Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
fdbbe5171d649bbaa19d759309a5450a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fdbbe5171d649bbaa19d759309a5450a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdbbe5171d649bbaa19d759309a5450a_JaffaCakes118.html
-
Size
12KB
-
MD5
fdbbe5171d649bbaa19d759309a5450a
-
SHA1
b748d419babbc3574af7158c4a22e6146d0a6c52
-
SHA256
87f0d2f561664eaceb96693dd4513fe4e98f47be85da991b2fb7e2297cb501aa
-
SHA512
847231a4b1b325a0b19895af1e49d29f8f35a63028ac6341c2c72e825500f13af3ab98d6598fe7a14bd8f319b0e460933efa8ef94619256fe5bb90c8bc6bd863
-
SSDEEP
384:TTUH6QiVoay4lo7uk9D3GLIue0/eBlNLR1j:40eay4lo7/9D3GLIv02VLj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433743282" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d5f6fb2112db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000104ca4a091bcedbc4d7c36e189f64f34f5067a0724ca938e063423e96f917620000000000e8000000002000020000000ac2c2a63b91a8b1782efa202dfac8432aec762aa2b4d5df09d1a2dee39c52a9220000000ed286046b3b1e498267dc5f004b37c783afac42a09156383cd76ac8015c13e164000000016085914c11274bc0990a12dc5e8b3770b34da76cae701094f7810d6d1aea13e403dc63aef09bd546ada4ef6bca6d678e95c392305c9aa4c24ff29bc5392df8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00B6B691-7E15-11EF-8CC8-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2840 3024 iexplore.exe 30 PID 3024 wrote to memory of 2840 3024 iexplore.exe 30 PID 3024 wrote to memory of 2840 3024 iexplore.exe 30 PID 3024 wrote to memory of 2840 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdbbe5171d649bbaa19d759309a5450a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e793462ef3a87d53ee0926f0d00e70ef
SHA1f6f65dcca998b2ba7ffeab450fbe4919ee3cc421
SHA2562e3f4220e3edb957b8bd906661d85dc27743c11c585953f0ed49e9a310f5fa6a
SHA5126850063b9ac0a215562098e7f2d14be2545a4b188d3f8d67cc76499b4d9b930d6a9b2517b5bdfbc4527fe39d811646cb33a900ae9ed32bea10073a3b139b11b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5511a3f9b8b9bd43a638b903118c1bd32
SHA1a2556663c2173dbea3e01c43a74d54e19b448753
SHA25619fa6fd86357ac28a3e589bb72923b1fb1b8315d6212be4a032fdbad152f09e7
SHA512a027a77bdaeeec7f331f16968da486aa8c49b3f0fd8d4f5fe8522cabb82eec3c4cea7501c318b4c045a6fff37eccf7fcf2c30625207bf8c6c6aa4212f21db049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a952b3b1db60706a6937ef6a6d9f3ae0
SHA138b812636951bd976769f29d94c557ce0b1e0ab8
SHA256f04ec8edfe4ad8fd2bff8710aa76d075779246fca1316ab059a3aead0e2bd1f9
SHA512f035895d4002b541dd1173760ef59959aa743d93e7601cbe4a7636a444c6257d9e265f15129ab5dd3067b5f9630efb1a1a715a911307c4b4dbe1695b7a6e4507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518baf1906f3c47f6a02ee3344fa4ba36
SHA1049f4c9664a423dc4af10c837fe790203930fcdc
SHA256b98a275b59c991eaf455057a1f1adc36dd02c827a19e8cd8234d21502df95051
SHA5126d760f01cadcb2a03e2f47831f40896d0723f71db11f3447c3b5a51ccd4c189788da8e97cc10fd0d80bf7dbc0b428971b5a7e54331c7624a37b26091a676597c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161752ed05351b95cf724b5206df3f3a
SHA1a2fa133d409a74e7ec649bd185c2c19157c79fbc
SHA256a058b5462d90aba4dcbd7fe94664bf59736a34946d4fd4460f0f354661e91a73
SHA5125c916f0a76f967ee545147fc92e88669c5fe63d68c68bd73fe5d507297109551f2327bb04df1c28c57c9f3bbdec2564787d8caa9877c58cc0ff9114d3ef608b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce7931d7490543a7d161d518fae0384
SHA10de14d4bcb04fd594f480bec98100b3c38650e13
SHA25653ab297784b572236b0443fb5570069f661090f1f5aee6e6a299b438b8edc7ce
SHA512335c1b59e3e787b6e700c9e2b1a3c827fa190d488e61e6a5700bb674c274b32470f7d5f5f32d5da9e3f0c53bfcac86a0d2439d5cb1ae555a49c2c26f6b477b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572198f1ed6db9770fe790d33f354705d
SHA1f96e79b9f3b32cbe7843cff7797faadae930123b
SHA256c433942b675e6bf371b1d05c0b4a71720d752c64cb8e7a8bafdd1fd2e5e58234
