Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
fe53ee816baa557c0331118a36c77ecf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe53ee816baa557c0331118a36c77ecf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe53ee816baa557c0331118a36c77ecf_JaffaCakes118.html
-
Size
461KB
-
MD5
fe53ee816baa557c0331118a36c77ecf
-
SHA1
42ff573d1adc66b9e9370da07d4087773ebb40c2
-
SHA256
9ebe53d141ab500328aa0ba2e8299edb0d384ce0e145f898237781344bd7df60
-
SHA512
164a1a717584ae619ea507eba642d73cacfffa3f95bb981bf8a59bd3b08b32d72408d7215344806bc7a75428b06b9d7c800e38f35bc2fd8e4860c9dff7ce1246
-
SSDEEP
6144:SdsMYod+X3oI+YrQ3sMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3w5d+X3/5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433767376" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000006d4174908ac74413e570946d556ee84a3b095adaeb823ddcb12c3bf5bbe7be5e000000000e80000000020000200000000674d08eba5c0afe169a8262367b3b29b266a411d9bdd89356d0b4ec7ff651ff200000000800869acf343340c67dc614fa44ec0bd3febd6c9213b6452b15bbade332fc8a40000000828d6fa331c0e347dc2e08bab68b9523ef682e9ba5b5b605c107079a1382dbc110f76e35f6e56a21dfc2eef3fccd3b51e5ee886da0473c692c9b9d20c28b3e63 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d0c3f25912db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18B04711-7E4D-11EF-B692-6A8D92A4B8D0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 iexplore.exe 2476 iexplore.exe 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 532 2476 iexplore.exe 30 PID 2476 wrote to memory of 532 2476 iexplore.exe 30 PID 2476 wrote to memory of 532 2476 iexplore.exe 30 PID 2476 wrote to memory of 532 2476 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe53ee816baa557c0331118a36c77ecf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e2b3fd836e591e94ab8a6330924f1f
SHA13a07f723a4a2ee12fb1882aa2549d8080fbe6324
SHA256f2d77a2fea2526c426de4e1d00b9a55cd4e2a991ee671c00e0a48ed4247c7b40
SHA512e353cb84839628f75b1a28164d48ae671bbe17653d17509cbb5d5beba0c6a9f5b4831008adf2e16b5a386a646e99a7c5f8408c2312b25264270a70ddd7066f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a563ba056dbcc1c679db281d38317cc9
SHA1e0afaa5de128d9c3ec40b5189934ac6fe9a0dde8
SHA2566165f5ed4cccc2e768cdc69113f2599bf06246858ef67187158aff08dec4d769
SHA51222e1646b783fbb148f6768655fe1801282e47a9d7104c460ab4d264cd3840d6edfd46dafb93d16a50a3fe5361b60941142bf0c275b91455d6b62bb3e71a85a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f60cd194245c8199fefb9af74cacc13
SHA1f69449d6e59d94e0e083dd3df36e1c62f3e9cabc
SHA25653ae15d8dd448c870fa74c252b0fd4577de84d190e7d9132532a658d97b4d589
SHA512dd36690ff076735ba4eb06b675ff4177b30fdf5aa9544f61973cd8e12d1d4b0c300e408c3e0f9b858becd79e6befaf540e9ad9925a055065e5aea813eeb48772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66bf193fef958cd95030b7d1e502367
SHA12161743e74d5c4e8bbe7f9fd99ab94e12740cf0d
SHA2562749a149160be8e501053121ad9209292f28dde026d178d97b0845e02df41909
SHA512399cb17444aa249c07111bb18368c3c1dafb7970f17f83e78928844fe7804c2f4a9aafd49044cb47afe3f47d69a04cd1c81ca25143f2fac2301e2b4719087f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a1554c8aec04e2d5b2edde41181608
SHA1173ceea53d0558636358e603b93e06dbed783ed6
SHA256d9374667058476fef421ac03e146ce06b111d8eeb7d6f6d576b70d8256960995
SHA512dd154c01822455897f5cae4603700994890def4af83705f4d6d9918903ac280df98c0aa8fc121cf6ec4c4a53659998ecd0adad53b7f5e760fde15e409d535256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96d59b972ebb218aa0d46240cf753f8
SHA1b7f9ef6008a911dd6bca8074224d47c17cac2ac8
SHA256e8c36db2dd85fcb6759e3adfe4673048473015f55f1c2d1bbbcdc8c874bd25cc
SHA5120b7f9926879583a7da578571bf05207a0177629b240b8d838ed5fc1c1c1670828d26ff6b402ec66ce4bebcb774c25b84b86c21e352a452622a1e388a02d0f866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fcc09d82d3165e873e3519ac6c74893
