Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
fde18fdb8077b27c7ce56ba83ab856d8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fde18fdb8077b27c7ce56ba83ab856d8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fde18fdb8077b27c7ce56ba83ab856d8_JaffaCakes118.html
-
Size
4KB
-
MD5
fde18fdb8077b27c7ce56ba83ab856d8
-
SHA1
f05c9806f1d5d9ab3ca643f7f072003d3b70ff37
-
SHA256
8ab97ea1f622b5efae8f249ca3b1678b2c655c7e31e211d2499c571bae50612b
-
SHA512
fe7321c6928f4aac50d18b6199762f5570d0d382072e63baad39f8df31397057c5dbd93595b1e2a755013d86cd4fbe25df864ac569afe2bf4c8558a533e534a4
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o4PFkxTd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A250751-7E23-11EF-9816-E6BB832D1259} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433749444" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504b992e3012db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000020ff47fa9556a72de5dbe937e26d6a6c6d4f6827852abb084399d98695150d7000000000e8000000002000020000000f4bdafaa5d9ad84f822bbeb5a9aff75d9dbf473dee9fa98a3b800c06ea4d6c612000000014c932a30c33672b61ebdd6e1a4c508443966a02642af4dd8e540a1f4341dbcb40000000ffb3900115c50f4580df09c6fa3d85550abb4117f269716466882589895c82480a5d9f9ef15b8e5a92510bc8cfd1c2e13ac07aedb9abb3834a75b521bc796693 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1416 2508 iexplore.exe 30 PID 2508 wrote to memory of 1416 2508 iexplore.exe 30 PID 2508 wrote to memory of 1416 2508 iexplore.exe 30 PID 2508 wrote to memory of 1416 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fde18fdb8077b27c7ce56ba83ab856d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54259ed7fa365afaf379cdf567c97e062
SHA1fd4a0f8f93b00251b0fdd68c197f519230d79c0b
SHA2563fe67e0ba20e693d0300c2486ed1a1f7abc6bb280dc4907864c10ae802906a1f
SHA5129f7233ddc18739aa2fdec695ea326dd916c24f82106535e1b447dca6244c74c1843228d844c8adcd0509f779909809011c85d7684042801671a4e50fd7af984c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea781eb11481a43267fb62b4006c83e7
SHA1709590420440446ed8163eb87cbef6265dcf3958
SHA256c2ff515cf22973c51ffb1623fcd768fa177edcf2f21ecfcb6cbc4499e1c80bd6
SHA5129c9322356949e0b3c645d7800532173c26c412c1d7378595ccfafbcdeadf32efdba48567ba9a790dfd9de3713b2e3c4174d0c4a9dee6d165ca0a179f59641b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdeb4418a417d7d7dd970f52f498c2fc
SHA18bce14da5930fe235ddc68156667118b09692a04
SHA2567ea379d27b5069fff634ef766c008645c77c0cc8b26fb114283d7a44787ff40f
SHA512adddd82d78006ca7d58973fe217581425361603b231b61c8d93aa0947ed1de036f81ee0110af84c6763ad599df542ab170af5d1ab9d23938733f8a8b97918fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551789551cdf7c53389a0edb72a10d6d6
SHA119bc99dc9b632b91cc32f680180ef98bb1d3ce11
SHA256465a585177b626eb03163ef970dc803f413d8c68d21c99cce76a021827a07c53
SHA512aedc8da8dee424d7d83c8ad3092e75a9a705877de79cad175f75a1741676cedeaf9de9e170ab6cad6a422ef41998d3bd2f8215a6775397e75504d714429008ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56986085e6be2547e4539f6f2c09bb361
SHA10acd68ba9c87c50c4fd2e6cb5b23390d2ac25132
SHA256bf094357309e0ec76d48e96cde2670476f90e4f1858d126fed04acae7d57b8d2
SHA512436e5ee0624703a9176a021a0f700813e193b7f61304f52cb93f60962e7e059c5607fd0c55a00bbdac47c84c36ce3475805637873609d8d87e248c0588e1e5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e3c675d94e3a36434dcc240146d885
SHA1d32cdd96213009a8b90caf8bc9c78e32812ce2dc
SHA2567979736f8f976e0d13dc2b5f8a1f859cdefa22633366b599903586e1f219d4d9
SHA5120417455586320ddbd6699193d3b09de51cbe5c24aab7ac64d763d23b9d0bf83a847bd8817f1c6609ac4812b3ee9f7d79e72ed14fb4ac2051efb59ab1bdc88212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c96c240a2d8a518a3f57c8401e3f9c
SHA181c8cd8baf3b599cb0a7e18d1af243784a2136d6
SHA256b1fee76097cd030e0dd8141547a2a6749e7726faa4f7ef4eccd1fa852d6b93d8
SHA512a68a0ba75790683d71a658b691497f221df4475dcc0164ec957f5a5d00dc7c5b7c6f922b2e9e6a1b07278661a6fe622953bece77817741693f8f50cac26a71ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ccf311fae6d67cb657d6b7620148842
