Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
fe162eeb4353c273682ad626cf573192_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe162eeb4353c273682ad626cf573192_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe162eeb4353c273682ad626cf573192_JaffaCakes118.html
-
Size
27KB
-
MD5
fe162eeb4353c273682ad626cf573192
-
SHA1
1ba259f8717940e70d869171c2e21d75a732fe77
-
SHA256
8460ac8b6cafa77c6c98be781728ab74889de257443e330030b69ff9ad393c17
-
SHA512
13158836cf231bd80a8691d709d5b26b0eb5853041e96250cb2483d602bfb85c0d60715e346952c5bd8fc5ec48cc01339260e40c757704d686e09ecc02cff91e
-
SSDEEP
768:CLk9uIxTN+x0BNDhSBEldvtWhiBc2i11o:C49uax+xWSBElJt+iBP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000ac0d658f3082430051e53891fd4ae0b0d3652ba3a64608a847732f1d6b300c8a000000000e80000000020000200000002385106b81b8a03734bf7881b6e0d9fd7553cd909fab26656a1d1509488d2b6320000000a6bb0d915fc8e12c9b554526781240d805f7cf45ed0565832754e682b93c7ee340000000092cf28a038dd16d7c3dda476b124849bf24048121436d9a4736d8326ed512f02c02b0e80e12bef34f5ce44fa709f604c054760de19380e85936b32d56d94d8d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b8b1954412db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEE9B0F1-7E37-11EF-9E32-4A174794FC88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433758203" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2444 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1796 iexplore.exe 1796 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2444 1796 iexplore.exe 31 PID 1796 wrote to memory of 2444 1796 iexplore.exe 31 PID 1796 wrote to memory of 2444 1796 iexplore.exe 31 PID 1796 wrote to memory of 2444 1796 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe162eeb4353c273682ad626cf573192_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9d71f10a45e7ccdf812f00e99d193d
SHA17ad5612829670f6825134a4b5de1eed798147014
SHA25663901af91d5a8e23446ae0222041c21aad99c07d4077b4206c9f10b5e3a54ebf
SHA51243014a4b7abf640e761bc875d8c3008dabe899783bdc3d9945a63cdb47a54c8d7e354ab5259dceb2f6f0812dad5cd1e7747a46077e0c027e2ed6442e73514603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cef7afb98f160fe8ad473a05e5577d4
SHA10972c7fd08b47723f9ccfdee111e55f0761f58b8
SHA2568f4d2c61963ebcf5d5536b5bb2a70af433f7f296ede22205c5937f476d39839b
SHA512b6f593c6038ba867a136bdeafc113781e1817d29aef8046b3bf0b4bc08879bcd50150a62b77a32cee0fb32d8357cb13a384d2e9a09165bd98f0f69c136547267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b789dcdbc09b174fbae680c2b32cd805
SHA189e441c0a95f7b4798efa6718651ff538e7e99e7
SHA25687327b457d24535926220225fe5dc416ce29ea5f27d19c2078ca62fff758570b
SHA51239df4be0afe1306d050d8a8e0d4fdf69b970804a611f0e1a0a49b65763ea7cf56945d0be0cd2f16c80187de4cbd964d197d7bded535d77d9f834a30947cd28ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536fc23e999f9a2774c3663532f3c0793
SHA1faa36dc1bbde7549f0980c197b6401397ea3b7fa
SHA2569d7741cb2caf8da363e2e16068ba4236697370da7105aa9bd218266f53b4cad9
SHA512fef43d378ed9ea00adc0ce26b6b4c02c65e63b2708df4ce347fd99504162539fb93d83c7fa98668e629570e25d65c68c16a14bc2d6581756237203eb504c0335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bbf66608b475f200bb7084cff6fbff5
SHA120d23bf7620eb7c4f3f4dd1123d5d8c977910341
SHA256a4e674eaad243b9d5d2a51390c9fcf8f45e6afbd56c29c479fac09fab8b2a526
SHA5122cbb8bf41b444f8bc9b7f1cdbcb2a6266c39cd323698bbfd17765a91114895e6baf227f27bd113aa6f4ec952330d296f1d6505bc0c351f5ac8c2335bba8bb85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc731460375787538774555ade8c5851
SHA1a39673d3eab6c6cd9002caad58314e4be692294b
SHA256c6c2de16a2dee15e981a1f31ccfe7178c2f1418062c813f513faf86a0fe98225
SHA51292963354679fe36e3df52fd30aee6da8c9fcc1bca1fa8c2f58a51087f9af486ecacb655ce60aa66de389bb8a407d8fbfdc8b4cfbac01c890b7f0dc6b6b03e827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5091369c5a60bd2a1d23b30e7efbfcfc7
SHA1a1a429323347f20a52043ac1973ea5ba77a899a2
SHA256c562f53439116deff4664595bc4e80c0039386c45afd2a276bff4c87e8429f39
SHA512abc2435516d92d90b2e1ac2ad305dbe12f910e15dab174c4b232f52d0d05d210995ca2fbc30a2ef9431afd5390be95ae68df6cc90b2ca5b863e4703ab1cf95fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582921492317b2eded71136c5f56d6019
SHA1bd17b225fe1d8bd644fc1dc54a159f7c3740c36d
