Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
fe53a2d35ee6c46ff51dde2177da3e54_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe53a2d35ee6c46ff51dde2177da3e54_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe53a2d35ee6c46ff51dde2177da3e54_JaffaCakes118.html
-
Size
2KB
-
MD5
fe53a2d35ee6c46ff51dde2177da3e54
-
SHA1
0ac6235d77b6c04497b6950271229dafbc3ea98c
-
SHA256
c4ac9eaa04264220fd6bbe53d2a72649c636936e8ae4bd9e0d6eaf2fbc076757
-
SHA512
a1dc67cac1aaf53abdf91204daaa54789c977dd139e24075832dc84736733c48a9cccbd677ea5dfe7bb51c83bd3e5cb7906db42133a867f84c3f686f3c1ba9b6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{045C4481-7E4D-11EF-991F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e5ffd85912db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433767339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008e4fdcb5d61b36b0e44695599c96c97d11a7e61bb84151c28578fe1abf9a4a8e000000000e8000000002000020000000c94fcad0d225cc29d0eea7f35be670a3ecfa4092d915c8b98dd3fc2fff76fb7c20000000d8e0af1f81342c66e9f8e1c2cb77ca411ab7d6ac073a974ddf5a19b91b9b755a400000007f89bc0c09aab728eac0d8637503f9ed053eccddb2a38038fcd1b21673fa21dafa5f906046996fb09451b3939d99e9b63d0ad6389948f2dc6d969c325f3fe25d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2860 2468 iexplore.exe 30 PID 2468 wrote to memory of 2860 2468 iexplore.exe 30 PID 2468 wrote to memory of 2860 2468 iexplore.exe 30 PID 2468 wrote to memory of 2860 2468 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe53a2d35ee6c46ff51dde2177da3e54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564c3686f9bfb86ba6e5f48724d47a3fd
SHA1f86888b4e200f93d923b01f25077d2c42f9a6edf
SHA2569d14a4e8796843ba78d5a3ee621c89cc45d594144fced55e0c33784867295c84
SHA51212e70dd3584e63f5cd7dd8aaa576ba477adf8630e8d8454d3ca61bed3cebaf7f90e95a9edc80db60f34f98eff1bf2aad0b661a5517568fc147af17a4dd3f835b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006c2f2241f091970488f84fb049e10f
SHA1c3d643dc3b6fdf43eca330e8d4a9394c124de964
SHA256fa7438e1b588b2cd4e208bf0833874b8d2e3958b2768308d4bf8d875841b2cdc
SHA5126cdc2463d6c8c5033971696fb80857c9efd4962ee2f9009dac6ba3060b857280eb363559f7f921db508c009d8884d5e133fde2fa5bfcd2ce167de97b28f6ac35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f94df144bd28e4b527b820cc49f3b2
SHA194396951cbce0ce1814971d03cafe7e9db69d3f5
SHA2566787509fde61d45ee5e60d76db20dd5b465dda4e7e2f1a91a123e8ee8e12519a
SHA51277dd8145940799b3967078b7b20141d8d4528aa427181e1bd3bd31ea63248fc2ba300828ecafcf0d52ecd94973d311b27f5db5966a16ff71be0a31a5839a63d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc587f2854a71a729dc9fed81488e99c
SHA1c612ca3ed49789a7be417de64e905d0f7aee8b0b
SHA256aeb5c236813e058cd275ba5f8d6110a5efda9afeecc51158dde4293e9ec7e7ca
SHA51215c1ad286a0b9ca7fb7447e02b16fd8f6cb964ccf45702add57edd95691f8ab5e3c82d051dfcac92785d42a7862d51b4220635c417abe99950de0cddcfca9b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44fbb3527486f3c9f0300548518c64c
SHA121822942c0177a8cb05d829d880575bb9d8a8036
SHA2566cda51fc04a59d8488cf04fd9fe5ff0ca10de3b9b4915a2cdf497b7a91d4f646
SHA5125b210bff726048720af4d26c287228932a0a335cb4e23bef6815818fd4521a5489699c113b11078bceedf200765df90e4c6e68a76bbc8c65eea283a8f6ef9811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac456dd9b49f3fd86404cd89d2a47471
SHA17a131663df5380e55de48685b8d17dcba8e3d257
SHA256eb02b9f7422056d3c5fd10986bc0df7756e066ccdc274a5d69391d5f55f62e2d
SHA512b0360c5f59b957fbb4f140d1565affd669cafbad05cd99cf4f688004285da0b2383b6198028b437e55a2f8e05848455327660dccaffd78125540f2a4982fb075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5761b64a4ea3f44e579dea201def69959
SHA1431034d24f28fb25fdc7f9c7c1226a2c799f59f3
SHA25668568c7d6325660b34f528d7562736639c11e0c74c03af5d7ca607b57b6b6f78
