Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
fdbb9271e047854b31736ed53cb77aca_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fdbb9271e047854b31736ed53cb77aca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdbb9271e047854b31736ed53cb77aca_JaffaCakes118.html
-
Size
22KB
-
MD5
fdbb9271e047854b31736ed53cb77aca
-
SHA1
41b7cd930e6c422d99af781d59bcd3fa7d22d5c5
-
SHA256
3e7aa63d00053cf789d087f28a0f1b5a8ccd66a64ee0479ac43b821b6e9dc2c2
-
SHA512
f4c32096866b72d80dfa675b4b551b4f5b39ac4ecc1809f67b5881d36175b4b43bfa5d113fd4e99e8a24732064dbdf018c42830603fed28fc0b1c334f183f3f5
-
SSDEEP
384:YmI6uxWX70/ez5kGBUdJiJqcwiJXZIcTiJxnRfLP3iJIQdAE4Oz07F7Ty+CpHKJ0:inO7026mdAEbOh5gYm3iPxMv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900334b42112db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE184951-7E14-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433743223" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b1df4f268432b6be12e971cbf395e81e93b77731c967b63566834553816665b9000000000e80000000020000200000001ba72ac4e8e95b6400bd9db3baefc15ed8a74f38880edfa83ffe779c0a80da9b200000000d78e01505c02ac9707ce268894326f8b9699efe0870b74410fbd144c082b43240000000ef2373d16132eaf1230ff8083311fa20b96abb7a865ea49ed649257aad89798f66751470f63861c0f69241592810b4466dd066f999a67c49e839ba761ff80ec4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2860 2024 iexplore.exe 30 PID 2024 wrote to memory of 2860 2024 iexplore.exe 30 PID 2024 wrote to memory of 2860 2024 iexplore.exe 30 PID 2024 wrote to memory of 2860 2024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdbb9271e047854b31736ed53cb77aca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f80c75f23b1598940ca7c991c16ace
SHA1b857032692b3c0fe4305cedd719803fbb67240d2
SHA256b1421d28a793989ec23ae7e4431b60951c658744c69ce81b0819c34960ab536c
SHA512cfa9598a889c815c43428e02a839f85653705aea3adb821448ed9bd03ed1e7dc2846f9fc3e7a75cf48fbbe7b8ea87259286d50644186e8cf93e8f58be1e7fde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1f17ac70f5098ff9b5e08804cd8b79
SHA1dd92b35982f5b3f1f0dfc719051c50de8bf96965
SHA256b18023585bb89c389bbe55144d265375d0d7fd20ca623753c6cbc34ff01563c6
SHA5129faa6acecd6d0120634595910dd60793a55b73162aa2c0af535516976a46916d66e6be79b73d92660741f752b60942942a04257358bcb1e7246969834926c263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50adc94dd6e05997723099a06dd564ce5
SHA1f2550934871443162ee9be5f08208deb509550a9
SHA25693fadfef34b2ee8b145e3db04daf95f0410f37d2074c7ac7b9f58b6ff1e10756
SHA51276fdd12b3bab029fd790cb0ee3cc13a8c0e2b17570349f184d9e900ab219885d93810fe12173264a805e85b566cca9dcd466257ea7f724ad704b3c646d29d4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54477fca6ec24c33edd1d314e43c74d71
SHA1fd6cfe765b18b8c57a0daf02320a347bbba24f62
SHA256f5ba706625d972f51359153b2f04181837ab22361fb1744bba0ef00cefce92bb
SHA512fb22507d5815781abe072e4d153fe67a588f440f749e3d5892d8d22e949c343c35d54536b4ae5e3fb9c8c9cf3d1e8bfbf73b592451841a2015a1d498cb6cdbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069ec9927fc97707009e87802778cdf5
SHA19e3dabfaa94efe478a31a9f057509bfe204f539c
SHA2568ef2220a0b658de699bd137ab3d6251c1e86e00b03248283cdc7fd30c420ef8f
SHA51283e34558ba6dda0299124f4d389884927bc95306c9d56de0e0847e9c09dbf39c9f59a45d94ed5e19616758a392c771908519e61d17a1aac28d75b1665886a7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a355d70e4e46bd1300863d2530cbe3
SHA1ac419a6295adaf185f92af0b40eaefdf386605ae
SHA256d58402d2bfd3a5c1e6bcd6fd5fb925ca6b42fb2683cac0a42e4de2860e5becad
SHA5122f6217fd364c52df899ab0f0a346ac6d890e29d035e7bda807a6a6e970020728cad2066a2c711dd25053eec1e58c2aaecace9fd4748ea686322b8aada8a30727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac5d2a3c1413c87c01468aafcc1b448
SHA1b3d712a56fba2da87acf479293a0c9220abf573c
SHA256fea65f0303f076491cf54651469f998a47bb237de5929d4eb6c3f72a609bedd3
SHA512637f80a171bb7d6d02c227eb5f0d14c49382681f4dadadee22599dfdb2e063ff110672ed1a68b8e3d0d949b8374d5462a1c7554ea6ce507a3c66d54c3a099ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d016a401fe6945adf89eaa2af1277595