SHA15b9e93e16f21df9bb83c8c60df630b6f4802c575
SHA256d698fc70424274a5c3285038818b995568de558409f8761fc12dfce881f1f976
SHA512841384c421395cdb366061297f5a860948331f2ce2c55c2203ccf4a29300ec78fec3195eae0a77cd5895261cb02585355b60e0b800935b6db6f9533a628050f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061212b40ca1a4c84d9ce090c9eab680
SHA13784a9795fe921bc93508c7b889c80464b16cb37
SHA25662855b221088805fa28f72b9d7f158024a7bea7627e000c72a6048ca1055beb6
SHA512e3471b25f32185d1682550ed700c341e3321fa85cedd43987526eac3d6f9a88850928692df2e3f6dd39a0ec976f86709f6e7a32b5364f41ec2ca3a19c6137254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1160d8852139ba7ff9008dbbb02524
SHA10290943a3edc946559d4f68f249933cdfedf6b44
SHA25618c751711b82e7953ece7ba494228e7549f732be71d678a7cf58dad6de10a234
SHA512ccd5ac8280573688e5c28ea78bc456eab478d5346fd6cd969213604361e3ac0c788dc8658ccaf4e845c0574d4eece0cedc5496efd1683e0cf3460402fe0edefb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6c1fd7754654ad6581d177a1874f6c3
SHA1f2dc3b1529955717fc50c35de3fef3160659d384
SHA256b23747c6785357a5bc9d8af5502333a4723098ed4e3cdab072ecb7531a2abbe2
SHA5120990adb75f2524c0e60c687d7e7c5e2655a6115d940ba9c919cfe335c57a58abd3b00110fe9c3bcb0254fcfb1b2914d8ef3f23aecb45060638f6add7dc7cea20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4358ca46b2c34fe8c49911b40fe0146
SHA13804607995824e19453f8361e4ff1660dafe015a
SHA2562a8f57904c9d558e39b0a7c0c819cfaa34baa2e94e71d7805de4040d9ae4b9cb
SHA512634662cb66e430af1c0532a29af1d66c49dab44520ef93f3456b0cd9b2f0424c59029b7d4bb843847332bc22424f6aa02ffe00f29d90e93e26571fe7ccc104f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2464533d6cd59bb4991538f2c12ed22
SHA1b41b6c4efde5a06e5a0be62188c02a3ebab339c6
SHA256d920404633eb54ed0f3bca96904da77e1c25d83da06f3a9656fd5ff7596b47ab
SHA512ea73f08f8a59e44075b23dce12be8276786ed0f6629c3062c2ff3fba93477a4464ffe9c6df09406d170b3e4e70edd75c47c9d9ee0d813b17469e1e3a5b6992ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436b3d5197094356ed7ff8493309e5b7
SHA1f7622e921838e3542ec24b64ad93ac6fc0753abe
SHA256d86f094b6d0fe41b9b75fec5b601a7c925ede3cc8a4b07d62c7c6d4a02fa989b
SHA512459b4e7c762f966b9e938099da0dc2178978dcd715654fd19cb0657a6dc96ccc1351b81123adce5c602724885ccf26a35f82224692de552b66714c05947b5bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6026a26b1d88e79b633524316d5830
SHA1f60b3b97d0b24bec00298d8267139ddf5d5d3ba9
SHA2565e85eba60796476ac31e8cf7e7f34c792da40f2c20204d17ac57d2f7bbed4c7f
SHA51247ea3709cb911aedda98c2b3df0901ac854bb31358c08709fd09aacb0249b8eec84b5040cdf038b0ee0423104a793b22b228625ab915b70811717990887cf7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffc5ed9c62934920a4d89ca3c63d391
SHA14f7a9fcb1b71a7fe13ab0c9305b80b87b22427cb
SHA25616f499f485d1f9b17e945077eff9251730ed680975d0a5261540514d2a1c7a44
SHA512c70573e8668c90ef309735bca6f802f2cb8b9e8cceeb9f58b3223052e12851720c696aba997cec7202d09230b346463437f3176766108949c5ac8d83c1f016ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c367fb07ab4e717586aa119031be8462
SHA1e39cee11e95338cd07b8113c449eb69633021ebf
SHA2565cbb5c05ce73dfa61a9048ead7815cd769dc67717f1aeca515398adff19371ec
SHA5128af378f956831bd340a3dc639464844980bd7c513157ff1f8fa56a8cc3c0de7ed456a972e4b5a4f3b83ff5722e73b0aedaff8d38da0f9a0c4bbc423f12440211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d50a2d0ac1af15bd26cc79b5ce2ff86
SHA1fd0113800eea2eb57e05767622969f2deb405a63
SHA2568354b637fece656b84699fb68810f5da8580a9ae94808deaaeacd0ccdffc8676
SHA5129a76883978a89bc539d24adf0368065e93243de89a6f543a50f76ab0be30de89571b0561a3b1a31cdc3ac5f64ea10f80dd23858cf11e327fe612062f122829f4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b