Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
fda067d20bf4f1ac8cc2b9e3f55ea505_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fda067d20bf4f1ac8cc2b9e3f55ea505_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fda067d20bf4f1ac8cc2b9e3f55ea505_JaffaCakes118.html
-
Size
4KB
-
MD5
fda067d20bf4f1ac8cc2b9e3f55ea505
-
SHA1
613e35c530adffe847af85e732f57286600b1bae
-
SHA256
6dd903032cbf095543518dca17094207a613a4c07997595d775b6a6e44b63fc4
-
SHA512
46018b37ed171c66dd6147f723439357c043ffcd4253cfbf956704531a5f3a29349c67c96128f69d749959857da4a3dbc9baf4ea5e5b95db8e6edbe56244e54b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oMJeTIHd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433738985" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000001c1a06e76bfa2767334c29449d4296e02ff295ea8b206ecdf891a4ea45fee5a4000000000e80000000020000200000002a589760610b793fa936dc53215916d29edb8615d7bb0d61b5aa21171ae5938c20000000d29973677e789d82f9680da458641824997dd4f337ef2ae5cfb343f95081175240000000eca0fe7edbeec96b80bb3bafa2c4cf5dc4768e305bde5b5cb1b1e51f8b9458f1c3a9ebb452a435527147afba7cfbf7488ce367a38b3bcc9010d233ad61bb4b3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{000E2DE1-7E0B-11EF-9B6B-D681211CE335} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703089d41712db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2304 2324 iexplore.exe 29 PID 2324 wrote to memory of 2304 2324 iexplore.exe 29 PID 2324 wrote to memory of 2304 2324 iexplore.exe 29 PID 2324 wrote to memory of 2304 2324 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fda067d20bf4f1ac8cc2b9e3f55ea505_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53925b5fab60535eaac7988442be0b6f9
SHA1e3ab5a0486d9a4cad551f1d78abe93644db0f94d
SHA25679c276aff114b8891e2fd453ff158acd99fa214f1dc903bea75748077d422f08
SHA51227c76fa555f534a2a8ff0596458216eba9567e2205119197c0118c6ecba408e80955198f31da4d23b096ea4ced300ec69a8929ec3a67294303610f181585a483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cdcacb2aa95e20c1823676e08bb011
SHA14875d7be91e1b74007955d2147955d81a084a4d0
SHA2567bd589e2f91ff4e08726677870c5a3f0811ac77c132543ebdfa2616a55d0f6d1
SHA51248928e9a7cd7a31630a1b459080820db90dbf83c7c7174fcf54321ad6ce9553bf0bba885c3709c061c98878832709fa3f260f4d67275332a424af651cbea469e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1772c4bea2eb6d7c009003b022c3316
SHA1f093ebe0d6a641e0a479586aabb2b1304f03d624
SHA256a9f14d3eedc75ad464ca15de619360ea68a8e06ecd872a1ca65c8d2e00f8e727
SHA512a87eb8a695e4e6dd1640fd541e6666e67542803f645fb6de714f855da9f52dd643dd00cac0a10e77a0a713ccb62a78adf89e48c2eff182deb03503f93612d33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eba975a6becb3c96a7a5d4282648230
SHA1dac948dea10671b75923f1c8ab486f1eed458b6a
SHA256f1ce59256eec16e92c02bc992b88ee28102f4e9414efc57b2f18f6dce4fcb80e
SHA512767492d0fc27774b7a78da872b3cc1a61238aea6addf4ab4fb82028adf3d93a9e14108115126d94e8b98a353697453888a4be0f215fecb98a4afed7b08985353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd91493f62e3d09196ee65f3ea76da4
SHA1f556ccd1e583acc4be72c31b21017e00d24c296c
SHA256be2b2eb378285ddcd3af2bf3c9fc5b0ec5ef7f987d3605fb86a0386fec5bce0c
SHA51203849484fa11ee42baaed4b90a1aaef400e6e98bd546953f34e664542958376dabad734dd60f9487345d1ad5cd0ae80ee6300cb5f39b15f4ed3077928f03094f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4561a91d8a1fa8229f82631e0dc9196
SHA17864b74763ff4257bbd146341a89aa9a2c5546d9
SHA2560363ac455633c0535f8c8e8127d2a1e8d55690f10b8bf6feed1637dcb9aae5fc
SHA512f8a5c318eb83731cf4baf21b739b910a02694effdafe5411b64ce0cb7271b1a1fa5b1078e55d7945746f2f256bd05899be6179d94eb15c46d730525b89a75a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b4d860e97938a75034f4bf031a5f16
SHA18e2bcec4d2ef44781243a765cbbe4a7324552680
SHA25649e48cd060285d073173071e17c61092630a451d544a6a6beeadf3c7785ee862
SHA5129f9095432314df7d583a07648dbd5d5e993782b2b120de517997fd71ae75977311d59721e510782682298c4c2b9d0f081003afe187e3c7b4b22d5facb4b05667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5605faf5fc9063eab29cd6d895897e635
