Analysis
-
max time kernel
139s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
fe5f52ba45c57c3b005395c1f0669f9b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe5f52ba45c57c3b005395c1f0669f9b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe5f52ba45c57c3b005395c1f0669f9b_JaffaCakes118.html
-
Size
69KB
-
MD5
fe5f52ba45c57c3b005395c1f0669f9b
-
SHA1
9a6e88b55655faedaf3d72c6d628c699d1a5aaf3
-
SHA256
ea652192ef513c563393817dca10508bcd2b15fef58a950bc23c2a626af31a43
-
SHA512
6c4d919c396e1c15c40dcb4afea1b1e05b28d6a89a5fc47a75935bb0852fdee91c06bd46a23ed69b529b7faceaa59d853e07c81e03ee7095030bae4c90b84606
-
SSDEEP
768:SLL+eEeEiMMMP8a5Vm4ft2+Iscqfnz50PD2QpAlFVC6R:SOeEeEi68+3tNjcqr50PDNKlLC6R
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6AE4411-7E50-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433769035" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000d0671fb7c9b8093932c75c9c2748e24151a8a8904ae5e8181a778957da704689000000000e80000000020000200000006d6829339103df2d537eb7a5045b64613ede59a411bd36cd59b3c06586d7741f200000001ccbe8a7bdab6fd6b717c0d6616d9c694b6cb6012a92a29c64aed66b5076f6664000000039def1e23966db58141439a7320f19d896d6d17467377c6e744f5f062655bf33853cc6316fd61414f5bb154437a585844ff7acbe6c51753c6596ab6c5d3c791d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d7d30b5e12db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2552 2092 iexplore.exe 30 PID 2092 wrote to memory of 2552 2092 iexplore.exe 30 PID 2092 wrote to memory of 2552 2092 iexplore.exe 30 PID 2092 wrote to memory of 2552 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe5f52ba45c57c3b005395c1f0669f9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ea46ac7c12c24e45e79ad23e3371fe
SHA1ed744575218eed14be33ddab519f2f895fe65375
SHA256b19d8b53f1d04bf8484fe55394a03ce48e5b9e6f62d49c1023f447f9c3d95a93
SHA512793ffa41e263929beaa319ce9c75c6cfed6caae7d86039e3e251132e2f035e2b0daba4c51ae46d39f3edb420851c944ad4b4f697f724ff863e8a21550ed56378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fed5fe70c6b8f0246d80dfe46221884
SHA1a98d2881b303c153352911ec910a927eed6f3da6
SHA256bc31da7502903c199ed02e1bacf8d56e4373a25bdf0f5d4bd3283e76cc4bf9b2
SHA5125f67e642602105a1d928e788ad33b09f553f4a789b00dda2a8134fe2e7ffde996f7192d7a28e45bf5b9986373142e6938721e11b73f465dd364a22d983868a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c33f42c39b8b39ec8d5e674d6258501e
SHA1b4f3805c83ffe676bd803534ea0423f8c91cce57
SHA25691c98c7c7b9324287409a3ee64f082413966383b8e191078e53a480e1478825a
SHA5124055254570a2a3665f97d81623bba38ca2c25c622dc11a45c87c88b2b6bf3441315fdfb7527125768eabea6b8fea7de274df6b32aae66d8db8f09d4f61bae35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401965071f16ba4a8bfdcb01eb55aa04
SHA1e812f116d56b76e28e485179ad27447eaa9b2ec6
SHA25634e91f1664c68bb9bbbeb193127407a0a44ac1cc1bff1097e11c39c93881c875
SHA512f072ab17b7faf5401069df9bb39e08fb8465415f472cf05c6ff5ca5075b9de0de03fd066ebe2991ebe9fb6ae1a272915d4b25edae813ca8bf9b1766aee7a1e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c8974833392679732307aa9aa843ac
SHA1fa327f2ec9039c9414e7cdaf61c76ac05feb94bc
SHA2567e69582059afca9cad90b0a0b07b257a65620f27edcd4ee5c000dd92aaa25026
SHA512bd9fe24ff08aa98040b4b2d91ce105d1538789151fb662c7d447929a6c2167f6e95aa112caffe4ffcc42a0824a27ccc4b86bac11939f189d6c01bf828f9daf6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323f1a0a7c9ace750a48482a4e8cca22
SHA118da1c147e840fca0d19c5ec848c167536a9e59a
SHA2565f01f58f8bc78487c1125f1d4f01889557fdbbb699879c2c0ed3560dadd6f7a6
SHA51286ce035c0dae84035ca0f52c64abe209aa290d1f8de2489683a34aa8c8f41c216bdb27029d97a961508932b19913fe9878824505811ea1bcacd35ee63683b9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca62fece4dadc56177241d9c8d7e39e2
SHA1c266c6595c943f4d28c31ab312612e52949e17cf
SHA25651a2cc1935c3e3859e63cb6a8ce01c2bab7dc918dfe8ab1b9a60a8cb07da0e63
SHA512f2f8a168acb05a000c6d840c72624c43b2c169899a26b5b81e8b7bed652922da7cc8beffc3480825215bd8ce65d62f18a7b54c5d13b183422a78a58d0202b9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3e86ea38639f905c3ecfeddb4c8ae9
