Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
fe2305c53443be7e126155264bdf556d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe2305c53443be7e126155264bdf556d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe2305c53443be7e126155264bdf556d_JaffaCakes118.html
-
Size
461KB
-
MD5
fe2305c53443be7e126155264bdf556d
-
SHA1
ede9eddb179f34cc0c6a75b047d8efc617579330
-
SHA256
30abf352bfa22659f989a466bccbd2ca1c3cec82c73c62154cf6ea61da1452c7
-
SHA512
2c87c67899345be0aba6600338de7c35aa71230dfb60e9c1a4ddac7e5916ef17f59e52ac7379834762f422566e2ac99ffb44a6ba16d796ea034afc6c7ca92934
-
SSDEEP
6144:SasMYod+X3oI+YpsMYod+X3oI+YwsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X375d+X3M5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908007874912db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000b90b2a107e2c8858249d5048e12ddd392a47cab5e54ebca01752abce791efa3c000000000e8000000002000020000000b87d156fb4a8336d2705911bc0a07d573d8c68837d7bb33b3d0ca6f6ff5c696f20000000e7881d3135aede50993bcb5b2767a90129aba4a294e876e9e9112a7bb06f7f4840000000b68c190f93257e34bec571133bdc77c9b129a95bbd076b36a1c7b746cf6f4c9fee49e3ed7f611bb3d19c38f952068a48ade3c0f0a813df753a4111c5b344d3d4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433760324" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE805C01-7E3C-11EF-848B-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2704 2968 iexplore.exe 30 PID 2968 wrote to memory of 2704 2968 iexplore.exe 30 PID 2968 wrote to memory of 2704 2968 iexplore.exe 30 PID 2968 wrote to memory of 2704 2968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe2305c53443be7e126155264bdf556d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f58d6be129ec5c3805ea21169c875c
SHA14fc5b412648fe9ec451a37aa9862d6dc9fe7f733
SHA256b38d00c6e7ea63a6baf5b1084398798752ab459b3ba872994fd7c3400e24c90a
SHA51243570f093c6139c47fcc4ff98f16b061b2ac6880d1466e2779c8cf84001e6177f795c3eceffe508f531e43409aaa06979afe65724b45fe79cd081c757d4374a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54706de833e79c550f8954a0b0b611879
SHA1b33b649f27f079b30217c4964d0e8f08452b9546
SHA2568ccaf9f6f876d5b41c248750ac946591210d36a6269cc630de79ee7d267f4099
SHA512f82c3ef111853cfc6625eb2d4e20f11725a31aad3812143666898a555479228e8522e3b469a71e5d90a45d4a10017e92dfe3e7700a1151f1170fec265e17135f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b9796579b0e127319790c645179e61
SHA1798bb74d0f16863dac9527a2f2bd89a31032e5de
SHA256d3b30e7025c586b4d07e3e10d9385d092cf706623da0d69275068963ac13962b
SHA5121742486d9da6237c8ee05182d4d6ec69d6c5924ada445aa73c146359bdef2bb5e28c9e5fae74a242b0f9649d3a5793fc234d03b56c916a088bb4d443e02eaa02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a831af3a8ca78c9523c399fce1df706
SHA142b05a3c2ff104be2707391aebf539fb38fd1501
SHA25638bdf0d81ebc8182fbbab1cfa771beb39a737e74527f043b51663bd4b2ffc5f9
SHA51294cf7baa8b365436042fe1f6ba917c6b3a76370d0cd3a9d299c4662898acc4734468820625e15385f44c50ab72bf69b667004122777dc1c76ec553b2bd27accd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326f14fee5268e120cf625b0bbfb0ce7
SHA1a8600db43581fbadadffe754a1f8e83e741bf79c
SHA256d253301f7bbc6886ef4cd7025520796dedc6b31bb126e1c4e9b58f029cab8526
SHA512d0d474df6c30253aef7063f23510060d9b1d1c3453a44c916fb4d1bcf255701b1ee3835fff9a1da6854128cc4ddfac6feabdda732bcce80b0825e1d1b8868179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e21c120f558e5eef5e8e031b64456c6
SHA17e37dea5f7fa2059de4bb1f955b8f4049ea4b2a8
SHA2562ffe382f7ca91a51616c36deabbb12c76bf509bb26352956f44c0bcfaa40cd8f
SHA512a6e2572fb1d9d7ed564fdbffc877ae75c8532d470176d47754b94cbfc33c8049ae6f42eb923fed413667f345d65389bc3cfea76ae0db39791e1797d26daf0ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562eac54947cec07168a3deb3e6094877
SHA164d9bf81d594b1534951335a7e6b83f64a837f95
SHA2560b4204d12a46f7c7dee1f1cdb5ab95e8402b876415c9502ac39208315de4e101
SHA5122887b8414bc252009d4ada09dd4877febe2e19d94d562c3f8497a21e0f55553cdeff8625853d20633e2be1ed3867b9eb296fa541f8519030d119a92a40611b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540fecc2e5679c65de70f4d4bbc9762f4