SHA19f36e8bf6d1210128ff92feaecd4280b9dfe4346
SHA256ce8d241fbe911ab126faff7ca3da472c270e14cb6f86c8560da5da0e0eca02a9
SHA5120d11ad18bdb7803e55e2c59cf504129dcfcf0f9ba2c24a44256a67e173c04c47286bbb324b4733abfb3d612b56ba61c2ad24f788b5d2b16be113b4a2afa0026a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2002a2d4ca6115e6062a2c5d24a413
SHA17c77adfd5554eb6aedc49a422d071b288cf87c4a
SHA256a9734531f191d0e16942abc9285e2a39c2c8b7478e191b008bd761233a3b7434
SHA51286a772bb376dc8b1a51887636d96a7624c42b555ae5902bda3a99e8279fa9a0c8023b695288a6d0731cf84acefa712e22f2dbc7ea0ad787f0c7fb1d2e9b372d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55556c247a2bec080af5745243b87e142
SHA1d1b362a63a449a6c6b8f4110b9850b606bbdb1ee
SHA25646c422cb62e03ad6e82b26f17bcc009cd4330ad97d2d44a17b90d709900c0ae6
SHA512af753103353a7b9963a1435d7371ece4fcdfaf08d5b5384258fbc528e1f8c63649977a86cf37203996523e508ff781c70f0907ee28753960aecb0046be592b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccae70d224b24d961869f2186f1689d9
SHA1654747565c7351e78c461a54dd12930ab622f3db
SHA25679bfd8079f6e48c2a2fe5c7b9d408cdede1d7677c225684ef83af61f207f8c72
SHA512fc2d26eb50b040cc5c637c72715ead9f88ba509ade8f2be8bebf2e4ec1f5ad0a24f78ff61809276e9b2799e54fad85ee17d8bdb296a489e3593a23333fa2b0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9338686319176668b885358e68deee
SHA11f9abbd04cf9dd0700205daf1481402377e13067
SHA256d72797cb99db3a9bbf729cd3b25a874b0b0c5ed6e829cf64b67964c4e96dce34
SHA5120a0d6a9beb0531a5e4d02fd6289bbedaeaaceecff2fb20ce8f7d72a8805dc689c76b33d4efbada4ab343fbc52e136540df75ec4efa34b5c8ff05f1123581124f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872d668f96b5b61a216d7b1afaee19af
SHA1920d156c1394e2e2c404ab807d4d840596948c66
SHA256c9fc0ba51cf26620b38be2fdf9c0627b5e6a7e18b60928e0b8556693642fb4fc
SHA512be968cba14b923504e493102b5d442c84706ffb015d23454557f6553909125b61f8970d2fe2ceb14ec7eaac948cf9dfddef575b4fc15dcd4686a44c791371fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0fe41dd74cdf9cd67723f77609061e
SHA1342be50892849213e0d9c1f725ec29d286370e0e
SHA256ffb1bbc3fd493d27c4870a4894c7eaa4aaf242d314ead08ba8e762390070cd43
SHA51273bc9073117ef25e7c611d0af75b204739dca1e8d04c8f6940ca5288df46e0039d35ab7f8ba08203461e03372cb159e635317178450d3fc3f0249e79b125e742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8fb15a71257b24cbfe4366aa5c85de
SHA148ffd3443ccdc0112183198e2763f250ccac3ec3
SHA25640cac9e6d94d8ee1d3f149917ce62c64b13729e91a71f7634d939ba012e917b8
SHA512864579b88fdf0fbe9032f537dc2262d2dee4d0d71f1e60a55cb6b4045ce876b1203c85c859c51992abf747bc3f55e77794b7d06cafce3b27e42a184c7fba2241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62c519c41c9b0633f55f271665a2fdf
SHA1489b1091d01ed58c3f7607ee7ec81ebb6dbac7b1
SHA256acd17f782e954cd82136e1fb031aca6f1edfdd253394ab4f30361769e5960973
SHA512db08fe916d0357ec3847912294a7db4628ca3db1876e0e4879bd010253fdd03f6d4b85b273082f5416ada22bd013c8ae55b559012a8abf7eadfb59adf2127065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503083ff2665c0acd326cdb7b0c516c08
SHA1a420b82f70a7c297057eea05ab041ad575baa27a
SHA256b0eadc74e947fe64b347689661850cf8029e77b9e0ec0a48d2678a36d55ed72b
SHA512820ec9858bd5ae450c043cb038728b9a90521b21f6ef8e46c4aa1a31064fd2bb4e281f2db493d0395379ae98b9e739b62bd8ee7372e15f302753f0e23f6f4c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb40ef1f06f5b4d3f8a9e2c6b17550cc
SHA1e4b53337f1f1b3c5c888a7c07d25249393178b2e
SHA25622f501d372fdac623bf7fe9390e2708977cdea37ca37283c9cb0748cfcb1afa4
SHA512dc18d78ca903b17990efd8fb3cf124b9cbf08eef2bf25c6b7cfeb0ca64659fd6f245918477b28379cfb2b00e218b410fb68bf3b74ed266da04c5113dc6cce7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1db1c7f3dec410dbe3c8a264cc88ff8
SHA10b0ff70dea9b7d5a27059679557e88aa5bb1ea03
SHA256ea27ade0357a3f46e7f3979ab4f0531f905a712e4bb7a4a9d36ab7a6a5a03e76
SHA512428d2e2291728b5119875b9bec3d18ae18a4813c5e129c9f9818dc981a84b0f892747b390018c6cc8edc21c7a5f3926ebf33a735caf9ed574486052f1e423080
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b