Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
fd9f3ce99d94bdab99b0253e80265a44_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd9f3ce99d94bdab99b0253e80265a44_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd9f3ce99d94bdab99b0253e80265a44_JaffaCakes118.html
-
Size
13KB
-
MD5
fd9f3ce99d94bdab99b0253e80265a44
-
SHA1
7cef855529877ad975e5a691f3537089f6e82e50
-
SHA256
460b52c88ac97174c899eed48def7d3c4fe8a3d6e202e8875dd1fd311d8451e7
-
SHA512
93c89f288e671a02db60f961da41751fc5696dc9b1aa51762ada9972edd5cfce9b3a260c7356a3f57415ba4fb0d31b55e6eed9bada0f2a95d3a3e7d6d33384b5
-
SSDEEP
192:JuU5tMEs3Zw6S7ns7g72w6DHg+zBv1A/S8LzdXnq+9OhzzU/WrMdtgYuExYYtkSZ:PDsMSfL8r
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ba30621712db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DA36091-7E0A-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433738794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000250fcb712d819686fec4aa7d89481875e0e2399a9b5c0358620dfce36039c81b000000000e800000000200002000000093a92507d345f6be1629db1c3772fcada7c6df86ae63a39d42fbcd788182b03c200000005edad39597588de3333e834e993d61149f6ff25dc4bb6812f53736c24da1562d400000006ad8ec6c563487487458f98ab861dea5177d986ccab7efafda46d6776ca6caf8df7e6110b4802c5eeea0c8b308c45420ac5d0cd28e381bb6c8c94b3df4ad56e9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2104 1952 iexplore.exe 30 PID 1952 wrote to memory of 2104 1952 iexplore.exe 30 PID 1952 wrote to memory of 2104 1952 iexplore.exe 30 PID 1952 wrote to memory of 2104 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd9f3ce99d94bdab99b0253e80265a44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5bef6cd9280a7a3f2502e52fbe051a7
SHA12b1f48ae8d9aaedb26334ad207283ae0cfd187a1
SHA25662f368a9a694762f749f26766a28963aa963f8362d8219507a8ecc46b9cc58b8
SHA51231c746a0a54977702a869d2dce97b29642ea4d1c6844eb2225817bf4bf1a43040a4e08576b5364f22ef187e026d1aa3cda172c22eb00aaaa1aee1b49d303f831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ebe3790797d2b8be1e826ecea63849
SHA1b760073c6dc3f86eaace9dc091cf75ae589c5eda
SHA25608f28286ea94c2314a8d118baf23cadd6d3b7056205eab8bbe04a3f7f5361235
SHA5122b918cfc4cdaf9d79d4f8915391f0ef404c4227b44e8718c7725c20410b41bacb38cd898b635c8d78fd62e3eb3739211811bbd0de4d14708b5f161c32a119aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a386c5923f6e4c86d7c62d465a0d61a3
SHA1bf6b42d90fadca906a110ed047252fe061b6a17c
SHA256b2b3f8ad5f3e9dd282564745304da4d48bc52534202e70768df4b2448b22323c
SHA512734c9a13fb0b59a84d11a8fa1dc9fc954720ac69deb8571ac000b574ba47aa17958890fd0de47285559a87b0cd14141ee8e02a115efa7a7e55d17c845596dad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542a2213287e6fe3801973a82709c256
SHA1f91a963bc3dc091792647cc78e8ddcdeb74ed822
SHA2561e7407589314e50b6ad63a3568e65c71aca0c1133bf692ae26a31431283dc57a
SHA5121864261ec5c4394ab64028728737b05557346d328bbd5cc05fbabc2416248d3a57982a48a119d6f08b6feb0dd8a7181c81e5a4b48cdfe8fb8bc5d5abd1fc90f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e21eb1a8fb77455aad02b78a848db7a3
SHA175f4397b3ee19a31b5f75c47b364cccc2ff9d675
SHA25601b8b10f4526cf88d0448dd9a9da62e4635e9dbb3a22a67ace6b9e05e14f5936
SHA512186f796f8837ede4d0c3838559e056f01d2384cfa5e0822f3f4f350ed0f630e6a172237fe24289d2c94768448feacf3bc7f5f9014f008a0e4a5db056ee6d541d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fbb51b358352f1cee2db181d495939f
SHA1328ea68bb6171c7852f086635c48bf4be831bfaa
SHA2567ff6d9dbac70cff6258402e049f972796f75a39ef26a57d30e7f211ce77b2d20
SHA512e9acf2f84f0c394150780cbc1884e92a40f345e87f4821a07a4b14d773ee03713095158e64c46702f6f797c4083282f9065555f92c47b82e9b2f13e2e5075c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55398942e3d3874aefd46e2d512df8afc
SHA104e451590a39f1207413ebbe13610f57c3c09fbe
SHA256ee9487f9c86a5e995423b01c9978a1d74480bce24c4aab3f6783f87a292e7335
SHA512616a9ca5192059655a1ffc469dc86baa3df153259661be774c04221db93fa47eadf5b991fff8b2582b7493f4d53066f81b80d5289345391a2d0ed4736ca672d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6eab390f63a8f321402f0d99827e30