SHA165349603fe92a0144560c66fe74c8c3c770d9a1d
SHA256079bf3596d8fd725441eff7b9726854a52673f9846154a4c20802cf6a20d0dbe
SHA5127dc37abbe40539e3df194bb00c08374ccec2f21373021e22a7a03acefd840af19cdd3b00f4630af6652e7b6bc82170c21b3c858a5b4bc14066b67d425ecf1436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae34eabb828989d809c740f2dad710b
SHA177b0a2274ad819e931ccfd93596b788aa1bc8333
SHA2566f344857bc4bd157b03d2a183b09e6e3147b551802d646fdcc0b74bc7d6b5927
SHA5120346ce43159f5a337f0985cc7f8857a08519a5c69a6b09147d9f439220a2a71a3c0ba48628fe5409f18551769f316d790e75c728b2a8ce33e9a7b176b7013516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516eea6f999d0c0cbaf11b378f0f7b9f4
SHA1b3096f9241849211b489f17c98d5d6383a71d70a
SHA256c5e566bb95d9af62d48bda1a94dae08e14b0e123ec306337ea1b22443747f45a
SHA51202aba8acafd82aa7bc1b9d66a0a97229fdfa6e1d3f853d66a9a42cb36b48805b7dc297c9b1ba90d4a3855d106cd344e5b8e6b3bdfbf2e8466833968f16749d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad85935c8c1ce2288aee14e3cc0e52c
SHA12f18563fe4a6c56947ddc588134a1681cf66df45
SHA2569bc0d6872c0f868893d8c494523dc89e63012e287cd4a1037c8d578ae0f9162c
SHA512d22d568d1e93f5d951334ddd41bd7b6a3a2815844524f5c45f4ae0ebb619ba7109152771b9fa9b57467103a4bfb4d2b37ed0fe88fbffdbb5f2b07a812407997e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403ebffc789f073680d991e1405b9053
SHA156c0b0c8d53941656b100d4f6c80257641fc6fe0
SHA256f44dbd7de7f56cda928fa10f7ea75e02b7ebb0cc7fbfa3ba7bde32aa8d31a5c1
SHA512ff9aced4cc980e42bf7d09cd2c7dfee85c0c621e090c67ec51eedd96681e04961232be209035878f3b7ae08cdf960d74565f6aaf8b7231d5b3819a6bdecb4603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5468e2bbe0f503425f62d982dc9c17e7e
SHA13466cda56f58b1f81a0ddc7c6a27c58d33d49244
SHA256474d41c7a41bc01e31a8d46d3a3a2a7d636726b985b0cfa40ce5e5698ea1b4d5
SHA512cf24d81b2ff57a5a60d0e13cba23323d8bc4db66cd16846aaf4a5c96d921097ceeaf15421c78ea50513f69c21d9c2bbc3e3c8d503ea651d820ea6fea71952389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a5341590edfbcbe7b89cf40abe4711
SHA1679252aaf96ce3d3d9d765fdfd1e8419f99f456f
SHA2563b729e51b696e2fb7a4a1b00a303d05689820b4d50ae51310652d1f8ebab3659
SHA5125290e9363d6b9acb65af275fbadf0fc1d01a552ad11aa108e95fe0190d9467d7db7a7fcc2463084009a03a608935ee50bfa45b164f607edd5e843b0bec223c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b82c8f1a40b86cfc975b60caf7d433
SHA1382ddedd180ce1ea525c41f1df65d5438b11844c
SHA2565a53b47461e851dc9023b8cc5da17fa9f354a14499e6dca9d858a4cfef28a150
SHA51209eea2dbc91ea30e536fac5e7122eb82b34c8cdc9184ba295c29ec0cd1adf40f6f887753286bcb4ad4b187a8397174fd0c5ea73aa311eeb461efe028fbf46d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de64066054dc10826d70afcc94d4791
SHA152410ef6df6a91f8656e5de38fcf5dad490a7a5c
SHA256d1fc843e99f819385906764b4c8c6243c71964b170265a986aaa3e742691e3e9
SHA512b6cb8f15f4f61fad0bf54c90d9e1a1df964315364cb326217b27ce222358e490664e9dd1d85da7c3b72131e9cbb854daa746aeedff21d277978fb1cbaae51630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d437683b880851c0b892ebac2ffb5a04
SHA1a08c86228ef91c5593491535c2e76622a5bdc4e5
SHA256454504384694a372f6a8b47c3d30da4be1b3086ce5d8337a10415bdffd12d378
SHA5127c48b5fdcf6f89e5e25a57059685a7cdcfb6a13967abf945e6d0baf805c1efbf727d096f22f5c77d9a437f9bc5a75a8094d0f7b8f302a5b40322320c526c9be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598667ffefa293e6f9ab9d31e568f9a39
SHA168cbeb7834a3b919895048a0dbeefb366a710db3
SHA256e13f39fb307c7d3f5f8aa7218c8d5198fa62a676af95a103480d37a2d5b6b39d
SHA512b0d877470de71d27e57fadb70028d7ee35f3534b7d6c77925f4f8cadab6142ca2b8f6d61754e13428fac1e52cca3d9b568bb6261463047e762b26f0df65d9fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8156d59ee203317f54d312022379b22
SHA18613e6fcd560e8947b2bd7a11e3cf332632de7e9
SHA25694309b3b9aee77a13040401440ad2bf4b37fb78f7e22c72dec1805e36a7908a9
SHA512bbaa0758b09f06bbb0e7680207e32120753d34af586f4215ad34b67a27cadcd89a670d5eb821d9de8bab2ab7eb549cae8f27524bf31d32acf3baea8567a46efd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b