Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
fe23101a42e9877940a9be2e07071fa9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe23101a42e9877940a9be2e07071fa9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe23101a42e9877940a9be2e07071fa9_JaffaCakes118.html
-
Size
2KB
-
MD5
fe23101a42e9877940a9be2e07071fa9
-
SHA1
1d01844f0c90accc64032bb263eedf5a4b6ca185
-
SHA256
5e7adbf682124511b9545f3390660db230649fdd247212d7f253ceb02415d4a3
-
SHA512
33f61cb731064fffb5cc736aa6005f59c2fcd9e709967e14344377ec862bfa01dd78f24cd6ce7b3372f55a4ebe8f9953aebbbe83f215e0e71722f833a37d0b4b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505de4854912db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002a32924711dae8d1919177584141daae0de54c361dbde021286e9c32a90a220c000000000e8000000002000020000000c9bd84e6725a4c6eb7c533194e6105b6adaece3bf74f9197bc622723a5dd20352000000062f672aa89f1ead83584bb7eb66dbccf3712192abc631ec2c59a48be3cbb26d34000000049d5deb7c496f25fa70a891d1e2a1ee4fb77b434d0ff52ba2446cbc5a441003ac45b4aa8e6a6eceac38f07789cf438444469358146d2b1dc54232fa9efe9b924 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFBA6A71-7E3C-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433760325" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2356 2516 iexplore.exe 31 PID 2516 wrote to memory of 2356 2516 iexplore.exe 31 PID 2516 wrote to memory of 2356 2516 iexplore.exe 31 PID 2516 wrote to memory of 2356 2516 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe23101a42e9877940a9be2e07071fa9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52427ba11d4fc474a197a50e9b352e724
SHA1177d80d5cdec1669090abcfd6e35854a7f4cd771
SHA256102b2ec78b0e769e6a3e5a0f4d988e573c32fb1a174ad9a8a5a5b68d5bdbc799
SHA5126888296f1ccb7179c30262e62f8fa655efa1d61173e398d5e101f52b68d43f5a752281fef69a86a9babc6f93bf1cf6a49a23d53b19d4eced8f06cf854919737e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e0d3572d260ba038f6fe16b44de9eb
SHA1f504142e5108d98b685b0fe6a0af1d42d42d6f45
SHA256df7f294d39484dd8decb1ab4acc232bc810d99378c260d76ebbef63fb66f9e24
SHA51240d13e441fae8f9dddcac030869dff712596cfe2c41b4c740f4d35c287aa4fc6891d30e6e0b4b6feb38572cd7c940b0f8abcd998509dd224ebf87411bc8ac5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d7e10fc5e28c746e718c9fd64a1fab5
SHA1c22abe40a04f2ffa358dbf5ba85793438d44d177
SHA25659958cea99bc663c8e425215cf1f1a350b4c29a8dd2369ff8f1bb0567e8f03ea
SHA512a29493974faacbf362d93ed2ab30318627461f5136c0444e5385cfab6ec1b39fbcc5a14ffee561f74a9727acfb397bd75b9c74846beb1d138c6b6114428c460b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b5743d5b20693a50b8d7ccad7af543
SHA15de19f33b9005644513c8393d9ea046e43d30cb0
SHA256adbe857d4b5e650f9886b0f916559867cb06fc0abad875ec6621fe4ff675ad77
SHA5126665bf2cd91e0bb7f7726f3e4a9309c54c37dd51b3c513255e79587912a2d4cf0af2f76259468b80f689fc13c111f51c56d63d472650d18dbdfcb7833ae8cf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743001eaa8f48cc3175fd682706462a0
SHA15170eff642d993870c74b1f58d852116f03cf9f6
SHA2569051f7cbf64e7d692c1cf7a2d28417d8f0d0766a30b6b167fe2204725890d374
SHA512ca826d906b7500c6b699e25cd627edf9ba20a113abdabc2f32a9eb74f43f3f6570b884227557def99082743647abbc2831bc1a07b1ccc8564840c53e944d534b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec6cc44431088889318ac6a9aa48cd2
SHA1dde375ad82058d2a4f3faa1fea3b444071a43806
SHA2565f088e1289808d84382f5f745311ff3c69fff18e0dba3d587f2f22f246a06428
SHA512e3839ab690289999abcd0a8711de2a3097c2e3fa1610fc8f09544315ab5f1db64a153784ec2f483e90ef929c176fcabc4abf1adf76fba60d7fa598d7f3c5f35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273abf60db5cf2e198917740388d5228
SHA163b39628429708b01159502fa04d11083f34f447
SHA256a6542daa97dd644059fd0ced55a70e70de9924013c3e8b18df174303ee8b906d
SHA51244a3da7abc7c485a20fb007ecf4db837d4d4947b575633bf0ddd51394874ff2e4b95d0d464d20cfe0e5535cbc1c76e3ff47da9dba0ed741720f8b9c8fe742926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f504293ad167919e0e9049819de666a9
