Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
fe6e1ea5b77a88fa60962e7380c33ca0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe6e1ea5b77a88fa60962e7380c33ca0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe6e1ea5b77a88fa60962e7380c33ca0_JaffaCakes118.html
-
Size
146KB
-
MD5
fe6e1ea5b77a88fa60962e7380c33ca0
-
SHA1
82fca2b8e9932132ad93757001ceb6245b756dd7
-
SHA256
7162a2585ef549282d52a10c5e381e4511b7a7b55bd1f8a5dfa84f64a1a9da01
-
SHA512
ab1ae964153a1f3140f37d3b5cdc722a7d1ffb2f3b3ccfd0ad10ab7277d8be178b9c6321f1bbb3d3220c9b0db5bc7ee9bc5a6ba3b9b40562b6ceba68f493dfbc
-
SSDEEP
3072:XlPipoSL+QKiazizu874qh3DgBrRjCANdeyQsMGa0hBih/+w9xt:OHzvh3d3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D449B941-7E55-11EF-BF4D-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000a8bb598527aff73f6674a9eec968510067630326a27264b750ff7d3672063603000000000e8000000002000020000000807c0bb9d878b0fb86be35aa20287afd0b6b66432b0c99f2ece8e012afb00e9920000000c4f9a67d5d8c62103e05e3ed4b4fecefb86c3ad85c6aa334fa81a7befb2924db400000002d7f4857559c6e988ab4f12b5293c8e5b818c6c6b00d224a9aa1cd14ed1b7d43d232ab1300dc506c2d362ac1ce2879d281ae0d152508999bb1c025c885f089da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433771127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07811ad6212db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1716 2068 iexplore.exe 30 PID 2068 wrote to memory of 1716 2068 iexplore.exe 30 PID 2068 wrote to memory of 1716 2068 iexplore.exe 30 PID 2068 wrote to memory of 1716 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe6e1ea5b77a88fa60962e7380c33ca0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29a4b0951e2ceb9f30bd745aef5b5cf
SHA139f434962ac05ffd74c7589c8cd191adee58ff4f
SHA25681ad59fb8b2a469f7223b56b823352feea6fef94df98050624cbc4da0a669681
SHA5128c62f9fbcd017e8f75974fe1c9a22c7d06fcd9627b624ecb58e4b65a1edd5440d2fcfb2ea7eb798f783e3bfce4d5be7fba53225b8240db52fecbbb19af72e5b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37e6ddfd26e7a1e283f1867be4113da
SHA14735f41a071151dff446c6ce7f507a743208a465
SHA25623eba721e38a4a550322593b2cf561598b41db7243fcfb102fb3655e79d0f3de
SHA512e8a833fe56a2affc8df937d15f900570b12880522b67cdf44b61cf919ecd050cb962e0c706b2a050555acd6d4ddb0c1c878f53bfcd43f572bb385f84c10fc701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be9bf205bcb639ee67a39cfe468583a
SHA11ceb3cebfe505a961dd8421fa99f56accd7dccd7
SHA256036c1186b4ccc6ae60a565b8b82d05b55c57d029353da213e9f2f315860b2374
SHA512463f74eb1249d656a56b3942b35f296dc9c3765546694f7900a4ba13db796290a68c3e53e8c94e88fd6e4cafbf71e1891ad4bcf2bccfe0bbd5a942330831b34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b94a39a62c0b2be7672fd85c98b806d
SHA1e7bd042f0ef8493afafd9bb69bc73956dd7c9ff8
SHA25614ba2741d2134604babb2d658f6b478f778137138d90c0d9da1befbc222cb44f
SHA5124f71874dd8a04e46b6463d71c256a72d76724c792f4b8ead5ca9e1053f0e5ec36e757bcab7fb2751d61addc69b3868ae9cadd72718785ce78ca3f2faaa63a72d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba728e12cb6ea600a2a8f71df503721e
SHA117161b220749dbc344ef48bf614a848ad0ff5217
SHA2565930b2ef74d5e75fa6562f4b7dbf0eb31614136e95e574049ea8a5e149598e85
SHA51236704009e886e1136ec3f0e50f80f9695a0ae523cb3567e5a64d542a15b04f0de5f0d8db3b59bcce4b621274802d8067d95d97fa7d00ecad327137cfaab46ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587546a79604298f11a082d7b1bcb3296
SHA16ef3cf3a3cb63906244222e6904e7486c37dcbbc
SHA256e3dad39a1116b32dfbaa230235ac72b076e2c92796d86ebf92d1d6bcfe2a122e
SHA512d54fb646b79d74771348e736a55695c01dede776858db4829f1e393a79da48ef1beb713ab2e24aebb5c173e8185f353736a9e3c70d8241267c4c4cbccd6603e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171e327787a2a44a550626d804877699
SHA17da1f0cfaf8fc7632bbb731fec80b33eb60e167d
SHA256a3fa401e36263a98664118392bdbb0959e834fd0d22b5f2914dada7fa8645e7d
SHA512317efc2f7a335bca4df1d4989634a76eaa63962fc6c785921a5e763034a2b893ba90e2c6c7233cd0b81bc64686ffb5f0e11663c972757a40c28bf6b3d39f6221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555289b698ec6e6850ba7835da49a2049
SHA1532835ed4b6d57ecbdf5017882c71e77f67913f7
SHA2565008fe9b646a24d4557cd86a123fbb6424dea2f97fa462120004863468d52fdb
