Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
fe4606efcc8e80b92e10b499667f77da_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe4606efcc8e80b92e10b499667f77da_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe4606efcc8e80b92e10b499667f77da_JaffaCakes118.html
-
Size
461KB
-
MD5
fe4606efcc8e80b92e10b499667f77da
-
SHA1
d700679a10d73ea852f8e5a289cfe74a4f420f0e
-
SHA256
bdc6e61ee9a2a613ca134eaaec138b6dcde53e026f12436bb8fd91b2b2d9cc4c
-
SHA512
c2430fd0e5e5599f86031b5d3f3c0a84a7f80d6ec07e0e7a9512f00febb31a0a4ca8227dd9070bd5f6aba5520017239c0e1bdb7d646ec3a651d16c862da1816e
-
SSDEEP
6144:S+sMYod+X3oI+YdmsMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:j5d+X305d+X3v5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000003d9786a4e6081a95aa0d70fe37ca80ea4930f55cdf9f65ad1911d9e7138abcaf000000000e8000000002000020000000478dec9506bdc6888e83590dee3a462a2df64f5a070734d76db9a3d3ac12b27020000000c4f42693cde6ebfe0a80634ab9a96854febc9976355cde31a188f0d4ad6dd9df40000000031178c83140d1f7afb35e0de6d6b0566a95ce89354f45950bcf6a8ca3629a75b32814855f7a4a6d62dbc570756000d5a7097528c7e393a0d056e893e76589db iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c079cb065512db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433765260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CA83931-7E48-11EF-9CED-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1116 1652 iexplore.exe 30 PID 1652 wrote to memory of 1116 1652 iexplore.exe 30 PID 1652 wrote to memory of 1116 1652 iexplore.exe 30 PID 1652 wrote to memory of 1116 1652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe4606efcc8e80b92e10b499667f77da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58294843302c3359a61e545f523d818a8
SHA14e56e274cb70f29be86c88f85689ad677a6114a6
SHA256262204d661d93d16f7e2526e312baa9c76c56aa688763a798ae951d4a2b48ff3
SHA512b2e4884c2a1f28f0f247c56210943f4e303621c71831b1233cd4ffe1db346f64bc2466609d9c1044c7b8306dbde73743dfc2d50e06e52aea9370e3e64ac0d89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f02af44ce10ee2a8d85246c89e9e45
SHA1b7d8cf46230d9548e9425bb1c15abe5494bba463
SHA2562ec1576f5d96ae9ac68ba8fa292878b243c6eba50f2d6a1428677b614b6e19ce
SHA512b0ce3bd745d503694d7eaecf97b81f2af572ed47be106d18eafccf7bb7ce795695b8b5364f43171b572ec0d8a9c46ba558f6e02bce479b0fd8eff3fa3adcf698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd339a52893df54b294b59e99319ced
SHA1b46a2c5b9ea1eda0f2fc08710d494ab70464bb23
SHA2562f3a837b83f066c2993388e2b64faae7562e489368d4954443815995fd87c2b7
SHA5129ecce80113784d8623738c50a8fd65d2d437859005b0527988a6991f501018c82fbf95c657d29beed279c00a5bd46257a5c409c9a22dafb0a30f1ba25a62b86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be6defbc82d6521e8b9a002c60936bd
SHA1e7faf4bbcb6ac5c19b81c2739b3891df2ff55009
SHA256417616f48274ef60ceb899f2eebc90fd6d811ebe334d39f4f1a2d750a4e6b555
SHA512a47773484ca20fa5e79ea501a7be10573e690b55f7316974ec164acd71ee29e5fb2d7da87c552f1cb8fdd3c05c227cf94185ace055bb17b73d7eb6e429ac6bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564606590bad1ea8f5585cfcf0a82e3d5
SHA17446b1ce823c1780547e5e14a96fcce4b5a3cc40
SHA2569b51e0bc88813b76d135de9f080f2e02e1ff98d7e90e27d05c658a9447e38aab
SHA5122388098b557710858b633b5cdaf306a24a76a5e465f3e31061d2f91d0317905b24cdfda0d76a52248578e1058e5e7491672a5f3549fbf26bd9586cd49e1438b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50000fc236d51c0cd69ed01b278ce3090
SHA1e2b0a499eb86343e00773d8793f9cccc6ff7d08a
SHA25692aac11430f5168d4ed1dd23e2b18a3690cfafd2d91844af6a07a94f835e2d68
SHA512ef138aa2b787112c07d84af73f3883dd59e95abedd2a1640bc5b709cf2b6e62ecd9d27d29bd17cbc874c46d715b37b554b2a34d7d22b067c93004e4e592217fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7e20090bb7f0420074750220cadb2e
SHA119e6e984d246c3f14953fa25d0b2e781e1b4543b
SHA2565e8eeee599451c119a59bb8aaea9d3bf27db559be2d0a2fa8072168db70beb54
SHA51217bdbb76dbbf07dc7caca13dff2a4b3a3e3e5743a0d1d7e1d0609115111018649bea674586bbaddedee9bbbd87b2825ef48e97fe62ca0ef647430992e764aa89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da294517ac82ae2b0b171b2e21bb601c
