Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
fdec4145627ece691c43db218e93709c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdec4145627ece691c43db218e93709c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdec4145627ece691c43db218e93709c_JaffaCakes118.html
-
Size
94KB
-
MD5
fdec4145627ece691c43db218e93709c
-
SHA1
04af0d9e30876b94e43de02f4f5c10f9f2c4c20a
-
SHA256
b8df2f068ff2919049c1d3224e76c16464ea334dbf56c2ae5fdf3fc4319aa2a2
-
SHA512
f541f146493470c6720e496d5b632306db4aaec646bb61971c397b5ff4c5a522521872b8a0cafa9732affba44fb8ca4e0fe8d06d6c7f83d3cdcbe4b1f88da3e0
-
SSDEEP
1536:WMLiNipvZbkL7LZgfoC/f68WFLCGy/fCDCZ8yLzBdkrY8mgHC+qpEyW:WAiWGoBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c6a755da402e5a954e588f4fec02fe24f16f35d07f670abef50cc3ef20c45076000000000e800000000200002000000044dde6a8466311b40262b29d8f6cd7a48ad3038595fa28af040de09744496bdd20000000803675d0637df3c752957a319f074cc2c09e48696a6624168614ad6d8cdb0bc24000000059c4a301d5714033b9c862afa9af00075034dc85bd150d4bf8a1d65eb127af9c6bf943ac65c2ecd4c3b89b278ca8fae83b8d0016782d1aa6dd549346e376d836 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c321f54ccd8bf6641219819516de7852a565cfbec497229fd8f9c336bc9692f9000000000e8000000002000020000000b0ebe873cf29174f65c87d74eca56ab5bcf47962c62f3ba0d912fe0f1469a11390000000685111aec303ba5a482327f68cae204d0cf9c4c80937df1b86f6dc57e5242bd824fed47dbad98f60518498b8e936780e47e1132735104946db412a561f65c5dbfcfae0dd802c0e1e0a29b909c138a59fbe10cc16901ea88b77291b08c0f7cbd2c959dfb359c01b6615d7a1e1e9deb63bcbbb7733b33a9683f42055c3ad300c79c6ba61b05140523ba1c4c49d581d031d4000000093f254f61d3bed4f001d181702e8cb1b14c8068f63696a09ede69a4e611325da6dde3f79539b049032f53b23410e382d2a8359f45bf554d7e24f9a21f9edaa0b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1EB5B11-7E27-11EF-9218-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433751339" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ca96983412db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2428 3044 iexplore.exe 29 PID 3044 wrote to memory of 2428 3044 iexplore.exe 29 PID 3044 wrote to memory of 2428 3044 iexplore.exe 29 PID 3044 wrote to memory of 2428 3044 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdec4145627ece691c43db218e93709c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eaaac45d1b2f0afc7deba095b55b27a
SHA1f9e3b3f6c57f1792ea0bc4f5592d7503935ccf9d
SHA256330db82beb64d5328ce95a391a3b7e1232899b5c02043a5fdc03bb4f4fb4c248
SHA512f25b2d9c1b5b12e94f5729bbb638bee81993667510d7c405eabcf194195f7f7d5f98acc409711de57a7ef91ddb0e187ae3e32b6cb25bf579f75c396942a551a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d374575610fc5bbc5d307c2458a578
SHA1df9dc42ef5854be304f9ae72db374145798bc50e
SHA2562ee44441c671386d9a2f7681b0153e66a53b1ec9324b9bfeb53446f94576df9b
SHA512c250d398ff78308653d5d0a197bcb31894e41be1a37c7978205a46fe2184c4ca6ebde939c7b787ae0361174161e8a53c5ace4313bd59851e8fa7c54c8ab8cb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19d7b7eb42d91f86e917565ec9162b6
SHA1149b2215cd9c93d3d31436aac9db9cb4f435cd11
SHA256d7769dd425696af763ce729d446c699865847ec2eb2cc1140e0e36df096a319a
SHA512b99f86ba42b5636c155e79958d4af1af45b0e0584e323b8d25ee716dcbe454a417312138d067c9ce075759968d985e71471768ef670a64c2a84503199d63b517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbe1a9104be70da2866772804d4a27d
SHA19c1b211161729d948254882d696e430338c2b5ec
SHA2568dbf26be272ea00e6d297b05c9ef782499b36a5dfe8a7abd84ae90d7007637b5
SHA512a12f5f2227199c318f26024b92e3efe067eb84665f85f4d68c676da52471050d85b12d3274ac30a7cba1a726bde8475b77f616a69af321346a7b7b6ec9181a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8bbf2a81c235a726137ab8e78242da
SHA10db8515f113db66664b213d3f7cc919c62fa586f
SHA25687a8f59fb2e397698b11cdc0cbde740b83327a2ea3a7fb3e663cd3c6d10a3500
SHA512b86eda635d22a299e05e1f9324c29d75edb1fadacbccc4a12403043eaf277c2acddda7008254ad47b8572cab4e1ace0a4a40dbdb52b24af68634c2987dc07043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515a699bdbf0be154ad45223b3a977f3
SHA145c29028d7d5fd81cfca2545666a07dc69bca16d