SHA512fb2f83957cc7e35169b896dd0a768e50d64b5ae6ee29036506af4a2bd6ba07d83b4a4fd3f01208e9dc3439064f8c1aa5c9057b1058d14bcf8ae2bb82999c1fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c58772d9bbd9d03b318bf434c29884
SHA1f6df649b46aaef090d03121dac8c597165b4a678
SHA2563dd76328580fd5ecb9b00456567fb6dae3ab1252d2ea9a19dc431372d2a0fc38
SHA512f3e3366b016df1c4c524676cc957ff2f99b35e9be27abc0da9880c9f149ac136ff9a550db12b2cfcb045c062d6a938049c6a54de25e23582c8efb13291326ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dacff937782775de13a64a3695cfc7b1
SHA18a8edc7a20995719a2adcc103285bc5656a692d1
SHA2562f2870d4d1837fcce1532757a9e932847c1fb711ee7feb9a7df2bc4a4a609397
SHA512a7db1b9c670ae5bdeb2ececdd3b8c849bb77376baf37a8952659a806c4a6cb03c990ec018a0940d77ff05e326e913f5f77cc7061d72eb39f6026a7b0b0cd7dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64bb4efc5ed3b381ccb0133856b0be8
SHA1d828cf74a58d105ab87b9a53f18c1905620025cf
SHA256f7af4e92476c478e6bf326cebf105a6802e69f4cf65a2a1fa68586965f4f4541
SHA512aca47fcdf781da5fc707fd87039ba3b958d2a0ae7a2e7b9dcee4fa3fbe59c526f911910122fd00ac8c0f437ab1bc6491e2bad1b71d5436a6299c2e8e3891d353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53106bc747b20c737e2de2c21bce79c55
SHA16b2a3dae14e6e8434a504c38d2650dcbc2c5ee3a
SHA256e34ea7bd41e99fc8d2776754b78051fb39be4c64fc65dedfc9c4a8e9f8779cf0
SHA5124f4f4e02e71201babeebce0586e17727de536c86892317216bcf7ef937e977374370d6bf387d5b7707e9c7a3ff04b3c4ffdd13f65ae0ecacb794d67dbb4680a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ebc4fb1dc6e9f7c1e4cc12c904ea352
SHA164ba2d8a7531616591f225185c85e8b868b57cc3
SHA2569eeb4cb1ae952bd051c285c08a3a4cc8aa361cd5aaeb4e276db0ba9b43a09941
SHA51262c51db910f13556b10c2053ac829f99d1e0976d7a3266d1106fa5f3c579dfc5f82042837dcdd0d748764b9b2a2e152057696a9f04dc92984c0ba9fe7ba15af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8602a39e4685b331339630dabbce70
SHA12d3c173e836126b516b70933943532be6c24f69b
SHA256db8e565985dd487d4db7ef3bccdb6f817930ed4ecc272c4dc4795c136ea546e2
SHA512b2f978c47a6d90229baf23b52c463d57793f87552cd9b75fd6d1ce337fb9dca18e654b8d8cc81859e1b926c2da1cb40651d42b6c7ddf3aeeb62066bad00ea7a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80bbc1c0724a4fabcf7aaab0cf812fa
SHA19521752064e7de762ae4bde4c03c53b437b009e0
SHA25636d41f078be4e5785d6b4d32a816490213549ecfc559c78c4dab9ff162621814
SHA51296578647328b825773dc829455b8ebdd339856d740f16456ec5914625609e0b2da60fed20f95400884776c761bf9fc56d63482122a3ae4868d648624e1f0293a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931240f7cafe40f04dfe5a4b826e97ab
SHA115ee78f87477e00f52c040e91e5969c9da5a3c40
SHA2562648a5f7373175e7a82e3829a2880aff3e2b8a49197a52605429f75e1fd2513f
SHA512b2dfa8290ac2b8ee07628ae80e09b02c2530c9bc5e2b5a164d0fe56a2cc895343140195e3312254fce9b9cb2f2484ee06da28c35cfa0463c1573806ba56f85d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2884728e3edf8b76f3e59f6fc741853
SHA179202c91fe175273493558377b700fa6717ffe5f
SHA2566747c4b96e811abe565e52296878f949cee439fe162f8c245bda41c139174cf3
SHA512b8669480aa8f76a4b4fbe13286a81c74a11eb7c1fa7ab6cbbb624114f6a70c5ad8ff12d302869edba2b0d8c8162a878fdf3b6eecfc60be7bd42c1aa469e9f096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59def2e4da515d1ba094e1fcff9e1afa3
SHA17de26fd736dca03b0013dd0edf3e0ea428baf8c7
SHA2560fb62478e3cb6e16204f3dada8919ecbf1322e27cb9a6cde663d5cd156c85c82
SHA51256288a1cb8a74dc7a9c74ea0a4ed4fc77da9f441f227fdd7bee31bb84bb05204ca565cd4eab2bda7c38e30de4f60ad74c97cadf6b263c5804ac2060be87c6493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1786f92366a34175bda5508eec275ff
SHA1e21b8a0f48ba241ca9ab07bb4155872b95c28a6b
SHA256da184e0dbb112759e501da1d581da4577571c44018a9e93cec55c75c20ab93b2
SHA51228f590982643eb8ed9911ea107999a1468135301a45a71745963d9cdba3cda0c8ec9724589e7d04cb8cf7ad290658a8fb8ac9ec85084c64e989bc724b15e3dc2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b