Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
fe92740d2ddc3f9bb9a534564ef5a776_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe92740d2ddc3f9bb9a534564ef5a776_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe92740d2ddc3f9bb9a534564ef5a776_JaffaCakes118.html
-
Size
120KB
-
MD5
fe92740d2ddc3f9bb9a534564ef5a776
-
SHA1
78c8481e637e6976e03701c1b8ab9ab0838480f3
-
SHA256
aef9d45287b6ddddce4350b0a1731f141bca7d89692be3861b490917048d6a5e
-
SHA512
3c4d438ac4bd86df54fc18a34f2c4d257fc082937a0d55d440ad40193b94878af245643fe83d8674d43510fb83e1dfd1d361385ca6fd92f8103ac6e935d13b37
-
SSDEEP
1536:SR5iMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SRUMyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b498bf6e12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB1777F1-7E61-11EF-8B05-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000cb95d7888767f811db8e2f7d4202339adede886ff95f18d6d619b7661d67e99d000000000e8000000002000020000000606ebcbf241b9d962fca72eea1200d2210edc4b2cb96ed162c5f0465a8fc9a3e20000000c04450f794b1ffdfe102ecf997823f54c47ff36235609d6e2bd25893b16de01440000000b6b0056b76d4f23b62c4dbbb339f3b6de8e695c39394c1301f17580dc21d8054ba23a5ad34ee6b2b3f98b76cb878489b96949b8ebf305f782d4a059fab36d8ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433776317" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2828 iexplore.exe 2828 iexplore.exe 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2828 wrote to memory of 1232 2828 iexplore.exe 28 PID 2828 wrote to memory of 1232 2828 iexplore.exe 28 PID 2828 wrote to memory of 1232 2828 iexplore.exe 28 PID 2828 wrote to memory of 1232 2828 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe92740d2ddc3f9bb9a534564ef5a776_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b70024eec03339b2cf901cb06ed769
SHA1af312abf0267f496665a9b7c0e90c631fa6b8081
SHA256f908cebe86601172109245f05e205c0a5a3c3689a9ed3a188397963d42e7f6b3
SHA51265d7854d2b14c27dbd0c9fd41e68c2ff436bbf0f17d17e846fcbacffb63c5445cbf08dbde9a1e71eb244dbab73493adad6dc944c7663f73d17c3a7d27cd3bceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acb9e9e62169cff89785c1129143cee
SHA1c603b6e30529c3e8be233106b5ddd077bea0c3dd
SHA256f641488875c0a24bf3c6062986b2dc00605894e035a4f590032a4da3263d1b62
SHA512b8a63eeeefaf6587cd14954661e68b71aebaa54a5d1ee12741bc2ab235460bfc9d6a82bb55f0db2e88488ec000efe805c6598fa34e0806f3ca40af702ee1c4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a6c580836dce607d077fb38cfa9e35
SHA1493b259414e903d8e4da64bc58b24379ed3570d1
SHA256717853ad57a6630b62b5e80ee2dca5888aa42b2c3e4c009b9498a013520d5315
SHA512c5e61d0f9a94189ca894db7e455b0c213ea841c70c9d5d81512c129ccbc7294edb3c9b942d980791de338353282725c7a525be29a060a9c0fcc625d43d8fb137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb647fa853b98e1cbc54d78fb21c41ab
SHA1418aee805930fd0a2a7776c36a5024af42f65b7e
SHA256708dae8453ea8c0349bd092c080ab16b30816cdb197fc804b12ba57bc955fb0a
SHA5128d24a2c6e995db931ff9825b376374538b96882ca4137f71409385f3d0365504bcf078ae427320af25a6106ad750a7cdc51ea375d444199a26964ffaec0c7026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25532747ccdb933a6fda7ffb80f825e
SHA122bab030886a0fa3b96c52946614cb3fc4bf85af
SHA25665438106d0096094672e59f747605a10677a2bf041dd28686dde253e3f2a0095
SHA512ad0d130748e880fddb00cb46fb28b8055530cd4c8eec3d184de2db2eb98b1881664e0cc99eaa33d2c99019ea7a8bd4af4970cd219f94c64fad8a05b4a6e3b9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5517a4f42438899be332fd98e102f06a5
SHA17fc31e37213a22fc3736953e86058154d15a50a8
SHA256066172ae76dc40923fe1b6d3287e69a34cdbeb41f725905f9ac48ad1ed702ca5
SHA5121549705ba4b8058f55e5cf6308385a8c903a2c63598ad0ed1c647c256df2b315e153ab9fa9660c3db0b5b00f14e5d507e40b3474cd48568e64f91d5ae5978783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1daffa055d574a693a70fa7e6798a2
SHA1424dc397c530e8956c41504274d0002bd26c0452
SHA256d55e4e53fc5d975f12a583247697e2b6ff500f637f058cf8ad7555a61d5ea84e