SHA1b3961e620f4e10144bb3643aaa710ec1fc4672e1
SHA25637493266a9dd4682d4e56a65d8a40d080ef2d94d0f36497a0de6807c6ffaa9ee
SHA5127344e87e4c65602d24762c90af784607edf466953c2ffe0ff2a82e2a802abe4a03d9510ada7f28041c189885f7747da9ce871e720ada6745d6694368d93da0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55725be760a9a44547bcdb770039b6997
SHA186c95498ee269e56785841392201c2fc7481e5ab
SHA2565e3ef0000720b142f6d2843ee233fe96e78521fbefeb2a65d8a5aaf055bbc70c
SHA512cb98ebee90a148110da4a6a585f2bb6e6e2d80728df6bcb24f9693d01e38136606b5582ada671e3ee37cbcb210d4f95a7ea5e79a1eafcb684a0c2e263f2e74e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58590394ffc9da039f250951cb4770dc4
SHA15d64544ad9915c01efe367c51d1b1c5825bb4933
SHA2569b4c41d2445c81932a0160923c413b55ed284d0358f3693c01070b1f13bda211
SHA51281d7ca4974a41d92346711037698ce4f0853a921508ed49a3e53b25f4eb9b760b49da1f688f558b356760b6242d7974d0420336d4b9c9f114370f2b48eb782b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992852ac3e32c7aa363f5ec31016ebab
SHA19e77071f65f1a330c9df980ad5283f5032c5863a
SHA25684787f2e2eca514a4252846587e44b2c8c8b27172dc3dbfb5e6a943e2488f19b
SHA512ebc833c525951005f4f15038e441196cbb6e0c3d053fc862d3eb564f7064902f4db9b11d9f387497311af26de6d8eeba9c18c5b10b364b213d84f0b476cc204c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad1c9dc489af47ee612fdd6f9c5c995
SHA10280053d6d24ca0a17911f7037dd18ab5b15edb7
SHA256f21dcefa21440995731c2cb9d47ef6c6954e2a5d77daa048e05f85e6a363407e
SHA51208329fe887fc1d8a07d9b1d7062409318afe4e341fd22aff7b41e680d63377763876448c05a791ea7fd800ff0903811b26228a3896710c6fb077a8892f5eb2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591551b5ae71167133f02923c40b7944d
SHA1787dbe3d856aa72932760032ce890f7db60b4747
SHA2567a03b4ecf43be073231145fcf8d3b08408e2980ea15c94ed43c840d248b25369
SHA5127a8006682e49ab09de2971e798e061bfbe6c18d0e35894c7d1946e4196e944a401fc918dd4a0951e3d4e20eab334224f93260ae68ae1945aed7627c8dde84503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2869a6f9a3656fd9801a015f2bc8b5a
SHA16e001fa2078b4c8f9369e1a328589f217ff088fa
SHA256f791968cf85f5d04d1197107b5536596f5962187ac9447b16a27b98c7771b969
SHA512fc9eebde17a61cd99bc7cd0b3e4c6de7d84ded93548193ac57f80328429295593bd8d57439792bfa13265403fe2dd85470a214668bcb26870f13e6778dd4d71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8437d4a987e8810f9b0068ab19761b
SHA1975b697e6a617fcc7493748ba535902461f5305f
SHA2567f2399bff8807f01ce33793fbb7516621687d93368eafca9b00cd5f895590447
SHA5122886256048188c1f97a23c44ad0562540a2b35ea6eb95f6ef4bed3c2bee2152f72cf8f5028de334271aa746d0b8a5a1e9b722e3d979847846888ecc082ef55df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc5843c2fbb4170497ac9e50f320db9
SHA1e9fb630aae072de274b0fd3d757203b2df1b388d
SHA256233764e4880d0eff893aaacd2ca536a4c027b180b5c960a5d19d1cd437d5a463
SHA512f97c323fd75e6477b1d10dd2b44231aa9b1bd530c9e7e3a5332e8c582f0ab28856dff49e1622198f6afa6e1e256eb76f8e4b53635fd976ae0ef3553c738dbf00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5beea77fe0d4d54c5fd5efa884c757d
SHA1b1384339052922ac7afe180c8d765e3e7d7de92d
SHA256683a21429e1ef60438183912b7ab6fb55e61417d2038337d21444e02f198720c
SHA512330b38d7edb18f37157bff8b74d5a3aedfecde1203363af9023b28201d6e2f0ffc3926d3ea77c023455a781561d9aed977cad13405043158199617be51c3ce9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1fe96536db0372d00e35efeff332fa2
SHA1daed7279d147977a94b4195d249b7f40e975d146
SHA256465dc36130bd2fb8762f25ec5d353df6a6f44d5575be2fe38a0d3d37ae8f6453
SHA5127304fea149391f2f9886b63e255e2dc23b7a410fad19db15986c523fb2e4a91b7b0fd6736f3656a3bd919241899ccc87f067d5665fcc70a1a3601fd78344c40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b994a148453292d54a91c8236aa37362
SHA1f979eb95368dd935207cc4ec0d49acfdd70ffb65
SHA25685ff06bc7a93aaa2a03d6c88313cb491f0e6c6971f74874edd19e0fdd3c63821
SHA512faa8a1fa76bd4820f61855e0a50fa15c827e856f7722e0b4faf1c638fec83ac6d06a9854932e8bd1ddb5ffba9c46520ced39cf877cb10644ce6fb026d8b443dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b