Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
feafd54e467162c5fe8ef3d9105fb51b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
feafd54e467162c5fe8ef3d9105fb51b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
feafd54e467162c5fe8ef3d9105fb51b_JaffaCakes118.html
-
Size
127KB
-
MD5
feafd54e467162c5fe8ef3d9105fb51b
-
SHA1
43ec9442a0bacfaeaa950ff6c9205c8ec7212ed0
-
SHA256
184192b1e7271396f21c74e5d82d65bd83604a22c01667612e32cd07f51bcbbd
-
SHA512
c79ce7d2793ed6ef2d297e8efed103c59f6f77fce461d940f1c6ff8faed23a004e6e7e068524f8e39a22b361eaf2b2f01144725eb958a95033ecf4e87e035938
-
SSDEEP
1536:RY8vAO/oZh6vAO/18hAMZ/ZV7eG6QKZRhFdLXQ2P3RJd2z5+FTO7/GRhFdEdwY:MhAODlt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433780653" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000001f4aca32a52f46cda55502c0c3ed6b6b1d1497db79eb567d48f2a1571d0daaac000000000e8000000002000020000000ce3036a5f0c5f96776e867f44348cf8ef609e9830338976a450cb728687cbcbf200000000fb455bc6faa9b09d53740e557c0058e6f1983b8f8056061e8750783acb8011e400000005c40fe6f7d2a86a5b878ec1bd3f6fc7167f86448e69b93ff66f48d456097f45095c4202824543b2e4667fb1f2747afe4a1868d68f3228d2d011e763d8df44859 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c019cdd77812db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0295F321-7E6C-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2688 2764 iexplore.exe 30 PID 2764 wrote to memory of 2688 2764 iexplore.exe 30 PID 2764 wrote to memory of 2688 2764 iexplore.exe 30 PID 2764 wrote to memory of 2688 2764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\feafd54e467162c5fe8ef3d9105fb51b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50321b911c8f7c7487bcf08e07b12fdd4
SHA16b15475ce614d57ebd578ee9237164e1e6dac0f1
SHA256242c118925eaf33598bf847a865f5596cd7be5258e7eba11543d18a8d4e7e07e
SHA51294fa315a442a690754017994f92bf598db3816758a48e6d364776678eec2aa015258a6b1218596778646685e814af8ad57eff7a36639f80cff913c83cc4ea868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aadaa737ad54785a1e980b8ddf5c2d0c
SHA11659d712940e3460927de3fd4a28d48bd6ade14b
SHA256cad5a5d7ee25018c59d86c6f8f4936cab94a6afcabbcc52f1522e5ed02d467f7
SHA512274a01ce03f1c681a9256aec5d38718ba43e016a8fb955d8d228c44b69aaa7ad46c554a693be88d789583f285ef8e458e94b01741889cff79151950665e15531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c29cb87fdbf80b2bfa38d13a7a7b42
SHA15e73a6c32f3aca3979bd52c2e59c2cf2c8aac695
SHA25629e208f110f3e0166d3c6938a673ef649bfe77ec0c834ceeeed16961aa8b87fb
SHA512eb4bce5bbf810a3220d6dad1054ee616eb9a4231d02abf39af2312d33303ef7cd10383ec3caca8186355fafa8205f333c82ed2c58d256a2d66eecf6ed7ca472e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c09bf1af4d8979550f0adcca5c51bba
SHA10316b9ea648e52add8d4851ecc5e9075857b896e
SHA256b27d49f63c21a9d8a45464ed19851aaa58e921ad5bc31231b5892ac887bc5856
SHA512df55c57fdf5c91f57f7a505b5fa87e2b4f4e61e6cf7ed1b2417781e1b96fc4fda64767975ea98c8235e130ec78f45f376e7172a36c7536e92aefd1520fd615ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745bc899f38d4f8e42e683551252caf2
SHA1ee6c6afab1433cf8442c41614d961c71bab0a5c3
SHA256a1a03c212bf23dc2b94be170d799ceb637b709b9a25676d760f8dcde5ce891e1
SHA512300cbf262f24a057b881cb280b2ae1c18c775f3f81effaa4cb087b55bfb9bb49b14e0202aa24ee687a8f071e73b11af95653c75d4d6ac538fb103698e1af6250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f395631060cad2d950536fb75ce9a264
SHA11e28b2350df8a34c3f7891385d247c90f72508fc
SHA256e0f7698741eca722e2d3bad60211a44f7cbf89984e5231f4d97e766e2c8e832c
SHA512de33d26290ba907b1c3d48862cc3b80817e8c21990f16a3de90852e388e033eb02c4927e28ebe2e11b053412e22cd329d17d7d2f7cd66c84ca83aee062435a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e053e31731db33813fb2e1c6dfb6b77
SHA189ebc8c82adb2a540faf130244fb443b592da240
SHA2560cee4397bb64b98e449d2601109155075d6d4b1f2b126fd612d70e1a8f2b16f0
SHA5128414bd9a629406d81d48b9d0918faf4d0a832826377b6342a37a7370fc313aaeb4dff049d97f62851a91ad2e8a32d31c6d92a7511500ebe5426878c46a75229d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c63b599ed632af3110af524e8efacd5
