Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
fddaee906582865c5011ba41f0b21f82_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fddaee906582865c5011ba41f0b21f82_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fddaee906582865c5011ba41f0b21f82_JaffaCakes118.html
-
Size
19KB
-
MD5
fddaee906582865c5011ba41f0b21f82
-
SHA1
26cd151d43b01190a7e949f3b65585a7801a039e
-
SHA256
c4465b8741bdaeb0fa33ecb2f84e88dc220000db9b4d8aa808b3c715b973b541
-
SHA512
4fd53ccd3fa4c78e2d7e9acdd806cb24f2f1eb17bf7e6ccdd8da2183f08a21768e3adfbcb514341611e6eba381344d25a38af42a024889ecd61b76a0c73ac5e7
-
SSDEEP
384:zi8KhgESEVBD8c8Q3REmXoLFHemLxXucfIk9xheFzVc93r:ziVSEgcf3CmXoLQmQOIk9edq3r
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433748380" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000068846ea31f8bb7989c7df3b320ce74351d5d19caff4446f7c57cc4d675cf23cd000000000e8000000002000020000000c9f68fe4d8b0610aef0cbc56a2a93c29a0673b27ee86e2dd11bc22272b45a0eb200000000ec47af03b9a9f420510778f6e95b3a478abe64065cbadee832178f2e1e093d640000000fc79a2a05b41498ee033c46dbd134756d55d20427a742bedd806000b3753a2b5e1e6e24ee62be7eac151b7f1fe6520a697428632b5a3f5dd5115f086632be901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEBF8791-7E20-11EF-9E7F-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0fa79b52d12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2536 1628 iexplore.exe 31 PID 1628 wrote to memory of 2536 1628 iexplore.exe 31 PID 1628 wrote to memory of 2536 1628 iexplore.exe 31 PID 1628 wrote to memory of 2536 1628 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fddaee906582865c5011ba41f0b21f82_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c0312b763bcfa9f99a6995f4d7d4f1
SHA15b44a93541426e70fd0f0a3770997088e62b4c48
SHA256013f4af6f9c898231318f502887b7bb279506bbd9ff3b2d8c17d429cef4ee852
SHA5129a7a3c13631aa1a4206a88e328ba395c03ae659f5780bd5550a557c39ec0299c53fd7d13c2f3814d7dcee4a8ab57b633274af97c9539013ee4085dc54da03358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e281018b7cfb2225a29761d783357d
SHA12736b8aea4472a68165b00d5a182aca18262262b
SHA256b0888e81544999d8e8b711be20ddc686c565e8976921fdbb0fd31518af5de8be
SHA512d62cf7cec9c9349e4a617d0e00c5cb6eb456944299925c03f017296acfefddff4a42e2efb1fa96e8d84473899bd7333afb0459beadd7773d3c8eb3630779b987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180e070583e82a264d22f26ef35eca5a
SHA16eddcf741bbd83cd09352970f8573f3eb29032fe
SHA2566e0f5b793512fd9f24b1b92c5ccbd68ad01db48eafff063ed71fff97f4c58504
SHA5125a918f657aa5cd56b8498f50a7060de68a5af2c28fca95787aaac63f702420699607a9786ff9a771d77d308fa48370987837af4e91b8ad2529b6c71c5c607fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efec9a66e816ed8cf86d65e24dbe0491
SHA19a41e45976ac0860662726f228ba36af08de820f
SHA2567d2042bd120d3280fe248ab8761325258f0db841724ac1777855a6cdbdd42783
SHA512cf0307731645bf1334041f3f1a56606d6e8677747cb2be321fc5860fe91a06214e84b7fbc4628bd483746c42fa3b4a79c2884843d177cff6cd509dc33ac738db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c62c41732083207f3ae41d8b994c16
SHA13a6130ad14c987efccd54048b016948340a9e7ce
SHA256ee92c66c6cd52b81a495d5d16d15a1f4e61f7aeb30fb096f83a0dea102ba3b6b
SHA512801d470a4f2055fb72eb9fc5e477183f5c8880263bb8608a5964e726e89677fad702c95f8e63aca96ce0e7cf7b58935e78b688927da17127c57454ccbdaedce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6aa493667809868a5da88077cf91aa
SHA1de1dfd5c4273b66caa38f769359993a66884f0b8
SHA2561db339a70c78e3d4a55a03daf45efcf6742638978fed1dde16c0d9a581d9c0f7
SHA51206d0673add192d6514f158a64eabe544d3f2fc60a6659962a0843b3fe004286acd8376a22d368e8cee9bbed7f6803eb256fad04a061296f22df185e12320e502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739b2a05b004eef94a56425353862e6f
SHA16414275a35b0138dcfb763e4bcb8fde7fe5547c9
SHA256534ae659f365e8ad72f246dc059902fda7c93e0767aaf9481a22767096ce24b1
SHA512a57320cb260cbb9adf4188487fa403d44ff2ec1ac6bca36d253a566cec52b8d1bfe01474bd5f774fd1d373b924748d5cddb85c04c62d341eaee970513e8a13cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568554f6aea16715967084e8483206d97