SHA181a7b2e3cfb57e9d1ea63381754ccda0c1eee8b4
SHA256d782582dca74f558d4e3a6fdd177b1a088ccdea0ee2bbaa45825b9a092a2d026
SHA51250875236faecc7d300a666e174688ab03d6a8d71d347d5a6369cbdb793d6390398eb13b705a0878591db452723b52f3d9d47d182fc8c45120d27ac5ed3782472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b1f4cfabcc656b4fcfff82ea63c5b9
SHA1864243afbe5bcb0989f5cb61a320d2484343029b
SHA25604341346581864627fd109b5090dd5e8346175047516c5c4c80b79a6e766080f
SHA5125f3e25e64a4091ad0c8458de9ab174ae6ded592a8d0e4339531994fce6a774448c15f31acf2b75519c373d910017233e20b6b3b3a264d9e7f3bc22fdcdf9bead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f579db9b2e0328bf47cb3975f47ece
SHA1eb5c823404e0229774842506ba41624215e9068b
SHA2567126bd8dfd88d10a4e47c84721db00783e69902ef630684870faf077ca7d4a0c
SHA512afdc2b8b1dfe257b5e35ab0d81be2bb94a14f609b3e5c247d0ca95f90e94d100cdf0754a79b76902664365f6d599acf3c9092320288b55221e64579617cbcba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd52dab04401bb6c2c1e7825d1348f14
SHA19595170e91ee50994ca9bf601a2cf12770f0ee30
SHA2566dd8fad49bc429625f5eaf09d9b68ac7867bdbdc24ffd86ae454f10e1e581950
SHA512774663ade918088faf4754ec8eef1573f1b3680985d665ec94893a53310205707032a2445d8e5924d155179e96a0f02960d0da4adef95db146c28cea9d90fd68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c1c83919b263bde1154ee1f0ba4cd1
SHA1471bda295585eeaadfef9ce9928649990fbc46d0
SHA256dc440cf562b14bfe9cf401736dfed3b315386192f8b20ed602b9abe59a0632c3
SHA512e70410def3d78217e5411ba58b0db25728c91e2bff06d289e739d49ede7a0b7e46b4dcdf8839b73643486862b7aa6ae0f4df1ab77ac732b10af13087a4305f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57527dae0dc2a72c118c51c0677b7138c
SHA1676dfb2c4ce909d728953c005c730583b8094c2a
SHA256a25232548f743c8b8d597ca38a1cd79e4fb5e3d1e6e4fbfbb47b6166ae889af1
SHA5120887a0c3b88bd171ef85a00d2ed011f2e62c885c0b98811e097741f33d9cb1d569856ff96005b308868235fecc45fb18c5ebd7b1fbdfb6c2de903688c94d22d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3839968f0067301d9c0eca6cad53e8
SHA1c337a4923b4f738d8d0f7625d8bc73eaaa11befe
SHA256e49ab2418f0c575c4601a1e925a2093b9c78a2982df22a3694be2908658b81d2
SHA512c38a4f72f2e75406bcaebe5f561360aec60af8203d2119a1d2bf8be80dd0bce837f2acbc0aff7e710a6c49df77895e11377a8a2e9a547e600f055d3b6044c681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec9de0d548e9e38592b10b9c0942d1e
SHA1d9389edfb7d5e36014cdcf078220abb089cc5be1
SHA256b090e15d38557402593f662708eff8a614f94a2315ea175f39c00204f1c03b58
SHA5123dd1b0ebafeefbaaf8c96ecd348e09276c97ab62872475877764114196c8957484ed6c702aba290794bdde9b9b14287e1b2a852ae5fcc4dbf79fa64db08c236a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46d177f8f2398f38ec76ae53a372bf9
SHA1f53faaa58d9d296b2d2070cbc1bd40c6f56254ed
SHA2560944e17de8bfcdbd1e800f5aeccd9daa7220962c6a0d835e026086235efc4318
SHA5125acdfb319f998a898668f737082343fe32b41ee413a43a263a47c35209109d11b6be3029f41fa70e2ee8cee782ad4ad97a311179fd99d6582ddbdcd4d9621e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7b5b961d4d335ace5e45ab9e3fa479
SHA1e4d3ba6c44ffeec2471d9ad0144e7743a45bfaac
SHA2568a51429d468e1e161d2adc854d5ee8fc87ee3abc3d0d6d9fb618ed15d4dec10c
SHA5120420bebff04d123ea895006fb30e0eeed97c372e60e478188df4fa8093aa80d4736df4b60b3b7397e22e8c55fb38e3908fe936c88d0dbf1783f3deeab0bd5ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553b8ac0b837dcaf600563b9bfff1402f
SHA1edc82dacbfe604c9944955b9675105dd060ec570
SHA2565011a79bf38d9226baf9d2e27c24c03f3e2e9ecedda662db3158f9ac809ce425
SHA51205cc11d834aabf4a0b798b678bd32272b485e9f22c9facf6b74214d52d6bb3feaa458cb0617e79c47f880e94b70ae40b942e8a0e899c0b8b189ca9c1dbd6c258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379cd98a2d2496ae318c3a27ef75c1f4
SHA17b204232574be77bc3652c340e947c2c7400d76d
SHA256b4db4dece0dfb1a0453b3bb7f6bef396ee4569c9a185b4dfbdaed921ab44e45f
SHA512d72fece35e7693b430951d4256d970305cf7260352e5aeea943cfb3d1530fa38bc1d7aba930e3e7559d8cafba2cc3093b766da2f93ffb830b8dda4e8c71f77da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b