Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
fdbfd19378fd09782de0b20d7eef4328_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdbfd19378fd09782de0b20d7eef4328_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdbfd19378fd09782de0b20d7eef4328_JaffaCakes118.html
-
Size
66KB
-
MD5
fdbfd19378fd09782de0b20d7eef4328
-
SHA1
05d152af00096f1e08d12d16f33ccf9ae2fd3ebc
-
SHA256
dd9b385a984a785134cc72ce65c92d610f8373aabd24d389aa2ca1dcc8e26e5e
-
SHA512
54167aaa680506d68c9cd4142cc2460b32e2d6b305a1807faff81bab3edae407f148f7358e081a6d317521f3d685b3b696a967318ce543eb30666ac47ee0ad4c
-
SSDEEP
1536:2XQux7c8A2IMby6FrokXHhk6fNH9knbhf7tYehk6eNHKkAkHXkx8kHakU8xHtkzm:R
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433743962" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a042aa6a2312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9603A401-7E16-11EF-9FB8-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000017d76cfb059142f218ac2b9b8605e4aaa8c8caf776ab156f379c5e0263739852000000000e8000000002000020000000eb572945c1e173c3fb127349bbb5f5d95199f61ace48a5d418600641525760ad20000000c86f1f6726af3fc27692e4ed87e3bdb89d2f4ecfbf51b14bd3b9daa58ca04dee400000005aedf172c061810723d43b508e42403782bd6946eba0e1ea84fd3eb9c307b7043ade2b86b968d1587ce774ace38c3164a57719e4b926caa0515d4dc128a36a40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2424 2320 iexplore.exe 31 PID 2320 wrote to memory of 2424 2320 iexplore.exe 31 PID 2320 wrote to memory of 2424 2320 iexplore.exe 31 PID 2320 wrote to memory of 2424 2320 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdbfd19378fd09782de0b20d7eef4328_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d277062c29ad90abe318a8a0b2267d65
SHA1889235fb0dcebf8cf4df4fb4c1477695a73d76a1
SHA2567ad69f5d392bcbfce1a2daef2340869eb9ba5ef5297afdb96a64aabe3016c2ce
SHA512e7e13a8368644ce1770c4f0066c0cfdd817d51cd7c1dd171cca8ff4e472aa42cc7af8523eb256955645d6284e1c83eec33d0fd17bd482cb37e0f99c08ce16238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc16385845ec601c47937568289eb88a
SHA1f706aa8cb7d91781d67473b4eed7d3892e25c38a
SHA256f5303c8240eb0daafe0cc1410a1c0929d9f26cfd6635af37269d5c34722a3f1c
SHA5126452d18284ad3a706b6c36b18291bc4af554936bd3c3b641a9c9a35fb2508f6418c94df1113b07e5c0a242bccf13574b2984c2385fc332246558a6fb21f16043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52518ac6f95cb8863fabaf3970bd41d77
SHA1521fefc10a78b7080a521ec6990ddc33803a1c37
SHA2562bfcdb91bf93a4eeb351101d97ebda265f8deb16725946a393eee59ee7b11634
SHA512b35645ad9af62a08060e077991c555a3d6ce18730f47979adc5dfafe0927f3abb707e640f27401b3cc980259ffa0f68674ba69d7614f188d429e9fe689f23d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9f95231c529b2221e766d26f009bd3
SHA148359f6ed071007b5f20708914e0e6610b0f089d
SHA2563ec7d3da267b9a8230f5749acf106ee77a8ce361de05b2c3d0f5f08e223c5784
SHA512b29aed914a7000006990636196e2134da47cadb8b24b992ca6d919a912f342eed0bd285bf718d9c1c8ba56bac24d5462ab2f98856d71d87de1a4c521584e5134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df928a40f84b3858f8c3d600d9399f44
SHA192daa748da8706cdbefd009d24f688db29fd89c1
SHA2560fe37ca877ea07fe0f7282db8b6ecb198bfa8a059852e0e281cf629115ea602f
SHA51231635c4e4ef3f2e5f36b608dbe6d2ee65b08857c9184063620b3e16c0b3289b6cf87a86a65ed52a3b3ff44ed45514192aa0403ea0aaa18a535426ba29ae015b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c233cb0ed0cd1fbe9c8014c6c6bf469
SHA13ca6006fffe2f56bd6224b333879984ee35e1b62
SHA2567781667409edd59138b6cc67ae3dd3d450f117d7df99cc58d739a31bc8ac8204
SHA5120d3adda15adc18543fa81cc77b590f17a4f0304e6924269ef87ceeeb6bd67a2ff72131fec7a72a8d3ae35471c67c400215c2eca4865de6e27677de024c1c9945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5113f575a9f6a1cb63eb5b62b8ef9aaf1
SHA187c58a3357ce756771d5af398c8928efbbb27926
SHA2566219ee7aa0eb66d76f54d451b14f21fafbcee0f0ffe8c93c1002b4462d8f55f8
SHA5128a8ee43df79d75a6b72a94a89f2ef9cd7c29c68e2b10beeb50485d20091925370d706324017675429b610e58e38fe3e9fcf96a5c8a4c020f334147e5a8715382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d0d1bee92696a5a77323764f9f980f