SHA1b8a0dac26f2a52a296cf61614024bb50cca818a7
SHA25632e640f6e6574547822b07b4adbd3596ed715052ed432597077bf35868e0ba3e
SHA512dcf2ba8f2bc640b3b633163672f44d0b29bc3aa2d5c71ca84dd1f3d282d4c4ccbf45b5b770e097ee82eb1b0a4525780226152079204a16e3fe7fab5198edd034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548731ec64f3c2eae6ec0979bf9df4c86
SHA1d0248ee955bfe32c18d8b837b66a63ae01254cd2
SHA25683df5435404cd861c601de147fc45452e460f8e7f3c383ff9efc13983f987a5a
SHA512571e119221ffeaa24867b1f857d3dafd94ff163fb3fc344c08ec3a7693179b6d1006f4a24d5b14279f2d6ad290bff4a7d8f0fe6cb7f2bd4f082d60c89c92821e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504bc88eb8d0f7b7cf6b48bec97a4cd01
SHA16b2cbe6aa283cf9f697349ccdf51d4bbca271ce4
SHA256a706b81e266f87bab0c25292951506e3be6ecfd0f77c457e89248961ebb8d71f
SHA512c692d8a1ba48e45b7899bc8a8ceef95eea6d9ae15cc99173237df3244172ac0f950e2d8c974f93d8d19377afad1e128d865a730e7f1630b224f4ed395294d75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56637def02d25f596111c5d097586caa1
SHA1d8109ad2bc463f81b9b51cc4192f924869a78779
SHA256ea69936d2eedf87f9ac2e5cb691467319521e31791fa29994cbc908194c739cc
SHA51246cc7cbf107a502dc5f42c68561a5487263a057551084b5c44e723ff3d1975186919edabc7d0317f789c59e6385153deba090f8c3d22939802a077507fd068c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355efb6750568ca3defe46be926598a1
SHA1a94ae04e16cb13dd6e7a6bfbc0edbdca81956740
SHA256ecad3ea2ce0db32151f83a78075ba924832ab7293312fc9f9a8cf7046a68f604
SHA51286ac3dc74b73c8315a2cd31b1bd03db9daa4868ad06fffe1e67f1da2250f6d230fadf1624424c06de4b9ae796b4eeb77bdaf775336bb76f5762ef56a1a0e03d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58112a5c71c8064b31c00e53ad30a4a98
SHA18a2625586a65fb488f37e1fb34366f1a5c0fc93f
SHA2561dd44db1f864dd3d3953cd0837e210843edc551ae6ca290e3b264827bed006f8
SHA512fae531987d7979f08d1b0b1356e09977a64a37ccf0e25847e37d4e85cd2ef1e719fa4d1692a07a688bcc7ab081fe6401048f1f6d73a8422b897020c2d67d3384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581cde0b94b321746ebd68d94a52077fb
SHA1d8d0b5fa9e84bce818be0b02c62066e2a43c9c51
SHA256b71478c015eb04bba008078810bc035d8aed966676cd5888f6f1381eb54dc25f
SHA5128674651e8a67632204cdc1232299b297aa8848d8db8467459ff64c48c05bf72863251a4965703b837d8cacc5c5cdfee5ba413832e4f27fa8512e9023cc101713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea2424c3651e614c89a9264751fac1a
SHA11f2b778cd095ceed5040b80b2f9034e60514e9cd
SHA2567a287c3bf0d0719dd0a28023a6f5947dbbc20da0647fd886f24bd600ae1e13cd
SHA512fe3030cb08fe766114f963f7ac1851205d7e3fe64f6b4f648de24e67ef703e06ac3640e670b0a038c0ef1056216d5c6cb4ba005f6b49a6e4bcb10e9e21c30bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eab4ffc1a8d40a23d47d478a84e8d91
SHA1c113717aad85d92a80680d6268a90e70b16a9ebd
SHA256d91111a0086807148cfb9244cd0c3ecba15ae598e7e3aef9e638257697de01ce
SHA51210dc23b2b0722042b1b777821c00b7ba0522533cede1894adf666237064057dc39cb1413f853b9a86742bcd4cf73c5f28c33ed94bf864b5521373126601dffde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed897eb493a3b76f6f9807aa240b2757
SHA18ed7f2ff09168fed64572f129dc84354fb157b64
SHA2565747183cf9cd858520fa53484c33b8dd05b6f3c846f6164bb58cffa734856c53
SHA5124be7cf22b099f642ec7704da6cd535285e9aa19cd7af0e875e3d2b8865f03afd3d4938002870d76d863609265bf607c8181145b855b2d18d328a036f7a5357d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d447eac2ffb7f84c6e5e92a0a82fbc
SHA15a8a4e5d15ab40a2c8ae6eac5eee3d461f5945a5
SHA25662f4e076ea2443092a75c28a217f6066ce8e71540aaa6f7f7ed63906568da5b6
SHA51275599834e87a01c3df7ac37ce764b336a5766039ddba21245d7e6da7b24f7bd7c7c875be582f14eb9b6de67239b8551a290c412c6a577782aa487e7f40bb136e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd7340f2eb29a6b9d168e996354255b
SHA1443069eaccbd3d65612c72c2163e9ab37b912768
SHA256808d2563e3133b23f0c078fad45eccd768b3e7da50b1c7fa5ee92c8b00bd38a4
SHA5124fa54290753007069b4edfd7ade8bae3949d57b25b771836d203647f43f744c48d4d0be0b2e5d3235bb92ed8b0ee6cecb16b553c6b35c8723739d941f8dc7f43
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b