Analysis
-
max time kernel
68s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
fe7307d8b629bd1179a1e5bc8827daa1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe7307d8b629bd1179a1e5bc8827daa1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe7307d8b629bd1179a1e5bc8827daa1_JaffaCakes118.html
-
Size
76KB
-
MD5
fe7307d8b629bd1179a1e5bc8827daa1
-
SHA1
3dc7fd296568516a559f3e06d9453282c289e916
-
SHA256
69644504102d5bf0c9486a9fa91eabd9e963424cc0d20ec10f4a319200a3b81c
-
SHA512
1298a993eecc8405b2b9af4a487c213efc14af5a3bf9981f0cfb5cfa74a556d23e3afeb462d2d6cded1565715cdee3c282e3f76510cbcdb4082b302eb96c6b6d
-
SSDEEP
1536:p0L5H35YE8YcMuKBcCOuYY6eIrDx0S+M6XB6aNsKAwc98XLNq0vekjypo6oi0xpx:p0L5ymcMuvbuYYurDx0S+MJLKAw28XLt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E8C2351-7E57-11EF-A6BB-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c5e4666412db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000017879da59d0dd2c2deedb41acefb974efbe55624b75993c1044b25c95bb05add000000000e8000000002000020000000593da27191767d745c7206dfd9fe0d62d0fbfd00821079b79628cfed98f8cc99200000004c2c1e7597635028c9bd7c957101331f4618dd6ff0f3dff4ee7c223484c90e0b4000000073309d5904af00bc205725a77144f37a236c6fd4057dd0cc7038917104d5d08b3209a87eeaf35c5378b15fdddf2feb04071a516e005948fa72b4ffb89003fc63 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433771868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2176 2292 iexplore.exe 29 PID 2292 wrote to memory of 2176 2292 iexplore.exe 29 PID 2292 wrote to memory of 2176 2292 iexplore.exe 29 PID 2292 wrote to memory of 2176 2292 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe7307d8b629bd1179a1e5bc8827daa1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4f72d5314a2ecf1dcaf2303c17e05a
SHA1140197329a4d11d95d5466b42b84046aba5368a4
SHA2566c20e6f2d03ff463cf315af72b6625ca97bc4f554914ffc92603e561ceda26ce
SHA5124cace5eb431e0884366fe890c68f7b27497ff0fdc11b6332c0e885de748dcac87cc0b0338c6a3e64be381b82b05a6cce28b0168b4dabac21ec6c1cf7ed65edd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5988a78087ce4a581248a7201ea0945a0
SHA10a9edeebf77c4fb20f9e006d6ea4304ad2aae2c2
SHA25696a2e09007763f3d497232e9953a16b82361af854d718c487969363e7a9e5e40
SHA51206bcd45f17c1573d08d3dfee69de999addd9af5a0b8d40c88dcf3628f510fa2721b8d27be8e741f02415bc9359207faf9de57c86c0689e3850c69a17617019a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3839c712eda2aa6fa8eed3f91b13a33
SHA180755b0a0bd38c08db3d5506de892be7ce1ce3bc
SHA2565fa2e7f5f53b89a6d27b7170d42009daa3d569ceb4c43fe235e9ba932eb2c63b
SHA512338d5df85070f2428823393a99efc43a28c72562051ff9c4a8a95ba19d71819ad88e08b90bbe7f2b024ff1b73b79de0a905346504cd06a5f165da954ea08a8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8531861db65ff358937b33c808a621
SHA1845b59987caaf2472e9875408537035c0ff08f9c
SHA25648297b10fdedd576f43a3ef4915ce227d4c52c04dd8af99793da21019bb6f921
SHA51256f2e9ce6de27b08d16abc45ff1330cd1769254a1864d5ce28939c0e0b4f361051ebc303daaa6533b2790273ae0a085080ac80a1a37e916b4f6097d5f11aed43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5039ed4b480d748dad0518340e3097d89
SHA1272a9bf22c8903d4942d047c7695761390aaccdf
SHA2564dc4e0b3d44c8f49d99be8bf4228abbf45e36b3d3afe2ee4765630fff402206d
SHA5120d228bad298ede4fa0f146778c85da8212aeafd568e8aa43091f59454da77589330c5b31cd4dc8b0b986f8f7c2902f9d971481ed609fed20417dedd97a61f271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4acc0c44492cc96ec1a68b066b268a6
SHA1db1614ca032fa10eabc063b57fac02a533f77995
SHA256d163806327c5b71022f0dfc57384f45c9eb364de80f0e09a0f2a895b4ad41f71
SHA5124262438f183964c0cf2a35289da70b65d9627b56b0eb0492edd1a2b34524ec0702f020309513deedf4f8a429b3a827425fa1149a2c2b7ae6b24302275e0c24f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a810bb5a51fdc1c92ce410757f0c4534
SHA1063b9bf90b35caecbefc18f71c11c9a173e807a3
SHA256f0cb00040b19488331b467e897b6117e8518f0bc1eaab4a1d00752e5453e9183