SHA25699b3e103e162551b47337526447fc65747e0b7199849820a216aa22264e0b927
SHA51274e0b3de7c4cefeb6cc2833b889fbcb8e5ba483ab1f0403379691fc76155de5a3daa3590ce78b335a0bf7421382af01b71c245a1769b33cd567c9db66bbf16f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89c290bb765b5f4fd05cf403d35866a
SHA152e8edb62e73554c38d7d075bbb7c6ea0d0dddd7
SHA256a79aa2c21651a7c9cc38845ebc754d92ac0659ca680d00614432b017ec69ac4d
SHA5124c594737eade8e95ff944dd97353b30f164188a747950273e9cfd53f59eb3ed874a447053edf712eb02d5d1de88484f48a604d300d2f0a80bab98dc9654d17ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525354c42886c1caad36b792260e73834
SHA1780cba06a1061996445b0bd76db09ef35a4a317f
SHA2563cb8ddf64c51729fb40f3bb573f91797e939de2e61368c1ced03ff7763b10646
SHA51299412f9648ef19dbaf935c3acedb0435f3ecfbc862ed2472041de36c659f8f0f9931ddf373b196f6e4b2ce1ed9fe3daade6e0db3e582ad4160ca5dd9fa02693b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566613333648051285b7023799517b30d
SHA11fdfb948085ae1bebc9dec74d074edd1949d7c63
SHA25679c6eaf52292c06ca01e740383a6a6f5a01b1b6af586fc86a931826563d49bb4
SHA5120d3d92558bcf0d2322384a56ce14bd3f1696b20a26883707da41c0c01e8bd1b65585ecb104e0571dbb20a888364f2d634de95645c928ea1e31d4d1197ad4ec12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570297267b15320fd4c762a692bcf69a0
SHA140122646a745324718b0a9066740948e8c5d63c4
SHA256f02ad09a89e9b0e3b1f2316128547f370af5c432df7c489b743e4cb0dd67878e
SHA5124213b649cb93be1e641e3d2c244b9458de9ab4636dd4abac889d3f9d8336d142242d788547b550a6cc9bd662f84da8ad84ab86e92b66e55664564eecbcdf250a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a48a4fb11ec90f240afdbde1f46d01bf
SHA170c1741c8bc3d17aac331deafdfc5021911b2875
SHA256f678241494672ec7f4b5b5e885de78be51ffdb61439fd63dd3b5f611fb51802e
SHA5122a99d716afa351d67def42b088e3369c94a918f042f88181c6fb7cb1b520a36b449f98d397998c3942ef226cf3204207a022a8bae3185cfed3122d0da7549e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50287651585d67e281943c548098ee49c
SHA110be284273dbed01c9cead0c39a83f7bb0899586
SHA256f306b63b5bf6b2936c173254fc9b48a1f4fb63d3b7970008b462358e6fc1c4da
SHA5127e92f8920d94205d78bd5a5c78613a9442452ac86a95b950ea9b5a5d7312d6a37767d31b65cb39a41f0d7384c2280ec176934c3d3b4c2b3344255122f920c1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10a4be74751470a56d6ae67a6c3c62c
SHA1928a9361f7132b61c1577bc5a634e19c61c21298
SHA256bfa51fb6461eb67402690eae7de08189374e82e5c673fab7ed3cbc6427e03c41
SHA51279c06b73a779fd4e0ac222108a83e0237fc4abd4f960fb7ecc9778d8400637ff5c817aea92ed2f7036e969f076ed86ea1b6a3e5337efacd2850da29725ad7feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e735a30cce4daa9adf6f4b0b3e824b17
SHA1f7654212d2b611032652c082df6922d15cbe3bb1
SHA256ea1567f998d20850666b5ba62dd8790bfb77bc0dbe992f076679580c3ce864d6
SHA512901eed7dcb65c6cf359316a83ea56dad76be5c1a1e47f2b96465decab7350211598823dfbc1010b73acb302ec75d0f7e8d93204bf960e03940e9833fba5415e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6be63ae80db225d945bc59a693e9698
SHA1d9f0ce9a1cdd690ed119686458fd73931b8c1535
SHA256fcf448067da525967e9a0566730a1c027f75b818bde47cfef838515e42f18eb1
SHA5122eb382df98005be17ca8de31d66e025507fb318ebf6b533e06f66a45b5c2b8e08eaf3a7cb9ea17d1c0c3d003bd6dbda39e8ae320cba16a9bf4d8e055efa36920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dbeda37375616a52051c1e0476d6b45
SHA1c6138a22db5377780c1ee3c74a6f415ebcdc018c
SHA256ffb85421c72c5ad6da0abc4e20071ba9aef31b1e469851fe068191d29b89a676
SHA512f66ca37644e38b4ab6352a12bfcb5ef35154923688ac6ff79dcd668bbf2993928226916a8565a4c7f19a97ce81696a2162bdd7533cbc2fa41aa800960bc880b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da04410378f744f366a457fc2701fe7a
SHA17736a3bc8bb395f697feb1ed8bc8537c8656a598
SHA256902eb26196be7f4c8883025f47e2240e6c9a7c9b90df9ea596b05f8f9cc34f5c
SHA512445447d259208e2c2f52cabd804574a91e56ed7fa55472298147574c2fed8befe0c357e744049f0e689bd49868c4b847147456e86930a124e63990f4e78314e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d55dd073615524f1ba299c729964384
SHA1c40386249dc17c973d5ed2762b4c0ad4249cf80f
SHA2567f0d2946490563737c53b44389d0cbdc23b86cb0aadca95e457165e2540bf16c
SHA51208a6315d14341b6c2a448665bb7a4b1ba84af457f9b9f5f783d36d5ae1b1f1ad48e5900253fdad91bc97a7f6cf8113d787fb4fb9e0ed2e744443ccdaf0e93535
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b