Analysis
-
max time kernel
136s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
febd951828be887bf356c9a01ede0b36_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
febd951828be887bf356c9a01ede0b36_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
febd951828be887bf356c9a01ede0b36_JaffaCakes118.html
-
Size
255KB
-
MD5
febd951828be887bf356c9a01ede0b36
-
SHA1
623c6978217da41541687a8e4b16cec7a7a9620f
-
SHA256
ae5691a42a2185b5132a6cecc9b28651d3c3f763334d45c84997539bd2d732b3
-
SHA512
dd30597766512f56d0e92e1e25312a2738d70ddaca7c4a0e7e6614c42f931d751806cca9ead0129bae0e68f372256a8ce58b37b35a481f851d76976fd64203df
-
SSDEEP
3072:yyfkMY+BES09JXAnyrZalI+YuCuyfkMY+BES09JXAnyrZalI+YQ:3sMYod+X3oI+YuusMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002a2327c728bf014c1e683ed799a8d1cadcc3297059bdba3ca2cfc659d70536e8000000000e80000000020000200000005f9b375e67150716292841152cc340f509202e46d116468ea2443c9d57e54a8b20000000e22db6608eb33f3c59c3ad3cd4e297f661f7c0038e7429c53ed1a2a67d74f74640000000f57533164c1f8b0bb0349d7a71da3f34408980050340ad9e6d01c6624814103baadab91dbce7643c93dc52bfdd82e613f69c7fd48f7e8a17a46ba38c4a83a798 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103347db7d12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7A6B151-7E70-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433782700" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2768 2364 iexplore.exe 30 PID 2364 wrote to memory of 2768 2364 iexplore.exe 30 PID 2364 wrote to memory of 2768 2364 iexplore.exe 30 PID 2364 wrote to memory of 2768 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\febd951828be887bf356c9a01ede0b36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb43c4e24086f2d5a49a06d48037c8b
SHA13519acd62d53e85ad77358bf178d59fde0c15a62
SHA25654298f7f58760e3af87cc7df44242e35d1f0ff093e0b4c1decd2d4c2ca68c9c3
SHA512595cff9dfc825fef553e6f4e9c531bc5f5ffb405f22b13f2802f494b6e92b4d8ca84c562a4133c23f6eb89ed25db7b6c932eb443fee0e625db2c514fe285b5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed63241ce4ebdbdf4c242b114a073bf
SHA1abcb055d7123f140a07bebf7969e955199df62c4
SHA256eca2b59f8a4cbd1fb85883437cbd6beacdf3ac721e60f325f378e2762200a93d
SHA512ca339629a6d40cd022dd6aff34bfa4a2f8e325fcd8acdf957456979189b2b4b11defb75c2e3a3c8868b039a87b88ac65c72e834d46943aa3ba5af5b4d4d55332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c0c2ea6de1017fad518c453fe398d5
SHA15dcc832dfe75fe4401ad515f2f44964802ae79c6
SHA2569db0a3e069f710b3aa0f5ac4ce71bfdf4a6819f99b462a309a64eca8e7e2bdfa
SHA5124ae49c501e2bc8f05a1239a87189979967255c6699563c29e6607e09812e5b2f1008a681ca159baa778f30fdaef00353321c045787b90a8f047287e6fb1a14ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665745f94a62707d7ab731626df7da90
SHA1d894bf57ce37924eaf9f9b9d3c1c2924b1f12467
SHA2568a0b9f30484fe410c54d60adfaa7f99dc8bcfb9b3b5037fb4d2af18f4b8674a6
SHA51295fc0fe8b34d4889d1e17fc4675457d88468d945d356b33f0cd7c7efe7769d5d63ac40d94e751b8e814f4667e18a2d927064adfeff6b70ee068fdebfbbf5f42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2728fca1abcf9b8a9c1e4f8abc24427
SHA154f7ed34692b7abd3aa081d8ff0d4d27e622f8e3
SHA2564ea30330df4febfbfbeaadcd69ff6077d3db7090fd0bb42f72b794268c6b6703
SHA512456e0a5387f5056fdaca1a798e964748a5327255d15398cf222f9b2872734f2fb684e9e8f1fca603f15545102579b0237fc0363ecfdd59e854cdc10b06c62938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597bdf97d2c3e4fed21c452b2c57e61b9
SHA1acb58b17ef4c7f170e29b5a443998b734b789e52
SHA25647854e878bf6043931e417a0425f62b93ed7f317ada01c632a8c0b35287082ce
SHA512d31c37b8892e88e28a661e36bb5b3f7f9b347e2cf96f93b81b31fafec21253eb2c0b5da4beed800c71de00159b0bfb60fdb318ff12098dd5633e65ad23e98f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab8cd961e0b8c9ee30b144755c82a11
SHA1a6b3e980fb8566aef8fbee6aa76330afefb948c5
SHA256882cf21f43e37409a666ac5b3e2723b7d99b98811c685eef20a05d27dafc6167
SHA5123d927ad5e70204e79749b80787b80e1b0da12034b7e8eb6248609bebdf905ad639247f1dc79d1068489582e5d19cc971e506f93bbd3c0dbaab3a1603ac58084f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1c2f274041ae7b5dac9df065b0e0cc
