Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
fe86d2cd1c5db34f5ae039e0bc7d6dac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe86d2cd1c5db34f5ae039e0bc7d6dac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe86d2cd1c5db34f5ae039e0bc7d6dac_JaffaCakes118.html
-
Size
21KB
-
MD5
fe86d2cd1c5db34f5ae039e0bc7d6dac
-
SHA1
8c2e40c649dde668073806b44a9630158f1090d5
-
SHA256
ddbcddf183bb07c3e5dc33463831804573384f97061bc103cde57338fe32f405
-
SHA512
403a571192a7a88acad59499c46a98b1d97b739131b6638f307ff324c1a33b4aefe73f0c787e229a2c914b68fd992d64895f0999d7c03fe0551a49721bc60cf0
-
SSDEEP
192:Hqvl596UDrvW/6YsEEe9So2UQB7A09Vea9XSdNVMjP0kuP:Kd59RuuEEe32R8ahRP0kuP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70bd634b6b12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433774843" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003af40ee2794bf1a298ea35650856b27a867d47fc38a78bc1d01b93b530520c19000000000e800000000200002000000082942ed9f0d0eba90f9d6970914d5e7e48541cca8014f1fd65916411042e55162000000025337c92bb4d4934f5df9673ac6da1b19ce7725ca7becebac87fc2bcad5158f740000000d7a7a01e8257020671981d5686d29d0700651cbb21636ce2fb7dd09b153ae98609c9857b11170f92bd00a0b853f404ab9a466db89bf5b4ed8405c590d3da6189 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74C1D3A1-7E5E-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2100 2532 iexplore.exe 30 PID 2532 wrote to memory of 2100 2532 iexplore.exe 30 PID 2532 wrote to memory of 2100 2532 iexplore.exe 30 PID 2532 wrote to memory of 2100 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe86d2cd1c5db34f5ae039e0bc7d6dac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fde0c8f64cded9218f5807a9ffff234
SHA1141fa4ae94f656992c7c57dcf1f9fabd85dd6523
SHA256efc446dfe7080a3cb80398736c152c919e81fd6facf91e71e03d49998a01a7f5
SHA51284c85df00aa4f3aa411796ae5ba22fda9f384f6c68e4405c3bb4db41e49799297e1206c790d7b311ea2bfd3c6da31825d90084750a70857b97610cb41cd24b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0d6c028794faeb2dc8e4369e697587
SHA1b141162b96a14be0a3889e5514a64a07b1709b19
SHA256d4e2b5d5e4b6a62f8152e827baabe9a30ff854049fd34a124640e0ccb4b29607
SHA5122947b1bb73fc661e9f8b6554101e108821626787c6e9cd56e96ca76217225ba0f4c3abed386b609feec73d3b591b010385edeeac728ed7c0c16b332587e6be08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e2e570ff756dba342ed50632a900b6
SHA14b37be13a25912cd0c82e3d30eee594ecbace545
SHA256d584421057433720388567f3ec5ea9a1c1c5f935560e55097e668afdfea85cb6
SHA512a581829ec9d8f8f6c7dbc084624b4425d32bdf8f7d4a1e0f6c8b532280afb5feac30af6f272252f0ba486e743dd0aa6342a393343df5497ddfc003da367aa678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b33fae36091af194ca37abd055c5cf7
SHA127bd7282fe13a970ecd19197bb975c86a7bda020
SHA256417f8d6a6ff5d6c02d7f045c3a70e57c18a924b927857ef9d8bd3600cbe4e6ca
SHA5128404a39c97860e540f66e7cb1f25f524813fe2af67cfec5c0f7566c9eeee167291bbaab4842f04fc083cb40386fa40f75af0db1a20aa59546c7514343f63e068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e363ccca5724ae6d24e7952c1e519b8
SHA1bcd23eb324fab8a71774d90aaf7877abf3a06ef7
SHA256a2db98e5ea7a5832573822152d7bdbb5be9cf0b4f0e3a844fa757c14b805b357
SHA5129b41b16fac34c0d8358a1519606f8a93f95668d5d4569bb42d62bc7f857de17532719a1caeb7f5c2a35de15f5b1fae5a62f6baaacd9f51b0ffcd2c2cd5930546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e015466398c1585d1a4cee4c5cf8be8
SHA1d4d8e9080ed2c67e9b696f8490398faf425a9246
SHA256d5e5d81cb8747e94c1b4c4ae71d6a67e6ff4a3996c5e69a56ceeb06f03e0d58b
SHA5120c127d92d2e10c19a19b7a0c14efd0e64c2ca9aff2b8420b3b838290a8b8638bcf2ff208f3d88ae40452e7521527ef7b221539ae2de1ae62755e935885a1de49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b0c48ffb55fa2d94a11bb37f0ae67a
SHA134d15b4b2bc8d5419f21ec31d1a124482f0b3899
SHA25678d88f979cc57e3f59bc538a0860678f3d80cbfa7272c1539233bc67449b304b
SHA51219e29352326b330d9d94f4dfcfe9525f417a6aec6b911d5e06c8ae3f99c1ba9b901641e6a7a6f83f434a073df21665cdc10b6fe813032d8ceaa8399941a22d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56091a949ba17362d6819486cd22ba326
SHA1402fff9353897c366cb0db26c0cdcefc698ee1e2
SHA256af06373823bbe43cfcde3dd7f2d1e65ebcc9bd834c4270b342099bbe01b8fa9f
SHA51272182b7fc54085bfdde661fdce4dbce811b27b6b96526e04ac615276404d8ffe27003f1f0175df855d0e765f648d5d5556e0c7d86361c66b3cac5f5ad225b57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586139b3d323115a22259f3585f06ccc
SHA15675a556ed5c8dbac6e3ca22b5bfa8146be7a3da
SHA256676b57ba1c2d30c40c3ea28e42ba904e9a0d0a0ea103493f4578bbb2779729ab
SHA512143b01f345ec606f32aeb98d1adc115f0cd566ab96433c1f8e96bb30077f45a15fcce5842ea14fcc81f067b90633ac04cc2e430b01b640f1dcf67d5610b498cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348277265a02fcdaae7a4382f25c3802
SHA1b28000d68bca908369d625cf783040bba2cd5f28
SHA256e1665a232f68459a5558d8db705b280922a66c88f67eba70df7dac7f5ffcd8d4
SHA512418c471ff6648eef155669547b1d0b1b789787bcd4926fd9abc5d3c33c100ea011526da7d1cddef8589a11d2e4383868eb823935e548b4771be0b79be46f4c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f204939eb7f2915e8fc1d771da641dbc
SHA115fe066c3388c9210d468170e9546df9f32a7916
SHA25614ccbe1a5492b69b9aa0e1172464f9fa21ff1c4820cdaaedf20325a918111701
SHA512cdcbf28116f54a6a77d5b706c3642b7d71ebe0efa314da4dbdc32589dd704e8b7b79be970cb4319c176bdc9ddef7de70e6b6e0e2ccbc310f71fe2aac8bca0b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab3e3c94525aec30b5f86ab88990845
SHA1a2de7d6d22570ce49e58903d3c80a961ec04d0a6
SHA256ae001a177efd3420d1fbaebba843b2b87a51ad43e1b0c88203eb0ed8fbdf130c
SHA5126616f26e3e78c29c31dc7491dbe31e15d334c0eba5874f5523032e9f4ba3357a208b347dbef151ee4372b22e952741b32866449b9b897f989ade978e0aa857fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b