Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
fe894de6e222e4216a7d363706d16681_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fe894de6e222e4216a7d363706d16681_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe894de6e222e4216a7d363706d16681_JaffaCakes118.html
-
Size
34KB
-
MD5
fe894de6e222e4216a7d363706d16681
-
SHA1
79d1646f9f9f4051ef0a9df884fad9a8a99083d6
-
SHA256
39d36f330b0984db1d5d0b11857bc3b39dd01d020790d81e8e1d07670e6a229e
-
SHA512
3db8127c8863fc19eb47e034210a26184829c5cfed0827ebcb05e9eee2b81056bb9a0fdc05eacae262a791224a5ce78d5657f21300b09053c625b84fe2896204
-
SSDEEP
384:Vlv6iwIcnw1AIOh9PZBBCwfo4PGiPRT3zXUGSLEsUMsE+xbhNKU/xeiMP6olDWBI:vvvOZ3CozDIvEEzU/qLKDOOwseIi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003fc49857e3cbb6f82a04b1cb64b109322f3bd1f20b2d23fbfcdf9aa1f2dcbd79000000000e8000000002000020000000f85c189c1448e96c8e6031b80c3361c0e07c12d165e8e09d1fc92c40f7f198aa200000004568ab3a1035cfbbc99c5190f234be8c234589c21575b943f59761da2448d64b40000000e593f5243848159fa1f78951eeabb45748d621e714ff1cb1fe7a8f87be68bead6f81d6b3556fb159578495ba3f6bc20b41dbdabb8c74d6aaa846fc1acd489866 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433775125" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2531E311-7E5F-11EF-9816-E6BB832D1259} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e8bafc6b12db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe894de6e222e4216a7d363706d16681_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60a8c6b99d5ece564d577bf377bc835
SHA1234b0711d85d829d519592079471c76e54849ca6
SHA2560237d29c82d7d7537474b10ef0f4ba281e10eeee5cddc9a6e51bd4683abd033a
SHA5121d7298c00badb23eb70fe1cc443348b67a2bb38743ff9e29021875100efffa52a1ff44e39a5fcfc503e3f217e317cf160e5be5c21a94837b8215ceb6fb6f6bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8c4ab99565cb956132dd97bf1f18f9
SHA1e67255ae3a820503311753206634ec72e3c6e096
SHA256d4d285eb684b254ef7814507e24406e975b19f78e61fce2e930c13744d18b732
SHA51201e9b04a8232885feecdd680e76f4fe4d2f0520656c6480729129d8744da0161537efab3c395e8d383ffa549aa04709a8f8ff4d166c78201a367fa95b6e38248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e811417545eb35b805832362f919f8
SHA1bcbd6f21a001bb89e7aef9dee1c1159e898bdbf5
SHA256b07158827d5fd1273b3fbbe425b03e3801c3f62336cff8f5c33bdf3a0d2da768
SHA5122e6139d86bd9b89568315321728c1ac58d28395cc642ba5cbee849ccb1380158402c242c9cd7440b2e73dd20a963100aa722dd1b203086ad0cb6f887d2991048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887d9b571d1a98a86f519a1062afcf26
SHA112a4b4fe17d0adbabb5cc869c7396231784cfb7f
SHA256757b977710a6307aba6459fc10fa601ce9be3ac2da635dcb797463e08aeb1eb4
SHA512306a87e95584260158dd8430af0cf484041270fe682124a8b1a6c3e240cac93bc04c43ce8bbb11a9794c11abcf1fd35bd6d139ee2c2189a9783b58c4a48fc6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3acdbb2f7a8db8d88c6558aa95be2b0
SHA1c7a33bc5832798436682a76c38188e0ffd02d888
SHA2567f8f7919059506ad565aad91d0710684c88f985fc49e11a19576b81c7c36ef61
SHA512f1494d5cb3a8c8c1c57ce50cd9b02e2d6af2b50cb13fb8213df84b995ab0068282c16945e6ce44f5b9770a8517e71ec1f03f21ce2cf887f07923ab9506f3913a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513894a3303cf3a10f1553181323790b9
SHA16fdf3a90711900ef0d84803f6547b5499254c6ce
SHA2561f2325ea3d99e5f2757fbe1c080a72bf01172bd44646e8652446b559705e00e6
SHA512f7d6d907d0dc58c24d899a89cce792dcacfdbf59567d02a588ca4120b46d51b5bc61adccf9e27ad6be1d95a6d0b88ee9b3d08e7dbfa0202f4b1377d036e106e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51939dab04a9cdd920f64869a969b7c45
SHA15f82bb6682f023997059d7b3f42afc55fb43dc48
SHA2561b4dce8cadac9f1a728cb70b6bb121d2411ed7374c110cfa534e64cbca5cb6e3
SHA512ecb6268420a2bc439b6b4b39e0f44d83c01a1555735a62b48fd969cdcd4a76db4e6afd384b364bf486c2c49abf33cc8401256cd21b8780316c8fa2257f2f5188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43ec7bc24846a05f3992db7def8e6d0
SHA1db57593b70af908876ea0cbbf529f7a0611c9858