SHA123aff59d875f8adae9d2418b3b06cf183d7174e1
SHA2566f73dca2c81b00e56c7f2216514afda4dfbcf0548e022182440b1f4a33e35b61
SHA5121441e79fa3fdb0ae815c9c0d6ebc3d41c53460b7788c1a8ae4303beeac467e1d0986f8b7c689f7b7a3616af30f1296d409413f98932e51f884571c6fd5229410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6f5802a950932eadbb852d08d01f5c
SHA10bafd89ba2027feed0c780a79a4ea6aab0c5b094
SHA2565a5761801712c9b8f6ba325ececaea7124b42f8ec409511d14ab9d80d98fc0f7
SHA512e072dd6c4425ed0d639e107f919837e1ebc4d3577a2d6b326d72e9b9dea2828f303981906fcc9eda1d1f7699d1de50537b82aae22760eb2d6568aeae8f8572e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57151527bb32b27a78602070e015939be
SHA1f9f903817c68ed80455861251f52ce5fb920d296
SHA2562a1131b425750e4ae2684d8c5c0ff0a4321f07366cc605858b935b49a5e06eeb
SHA512c713ac23175aed417f2c183ca41ab983169b0579fdb20ed1c36640bc4b792d47aa97d3d8d8000338c681ac3f8d8a14dfd91593e02fa2fa0c86fb0b48bf84e32a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661227ff3b2b1b6e91417e60c38e925a
SHA1ce6d6c2b8d77621f272e16ea344a8d4aa9918537
SHA256351a430ab53b34c8443c548d6074d46cb80e49ea90a57d4c5fde9dd52d174267
SHA51265bef2b1e00f147346cede7f9d7ba4134d0b7984f54ddb7da195cd4eca5a83161846669dc4858305e7cd929e489a0d61052369949abc2d899fd90be6343b83d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e56b2689075f4995ce21d2a7e75d47
SHA140c27fdf65ee07ebeb9253e72f0e4d5df8fc7f75
SHA2567308e13471beebcf8e17a76b756621d03b294d3b9422225686d95c0415df80b0
SHA5122d56d9a84d6e13f09a1f4f28644470c95b9a4625f2542ad2b4c5f1b3190fb1858a0ad87d29333eab7e3c06a6916c5266b3c49e952e694940a5e941e3c8b790a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fad5f3ced6a7948387998e20ea7707c
SHA19973f2a93bc8e9113faeb415222f4f3c4cd87493
SHA256af70bd3b3654575a0560e8062a518c793ee79e0431d1adc30190b42f8a07dc9a
SHA512c79195d9bb0c4d741bc9e8c2c243ab520e6a0dcb318beb78f40b73bbfa9f7caeb40e6d9e362f4fe715a3be8b484714f5f765b78f7b039f17b78fad824d3fda5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27faa474a0408489428effa7b57672b
SHA11a2416eb7ebac4867b4c3437550a6fa6cb2babc5
SHA256d5d9d003b78f164515bf0fe7e7c2958fca6868d9981a581cbe2a27790f6b2e84
SHA512289727d94f2514269eeb752f723835ec166709730ecff7d4b5cf459960229c96b27035c6c3d28013bd6756dd0c93d3a147cb4746b19b1ada75f9057fefaa5ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec7c70daa4f3ddf6c4848b7d8c11b5b8
SHA1a189d9318cd288e54f194886a0a9463f8af0cd16
SHA2562fa04e3f2d819f19d653d73be5a5240586fca3d840db88e1dbd9d3e29c7e609e
SHA5127ae197520e365207ecc20cd2c62e6ddb04d46d5c6ac068507aaafc369b2750913fe81dfbbbd473b27a8e2785973890efc1dae61931b37cb933d20f66aa032dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567411aa345f85892cd581752e9a8231
SHA14f220d266f938ab44cd52cc3edca9981fc1c45e6
SHA2564506f9c40451685c21b52f73ee24e82ea1f874fc77fa089320c6ae7c61f5b253
SHA5120fc45b01f2ed99dd8ba1f9c296be7a6595b4cd677294bedbfd58af282e4d8f3a4d7e121907275469fe287ef4401539d69a38da3426a0ad921291bb17b48dadfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c57e83eb4d7b9e1c91a6a8348f6128b
SHA117c293348fc774e8418dd6d5c3f05c16badefb9c
SHA256824eff1d35108338456004cc111b840354b5b468b57e5c3a3af53eaea9bc314c
SHA512bd0f2a5d66b969f31dd75820b5b30551e18215e38efb13260606c0f1992bb77d7e9659bb299b75da31e1b6e0bf13f8e52dd47a6950dea476596b9b9a285707a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff59bc24dc384b23be0d3b99de447d6
SHA166d09e99d0731ba68881e0665418919305b73fcf
SHA2567d6c9734461cfb0cb6ad27ab6e29b6a03f035c3c0b1c344e0ec68cb85b49c698
SHA5123c28eb70345a8fbe043e71a1bf8b7f0011cf9dc6ada2610c8fabe5564162543419d2bd4e118d716c281757713178b1782f74488a9d9dd79fd53a6aec31e3a742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d7099c232db3d6a1c97a1113be388a
SHA13efed26d8a87026f7f3b49508f5054bffdbbbcdf
SHA256444994d8144ca9f73620904059a7d4c6ac4f74fa6ec696e63601ccb985f8138b
SHA51207aeadeb65bde8838e5230bedc6b0989d3cb553bf784e7bc7d6c07e6742d9b720079e81f797c0a50dd6c07a6edd909c4d4dabe966c985d5b47f2e29cab2fa64b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b