SHA512dff802659e9dc847f063e49cf51c9c1be7276e153884c4191826b4080af077d1a4cb95feae58b7e0b1bc38edfa27380fe933bb5009f99d1d02f6df89c13e090a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beda250f40f0fc6a310bf11c02426241
SHA156578b094e6d7658c08cfaf0507ce8acb0f88c73
SHA256ec13717d62e99e876400d4873e10417480fec7fab18e8b26e4a06d87d27a51e9
SHA5121f3587709e09b4654cbe0ee098defd8799b2e846b1dc262f22d8a07c6b5605f2146efa98518c2b272ae28d4237487019f789551284a63a95c4c0b3b779a87cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547dc4cf4aee619b3df2ca45bb92780e2
SHA173ea4f27b39e465cc6865bb99b416ac5dcf6f755
SHA25615649f037ce724431e4c9b246eb9b01a298fa7d57f35acfcfa61603c3f75fd41
SHA512d1fa93dbf8428b7b91cc8b6ca5eecd5ac8403003364d2f679485c3c66e7d25f3d5004051709ff397e3e04d8cba89e09cd83ad396b29a3c955bf41b3048df14c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55549bc3ce9818f3c0b0835bf8c20b109
SHA14ec4db78a3c6f0e8f8cb2ae3d7fe74cd3b18bb63
SHA25653dc905b341910cc666758c4b3fb74cfc27f440c7be6909aa8b9b2f2fa00f9f9
SHA512e3d091ae7685ad66599f8d1e8fc0f5bd78669a52b0f6504aa81210e5e1f6c62694aeba5c9261cab3a04683179f43b6cf906f6a798c3ee9b1b978d1ba850ee8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56065fa73178d778c33559abfd66b4720
SHA127c7d7f706c00ed94df74c40d831bb943f3dae3e
SHA256e64371109067eaf7308d9ead5021229ef74aaca4045c1d4d89355d9561fa802b
SHA5128c03ab51130c15fc2dc89c1630925ff7d56fa9e0a99826f4d91bbb599086e1ca2abcfa4c354618b31d7b6380d41f43640c0167d57bbda598f729d63d351290c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24bd1cebc764e885c0592519bdd5fd9
SHA172a411dc77c5c070679863bf0ccc118d9f116448
SHA256f530eba08df5e5baabbdb185e5d4d7f949f4981fa780e3b1151e84ba552cc4e4
SHA512ed0137783347177da49a0b895804e480aec618358460e641e6c1c9d5758e7ec1ad1b4f627577c2bb11220c2f1efa2036cf3bb5a0a9b5a164e2d6c0b3f605aabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101bdf0c11bae2323f8a04568020c5ce
SHA10908b54c59227ee06038fc839f9ad78d380e3328
SHA25634cb907687c777341111cc693a075ff71846e302203323fe0acb7033e89c494a
SHA5120b484606ec805879f798e0b410ead585ceda1bef6a27b1555bc3e78230830e43523f8d99f260b5f5d85e47ed0ccba6664d31954ef22529e67d3251b0248de140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5940597426d229dbc6df896d348a7ff74
SHA1369bde8296b7f4337e437cd910134c8464502d85
SHA256404995352763d0a05460f361b0aed466639e9d9fc895ac35f3d05256a347129a
SHA51259943e508a4277ea97b24e31b16562ec2126d2b76d22e7462ff5676e1b55e925302cb174f022f81cf3eb451205956b026fb9f5ec065f81aa84aa18cd88728496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e1951d6cf20dfde4e0c6e7bdbe0ead
SHA1fa46d7633ac019e5031e878b7f8c3d7d95f38315
SHA256c67f24a8e3aeb358f32d1329547ef84dc6917d9a97c1369a59c656b13f9e5924
SHA5122576f61596f0034b3c073e89c16b7d56c9d7b39b230537bff91c7c1f1a5f617741f9d7163c232dc8124d21acdc0efdef87e42ad776bc7435f8cb922eac94bc4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca7b841ff4ebdbd9ceb87f27db603cb
SHA1117fb23952af730c268fd36ec863bbf0474ff00a
SHA256205e0539ea74deb6a6b79e460199df396fdbefefa7d82e0f1e8f0703533222d3
SHA5125137b66e4b18542e20175bd933fc5dae6e7b87e2b8179f08f088a5299d2f3ec8f3a5b93d2099630d0513c123714647cd7e992db64246eb4f96c9a8c1e52b7910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a584c9753fe6fcd58ae428b9912686c4
SHA18934389150f99a7391eba05d47b340f9a23b2087
SHA256d5e26c3e1ae997e0a5b9f7739ad9c74f1002614ab3ca4419b5b1e5fd5d263e45
SHA5128ddf682c502f52ced8df17de508972c2a648e9eb9817ceb36cdde194345e3e645ae5159c48fafc109f81014ed92e0d8ea6157d2a5a4e5e020db77479522ac9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14528ae1fc36953ec48d42f7fd7feb4
SHA1d49a3cd47717a205a11a507b12ee9652e344c5d4
SHA256550deb0c393548703a74ed5ea045bd38149ec5718e1bd00e2ac186f724aa8b61
SHA51239d72d2e604df518c8d13d20a4f8ce3b5efb4c456e42c5ed413dc156cfe1d9ca4ff28b82a5e2ac0d19af0574affcba473a623291282be50737b838c2098a8c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c06287530d75c8af01f1bf0a8f7838
SHA1998c73f400a3a6a4ca5fa0759965e5a0ecf5030d
SHA2568d07a96a5462f229ce2be0050378bd1a0acce4fbe028fae3359168cfca7c2b81
SHA512d4983589cd65a81fde7114f533e48e8bb15a2f2974a760500971ed475d1e9f15d860dc90363bfe7dea36876be3a97b48859d8864166056c21eda038ea76d0ff4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b