Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
fe7bfcb447dd0b8e9d2d0fa2d2e5b50a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe7bfcb447dd0b8e9d2d0fa2d2e5b50a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe7bfcb447dd0b8e9d2d0fa2d2e5b50a_JaffaCakes118.html
-
Size
36KB
-
MD5
fe7bfcb447dd0b8e9d2d0fa2d2e5b50a
-
SHA1
ef2510305fff932ca42bea4c057f4310749e9135
-
SHA256
04f8ad624a9d889527e57783d4de6ca0cc588f57dce1a82c082491f10da7fab6
-
SHA512
10cf5e99cd84e1fb45006e2bfd93a03add3ae5aa8de1107cac99d218c88cbb4c661894aada7fd18844d172792f6a543f6d4013b97168d5284bbb4b1f2c1d39c2
-
SSDEEP
768:uZrlqIkg5uKjdvPQ+lpfvECssnBr3b3PhGUheCjCtCCC9CVK/RSJJiy/lYoYRcka:Igt+ANiumxDxyO4RKR0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ca6db82ff7080b5f6186f1b1b90b832c9533fa425bbee8b7b6fe149c83e2c8f7000000000e8000000002000020000000ad7ec6a9ced6dbc1153504454eeee29c622cc3589878e7f9142895a99daa2f25200000009fc0140b2015f18c4847b303d63f17ec8a26dce431515a937796be6cd5ef428540000000d1df3aaaf7be536de16aad5d8bda52e4bc4c612f84b9c49ff670f8947bf0ca7e02ef415648e5a99506d93af231348249930b2864232b8c1532264c300a62ddc0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FFE9D61-7E5A-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b085aa646712db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433773136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2812 3008 iexplore.exe 30 PID 3008 wrote to memory of 2812 3008 iexplore.exe 30 PID 3008 wrote to memory of 2812 3008 iexplore.exe 30 PID 3008 wrote to memory of 2812 3008 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe7bfcb447dd0b8e9d2d0fa2d2e5b50a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539456764da481965116360cec27ef05e
SHA17893e6c6faf43c53b5fde99f692cc59eeb66d6b4
SHA2569f0f367e26a948418225dd92444ce5ede771efa29301abf3139f88b8f6699144
SHA512cee8dbe09765dfc1064fbb5a063a69e3db4065fac09fd766f40fa5cad62fd69ab7cee5f06f0a4986c95e1fb3fc3c039970ed712f60372bb241bd13494523881e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d85add8505321b3895e9f852cdf8e92
SHA1ab018ae9093eb70e9007f0ce55bee940ec6adf04
SHA2563910813172aae0d668694c82b377b950554c5631988d87c9406a2ea83bac5db3
SHA5125c759380e3195542300ce5d07b2465469924928a4fcef6df73a67558584468d54b591245e847780329cbed42e44fac0dcc3e9de9038851d0e90a8183eefe0027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a116c217deed17ae9e24ba0e8680fa3
SHA10dfeed66f05bfd244893107017e92b8a4465c01e
SHA2566950d84cd5e2be9bc9e1ce2ba04777007d4bef527cf0907e350bedf5c52a6e62
SHA512b9b3f0a2f1c1b11e0e414ffb60804799218666de4553a6cb600384c17658e37ac64ccedb9013e6f374d97692f9b83b7f84b7ebb8c13985303902bb9fc38bbda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de7eddf6cf87939e497b95aafce5073
SHA1ef080766e93a3ac19674bb3cf4443899a67d5d3d
SHA2565c82b0c189671484c562a15f928ac2cf1eafa2bca96a454ebd45ea72706d60df
SHA51266678b691b7d720ab63ff2dc4f890663bf6c590ee448eee7fcff49b5a486384c15e5b1a159a8ab381d1d1d4adf125dd77d72c4d31cd8f2966fb81050b5c9e281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d01f75f8f0c35dcfdd2b268c4d71fa
SHA1ed8d3f43032081b8d39fa5ea0df6e7180d234eb5
SHA2564ab42461057bee438cf50190b15a8551dc2d7cc55b47ba943e0e4eaad1604adc
SHA512c4d017ba325a1ed80956873118a8f8328aca7302c6c5d2d0be3fb4da3305fb57a650af8586ac7d86a47ffcba05b2d6bb0dc5f9b5e5522b1ca7953ff60240ca91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5917397b8479e97e4a94f029bccbe59b2
SHA11e1513e364957a56a04087970c5a4ad5020a5321
SHA2563d9fe1f8ed4f41658e17a6c69238fe74b8a58e8c6a775bfba92d2a6e100bd828
SHA512acf114ea85827b001845fc98cec88cfb76189619bd193b3eafd228a35efdc33d7559c5fe63349d1b78b8134b04a822f7cf575ae25a501e9b57d4c7768237116e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d824bbb29548c8fe48b988c8c9f955c6