SHA194b31cace65e5e3de807eb7a16247967ff772eab
SHA256e168e6ac722c8e8d5769ea74b8b1ac926356ae61783d3553ae2849a8f96a3db1
SHA512387703811e7283dc87759d3445529281aff1ce147b1169f362442519bc9177e56f729cfaec247ca231e50c462d420caf96ed2795befa4cd890aac21e8c726e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d481c87ccf431ef5675db0bd40dab6c5
SHA1f712ae7690c15f5dc1fcd689edba1fcb24b4d352
SHA25657bf4e7fec33f373534a4163edec456f2aebb98f1f41e0ecf7bfc40f9fb60b73
SHA512464a9484be07e6e511594646a62dac23839aded5680273a5f7679f36d99616779575ff79b6dba6a71301c53c7f07c2a93a3c0779597e28a325ffbfe192fa7e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f878a054c7b3acc5fccc7cfc0a4494c
SHA1b7cd3efa894d77391ceab1e897390539ee948949
SHA25635ec86b7102a50681074ca34beff2e98ef37579b538a979388db8849cf049818
SHA512e8203dd06356fbd9a0e2dfeef146f6ce96429a26381746000ee826d6ce724ef5826338ecab29d3e8a69e22dc2fc93e60ad2b1a9fa7e414af42731cd0706d0d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a938b2b4a55d49c90c1ee806c1a7c96
SHA17798f3cb4f1ec75417c38c77db7c1a78b02e68f3
SHA256400d0cee0959c2841c1b270afa90915fd695750e0d0e059bb742920763c28af8
SHA512c1e87ea30e8dde19ec8f7c4cc8ccab55f285210d2b06066b0f0fba5468aa3e55f1be2da57efb427dc28c4b8680823c418e8b9b4ad78533b8a1bff0cf25488280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d2ffecf93faf078590d7e2777573d6
SHA12be3cca67544fbfb322ff41d94536eacefbfb54f
SHA25671c6e20f2815fdffd9016aab4a4321142852e3804b201aa86152ff0b38944b80
SHA512295998dc09b0866f8920ec882ee3d502b8a22a9ab49eb59afecc44736c8c1245341bcf54130178b6f188d2c94a8857b06c3231aa3d2e15a00948808236d1bed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e95870c8d0e36e8082bf1679e9d9e601
SHA106f6a3f02205dab8c50311b8f4fac426873d99cc
SHA25658888be4cc0c062cfb4ee498548a0d009ab6b3b4f6f98b0dee4d3caea85b504a
SHA5121b8f8a1232b9281354f570fc9d47fa8ca9276cab471df79050bc4c3dcede4ba89e20e599974fd694b331736bfd445636e9d45a347818c6c31a278a19e7c925f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555eb29952906223b1f3099711cf1a688
SHA16d7ec17409d82e4616c9289576f2898bcd317989
SHA25664c688dbf3c6ef988321d9c7317356456d4bce4ecc2036d66c5ddcf0435bb809
SHA51239cadc36f945ec0f26f357e8dbcbe031f3f70a9e3d4f903b19c44e63273fa4b93f01e292d01218f7a334451dcd62060212f09749260859c44b67f71af3f2d0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533070c8c10e4a512efaafb15cc27281f
SHA12a92434a1135208b5553d3856b5b0d58abaed3f8
SHA25614e8cf21e675a50b8345b663907b19c7403dead9dee5d097958aabfa6fa464c7
SHA512f4ccb6a9156e125a6706652d8306c88f362d1a000f1adbac09ae167b7849e7b4d1c9e460a7dcb90b347542de91cce612d4b9623bcb92f5abc0776e73f58c75f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f4cc06adc67a52631f9335144c076a
SHA101ce6552deef94114fed2e14f31876a318df2bb3
SHA25603e7162f2786e67da90e27c939bb49dfc2f8fbff759e9ddc673232d6ad1bb737
SHA512e8c4c970d2007664fccba79ffd64b6481c0eb3ecea827d717f3320c9979e31c816f8e670da785bd31dd88853e033f4a87de515ba1478819e604324d6f5d93912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58204b09f1cd74ff96d3af70b234e8446
SHA19ec594a42d25ac20e6b852be1782d1565515d0ba
SHA256b82e9a6aefa5c2ec10b6a447511d305528f3b6a96cdc18ba204bdcab1c5a1d3e
SHA5124154c73b73adf98935a9dececd48c9cfcc98e77f3db99cdfc28b1d31dbd5401494b1d9179add9922d3735414d96837b9b4a2189bc354f11165f2e29e262bc7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a989af162d009aa429f8fb6f9a07882
SHA1d16b928fb0aad4780b5c41fd0e498d93809d819d
SHA2561c556a68243e7fdd06757cf7c997adea2fa6112b62423595daf6eae2cadcfe8a
SHA5123d3c7eff5e1d03937076baf315f886febac59afe7f6d339d013ee652e45b27b3ebacb37493243fab47d04d9e9d30afcdc824c1c4fe8f3329e021bd7596d6d39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1d6c8f2925cd5a2cb1299a312df687
SHA1bf16ee3365817bf2c2d5cd533cefe70d87e0aa87
SHA2568e652c27c05f2a033a1c940638f213fb3cebbaf84939384098cc5aebf049c390
SHA51287486c7181f0305cc0a78f69c5bf4c8f7f8c4f3535a8aba33887112f22245a86423959974cb3eb4eab6bc7126f6ac725dd5dd1ee25b9d33071250d86960e3b67
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b