Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 07:19
Static task
static1
Behavioral task
behavioral1
Sample
fe0aa565393502a13f0549a7780d89e5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe0aa565393502a13f0549a7780d89e5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe0aa565393502a13f0549a7780d89e5_JaffaCakes118.html
-
Size
29KB
-
MD5
fe0aa565393502a13f0549a7780d89e5
-
SHA1
4da6c5d2127bcefc67c794cc853287529b735878
-
SHA256
9ccbb3963d34ebc8e24e47acbef57654df31ac8c7568ebadd2ae0866339381a1
-
SHA512
4c9ed5c81a32dd2fcfbef578b6726fd6eb2d8918c89a991dccf649785ca7a0a6f73d960553c1376626bbdb4377a6235893e22f309d15c991302f172ec3bc7beb
-
SSDEEP
192:uWXV7b5nFnQjxn5Q/2nQieVNnXnQOkEntm8nQTbnZnQXMC6/AWa8SRUQY7JtakJf:OQ/FQ/ravRdGaHQ1OEl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433756215" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000001629afca9c21f09d886d7ce8d62d8b8e591e8f68323e78a8f17306dfcd7ae2ab000000000e80000000020000200000009d3cb18e19264e2aac2cbc847c056bf478cc8c7f8ffd074905d3d8c66e31576820000000f59669f710129c1e8219fcf2b4398e920e0713a790fa662080af61b4da712172400000007b6b2ed4fe8008c43a883a7a5f4f1afff235fbdcd49652ada7ea0577b9dada4b0020bd010d6b147323da9eafe3071f685ba53edaa5de4f7b321ff9e02556e4cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D60C601-7E33-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802804f23f12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2768 2748 iexplore.exe 30 PID 2748 wrote to memory of 2768 2748 iexplore.exe 30 PID 2748 wrote to memory of 2768 2748 iexplore.exe 30 PID 2748 wrote to memory of 2768 2748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe0aa565393502a13f0549a7780d89e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf241a6807f60efec01297f449a8c423
SHA14fa7bc0bc263812a5f579527b6c21520bbeb0717
SHA256ef86239ff7a0cb0361e037e15b8364800c497a771a0b073cf9bc10e733e76d26
SHA51200b6caa807af3f32c26445c74f4a03f1ed43a7a11020f9870595ad9bfb153e5414b3ab7e4052e6033b092d74b71e97832bed65a5f50ae2031dd72cec033cb4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52cce0d44e2f618ea7f577eca56cb83
SHA15f7392048314fb03ac25f0f04889db474cd8543f
SHA256b68406cab6cec875825d9daa59d221096b8f2f02dc4135855b2c8388237a816f
SHA512b2056bed0628761f2cdf44c511f9dc39c1d4b50ec7287e61f2e93ce100bc8aee2d477b24b74564a45e03c3ae3221ea9b1789750a983a4d2de71fedeca0fec618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f70fb14f8478390762f1ec36859564
SHA1ec0a24f18c5ed5503e40c44982109b7afa9e028e
SHA25681883755b2e016624582cc5e0cf3abf94117aa23022e7a06f842ac244d50f95b
SHA51262f9a82167c018033960aa8bff37476735744f76c862b33ef13c652d6a90546f6b08948111591bd4c26dd8078eab3512cac817db6a33d2a0fb5a6f7c5901d899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556eee65d0af9bc0a03c6b9f7a8030415
SHA189a910da520cf1349dcb74f4308be2070bc41f82
SHA25626f0ced4c733bbf9597db1984718c7e621b3eb3f48dd325d1e0a0727ae5f79e4
SHA5129ea2b46940d75168237c46c462c718d17109070c39d44447ca892094812d391409471de89f148b2517fcd9250f1ea0c509a0140beca270b1a99a5a38655a8115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67f04dcb17953c3ba13737b01f57989
SHA12c332d143081a380540dbce65d28121f751a41a2
SHA256dc931df6d3f7c2da2f6c151f61c493ffb5555ccb344076c4d3734c7c6d1ec9cb
SHA51293c9052444cc9f1d7217aa2cb9b83867414824ef82dbeddd972e896a0236ca0130217fbf1f22f624176fcdcf85ce29e2e722e679757e4e351a2f668deca44036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb2c146b13e3bad459e703571e6e5b2
SHA172a80a2f0fefa6e6619d982c571689639ae3254a
SHA256911f6bcca3c7698b55fa4e36e24ba505078deaef0e9a736d2792a0d89483161b
SHA512179a7ec2831916b7caddf0ca470bf8e1db14f7d35c993c6d5b411b45d8bff234dd6156122774a0b93213f4ba78a2125c07f983070c7863b849837eba81fb9085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c33dc91187c9612f336fb15abeec6fa
SHA12434469659417b1ecb135196c6281eea811dc95d
SHA25655ebe113dfe226388b5abe0463d195cd95ef3e025e36d34a6fcca9f7b6cfeac0