SHA13d31addce337642c08c998f4d64025ba5d216b30
SHA2568cf5fcb01653007df4236e355f267de3502e96e4d0ae01c202e88a2e15e34e18
SHA512685d9f193ba2ded243cc6c4185826d7767aab030e5d566e9881f182fff18e63181766e386af10a6e1697ba48ea8c15b6a53565f612345ded3aef3a4a193c5319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536efcf71d7900054d5cb428de83366d
SHA15eceb1ea300a354b039f9948ff910884ab9e1cdf
SHA256c4e0f7819a3e3945993a3659bf2606c508ec335fa3001188e466d9ac0e415da0
SHA512d095d658468eb59d54158c25fd33b03a2c51006214a2a6900b35e5eafbb540e291ac113497c0166793a79ce2f958549ac01a49cd410de6ff7c093dac302adb5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb3f8834226aed3be49f606339aacb7
SHA1056c2dce6b59a03aaa5cfe6c5fc3f7ce680912ce
SHA2562384f0f383ab727557ddd51057d2071f2e2fd97ed92f2c4678056f0c15cfc187
SHA51249ede74c5fdb3539e44e264efe89b699dfd16bd93d268766ca8a372689b16a726c306dfa404fc3b1e4b50c6ef0bf2913a3d47c5bd26de114a75211c9d1731e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743be56ff66753dff13b4026e7e2bed6
SHA10529e586a61c8d824aaf4a9707cbd7bb9cb8c387
SHA256413b5ad37c7ba2ce1d91e536cdc4b7c354610f030303d559d6648ec778f7138a
SHA512ffcd79bfb47ec56191d6b3860af8d7775fb400b79b64187a51b8275cbe195eadf5abec2a958438249130c0f6b81d8eb2921086335c2608970ada26789bc50572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb9f898aa6984949b02d0863b1f0108a
SHA1b14e35a34a64c246a54987d1328f9919fd15de24
SHA2565cb0fa493fcc111dd3fdf6f998144da0e52b0eb872e7f969a4505b71d2d1f464
SHA512c58d32673b225ceec1ad369aba6b5b715562bd1f490c63d07c0e188abb91ad5a0dcf967df58b6215770570088ed45029734f9420c55a6c4bae38e8901d7b6dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f593c221591b8b5f630ecf0592bd076
SHA123d9103b054a0b0bf1ed4307bc9d8843d8631aae
SHA2562a45e9c79521150a0a77ca7c3957176610c52974b202799c161166a20597332c
SHA512c53162bf30577b35359a8291dd1f723891afc9d05e9daf8f2b136aa603e4fa753ec30a56595b58c574185dca02b377665efb3e4d562b6fb4856e54b4eee4c586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453e464e2269f6ef5d7bf2423821d0ce
SHA1a7db2d55cded0bcfa66a4926932297455ffb6f2b
SHA25646916bde53212b74990b2533b8f8de88d153411c29cb4bcab23aa77b07057f12
SHA51223320e5ef5c64dd970fb272c5deaa7b32e39977e35c57d52d6cc111bb5e02b5772f594591be9ab699e57a7d52b7bc4bebc3713ff8b8ad1a7a67d6aa210b46d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9889a33e925472267d159cb7d5fa477
SHA1cd09806816ec63c3ffdf86606d8e5f88f848ed60
SHA256d2e5a1f2fd697e7b6bfb20305c9a033d3d0579691955b36de53241268bd6f525
SHA512dec0652b84ce6b2b34290d468e5b9101d4a8e5cbed3c7c48db8805ec47293009e6d04c0aa9d8924f5b56e64a971419def3df4714c6c97c0c183d1db6e00a8984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2c8edd5334b84d0bfa4152171d0c38
SHA1f55dd464e45c138d9dda980469eaa987aabe7585
SHA256b218e9fc347d243dfbd95390eea6f7a1f9679436edf31afa5cc4b81670c2ebf6
SHA512f282e2388b4e67744e06a7c1566d0b87b2368741a59e9b96247e48a69edfc8df95e097c5701e14dd2f0ea7499564f89db28ee2df7d8c6960af24823ded6c7f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe62719481ac2453c40b194e3318d666
SHA168ea0b55fb26376c38318fdadb718861d46579d9
SHA2564bb5476ae4749df811f70576ef9a4c38df5c15bf9e6875c53e61ce80f1288db7
SHA512d750cb9af53369ea5fa7f0f1a09ef2b5ab34cbab217c6e424dabb5509bfc786541123380969c74820f6fbffcc071eec1ccc5c8654582f49489a2dd723be8bdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561aaf019cff579b197e98cb4ea72b2d
SHA1d440a9811527faf4a449ac35251e546578d4dc36
SHA256c398bbf4505aabf32f37e8dc5b2292efbf337ac277377a61dc73158aca260e71
SHA512ad74d9ab2f41414c62a11b0e50374a2eaa55b8c14c1db5a78a54f5e5f38a54c105a8e5f56f3c2328e040eae22977e527dcea5c96262e04cf23e3a153ebae0f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd7219a1d563b5149be4dd3deb2eeb1
SHA179503b8ca6ca276ae46d4d9faba015b99249bec3
SHA256ba429f2a29e3af6ea21ab072198539456674f50e402e1699c51fa634ac863bec
SHA512df1a3336711219566c1ea06597172a5ff4cd7eb419b8b7d0d5ab6a9ed6ad90ef1760368e447b764e42cb376262a57339811bf53fc79b1403856000ccd83ed918
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b