SHA101d01b8c9ee662b069d7228ed48a8345ef234ce6
SHA256ae327b41295b03372ba97667758bcbc5bffe44933223241622980bae967819bb
SHA5124f6a6d03b9430f3700ada7893672154c4322f78548336df0e4c8e601594aad1d9e9dbf5fe4f1470f614de8792c4483e69c0d4588432368930985fd9b2447a29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a96b81db345e40463f16ebd03591aa
SHA18ec51e826252b5529c73159d42959d7dbfcf9183
SHA256195f8eb9bc651e4b7eca685c6e876f1fee90983416db9b5a984555ee044f63ad
SHA5127de79d15003b17e332b89d2aca954e73ee53ecc178370b93b5eaa5c0501b7f1546665aa35663a158c611bdb10ef38d57958d939a2aec1e8dabb50f9b745580f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79dc8f8be6651d174447f086ae20be3
SHA193116fe702874859054c05f5a11f3c8233bcfba8
SHA256f422d708c66e8a82539303d7b81a4789555458e6e67eb9563187f96d46cc0db5
SHA51286e2d3b371eb2501942aa6a868a0b8b2e70714274af7db491e5be345d4f0ae75a076a77d457f318f49e2317223ddc8af262b6860b34019df5cd513e1dbdb5355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd016a614324c1d0758ea1c8533c946
SHA1b539c116310ba0a5991e069b9af9a6631643fd21
SHA25608ee40974857c7d5d70590c92563f58f42e3c5249648769bbfe43e7ef0ab4021
SHA5125ccb79bcf0bd184b3ef67677b713fc73e1daad2e70a40cf1b94db9fb03ad9804479f5c615c45e0e221b4231ad7cd64d8671875775fecc4213912599830b33d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541817e81be2d81cea0970303fda15a2d
SHA15d4901fe9b6019dadacbb8ff518ff38766a7e6a0
SHA256ab47ef10564367cdf8fab4df3f778e2f5b3db412794513226b3c083388688ddb
SHA51201457b5d4cb6815a389c95df97002e8856f647313fe6c0eda3f59129dd88d939475b4edff04ed71cb812ffa31938e0919ef6c3c027888d164d3253116576835f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62295a8ca359abb2339397ca607d6d0
SHA1727a00e232bf22ea548843556dd3f33175a68408
SHA256dd5f7ad7ebb57c44e83cacb63ec8647795a73b5a796de674875ea7f6046c32f3
SHA512844e13bbe4f1380d38d4f32c496fe90bd338884161bdafbb8d7966ed0dedf65d8623981faa7b7da09f0b5fa0b2156aae67faf188fa71ef923ca0dac166ad0ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80c2146fc291f55cf97c98d1d55c754
SHA1e492e4568352d4b5354006aaf5bfe632a5ae905c
SHA256f18085fef4cec9b1c24e5a7fba734086952b82b02920c2d939d51b2c45ca25dd
SHA512e611df84eb78bb1b4a72d8aa07711849ba54f3c325880c8461c6cf14186c53564843fc03dd1f00c7ebfdcf6b4db8a3be80058e1afc74d0219e123b9b8e45bb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589c594277d3bdc63ce41302f976ee813
SHA1021e08642bd9054464e55d9d8d7c239a07c507a4
SHA2560ee3057b87a4a7c6dce60bbbb4b0242acf17498e6a14b20e36b96ace59aada89
SHA512d08736d6231ecf4a9a6694efc19af286db7ea0d4133f929a1edc2c7d555430c4b601d2b9fbe23020987c683205cc2662afbd94dc45fd15612a1d7b7cb4c8c7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210df71c1889e5fd2c241de945756d31
SHA19a7c0bd9363e652826810833aae9ce109d09df49
SHA256b4eb4fadc02622101dc41ce703a0436fd2234ebb7a9b3234646e95aa27c888c8
SHA51223367a4def7f1dad8b99ade6387ab2b06721ad4e54c5d4f1983775be0c06223934308b08a9f20704b27250ce8ba87e3fd4e188335fcfa2abeda89ee469271c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c97cbe73a76924ebdf038850b61af8
SHA1d91b12b82450e9d8109262f9edf8974a14ba28c4
SHA25692b66ddbeb765df9f6d9e34fc647368df00528f1265165cba26b6069db5f86f4
SHA512c918153ee2a21aaa0d9b4340f2d95005d911cec4622e8bdb656268c7053e8115e1ee134323ff087eb7201c47ed8eff40eff6936e49c78fe223053c2a28cdf77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565ad77db5e4dfd20147f767db75538b
SHA14676c428f22ea6943b56c2f03abfa26f2ba1a83f
SHA256f56cb0b6b87f327be0fb0ea3e62eae91c1e733608b545d905580fe7701da7706
SHA51252b6ed44811ddc542d3bc2e5af9f65e284f9b17520e52851e226199bb063e2236690dd85d5629b9bc53a55946a20776311100c5ee9cda7a61d05c6fdd80b6405
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b