SHA15133fbbb63762b652f52e0d2542a0cf26bcb4254
SHA256c41429b22c49cf9b074239082fa45324fa79c0c73a9c31eccf22c15dfc8acabc
SHA5122f5b5a127e039f81c4d24eef0be731eeaa89ce65c7e6927fe7285178acee91fbeb065cee0b9523099f046cf5033b433332d759364642db2f93f2823e833e9286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea281945b7f1e5bce276e5629c72b73
SHA15d10136a66aec8b6286e5314692d934d07d26cbe
SHA256383003e3036989eaf8c430dbeffc050a7b8f3f3b4395e4a85a3d05ee3f5c471c
SHA512e02bdda4b69f23dc83c386d54f9781606e4fc688e0a2cb00f0497ae322415dcb2aad0232c21c3541cfd8c4b6e2d386252ce31a53cc8ecdd5aca54be7484bf0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288d5e12e717e091ba25a9162988750b
SHA1735e86e14d94e442f295c993046044322dcc5934
SHA2566b8c4aadc8ab697aac78771704762ef712b3c91ffe23449da865fb11912fc10f
SHA512a8ad2da8e043a42f97bb8ccd60a9535a4e59058f916d3dd458a9f5792afcf01b90ea93605ff196260ec78b5c5d21acfd24bd83644032796295d3b74baccf214d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6e0c7ba9d5626f0193437ff934285a
SHA182715a80059f5387a100abd5a35ef20a4952bada
SHA25631cad390c77655763546a2a93b6ea549c1c1181fbe138b12a6667f676f487edc
SHA51292f57b0d7283865fd12d2f860c4a174d9c73ca81594b09bb89aeaf933545025beb98ce02b2fbe8018baad84b755ad9ec9dbf2d264b444b9a0cb69555059a8c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583fc61892d031ccfeb4ba53122ca0d8f
SHA19a91d63e02304fd7bb25201e35feb9db384445ef
SHA256b69d34cc68660f7fbb05f42593a093b2c5b697e1c3966195cfd5aa4c825d237a
SHA5121361a0307a90ac9acdcbecc9e580ecf1cc8e9f9396ed94e927faa1a90b868c18db939d23099cd09e37508755cd51fb070f1782baf992e453c8bd4b3d1316da4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6ed618c5d84f28efba3425d67df67e
SHA15d7ac6a25d84338c645603e0c0280e496ba7dbf5
SHA256ba235e3664c6de707d693cbb4277752f278e119225569a8504f9b2ab37c77a7c
SHA512e19b0bb3a327fc6a28ec52340761eb3f890d6937d0fcca9a50dcfc852c29c465986875633735c46bca2f9f4f4f6f79799293089b04346b475471745abf579631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bc5019c057e9c7745a037720f896171
SHA1e8bc926f8b8dbe21b87762ef512bbbc0454acbc7
SHA25676222499193889378b0d1e57e6f6c05f988a0fe80a71c230dcfe7c14358b48a6
SHA512cd6b752d821282d8293fbc0f8660509efe6dcc53b5495ce72c046904ffa9fdb108c03eb093c619051f4eabf94f52a5b98da38a8fc2785594ddf118bfeb8ce036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5ac8ed8f6e5f53de5affeea0185536
SHA1022a943a0162a85be70087d558187b938b02d628
SHA25651d9254289742b9d071124e84cde73e12d297faaa2ac046a634808ca1b6690b2
SHA512f9093f1dc0234c23aafc293c0b0a3468f1d89acd72e5f9f9e7ff7e420ac25d8bb1de4ae4f13f922b0a288e33e6c58ed321afde5b9d6b021c72058ac5d803c7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c556165b0a617ee7c3659dedde6ab3ce
SHA12c03ed96b0cce56c23d97450777ab77d7630bd5b
SHA256556fb1201207b7901427380671a04ee5fb6621a1639f9bdd7600e4dcf1bf7541
SHA512d26dbb0c041b358ade2e94d34c53cfd6e3f2484cb23b6eefc519272bad4b847853a39f6c94a4c90111915dcd616d0e53ee05f33adcd3f57d44e953d88cd730ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d29dde4760c4e5cc1df8334b063ae6a
SHA14b72c0358f295d2c9a91d7b84797f313a5f462a6
SHA256f3cc29fbcd216a950b29681a82328fb4cc7a59d458261824435d8d033f87db2b
SHA512e660d884ffae184fa83d1cb8817b0e56cfb939f6da5a0206da81f514b471c3b480abcaf84d805506f138c2785f67ece7f829e10ae3f7991aef5078b7d5a1daa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59941cdc50445784aadef1599aba3cb94
SHA1bc6a8f1a04830743508dfd8e773dfaf9642210eb
SHA256124b0ab6ffb4d241ea90b4346309a026b72ff48bf0595d1623328b74d25dfb95
SHA51297baa133997bcfddf9b91a4a2b2d2c749a26749031c01a0ded93c375f7a3e99337067f91d50d33cf4079e72fde5e5cc6897535d03ce4869d315ec61a094fd3fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03e1cfaa085bf330b46c10411154ad5
SHA1aebe8d2becdb0404c87233c9b3b2ef1060a73a41
SHA2563b82f1bee33c5cdcdbb92e62fa903728f6dea0076e9a5d1638c902784c969624
SHA5126bff26d956012c64ba0ae8cd92b1857587c5c84a87c26c5086056c9343dfbc4b3ffca46762f70b9cd9e533da0b92a00026b1d55fe0166de7a5f763de5f694b58
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b