Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
fd804b7c1449439abd7d93aa4739bbef_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd804b7c1449439abd7d93aa4739bbef_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd804b7c1449439abd7d93aa4739bbef_JaffaCakes118.html
-
Size
58KB
-
MD5
fd804b7c1449439abd7d93aa4739bbef
-
SHA1
9bbf54bb4e8f6f0448a51443db37974de31e5438
-
SHA256
3a0f7c644b5cf3304e9cfe016d1f3d5b84c145ddb477efaa45d46ec474c5a2d0
-
SHA512
277ff8d16e2fe2373179a6dc06b6c13958879174456c7ff8993c4cd5305fd5915ebf0c5acc2b6fcd639bc1836f98a018cdd00257fa23395a9f87e92cebf6ea17
-
SSDEEP
1536:7P/nIPV0rh9o1OetFRRMRvtHDhxWsMj32ZafnMxBy1DZq6J8KYRsHe+g4HWs:79o1OetFReRvtHDhxWsMj32ZafnMxByZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DD7E7A1-7DFF-11EF-ADF1-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000029e7a32cd3e91fdf25bad51e4b2223341cf4e51a4e7e36e00956b2ca703cd9f000000000e80000000020000200000001dd8d390b244ea2c51c410582053047077053f08277f57fb0ab21a04cf320b412000000015e3156ce98efea4bb5bed46e6013c2452066810a16a81426b381c31031a0df04000000081f28e0e4ce2b29e68adb651a95c331bf3d80e4f5be31b182f04db83efd0794cbbe0ef93d5ca8e68bf00b5de58f914f4bca82dffcb7d2647250b9a75ab78fa4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0aa41ef0b12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433733881" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2692 2664 iexplore.exe 31 PID 2664 wrote to memory of 2692 2664 iexplore.exe 31 PID 2664 wrote to memory of 2692 2664 iexplore.exe 31 PID 2664 wrote to memory of 2692 2664 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd804b7c1449439abd7d93aa4739bbef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527dcb1f7e1b41f8768eaf015d587bd4d
SHA1795332f837820156b67c6e56af36279325344a02
SHA25610d80497c29120d4b598fc56e8d0d68e88d97ae9cf82ac75531dcacd1f38aa3a
SHA512d2163b21a67945b1b60f15a686f6363df3772dc442c111870452b7a733cbce9d1433177b68d65d340636c63d79a8c0089617946f942673fee815d5cc833c007a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aa5c8aae4b223959f646baceedd45a6
SHA10dd29189bb128bb34fc1e0437b2cae88fff1edb6
SHA256bf0573eb3aaafc32a33e37b7813939289918097636e2ee586f21d707a304f2f8
SHA512356015608bc214bcde12e25bbbde6fe432d346999d48da0c54f4fa113c09db6e93adb156cfff5c3d8f6ec7d8480d6d042d758bbddf897cba7963e011c3d0628a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592fe7fabb8196c0fcf2fbe3e19c91d1e
SHA10a4ba68610d24aac8572e7299f3a6a0541e5901b
SHA2563f682f02610bcbd55b463b2ddf8bc4fce667105995bb45a432c8afd19db7dbe6
SHA512d83c88ae616500a147013aa5fc9393e27d0158c3162eac7a4a483687413ac54196424e32317281f34f65363432b1e848f6fe16dd493cbef7ad3799981b67e6c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad90a6c1a2a3f7c9bdbd15221e88fc66
SHA1828098ef193cbe175b98f547cec05de4346ea2f2
SHA256b95dcdbbe34d7b5e826a94668a8b26e9c4522152bee89ba13056a86d00089317
SHA51236d9d9b4cebe475bc7311aa4bf1485aad8361c4eca7a27a6a9ba81aaf4856817f1543085838aa1ca2c6f09f536aa19de1956aeba2f1a550857e396ba0902e49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f45f596c9d2be5e00cf9f6ce4902bc6
SHA10300b51b96b72431e355195e34471b133ea0e155
SHA256080dd3929c9e6b402a2ddb8faa7596276d5789bc3809d7520b25fff2d2c4f809
SHA512423993acb69772baa400dcb0fd22d5dc73180f77c22f696f35bcbedb8221e01a9169ce856beedef43b4973b4c4d061e49837b84d08e40e79cb3d0d0fdaf643b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59802d94ec0de8dd9a0d5027cc940d1ad
SHA1b533485c516e01e1de093bd36eec6f2515bac886
SHA2568697b1247b823a96d703ca2a8a1a7dca695e068da827dbcc53f11c6806f18d42
SHA5123526ed4d994ba9811d25b7370955ccd908b7f92a8ed781ff40bda904f721d78a37b3cd881589fb185846211451a2c70300e9869977795111e60c9ca2d0dee743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5865d7c7dcb525286c1c82e22cb97e592
SHA1ffe7ed15d246cc9ef1fafb9d2a145ce4d687fdc4
SHA2563f022dba52f3940408e22ae0d3c6ad96aa7973e70a6aafa9758c8ba039f4b2b1
SHA512801ee0a46355e5fd2933c12a28f0c1d3ae0f1039add3e1736369076f03602a5ce77534208b029e61b0923c545a28f4b0f70f9a0e5e4f6ce93ab5c1125297d98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2038bcf09fe5cbb1d6fc3d2b54664e5
