Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
fdeffd0a348c526da61aba455eceb8a5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdeffd0a348c526da61aba455eceb8a5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdeffd0a348c526da61aba455eceb8a5_JaffaCakes118.html
-
Size
16KB
-
MD5
fdeffd0a348c526da61aba455eceb8a5
-
SHA1
59d435023742e5c012522e3ff3afaa3991ddbcd2
-
SHA256
5f74faf2698ba5977fa040cc2cbd9d703478264c48d2003a5c46a91ca1b79526
-
SHA512
a6d125bcf183dcd17db4ddf5f9a9baa58e3bc59ba9b2c3e15395bfcb8d95bcb1166f4f63b09d8e486d91f602317f2ef26a0c4c17ec0fd102f166e07e70480b5c
-
SSDEEP
384:5w9pUS9LLeZrQ1AJdw3XXW1aA9WeQGEBO:5gpUMLLeZiAJ8XY9WeqBO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000ce8ba1458c658c3994806c3874c9d05678c2b6791165e9605436e666dfd12263000000000e8000000002000020000000fe696e8904fb2846f0127baacee837cf6c854fd511df4a411d6d2e7a946aeff120000000f46b53898291c074ba69bed58ef01be7c3168cd734c79f128754d11c17ee55384000000055aa44ec91230a2e97f4836592728456fd8b3472b6a18ddb8777473091b734048d3ab6c683e114619aafaffb92247bb282c463f7bf06c2b49db03c6bed2fde89 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433751917" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C1F7FC1-7E29-11EF-A444-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105887f03512db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2408 2100 iexplore.exe 30 PID 2100 wrote to memory of 2408 2100 iexplore.exe 30 PID 2100 wrote to memory of 2408 2100 iexplore.exe 30 PID 2100 wrote to memory of 2408 2100 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdeffd0a348c526da61aba455eceb8a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55edd4e72a527ff43305f6d61f6a30724
SHA1aaa84b3efb16942e30d863ae0fd693d773840d23
SHA256860123b7a9b6d52060b25a2da3fea2890c3694eee5011e85e34c57ec497c5c90
SHA512e1a08873b25f8f8aa61ef9cc660e211776799cac9657e8f26cf4c74dba41ea6fd2f243774ab0e76e1d4bddca0c76a2dcc7e535ec192cc6c2303b8b29cf6040b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b43ed1c321f7bbf6a6f2fefb66b01d
SHA1fc8070d6cc7663a6e1697e96b7d77d55c9d3bdd3
SHA256aac5eb96d47fc1c7046d8b711da2f19638a6b8e0d04434135ff26740045da806
SHA5125081ce3eeeefc098caa0e7194ce5a85d01fe474a8d2093a21673b972005d99f4ae5dce52b92e806b84b16be5133216c55ace70ea9f5b915b7fd5442223b22499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9da73374eac68caa0d97f9401465022
SHA1cea652a2d12113c30f8425bf972481122eb60b3e
SHA25651fb74a690befc9906877585bff54a76bcac4750dc0f5b68d505a7e369c8f5b3
SHA512e936740efec586d3c34a39fee8bd4329fd59a9886a03bfc967cf85f6d756c3b8584bfac2c8052cf576c1053dab15a908d5f348cf74ed578f947a7bc10690e537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55221e1660397d085ef34e9f45fde9247
SHA1378d1ad35fe9023e5d0926b92a1ce6da2ca13cde
SHA2564d1bc7ab9153488f8a039c274193638a330c4fc249065e309c282469583166e1
SHA5127c3f42b249b71993af707e9fe8b7a1f841d8efa2d9ca70ef6591b0d5fe61639e0f06c49daea9b58b04c124a2bf12977395fc4536e182658c871c0a6ac7df5b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef453703be23ecc2edcc6c5a52584fce
SHA158bffd8e2c1d8f6d48cf3cf8760d31651365def9
SHA2565cb4f020f4cb309a5f02b6c678399eb0bea2ead92a2131a2a19566c56b380449
SHA5120aa38b1edb3c024eb572176091446e7bd3b2ca28dfaf72b71c473be6fdcb701a7d92cdaf131e99766ab1a6990e7aa26b715ff01858e5c7ae8d7beb90159b13d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530092bbfe592f56db953b4a309aad71d
SHA1c151e2d80ba3292039519195a5002622485ab1e1
SHA256060d3360410ebb2bc79935f9e15e08848c3e4c222a886b26ae234d172c658d64
SHA512bccb1b1c60d16e4f9e283ee37c2eaf1713daf0d00c6ba77994778ddbed7fc0f0015a1cc9cb5cd2486925147fdf40ab75680976ffe88e13ccccbcadc046d3f331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa371a296daa5d17b19feeffae82d913
SHA1f6bc1eae92dc9a5f3ea88ab96aebd0e9b9fdd106
SHA256037cbe382587e054ecaf79fc42caace615ae01431abfb6398f0a2a94bd451696
SHA512e67a0652b3d1f100e9b7010cb4f0c96ddce5d9cc59a8e106b35ad2c68d7e889eda7b805e46f1758c0502f84d9aa854b17ff25c9e622c8c43f98bf4c0ce7df3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc35fc9e21eeb93fce81d18bc6d4fa3a