SHA1993a1c5223e0a4f313ddf916ace12bc088de66b3
SHA2569c58550c47bed7c2038a08e89e2dddae2f0caeea09cf01a0e0591017f46db7f1
SHA5121d767e832ad92d4262b5e0805ab9f12584333ddc2afde969ab0c704003e6f06802cecf15b657bba91a469ad236a8f3a093e9af76087e28c540218e32f38a3d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb50f4b93abbde8ca6f8d1c0cfc6db9b
SHA17a40f3d7b84891bfa2d422e735d767d48f6ef278
SHA25669a596420fd4ba24f921891414cb48ada8812b6f8da5442e3163e2113ba796f1
SHA512383e02cb95fa5e4cb51b434de588ff6de9457ba9ba6e8ab04c5b42fadb6a0d77999f1b4dfa2235002bd5c7375fb7b4008f72330a6aa0de5c213476cb41fbd1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d974690d1f0f49eda3aa90cfdaa2fff3
SHA1deafe9fa39ed07008a6f5dacee8a63766fee5cc9
SHA256476ae210d7861ecdb9dd212f1a241a1e084a1c383d45f8f5ae810689346f4cbf
SHA512bae0b5c6aa2b10e35cf3cb8069a1d35b385d9e8956c29c2de84d458038b4a7c68614384a4b8688a00f46837478cad8f2b6a869d69a411881d68fb40bfbc3fbc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d96e0d79134ab5c3afa6bb6db5680e
SHA1f1c8d4621b32e902f5e163d5a00d0ab21ccbb12b
SHA25654acb7f2cbde7f5fa10b39e22fd681dc9dc031f68a290f46858a817ffbcfa504
SHA5127451048c3c24e48a4e511ddabaebf6ee52c44a3bac2e4b00907ed0757675d4ecaae30f11e29696731677ee214ea6129fc211e1d94d7ea1ea2843deaf3c027737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5366a61a1ec99ff7683abe7a6657f5c77
SHA1375fdea7e1113f79129c2dcd4889cf3616922e96
SHA2560254cd8b1cd013dfe4430cc745a998e969808dd3943c230d6286566dfe6fd6d4
SHA51244504ddff9fe323a61eb5d6d763cd5898f1b724dea9f31b205aeaed18de8a877c419297b570b6cbe1f919efa60e7a19dc2a05ac01ddcfd7264da30557757508b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf7c686efcf6163f0c5cba53e3e08f0
SHA1dece1ce2b4bfa2e4ec4575ee295e9e42202deed8
SHA25692749f517e2328c267420a18953adee6ff53c93874e2d70bb27a4ad6c9f6c6b1
SHA512c6435f00ddc8fcf9e75744cad8e8d1cfdec87cb7ca60be520b860864537ea430d4a42408ae73bc9ffbbf5f1a32bc716d4191f82f02d6293c9d0a34b8f2cd7696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000dd57305faa806b8b7a45ac896461a
SHA1387ad063ade9ce6a1c577593d7dd8d5e12b7f014
SHA2569df662f832195f9e24ba4bd77e46615baf862a06ec336a47328d20ef703d42de
SHA512492d4fb9ac62f869d1882478b3b23d6e5c4101c4ff088390de18a1f723f34af1370242b8cb1f43fc7ec5f42492ac921a2b56b8ce0c8bcf32fbfc45efb4b63c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59555cf475f712265549bfd459404ad24
SHA171c294a20ba9e1545527821dc3bcdca4959e6206
SHA2569bbfc7aeb6fb2eae7292f1bd288a6b257916f3850fa0face0372f3bdf52b0025
SHA512f91a68c53f10fa9dcf9b27d5cbb08218d1d75eef89a7fb442fe07c3e05a9044252136618b2d5d5612f0e8ec4c388b3a2176f21f0181577195223c3a71f33c458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0f195d9b67d3f50db2b7b5e3ca52c2
SHA12afeda1dce2f8767d62bc0e4a460e81a42224ae8
SHA256d4844842dc2680a8db1c8cd1d01c6d04cb3d6a3bc257bbcc8b3b87c5858a83fd
SHA51297cfdfb78d6e18366f85b502c7a984a8ac78b1edb61c747e435a7b5bbffbf9cd816130b7655746a756dad72921723b928c1c6b9da880c3d282764fcf7cad76e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49267633124b050a7a68c2e0a6465b8
SHA101234cb18eff9585cf68db442caffb0827a96afd
SHA2566f812e52f1d9a0faa93d76751d3fadfe54868dd18473c99f378eb6181b941f96
SHA512d9a597ae1b1454ec614eafeeb4d180fed98b1d086e68346b50fdfd8f75b215390965709d6c8e80370b1241d6efc91da32a0627337ce69334af8c6708aba350fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad1fcdb5b1c6f5f9e6f049ace0ed3c1
SHA1f0dc18d0dfab80d9a5efcd863c67107d853a2452
SHA25693550142c3dec2f97e654f79ac3ea1d575b01e956e8a7b948632d41766fd6df2
SHA512dac9dc52c1876207bc941c1c7edde373f4b423a0d65e6eb362c86930f98b81788a8b1f4e37bd98b28d8fec10fafc27110d29d54d82ff680bb0d24473e28b81d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae14cf4bb0051295529df5c82196b130
SHA15f841cc0f10117c20511e9c869db96e5c16ecee4
SHA256fa393e30e87760c31e021181b887c308a1d6c3b66c9b08dce86adeed192a87a5
SHA512e14c2cbf845d4a328f4b9d7290319c7930a13c80d41691306af9febed5b20c0c8708ac433cb2451d10af136bb3e06a50963148f1c5445ca89821f5a0608c9314
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b