SHA19c196e70a6020a0f2a3a7090bc48aa0c13c94b0f
SHA25659697bb9ecd8b61e4e3cb985ee0c1dd7c2ddccc9dddad955693efa84a037cd12
SHA512d1e39609bb8ff64e850b8caa798966b09d6bc8fbb472522f298a311f6456180e2ce95e5b4e38eb4d73bda877b2fc18bbd5781fde12e3d2f152c9483e2dbff6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51f7ebc9a1d47b00f2414cbf9963a4f
SHA16b7f6acfb06f73c7c6240d67e83d2b2def08d533
SHA2565fc51ee003680e72805869a0519592a6d729f6c10a1ea91e9bf8f7eb7177a1f1
SHA5120acf6894ce8b704d86901a65f97d2da30f7fe3088cf4360e6b5e6a83cf8c0e9c339015558d5b06f612a0c5b65021bc2b0be3bfff608e9fca6ad08919c41d68cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a7e28d971d85dac7ac086aeef59f7c
SHA154b8011d486d4c63cea9abbeb4ec8bfb36ef5af2
SHA256543e0bd6a06f7b8994e1da67bb09d4ebaef61d2a3c945b3430ff0772414c53da
SHA5126a393005943c9e94c4f0bd7fd0c4498bd73b04c94072e2ffad4a9f7e4449a7cf1883bee3007a87105ea94ab887dee42ac7086614eac302c670d210ea91ef8ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516c7597788febd6f51a8c38212e5c01
SHA14f86615aa37bdfe0c30c46205c545b67063cf8c0
SHA25661eb46401b9037ce6d376c8baeec45c16b943d2650f1373799596a17917f20af
SHA51255d0751b045dbdd5faa1aea98157eeca25b4593aa22f429383aa0d3a84d0e7e003df61336e63fc2cf597af84debf73251e252d557a626184e31f077e9ee24aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e678f274ed1e615bee0c576527f8ed68
SHA1feea8249a0448156588518dd23f67cf4c4a49ac7
SHA25651db7e116d8fb68e15d1f016376f1c3e58a9da22c4fc11fa8e5a857e5c391428
SHA512fe47393ba7bb5f741f1e5a0bb88ca9f46640cdc11916e703711af14cbbc046f9e49566eb61e9328793ab077d0875b3feca1b61a9d70233f0e14e81abf3ef876b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba89574fcb32fd9c758713fd4bf19ff
SHA1315ad340aaf039c92250b36912acc4ec5f2fdfd0
SHA25646fc5a500765559d1e2ef0266850df0fc517088e17e5b83791ec31622bdde4f9
SHA5125988913631e2922bae1da63ca99437f98759794ad1063abcfb7841415a89f7b0cc4be058a82083e520482ea344d5a6c28f3bda90802ea11dc13797e12ca4143d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e91f18cfbbab6aaad73940ede1def83
SHA1fef472698c3db9f2893b2e0843439fe261c53922
SHA256b30fad47d80b493ce6fbf2bfa8042db3628dafeb16175bf09359fbaaa5b5437f
SHA512b97b514e6c9625da5159a030a9fc837952e492679f7f77b71f3e80f7fb8a82eca6e049cd545275588a882a67bb526ca918a18d68abba493eb716c04f05d0bc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d5954232cfa0c2b0b2259492bff9ec
SHA134d22c7a405311260c010fc6e3434cc8063d7f58
SHA2560dda80e74b092950d976d83d9e7c9717927d63455f1fbedc5049fba5cd90874e
SHA5127bc5964a28c9efa9e54a28bcde782d39cd0232ff98af18450f14cc75e2efb0c79f7eb0e21494b2a368232fd025e9cdd68d8cd69ee0ac4c2922e624d56a0ade46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4be490c3040a6f5b0997e969c58ea52
SHA12a422db6dec0d167ea14c42d86c1f14d69990117
SHA256dba2de9abb2912c17e77a91188eb3c04c0d5028fe9219bad1c9c50513681e3a8
SHA5128fb3a5e209cda45d707e5fa0ae401dfd3db08b61005a91025e2b3b78470d36e6d951cf3fb8b262728ee2842cea190a155dd8bf13d7f4ec5129da7e13c08cb9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d27beb0662b2f967bdc698c3749e9fe
SHA1a27c2a0df72f0aecc89119d6843592997ad2a937
SHA256db6cb88b6fe229e0886798fdf899e5f0c897e2f9b1ebcfb0e071a326e29e8bc9
SHA512eb73df8ff211a2daf435a16d5470528bd274128371cf020b749097043bbf161a7f7785d7dbaa6120e152a971107dc389817a8304cb03240176f0e31cb1056167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec61f4293b2b5ed221f8aa5ee947b11
SHA15b3a55a49bd4f23a559be1f3bb8d342259617a50
SHA256b2ae6cac10252dab5bfd268e3fdbc4cff984afbfad3c2d63c185723c7c198a4c
SHA5125b216d264ac03e602d8408c17fe1b6d88595b79a888924e28221b19abc493db2cd71becbb16f9bc0c019cc8292400176e3a1a4f0ca6008d5bafcf3f7780b608c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5607f8f9b21146391baa597756e68a71c
SHA152bb805bc018e15646535a25da45e2b056f71704
SHA256c83af582a248cd111ec34e9ab875c3253b544877623f67b348b551eb09e5a122
SHA512311308f3e92d91a7809c47090c0442ffdaf49e3bec85983e83931c5f7e9fb519cb6f3f7c3f9052fd268b11130e2991cc7fd1f820fbdcde905c92c36061539d64
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b