SHA2564827af1f03f694882f884d4869cfbcd6f8b8e1b549f82ee35f12eac89009d2ee
SHA512b7ccca1c0c0ca8bf282753304030abf55489048b86bffd45ecc25804f06a9fa95efb8b0062062ded300a0b37dcc65ba632e93e95f41e23563b19eaa61116a99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6106618a0684d3749fe4fd049beb04
SHA1e6319f19298d2b8f2cd835eabd7c6cc958010544
SHA2569958f4eb533e16c822ca48a6e48599f841b6aef816cb260a502305d51ac5dc1e
SHA51223fb4f5bf97cdc0632cd1381c5059c90542457e540d8310430c3cf27d5bb9d6c24823c064bc1e95c35b2e062a9131533dabb390f38218405dd6c76918ba822fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a1d841b35d9575107c32e0a3de11acd
SHA158a6caf5993d581eaa27f0d1b61733ebc8b271ae
SHA256e751301ce3498d299671f368e0bcf3778d365ff481b5fb2cf56aa8ddc437aaba
SHA5125b04cf9c4e3e2361d0c333ac909f1b3c4c7989e0c1e8ab54d3a63e606ba84cb3d8282fae3e6f4744f98fbe101f5aacdb844ba8aa5a32d36557b10b187eef0140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0bc2d814d55a31a4c805b77c52170b
SHA14a9b88d5bc5bd227511268f9773ddfcb1202d083
SHA25617cded9c499056a1eaa9b720f0313d0cbff71fd9d864772a5b6adcaa59ba339d
SHA512ae7ef1e1cb216a755ffdfed07c8221e0b45844227fac76681e87226524a65ca179f3d76a73ae6d65479c8bc39d2c2f3517f588531e17c59edb4f9af5ccfb818e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109f201e45c934a82a7d12c977aa3b78
SHA1b3345701eb4320433fbd1a8d49cac0b497819118
SHA256d6a3fac4d55deefc9a09255ada5290899785797e1ad2536c617ce6c84f1e0989
SHA51290f91af2f323fa293bfcfaa2f59df9e83ce20c9057f1eba7ddea3c974abc581728305e991cb9298c37ad447febb269e9e580312bc71a43bb73ea70e24d9596e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6a76377b89c37655e461f7afdc29c3
SHA176655978b3f0fe3a2d1451c4a31a63e27f09f1ce
SHA2567a773f4fe01eb05db5aef3f8739f0ad907516c02dd89a678e8965023aa2b652a
SHA51216c9063fe0e4e412192897496b5d91e5a69d6838da4ceaa48b5cc26394fe81cfbaae075a0d5f062189ea8232594937bd2c29afcd9a40874fcaf8566ac2af0d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc03b23dab02d48a8038e1a3cb855f0f
SHA133e2744219df5d9fa171e870e1bffe844752b479
SHA256a0cef6753ca991bb9efaca93e79b9148aaedee5086fa6a26cac61643b6604182
SHA512b84bb83c96200be9e3d909def609d30f81763bd094fc57144c6bd2b0c9bb80e9bea8fb051ffd50f75f67d8e3b9a353c48a9994459358a6f753eaaa1e8c278b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3c4a94604ae9a8f893e32640ca5547
SHA180a05e730929bfc7653e329fef603cc82bb4b7d7
SHA256c76dda45e28f8ab3608492ec86c5a4eaa7a196d4095bf9ca1185a375dd3fcf80
SHA512f46c182e4d5eb5c15db9fa174ab7819f17b6c41c80ab5cabc2eaacf84e01a6cd9477ec137d8dc9e3d8bda1c8d64ed8c5679424723d273acad5d8d2d57d1b2260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf602788ad56b4d3dcb49d3c8641a9a7
SHA12dc88dcd658122862972c731f2191bc67b71a00d
SHA2561261fed64fa429cd604b6be875d7767e829c9447ed0050201a980e4b35d7a5f9
SHA5124bc2a9f49461ba6a6a4553c50390dda5138b1128e33e0007b3c817ce3c8d47664f0a08b88eb23a13fdd87ca8b7c43343f3f23fce7a3b49a75bf9b2cbb500a889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c863600d2b34ff19263c7cbdb0c7ae93
SHA1cfb55e66769d8331b3b358b0d264950fb1d766f0
SHA2562e3fd6bc016b6740f4e82995fdeab6fc49ef0a542ca3989cb18dea17d27b7e8a
SHA512c5255beea17cf00f6f78ecccb91110f2acd7771a127fe5711c3dd2b300b06f15374bb2db5030917cd04186ba6e29c76218144b1f6dfae26c141d40d734c01a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be90a8212a12f6e1897e2f63617a1617
SHA182fc33686bf30f6c3b2ef2d906575c4ed323199e
SHA2567c9dceb6289e9a5db6597665771cb941d636ae92e18d37e94dd466d2bed90072
SHA512dbb6a2069ea221e79de6eee541fe4a3a33125aea7d3c44ba9a2f61c8d91b0e05e487bd095b6ae83684e54cc5a4ca66c9ca0213385e095aac9e4f55abf709074d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35e3b3ed610309fec600128ba65d9d9
SHA133ae17e7ca5581a375515865c72d92dd07d50459
SHA256efa605faa5005130c9b0bf74b47337c87b2e4909c01dad0a6675c5b2b32a6724
SHA5127990e247d80842a38b7f26da47dc6b06cb6afcb243f793f177cba04d0f021f3d340c42ae772b28889dbd0dd7f44d8405e28b25aea0206e457751e58c867ee788
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\jquery.ui.core.min[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b