SHA1f73f1744854dfac69f9d20f4c7ed24ec1e604910
SHA256b2291d6697d444f4011cc8b91d0da4263e4e355e9cc0c71312bf0cca5606c074
SHA5126058a0606dc8cc979c6faa7e466fa73396c1c5368fc7e6d8721ebd32eec343fad53f637699409064607fb31cec57a0bbe3b4681ba0e59fc5fe027abd710f8c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f75ade1c4e8936878e3048ceb1a9f12
SHA1fbe0ca3218324295d47dc49a504454f7e1d71ee1
SHA256483ed097c909246c00de51b122ffd6c3ad93899bdda8fc199184bb4dd96dc135
SHA512c17a0b23bb18463491f767e4fe90b8353f516ac93a6314c3541dde242d554c458f12e1488d3a86e70adeaa8bbff9e00b91cafffedd43075aa74fdc5ec9feb828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5194fc999c68cc3839faad11d4cbed5e8
SHA1372932559e623a100b37dd7c13f40a1abec51d9b
SHA256f455bbfb1398325bc2c5d82f2cf3b0ff998404e699c523274d1ed928b2113ce4
SHA5120a69573a869229f46b2cf2a5acd1f3b54fb4d1ddc296ae07e4b59acc70cfd62e632de8d43bb55f9ea91307f5e8156a724c763f6e0b5cd26146d0825703c52c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57439bbf289449d12c9f0479a630be6e7
SHA105da7b2348a59b09467f0a9e30efc343134342f2
SHA256da8adddf61374de8d320256673812db9dae52423716144fc99eb93f1f32410e6
SHA512fd75f3a0ba8cc6d8a38c767e74e3d10cf01ebec96386b950f7f1df73fb2d02f9bde29d2ab2300692bea4047f2408a3ad2925587885f05c6a34d9d23dff259dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957b1526e8565eeb7cec06fbcd6adcfe
SHA1d1e24fc68ccd2acf9498c5ceaab1a5f70351143c
SHA2568f52901f1e0390840c48ab0969d1c4af2a4e8fb9ceb8512da27ccc4d53ff1741
SHA512f45b8e2348e96d7377a51b64cbfd24d9979b1d6bb74c67b5a76870ec4318505924e7f3bb2a5cf125cb760a6b2e44ee6cfb87052d186a6238d616e15e3e4335eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706f00262b071273386f8a968f45cebe
SHA1b8ae97b4ae0e931f5f1c1cf40a783df11067998e
SHA256a3d8db7a7f6cb6df48f14357b2f0ac88de3dc10b041c76388e83304b1bbac891
SHA51246cea54b5796c3d7bd4f84f34baa10ecbf0f3b21fbc5686a8c12a734744f1793052791a4577d02c594ee0cef3cbdd903da1a1cdb137edafa351a95b3d02d31e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf3690330c4fb1d22a0f5d4de1f6784
SHA10d4a0b912dd2d3998b98e2304bb3968243aaead0
SHA256fd132e17cfe5901634124fe43d10ae65677ca04ae7999b9deb37f3ee88a4d775
SHA5124e064489491756950ab541941af5ace6ca2c3cca4258e4d9948bfae801bb6a47418d53568a329c750530d793da52cbdb3a591acb89a0987a06d3aa0a105414c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02a028a1c1a64ea26f4e529e29a261a
SHA12b73ac5d23d9154de53f71a707e5a63ba50a1bee
SHA256dcfa4fae85c2b3452fcfa1b435ea66f616bf14fbe0efbf6b0e63e150cf3cd90a
SHA5123a8b399dd6a08e0864937d5b5b57f561982393944f58d40171253b3dc398bfd01ba6be735f95c9b4d502cc71d789ac19cd1e7c9e8451d105b13bca7fe8776a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e7ccab62be553cfd2236de9b37c213e
SHA1374824ff05d275c75228cfabc30f4eb10a8ade0c
SHA2567f3a7f0ac8e8712ae592f49474c3b5792bba17edb4f575ac0ee781fbb37abeea
SHA5125ec1fcdaf9114d157375b23949404e0fff8d4a86467203d9919a6b45fc09c178e1d301641d382a50dfd93afed238c59269716954943c278b219eba78317bb405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1213f24711749a85607f612d262eb77
SHA14873fb31caa8ded8d6e88aa99ad04b840e535c57
SHA2561b5540ca98e64e01d0da521b2efbf851953c08a915b7d2f241fc3b55ddff3b0b
SHA512b1b8ec41ed922651af4c043908390f59b6b6e129d6137acefdb0986e1c76d8064ea2aabdc2f92ed82982654039903ac6c51e7de2cc71b3e601f3e9ae321bb81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c931c4d4a76b9d91181aa07fae556c9d
SHA1e7d3a7999a2fb4c5939940e7139af9af9c7944b5
SHA256f5804651642179830b23416a34b55f8437da77936f331b2c6e49b6eb2e929438
SHA512fc9f5321f5c9bfb616fff04913e11c425852fb18362e67418582617cac6a00c80a5818cc694b22993a5a3a6df013eac9d3ca697619d2c8e72db182a62037f895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679c2f8a659e35f6014f6e2f8c476b91
SHA1b4e0d9f66dc2d7ce83057101ddb221ddf76cdeda
SHA2569dbbff85cba166863e38482df4511c3e81914fc5fca6585eabe65d3d471e70bd
SHA512146a903215def791d5a2b5bf4c3f67601109d3ee39acce2bca31609ba7204e1d45f1ddfc676670648b47689ef419eb88ca973775a4d86e1118881f94ceb4aa48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b