SHA512aea9a68a8423e14756fddead1faf1f6625ced19431a9ae2ebbe360ccb8d4e8a76cb8391a6875d1f5d72119fa20ff763789623f65bc65fb4e10632ee776458661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5951831109d8aee6b2e5842f92df125
SHA18beb3b9929308e9e155b1a8715e1dab9a1891b4e
SHA256a0c37c5eb9e3e76d389e0af4575afed5373312d5c9cb130117917d87948940ca
SHA5126fcd38c044d65d735662529a6fc10a713b7d6fe08b37de649b3a3fac52357edaa62a5103135a43f9b144436587b484c0a329c3605d15dbf81e540355bd097080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cfeebf0920bfcdac7d4ac25d048a42c
SHA1ec733492c9328a34d67f47d52c1c25ecb5b790a2
SHA256aa68cc7c45bbd1c052148ffb845e370eb09d1feb99a9bdd4fff2c2f0f755a250
SHA512a60a16e7fdf21cb062f1ac162c3e310bb228ed66c7a386562b760e6688afe03ca3914748a62269a492ae89f5c60e8f08e1b48a580d53b15a9338e4bd056a1f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5a4dd425cbb1267e50cdc8c96bf061
SHA1e3a733651df457d2647fca07c9f55781229fcf52
SHA2566bcdfb261ba5c864e3c1ffc88cb26926e211e91cd74c08ac15b15cd70f131e49
SHA5121811ad62b7ade6bb9c41c0b1c4fd0586700bc3998402f1c7fa3b37009e789189b83165fc01852394d82a33327db2603279f506f71b8144c258a09a50b57347b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572de9420ba7ca83f48b8e838defad0ab
SHA1fe56dce739e1d21fb7d39bbaf7906d1737d53ffe
SHA256f2fad0f8e53b90c1d5c4d45d107d3504bc9a619ee3608017b8874eb7deca0478
SHA51277ab9dccbb573e4170fe3e18e1da6aabdf60807f7cb931ef73458e69308050f4a4c4bd9cab9993d58f4fa7dd7d6fc88932e8deccdafce3593212e80c9edd0d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5460232cbdd802f026121cc0d43738f
SHA175606c12047a487839db05570050d6d8e176ea67
SHA2563ec4b97391974d03eede471ecfc548dbbc4ea8462428eb56ea91dcd91187d7f9
SHA5120e964f6e98901f8b3d66b33ddfc35a041dacae70ed0d1490ac53e960c612fe8d6a6dc27ce9caa012b2a4e666833de8b48c61d1cc09e3633e96ff6170e200263b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5218937b73de5a104d99e53bdc86ec1f2
SHA1e09561abeb796195e13b036591675d524e7cbfc7
SHA256618c18eba92307eb869440b749603e3e5009964bab96b09560d820a5007f9b5f
SHA5123d56e93ef5f2d284319e2900fa54eca6adcab2bf4aaefce10b68cea09ea30e29af2aa22f23b562aecdc76c6853e1d7f36a5e511af76b994586b2d8b738aa8bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5ed383525168dd8cbd345bb234e64e
SHA12831e1504a4342cb9c6fb95927bc4f5ed1618a53
SHA2563bd8dbceef2ecb526c551c4058f5f3540d6da53dca912712cc070baaa83395ea
SHA5128e7c16329a4ee8f9a1bc12fa8ba8f3576b61564ec371d610ff29b05464f66f96fa29420aaddea941e06e608f951c287180a562de2fd9a54540159c7c2d148c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f528300ccc73f2ef3badedd00892081d
SHA15f5cdfff42b3482126c3f0309ef57e5107235afa
SHA2564689d07b2958220e4cd4ed788fb6820c36b3e9977dcafa961f3562de1f8d6632
SHA51274da1e99a1e25b384c7c2b13a03c9334778a296f581c394a451e6bcd9bebc3550ccb00c51b01d80b1d28c724b76862a61a84066d2d979e39833458319f69e470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da23da3e8e657546e4fde624b263d8e
SHA1349d754a74ef91b5e52e6d1aade229c2d031b3e0
SHA25640deb8007248749c0d3117c9b1ebcb2cdc54d14ee42fa6c178901d7c8360d919
SHA512ac7b52f3592bf78ee5cef9efca5f81c2d791c2f903b2954170dad5f29c1b8bc442eb0e8688fe60ee0aefb40579d3c3741b2a26709f6f8f32f6aacf60ab21e09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d5a21025ab6e8f9febaaa259cfa47b
SHA1f14aa8062a7bcaa6083f5d7609c109a317524755
SHA25677d5d05abae78075d3da8b05fead481b72abe1d319e59d11d7d2b8464cae4385
SHA5123ca875c77c57a4997897154b12de0e77ec4a0605e07179e1c139de2710aaeb36f5242554ab5129df324d409f642173319c9a6d37a2d0061e8921107dbc0b21ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ee64acbd2df1d359561c522a566362
SHA1b02b8ef3ab7d85fc20e724f589eae48d14ab6520
SHA2568ce348b43d958f4246af84ce396b5be07f0e9c966f83925ecca02cec06e3684c
SHA512b91edcc864f693800ded74c6fc75014eaa837869bd51a88b06ea339b73224b603cb2ac36a80037c3845ff07f618d025f8f62d223c11a3704259b83ea62265fd7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b