SHA1103c7f5470b382da11e77fd1cc9aa4541dd7550c
SHA256943fd89cfbe061ac9e92081b3341592628c044af344d7adb707a84cfc5943928
SHA51250c5cfa8fb5f5ef4db9f72fcc7122c925b524f02d0a75c3d0610ea83ba01dbc47518c9c1be0b712e7848017696396d9d69ca5dec7602a7d4f4eee6982dacfb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb9fc300da1a7fb420bffd29c91348e
SHA14c0e2339088eac7c2792aa9d36ad1ed0c4593b0f
SHA256e673410201f13adcc5a7a0a67aa7f65b57aa7c4530a76c23e6b9f6f35c9b6130
SHA5124eac3c6109bc74bae84c12a68147d09e6068ef8f1bb9339e7caba1a3718ba44b6c606d4f702ecca5f99e36ac7ff0996f338e7caa49a9e5155a23dca2643f3a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc204a992be0829cd8c713ef88cc3b08
SHA1484157ab4010087802c4a91ec185c7fc07d07423
SHA25659f5c7adc1a8a7bf0536c84e06397f24c70fe31f63aa1dfc59a24b9ab8d4edae
SHA512bff1e973520765554431457a691e26bd5500d6134eeb21f152afba0046b5e0a49d8eaf47546df1905f03c0309b64e3fc844f015f770097798c6d3633c2c57a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105d603a9b32c986eda1060b652252f5
SHA17e72776cc7ab422632129d0e5adaddfd048c5e81
SHA256b3e00314c435edaba3a86b64a1e8e945fa29a00012cdec7be5b19691177bf8a7
SHA512eae1fffa64a713f342b70e6c6cafae5c74ff76d042556452ffd47e060148e930ed095b640f6a95e8227ae6d94b069394844ead85d824e80aad0b95ac73f49ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cfdba6d7b8cdf9b4dbcf8bb802675cc
SHA1f0b4560c1699cc9baec4e035ea0d63e49a959c7b
SHA256097b3ec7aed8f067fc59d9a7d6f3402e9f3abf001a8e6a36a25d63588cb552f3
SHA51203317f839e7767ddd2ec1144e08e716b6a4eb7e16cecf42efb9c968e8c304b5cd19b3468a47d76154aa9d78d25a5d9c20d6092dcff07d8589aff69bfdaa397fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78300e0c175169b1ffcb167b2c6cfef
SHA147afa89ade9d46be28245c72ffcfce69884ff07d
SHA256844c87d8b965c6b7e528c56157f692dfe92438c8ac3093b33db3c42127ddadc2
SHA51298e375a30cf09da1df0a4e78a62c8fcd544c5f2137b3cf05b855b3626aa6b4eabb6ad6fbc1d043b3cdf598686fb96a5a02876373fd106cb08aa0b3012ea1051d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aeca1981acb223bb8a33baf8dee5403
SHA13b3784e436707bd852f5d4c377d60d3ae2532c14
SHA256631143abe3d645af2bd7699c9916c4cbdcf692b14a78470429f38dd17a944c6d
SHA5127aa498457534643c8014465dfee544acb586e87dcfffc13805474c8c298695931ec15a059b43f27cf6d0ae19486e530ac78283a4a56806158018545a4bbe9b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb70239076074022082e73addac4d5c
SHA149529ac6a07626bacadd3dd6ba7a400597587b5a
SHA2568ef348d8efaec5a557185351a76eae59ba28d487a36535021f2449c56bd23b47
SHA512a1189121273c7e4c01361f69250e9b40220fb9fe0829898f5ad7d52a9b95911571739cbdcf23a10f0651ebe554bc19cd9421759ff45b579c61fc252471e22d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c952e21c9a874409343be8fe82ee8a
SHA144350c4cfa4cc1b0909ff98ce288a9a4cd9c5424
SHA2564f8412ed3653b63406bc8c35a76a3c0edaf86dfa5d0649004a4bcdb01c963d46
SHA5126b95d0cb978ceb4d864e6d408561fab9e6dedce326bbf36bbf2820bf6ab08ce3f8ec50763b1ea0a2d609b545bada6213d53cc17f4bbea7088a91a2e3abe68869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a9f68b27a4ba8848e1b37fd1b2c6d0
SHA1802c3c01d37148821962b4267f2e55158aac439d
SHA2561a5c234a0428b307ba4a680d5004042932cb354b2cbc3611abeebeadf6ed9344
SHA512bd73cddb65a303d105926daf4319e002809e2db42bbad155411f068a5b93d4c1fe66335235834a7ee0e16c3148115e7c96632fdc96b073aac819f1389697debe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5026cba06cc5961051114fb1f55379401
SHA1f1545ea6ca37f5f5d428d07b73e77183fb2d5d30
SHA256c4e61a7a5c586d11e3297bc98e5e62005277d8b938d0da25511ffc3db7491010
SHA51221b3435d39b67008b68f875329ec9b91ade8e32b5e4e07b8332957406cba8ae66793c94649be9af3f161f4317a3bde5e0039ed383a19004e6055516fabac9b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3968a161a093b6e2728c43396bf34e
SHA10e6ad4b75de43c685adbad67337ce542cb6784c7
SHA2564580a063f1221a3b146c152dd4f16e8f0fff1e251ec6f08f67c5c7f4e97e723a
SHA5127caf9e3b61b0aef6a319e95079ee9c98bfbd90fe024ad93ed0e426849a8cc1c15e80896a0fa94cbb37c62dc4c8b791f431ac6e34c42648c762c5bebc03ed4f7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b