SHA2568f4378b5ef34cd2a052544794751ebcc042c886e1dc1f63ce802a695f6895236
SHA512a49576f1700a17f85407f865b67f914c6d029243a55c246fd8a9b77653e53a1d49ddd927e05e0982d185e21e4234636732e2ea9ce956a83cd4237478eb410411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a30180d7ab7ce487170202bd2ada110
SHA102782e0aa4e3f8dcada250e05c88a10043a431ca
SHA256ef960f099a33f8d666e987e91abc5e062a52981d72ee04da1df933523d44b598
SHA512c641f3e65c8722ded9aea266dc25453257e673a79969a6aefb2bcdbdbcc650e5d86b9a6c6e31173549f2e5f4ea438554a1149d46322c939677863b32ecd2b4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5895f127886671526a5c6beaa03aee78d
SHA1f4854a3487f4c23f28eb1481579dc4a4090c21ce
SHA25651eda583ac2aacd3fe45a9e646cb7b85d6acc2c14a4ef5da1f5f951dd0b2461f
SHA5127f03d4c5d798f62a0e7b7a176fca30e1ef688dd6f49a9e8a921e0baae5d7c66c2ab86812121a914dc1dd3911371d9ca5c44d3cf0a1764b3ee72d6639f9f481ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608b4be276a8984a0b5b0e8f8b5b5bd2
SHA1dd70be7e195a4105cd0068ea51c0cbfc9e47a6c3
SHA256ae67fbf7461547d022bc75d3c0e504d62b1343e098ef147e38b1304739d4a7e0
SHA5123431cba3ef2d9305aa4c0e522a2521cc919a153393146c8c297c2839c42b3f0798f7bcc97e929491023d625a625a368529e9f9228ade4eeffe09eb446ce1c252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4104cfcff2701a8287f121343d9cd58
SHA1cfde6c70b6eb5e109deefb01961043156a7f2d6c
SHA2563eed7285b3f2234f6bf720d7d5db7ca65bde1d02d4bfe9a1a05b5236ccef0e83
SHA5121bdfb369c7c42817678b2b6131951c173ff071e29641c897f3ba6410c22587d0ae83e12450a82fa18c74f0ff801cc9e85cfc25efcc94fa8ffdc47a63fa9bddf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a33c49f9c7c4fedfb3777afc6de1c1
SHA1f61c637513e1b8058525d8ab17eba60e713eeb12
SHA2560f780415511362439bce2aa14c88ee3096851beae098c0e004ae918049b52593
SHA5125a4503a75c092a687b225bb259fc573b6f35fdd7105b4deb65783126ec0ee745de0ce88e14a098f5c42638d54f4e0bbbaa4bb45941288c1d15ae0d8a41e4820b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710948ecca25d674203e6f422062580e
SHA1c280c9ef2c3ff9c0245d3f2f90c76fd876f7e76e
SHA25637252dd55103a18c9dbbc5abe1f31874e91a9157f8e3803304d3131050b9c53c
SHA512cf8cf0378e1745930eef394f90e0e57f3daa4dac6ef1aabb5d8454af97a5df40ee2be069bb10f6842540ca002e24e86c2ad416eca2713167e4c381cc52303118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3f10cfb28f5a15578d45ff28e03d4e
SHA1d7b81c2c251966f05f69aaa916155d46d48f8bf5
SHA256f2b07367c14bf965b12c463868892783401b89abd3caf2a8be0c05d099a547b3
SHA5122b65a1984a5a6e02fbc12d2547119279d43085691f4577f9c542f0f7c282b4768cc5b243acbc28fa6d883bfca8d90b5ae79d35fcf8bcfafe80e23ba58f28665a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffc65e1bdc32e25e762e338054abc55
SHA15ad3b19c50f52c5174ff8863befa5c59f28643d3
SHA256ff7b1594a1de496fffe00c57af50c51bceff6aba67067f0dc8c544e911b7c488
SHA512d5a4aefa335ace6e8e52fbf863967b4601e34a1e375f62ea83457bde945f4cbdf363eab0696057efe57d4aa89807b9394bda1e19fcc047043f9dd0d8e4281eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530293c3427168a624e70fdb8c07dd95f
SHA121b824f69203be67d953069062fd5f03738b3aeb
SHA256446ea3f25189d60cdc685c6c8cbba2892be7a83b737febac153a8b99bbe045f2
SHA5128dde41fb023b0a0fc3d7495b65ac3728d44df032260b9fd607b526e00dc693f4cd1dea7e4947790328446fff65f4117c340ea7f87ca6ad928ec9a9ee961fb2a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298ce9d4133915f7370b0d1da59c6ead
SHA1b81ea91ae9b2233234c5d870657718ed237ff270
SHA256f71409a70a8c97f58ed6fcd7abd01533542ff3bbaba144e9ba9481fa2708c045
SHA512a10ef727baa29f5c5da08d1526211e17a2f6c3fe5d97fc92938425586cd4c422859fb71ca73a02b2dabc9b41fee11fd589911c07451fb170535f2c6e85e3e1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56048bff915fa2f9fdbfc424643010329
SHA152b2bf3bc6c1678ac506dae0cc035f2cf9d92106
SHA256e9d7900170c3da09033e0eeeba63696c485bd77e7ae0901c1823459f8434b917
SHA512ccfb8511d5e8ebbb7a6362380fcc59c58c6e69871962ed521397cd64e50d07ff591cbcc8d454b0c7a8566b774b328da681fe844aba106d8970b1aa656585b5c4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b