285e48a79e6abba72f1163e523609521824a13d289ac001bbe0533dfdaa9202bf8c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3898661-7E04-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433736387" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03befc71112db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1836 iexplore.exe 1836 iexplore.exe 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1476 1836 iexplore.exe 30 PID 1836 wrote to memory of 1476 1836 iexplore.exe 30 PID 1836 wrote to memory of 1476 1836 iexplore.exe 30 PID 1836 wrote to memory of 1476 1836 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd9017781075556c1d84d3fbf0177f56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1836 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708cf820fe89d321d8b090dee481e92c
SHA1a374b9084c471ae1c7f3a3ce15f867b36ce4ca14
SHA256d26bc16a147a2664de2a1934a07a09119eee42933d7efdb5c4210af66bf41dcf
SHA512a6bc17d6618a85ac7595b8e61552de9be7c00b4596282231f64fb70b1ef57b815c0ec1eebfafd9548d610f664a75c7772b49480e4746d7f0805c5a9fe3a2baf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878580a5d3737d306b23be9e8adaac5f
SHA1afd4c1905481b509325ae1304cc61389cceff3bb
SHA256c5733de2847def78db48fff7ee065120197992969fb3afefde6fdab027bfceca
SHA5125601ddc0db4c26bf1848dc81d846c7bd890c96901ac2142fbf9128a9ba3fadb8543ba31eee8ee987331c15e6c9d91c228eb8d0cb8c54464e541f67ed59ba2b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994e2c3f9140df718da4952820f13b9f
SHA1bf59b71b6691b28f41655e6cd3293944b7a1fcd7
SHA256c5f016fce249dcc69884c98ade5f7e87f7c4d4e571a4c1651b5b6ebce71070c8
SHA512233c2be427bbdd6452b03ad289aff7a8f3dccd196a5019e24a7b3b95f4831323ff2c820da46a0d63b9ec89ae389f56bc6872ccf83797097b94f2fa7cb58ec450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047299cb4bffd4a3ab2eebd1ab369cb3
SHA1292784b36e4ce01829440d0fd2e2d6c3e97865bd
SHA256153eae103a05b8fbe90fe0f04e6ee819abc7dde0d377c9f7080c8968803792f7
SHA51226c4ef8198e9596bd71221f18798638c130200b36c4a04137f69b41f155ecf30413bd0ee1576a29aefd5e3519688e19442e992f858dedf3617cf04bbf10ac707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8d40f28af71664bb4587c2d150c843
SHA1e8ba3a24c9081e73ec777e260f874cbc50a73690
SHA2560fb3705a9bc269f6c570d199c53776e6975120d0a4aa524eb08e56b3cca8cec7
SHA51298086d1933cbcfd11578d69cfd4e2e9d8ab41fa8413b7ec4641fba96f8c1734e059c0fc7bf9df9888e9c053218d9c2bba14e3bd2201aa581f97367b4d5f17cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d62570c51a982e00edb46ec32bf8129
SHA1c563e1443512d0d4b1abdd592957fb69639e6f55
SHA25674a5bb3c603187ecb74fd625618166b5cff5979ffedfa6e31010746aad88e9bc
SHA512be466cda229e679be98986c9253449a985cac4243a55763307a8467b09897b9bdb13f41e67fd395906480e9a41c092250fa916c007f55ebd7fedb3c79e23a0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a337d816ddaffb70b907a5bb8a40ad4
SHA1b802b7443537ded9ca3b01cb1407e3f0bfb2b7f0
SHA25635b45279786fc8f7457832f94e81caca670d18c106f387fb61750862fc403e1c
SHA51267c63c01e23a07863898c1ca26eb668c76eff719495b45c0d75294701ffa13ae8c5b7c60df477d894a3d3f1ebf746ffae011c66c1aeb70bddc5360b81737e463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ca77d98f596bad54cc057d8cb9c994
SHA174150748b702b4d015e7e015a8313727467e7089
SHA2567b16ad32c1f87b30112daf2bc7dc47d395d8aa37390e12e718a8ecac17aa9924
SHA51271fbe132230d108e6e3be2167a9d1f4810032adfbf122501c1ece7cdc7e62b12a3eb862d5b65691907fc40ee81ab34d5552906dc77abdc42f9738bba1ad60a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b61d9e60b544f0cff2419c057af9d37
SHA1ed8b4d625d47aa8257d94414378c169233c97775
SHA2563f0a0ed2206da3172b586277db045fb3af6a50f585ca7d4ceff8c2a890a57a6b