SHA512e39832bb3694979fbee351e9fd2e2bc6196af8de36ff98446b25188201edff759129179767cd6062ec0f7d717581cbf85e89d301a9c61ae694a1bfe87e2518e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc85f79bdd02771b3e6a588ef033ab8
SHA1f672982c9b04640427d47fa39f9cb1324f4a7b03
SHA25677e4ba85132b0ca5854f03e87efd215c731e9643aabef47f605f0edcc2d4cc41
SHA512c918b17df4f6819110f19bec6e687d0d9d6bafbc9c83eb30d98df39b15517b6778e8b028de745f6335d4cdcfc15f769277d5b1cbf77ffc6fa5459b5500ead2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a7bc24c866aadb003023476997fa7c
SHA15fb5c5b5776795e4bfbef8be90c17d96045ab3c7
SHA256102ffffad8b0b4943697d2ebe5064492dc36b967c14aa5a580d3b8339f49a05d
SHA5120be726d340902479e1143e377568314d8227cc47b9b0616cdd145828137940ac477477fdc1d5cabd39b4c6db15ffdbb0b941e3d186234b9289f8251aebd2f933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe2aae288c76bc2fef1759236e1df13e
SHA11f9aaeacfc057f939d2e9f32c5898617fb95c6d7
SHA2560bdf611cd892e5860be0c3deb4899746d9b60d1443c4cb1e1b41287940e50b4f
SHA512309c0b9b63db0719b0d1d82b1240a71c0b8b2744021bf4086bb9f8d48405a596fa7a0cbaefdf5a54e9b4405772c8cab89e3e9ba95c3cea579317f31d8bc3d07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c2fed4533e4b5fe5661d3c6ccdda97
SHA1b746f1e4fe754e0f524247085cdaa5d304cd1cb6
SHA256309de3893cb12a6b8753051dab56f89431ed74c9d968145c6b19f82920e839c7
SHA512901a06056b2ee5f9bd43135d90957b909bf0c80fea4364d6b113446473fe61ddffad073d24132ed2d344329342bc11cd548b60884e65d581efc4000884cf9d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b2abff6f2477efe0b798331007d6fd
SHA15c1e800ea14ccd3576188538b537f5977f579b77
SHA2561467c751d8ec40ae6f895f07cd7b469e307229fcde43faa67e1e1c377e4fcb08
SHA512825581d5ed5d564f5d46d7c1470e5bd1209f2a42304af9dc6643faee9df2dd90fc0bbfe5da640d4d7abcce3b4769fe30372882664ee6b17538ada9e5b88c6b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8e713fbe8c79a476eb99b19275f4e9
SHA10076c8b65e325e67d8850c06725bbbb2817a3103
SHA256d3c4b1ae17cc0d12733551cdb6a74a3092565d18baec3964ac0ce20e53123177
SHA5126eb88b8116a3a286559abc8d2a9b7041f84529101262002fa9f73c440e99f4bd51726aa1f6b05258388aab5824703ecaee493a668e0342498d33b0e015a45e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5886a12533820071795f15b2ef9167448
SHA1e6d0810b000bbbdc1d3f77b44b7c4d3f0b48b3f0
SHA25603e4ea2ddcae711b1a58c58adb15075f06f81712fb62bb62651e9905c8adccee
SHA512e27a1de427288c825494a59823d098b6e5ed18090ed860ad24101f4e89852603de10a69cbc00588a58de1085ba882e30756cd568880201f4c6f6f822cdd68cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502427ee5df8953af56f392779b5d21ae
SHA17aa636a97b62fd5e8c192445af6cbdb11a3716ca
SHA25656278b29b58f92804dd59ca11243081b164cc0ab1213dee3a2762b1ff57fcb79
SHA5126abbc0610a9270d9857d9dc65fe2ac7f7fea8ff9c24c41c1f48cf8529269dddd8f5b31469c0b5605defe53f61e97005464a2d3701c7c3800ebcd1b31b9303af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c0cb8e0335af418fe17c2bd1fc9866
SHA14a61fd598109358954de91487a5744c1989f23d0
SHA256d54e36bce6384807f68f85a0de87f4d82410cba39c8c2c1185a52f8027c3e340
SHA51207b4a09022cfb7f0e2c607dd809577ac3aa5b9e5c043fcd6b21531837b51e0b547d176826bbe25abb19679011c50ea883800f0347f96022209d026768721510c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7972155d946d5b1b72da0e9c129882b
SHA19296e2aacd52fd3088b4dddd311ccb3ab77f559e
SHA25621f35bc3284121cb7ca3f1d2690aa98b686d48480acebd15acb5174a9ad5d597
SHA512f04b72db4edde1595ac63d51519eb14c9f678ff626ebf2710374141e5de909b6c5419a34472ce3fd6c7dd883167d44c68bf5258c5822ae6a8cd27342815c806f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d886c9414274e967848b5d031c9bd0
SHA1f65cb639477ce3d3e9780512cc0edcbc5d25243b
SHA256c12bda53603ca07f2ca0837afab77f4206e2ddf1981fc874aca4554775332394
SHA5126feb6e9b9e3e7ceb8d0ca57c743edf7c23cb4e8d9c605ae215bd7c06bba946512ef1e02b375d7e69cb0d77ea1bd22ca96a4b1ea5a1d2d3789dabb0f027db5dcf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b