SHA5125f142ffe10da6a7856672b671c83a985d9f8976ab4f93c7edd926b9971cf17ee6f7e24f8df8834d423e6517f1f7af9405ec9ff84f569bb283761fe1c41a49fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec5fe5b2beeedc6a778fbf5b84dc227
SHA1cb3ad3590d4b1ef2a77c59a7a5235dcacc5197cc
SHA256389853613796c37efa9ac224c3318fe074a56dd75694ecad6d5b1e6e5c3c039c
SHA5124309454504013ae539b91563c8d77a9e061996d6822fc5460e9f6adfc3c99cf9a3fa9ac5101d7ae0f5bc1cc6259ca7925412713acaff9f93fd502475245613bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587417d61e192384b1c7553aa1c2d44d4
SHA19065607a1863e3ca45543c3340df0f83b06f7ec1
SHA25634c3da5156fbaf740f950ee7d7362fe735a7c347b58844351e7389991f7e7d89
SHA512bd6cea09e55e81ac28ea55b108c051ade0737dab92025f1d8d220ed5d4ed769bd33448528029bc0481d177f1094413d6dd16714860a984c379df379c7c67dd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e41216fcaba91963b4121498f87e2d9
SHA10f6ab36c9e24e1109faa5add1f11f6ad781676bb
SHA2567b79734c7085bbad69389052cbf4c235cdfde97447df443bdc23749421edd051
SHA5121068e4903c9f46d3d912daa69ad2ac2e2525bfa92fc5dfb83c3c8a92bac2443fbb14b6fe29f097d010169e56be82106f974e62189e4623a5534e2feed6975b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb3ff90b7be5cea139779fdda3b247a
SHA15b6fa200c6f15707fe5d405dc1f730805c719ebe
SHA256b705358e502626e1c28fe453b07f7b51c229461197d70705ebb7d6a9a95dd88e
SHA51294fba2ecafd92716c7e7548d3961bb5fa2f3a3d9c1c8bfcdb5a5646bf4ae7442c80a8f6417ed6bdcc6bd70efc43d2e9b1acfcf0adee034439971fcbc2f86471c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d701013e09b2954664bec104ece427
SHA1cda8241fa2052dcd1838b50f4995e202c0d8a5d8
SHA256fc85dafe23dfe85e075f933dd7cabae8418b854b3096c26afe66959784f140e6
SHA512769083599957489504e43e474f3cfa3159d60edafce897e928ef871d704f9a7396d7366467c36bdd88135e174063e366bda46de6251bf0471da93623457446d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6c9290a92c916e092be89fc39faa3e
SHA1cda175a614e82a82c4f0aeaab1161111970c26ba
SHA256d9d9b41e72bd4ba3cd37e25af9e042c63799b22c27230d6e6fca005fc5e02f75
SHA5125e6ea8ada818bb2aa13a39eecdde580f2e0c63f454fc522f59e44b5f8c283b137c090d4b81143e42dd72d89f6cff8737d9a39442c9441c47f760307b0ec4ee45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5935e703e733df2dcc630c8d380502c51
SHA1574d5b4707f4ad1200f55b4091e90c8e17c2a371
SHA256b73c1780fdb255a435dc5b8e9ecf42aba0361b3a4e180f674e6e5a02994e9448
SHA512882d693ea57ff8bafccb33e00b43f3f588fc5adbfe039952d942d30464cb2ff356c5c35c805dbee273b819a489cfd2eb587d4f97ac41bc121d0d73ccdf7ef192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af051d67f17428ab37026d70c8179f6
SHA1320ea2df85f64e96ee36214c1753a0890cda1a4c
SHA25653c4b3562edcafb1dcd9fd591f48315b3586d64896a047f8e8602dcacc8d741e
SHA512bd2125348b91cfd382c21a35219640d857adab6ce5c0180e99a44281d453213b44c0dca9aa64641e954fd93b6bd6505b791d3f98e38994e228ec64b3ebe0fc3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e31dce209904cb6db5b4d8fbc1760ef
SHA15ae40ac5ff21c7303462fc211dfedcd8741f069e
SHA256fa59da835d649b8eb0cc92788d1e6640a4fa9635f15bc9836ea497881d07ce91
SHA5128a1a04a1388b47fdc53883996c3637225a3334fb6ec69a50428d221a8f41a3ce32b615d58ee34419d11a864e58e011bcb26efbde257c8ad60b0c0baea9a9f517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eafc39a4c382dd84e721fa68075af35
SHA11e8a2cc3a490a370e945700f0add644559d9b45a
SHA25668c6c4b62f4f62060b2e0d83b57a747b3c9e6820be5951ddeac5f2cfcb2196bc
SHA512cb3636d94ad85693762a4b0d436e03a8e3d95c56536bd09540cbeb62b376a88fe36df763192a7460295684233ac568067f4f5f647de736fc2475bb445abaefdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54793c28154f09e9232bfc3f4d003254a
SHA1a85ee113616068659fce1c18c77001217e600087
SHA2566debe15f96c5fc4424ea8e80c4c2607c88c738897d4ecd9e77061f9b5e10a3cc
SHA512c5b840ef062fad6f48ff1a85aec5b0589bff5e5ba73ba2b548905c7cd1b35d590b00854e9a623d2adb7c0877ca77eadb06e4be7378faa39d35e4d9e3953b024d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b