SHA51278e4447b49f08f8cc385d1cee87a167b6dff417557188286d2a194ffec251ffe952952258c8e9d813af0454352d9eb7ba028a92f20378f4a6fefeaf7de4e0bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524fadc8a38675420fea02f03f5edd5bc
SHA196a309d4ca1e16dd45438d74cb13cabc80fcbaed
SHA2565d46efd9939ed9ea2a9e8ceeb3589a2d89ad3f60e9d68394ab903757c304c4ff
SHA512dcc0fbcd57b902a0858bad4d68eeb75d6bbc77b1a19b0f0831bdc6e62ecca63e77c4936c0a64935943d86a9b0e54c0a86e86bf45248e6cd4aeb2fec999de7dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb96e30bc4df55eb59f958847877281
SHA103eb9c57f661d3bbdfc276b749a2615f24fce937
SHA256e30633a544b16e0f290e40bac7b6b6a1198154da752eec3214ccebca6e08d98d
SHA512db66e12b8369db551d93a88f32acce68de099e3493b2a4b6d5b593802d428c4dcbff38aacf25128c987c29555763cbfe9d96d3ae606c5877c7b40b7544a4b761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f828eed561fce0f8b73338a374b561
SHA1dc9f46f3857d435061f2fa3252e6f4b77e0c7912
SHA256db9a766264b622171b9a6fc147669376a29e7b29702eafa410c9d51b6b50b45f
SHA51249ec047fa941328202340d13eec57b0c8e6e6d2bc06ce11ed7adbfabd9a806470a97451fe2b9fdc2c738e6011ebece09d24bed24f142b7d49198e21216461579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de0dacee8c153c393370697af1f36b2
SHA15d7751cc9d443956f729b5cf05914049c9535a79
SHA2569520b8d91e1915502ecc06929a389efff08f4f40d9f0f24d109f182cb33b58ab
SHA512ca69f20be8cc7630fd01466d0d352006b544519cdebe09e6f2d554cccb219556e2af71f42efeb6242863ed029070989eea16a4349d8e6a3dca78920c2a6adfee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d529d9e8e29209dcc226b9d505f907
SHA13ac64aedbc2909007f417205f6423865f48d1af1
SHA256e1bda336afb5a3c890d775b83ad5af1ba0f07e06c4e6f2f7135e595786aa47a4
SHA51205fb71a13ba0007dc7f6d2ac8ec508b978c54485f20edb68181b2bfa9522dda67d2715ba3f764c573d5207d745271b8c7dae4b0c59a70dbbb445d865a727f002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58398df42947fc0c52a4f51cc124a7e3d
SHA190bf66103878a9872bfa4a5db11b9ca53b93c040
SHA256427bbbdcfc590e77f9a39b362309511ad39f68f5e3bf746538c1437760f02f72
SHA51201bf2500138dd604c7266b2ca42c8e41fff7d7c3496c35c6c331eb000b9ae1fc70a2b0cadbdc4896e66b4666d13b3ae01479b925b28bf7cb23a466a5cb57e9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52895b0fcc9007cc7d2d26f3c341c2311
SHA1875777a5fcb63e14bd1420f0e129c0da4a97cdbf
SHA25690e2614a355fac3aa112f02ac891d47835f7498c9df82c4b909082368cbabcbe
SHA512cb752c10d3b0fada1857ac3bb5548094c19f75ade6a158566a2f2d335786f586783a469017a07007e2ce98c036736afdfd3ca1f447867a249ab2ca6e85b035da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3461bf312ed97b76b0205834cce48d
SHA11cadc99099125ecc77d617bb9abc5f216576a030
SHA256c587a8dc532cd1d0534c5f5f4e7d3cbae697a514aa822d2008ea07bd77dd7b59
SHA512c020030470bc04d8649976a3f705e7eb9a21249c6a3c9ddef1025fb96f60c27562197988e0cfd02b5faaf4e0a7041a719135c14a2acae4d87af466eacad14da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893ba601a7ebb2ffd4d9546748aa9735
SHA160d42063642510a057a337814b5a3136def097d3
SHA2567a83c79bbfb5f5a4905be685ebe5c4c0e88be45f2b492a93b5a0f1c00618aafc
SHA51289fc6b673ff0c64857734aa8f9b0deaf38b2cc2450e2a3c4eab05befc56b9b4f9b004a1f5109bb7a20a3b5b5639283b56cf268e659d08deac973dcdd60c19820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca898670dcca97fc7c83ca101c601807
SHA19bc8dba00d74d6b80ecedad1fbe84e9125f8b4d6
SHA25660a2e87d211a076e713e900745e6cde3ff39e4a11f97e4279e0b630e9c9db19b
SHA512cb074a45d5febc6888542047a92dac530e0f12c172d20db557b02ab038c3bf59f3ac66a6120698d8b9523e106dfe09984eb97ec3786539da896353ea2622053a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c365c642be52f655e5e41f5acbeb86
SHA1cd4b4c988eb7f686986bda3013cdfb4cf287ff4f
SHA256302952c43499f2f6662071a21e72d850f0449e84447c26e7b94093d5a2510d9f
SHA512e5ef3e702b8708d70948b1641551d65a11a861c4bab5da2f1deffd4f5b2a4bce05caf413691daf5393314811d563a981d9bf2daeea98cfb6342452ebc8bf5b33
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b