SHA155215301b461efbd2f3ca86939dba97a9482e1d3
SHA2563f954b30735ac982e2de1020ef4e80a8599d37466ec5fafccab3964203e129f0
SHA51217f935db3fea26cf88812691cf00d925513b0bf8b5b9ae9952636f6b2b583022081ee82fe5aea4a8d29475a9772188eefd2e1ef15c8e0d0e7b43415bcd44fc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b9a486f6314cc583fd336eced8ae574
SHA1a16841cb87e9f63bd2fb62424f8f5021d4276255
SHA256fa97fe05032912d08e9ae33c3a53eff6c5127732c0bf0cf0064882fe6132e4b8
SHA512a4d82cd2090a1850747b16618cb709da1298f6a85dc8633080cc1e1e6e424e21d09dd8dd6cb9b900e2b9833d04acce6261f4a39c16f5ad95e32bd52d453f5d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2cd762dcb1d82b602c03fe7ead2157
SHA1e01b58d1325340dd17447666338846b454bf529b
SHA25646f7a3dad2880cb8c666cb2f87ed0a801be3fa89a672ea3fd854d2a938b57cce
SHA512dd6f70cd476fa80db34c596d889d400749ebe4934be5ac08b800c0edd73570af940791c3bba0a5869dbb823fc80b157126083822e00ad79501e453fca00957c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a7ae6337e4ca32074f0db3d09f137a
SHA1c077b09ebdcbc633db75a75b185a717c94ce3c8e
SHA2563b09d4a82ffdf9c9aa185dc74c3111298b7ffcf4632307f7e09885cc350bbdce
SHA5125761bb3b737ea8ce5168e4ebc031ce0782d28b3b072d6a458c5627508de78bfa3d965f6d97d8788efcd7bc24c6a24eb94ce809543f0f929cf0dc6c02407fd1e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0a1f1476755b2a5e735469dd4ea2c2
SHA18c45c09cf372e599c60a1136d0b182b178bded12
SHA2568a009f4fab28dccb0eb53b9dde9b986e580c673751720e675f2e916b224c3e54
SHA512d2d26224fa40c820709a94fbeec37002e3c7429bc907045ab2318441ddf260731b392ed2b39557e42d85ec5c7bfb713bee73066d95dfb106f14153f86496e9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3020b181c5d1e79c77c2351a649b94
SHA1fcd0421fe5b52022f445f8e279e7848a75dcbd43
SHA256ea7f732985eb6ab207409e30557eb279ec94d47c4dfaaf41e6c1d6d750c61039
SHA5120dc4eee1bddb8d8b139d0854149b2f0df5e473911fd3c92ff17f7f272f8ed4b31cb6449163c29a3afe32c6613cd0a41f759ecefdefab76d31d75c0202d412091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565dc502d434424055745324b6a47ed89
SHA12faec0605c3bb04ace00dcab549523bc44361449
SHA256091a6b98f5bc4cc5558ba36bf5f0a33975d984156c256c276036f7c0c197a3d2
SHA512305621a8e7f291a25bf1e3e2289b3be590656dedc0425987f660b86de2ee66ee1ce69a0047acd3b91ba6072b53c6838e1efb96a28774c70ea7f014690dd7ced6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250050d966e270e283c24ac2b296eef8
SHA12960549e45e274ea83b91d779a0bd089e6311d5b
SHA25683ff84a04d8f91567c83ff100dbc78db597560525f5225b74e27c3980fc7029c
SHA512a273fb36e9c590a52cd7aff7bd80b7465b7d34bab06b3d853aab9b51fe28f166555fafe01c9b5fcbbf943148551d0eb0d914613f7e25b200282d0db17c0c4525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda7a08e3f5e9332d7db58bcc2ee2a6e
SHA13b657015f457ccf6b3febb6ad702fe14cf735952
SHA2567b7d279261ec2e8460fb56575fe98c0fc67f518d41cba928d8f41951373c3fc9
SHA5121a9be24184bf693728ac8a37cd76675caa33776cc73d528ab6f0c49d033b9e0cb5c9a794b2c9d9587ac90b07d0750b902aadc037eda05467f135a8ff8e64099f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b70770c38b59ecf96bf35676c2eff2
SHA1c7e78d5e736aee4d2a82a6a5354b30e405ddf729
SHA256ee34463f0bea8d9c8d763784e8ac1ed208516504d532d008cf39134615e011ad
SHA5122bcc5c8687fba11cd36edd93c821dd9d9d5e6d01de76bc7ec249949c07607d65ce50b286fbe22dbc1c8458a960a50bc5adee796c1f670d227573f9eb39c34c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e436f756b5d72e031a52ac3e5fcf6fa
SHA10f81961aab7422fd0fd1ee8019063cc5e4c12f6e
SHA25672d473d7a756d0d4983cf6aa8d1dc111dbb4a229fb832d1f7651678c6b4eb6ba
SHA5121c71ba898a9232d8cf89f7de4d05c5993488de93c750a16989d1396a15f6991b82a86fe94be6a2e900e6588488ecd29834ca78da988beed06bede257bec1d565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708b69d410e221e54c8b48f44bc08505
SHA14ca18c0457593916261b93b058da09799f70a9fc
SHA256c3a5057620584a950e277a2413cc2d6af84caeb65f1cd1ba70b66f323b13ed8d
SHA5124191ead26aa6b9773a02cfd8eba56b3abea1d36b6e9e48c4b1f66ccfb994a577cf48390820b7e2deb87814ed9e51f808a35ae6b978002142ade8236d5e92df78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b