SHA51222d803638242c701935c84efedc7d02d7d3e98ae7b0e0be955c0179a98a62bb437fc37c7e957c8497301abcc626116a41ba5b89a59f526788392e576da5a520d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c94c93c0c236a1b4ff58640c2d277ac
SHA1bfc6ef49986bf7384ec3b4acbd1540ecc8ebe925
SHA2566dbf3667df2e09eab2cddef7296c125f60e258a32563f806b22a2dfd73bbdc33
SHA51204555d04809e24f25d1ea70a7bfe57e0d6686117ef595af5129ced96e5d2f0f5066e89baa3f3ac472bea4886b71d01d19d756b3ef1ab687716543803016c3fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e854ab093c6f34869a3eb8121ac4d5d8
SHA1664875453b3d78ab2dac040b919e31f852a29234
SHA25660e17c8a83562d5d60d678b19948f5dcc5a608bdd9dba81ca6b0e6aba5a7b3ef
SHA512a045ea6d7d3a1cbb2ac1b275984fcfe0c2abe128b693b33cae7a0e84fb21d4351653e843dbc611ea0bde9d1a3e0ebed462052eb35ec44799cfbf7e7f20ab42db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b1b66f95afe128ddf6f3e94544dbd4
SHA159299f3d3956749c4437f6eba1e5259254ad3dba
SHA2560ef4a78e251ac07828c98452ae8b1d662535b956cf0aceb96a00cda8a410078b
SHA512423913ab4b8042765b6c9bc5575aeb3bdbff7750cbf0405604de9f15a5a01c6019cd10007ffd5c3164fd37d78afd17d2d33bc2af64abea4fbbb5a294f98ca384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a50c650bf1ee5dca19707c536e94e4
SHA17d608014a4194f9d71827e187642fd700835ccc8
SHA256091cc7c76dabcd244d17237f2ecc95e5f5e0b9603fd2a058bbab79f376cb3e64
SHA5128be0d94c9d142041621807501b6cfb449071f44e11381b8b61bfc12e7094144808436558f72bdd7ca4d9e0912decfa0963f4267c13658441ae8eedb2c5f70d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca0d5f8ba097725156b09167fdeac11
SHA191b8bde85ed6548fe617b7d98dd7af37976a4066
SHA256682049c2b7173acc62c2f265c75451f341281212929622f2aa575eb822213dbb
SHA512338d2dadae0088ae67d0119e88fc1b70c8717b0da4dba4bdb62aa79ed5ace6c83ae502309af8c3e7d0c5815c8e77e56720158b69790c494da09075c55414dda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841095a2cd6cb17ac4fd480195fb1b0f
SHA1f30980b4c92eb13133d5a7c13f5ebe9deff27d85
SHA25654f695a4e419265a5e17d4db59212f9381e1e7053ba3e2390dc9ba16fd8c3b06
SHA512b8f63fb3a29c0fe1a1ce90f0d2829428c85470e4c27938fb526020760fbe131a28255dd1d4d9abc3b4fa59e0dc2886011733c216ea54601c8e97c4b334dce7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e358cc4842d82680096a028b333494
SHA139ba33d5c2cd02187aeeeb2cf2146ecef5385aae
SHA25694d4aa16ac5118cbd4c2619eb4f8f4a44753cc451afc8521eb503d75556958f4
SHA5127b9300146e0d37feb5f896b792d510afb1295b6c5918030222de4b8c4891c0df423881da6a281f7e0d0a9fa34882021e1a7eac4f5cbf0b75e7c9424ed5287d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e64015583425203e4ceea892ea204a
SHA102541a77dc07ee25e44a98fe6b99629558f50fcf
SHA256dcd7e9c501578b7169a69e574c9c3401cb56344ea7ab93c0f214a8d48a0e3f3d
SHA51218e639c82d5834f031768dfad943db5baed697aedaccff8bcff3dcd33232f9e28079f88c22d313c87ca316d094232e27ef9d1640bb721915b43e8cb75d96e75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8d26f164973f670b568f4f22adb192
SHA132497a45e244c34e8b11661bf4da83cbbe5fdbdf
SHA256278095188ffd9fce605ed884f9199f5b45d7fca73570c02d803470c095be97d0
SHA512c89b65ff0d48681317d18fd2dd3090d9f006f82ec740676d2ad5d736f32b01146e28458414767254c6d75b9990146c15ff2617b66e243b0465d41fe3bb8453e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dafc2cedbf965dd9d6cb92fbd71ed14
SHA10a9b3866c05bdf5f502e83e696324c016f61a805
SHA25670fbc487a0296168947f7de0e8c04c3036000806a672cf89b4c80cf3d080d07d
SHA512240d865b72e20876f73e4883e84df1d74e93698a7d3f0510c658afe0fa25f7217e3797361a2e47fd6aa637a173bad2d240ca1adeacceec17e2ed5c6a67fe7a57
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b