Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
feb5cb22b6d73ac03ef772f57d793740_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
feb5cb22b6d73ac03ef772f57d793740_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
feb5cb22b6d73ac03ef772f57d793740_JaffaCakes118.html
-
Size
461KB
-
MD5
feb5cb22b6d73ac03ef772f57d793740
-
SHA1
a3906de56dc1673221075847df2eaab0e5743a7b
-
SHA256
93e52af0ae790f6f2d41b5109f2941ef764717af345cd84c32a791d1821c431c
-
SHA512
d65392af827e2135d149b363b12faed063db5590c02ca29e1e0134bb6d49b1b52e384153bdc605feb2544beaf302f0af3a67c84190967adb78f26db940595cd7
-
SSDEEP
6144:S5sMYod+X3oI+YPsMYod+X3oI+YwsMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X3l5d+X305d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e7bf147b12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C2CE421-7E6E-11EF-AAD0-E29800E22076} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000dd90a75a460a6f0d3febdfd89cdbd1680b2f27e52f4108ae6776793016345ac0000000000e8000000002000020000000d1c6491e206170ee228c21a479273cda88f298c10c389a7f72612c2639c69a0b200000007358bafeb122ba7c9ba47e3854f2300846b769d46c1075491283c6b0b3f60741400000005331a10861dfee2fbef1dc9c6750b09b0bd03f4584418b56aea47da266ee8bac58f225d0bdbe4e8c33f3aa47d4a69f6aac83cd5e810a76175e0fe5f4f383477d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433781607" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2664 2668 iexplore.exe 30 PID 2668 wrote to memory of 2664 2668 iexplore.exe 30 PID 2668 wrote to memory of 2664 2668 iexplore.exe 30 PID 2668 wrote to memory of 2664 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\feb5cb22b6d73ac03ef772f57d793740_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584914ee918286827f766c37902881fe8
SHA1a439c3a0eddb7cb35336ab9bc093b3659a2fad39
SHA256a4b53af5a189d4d68c24c2c56fe935ee54ac0e3b87c968ed87c9678d57d36ef4
SHA5123b5d0f71ba74cc9abdfc2855e689d1e93ea0d105f7616af94b277588793e5faf615d2f924650f2e789c239563aff764db3a5b0b104c1a450336e6445e17b7e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591806b59e7205133ba009e1accfdc21b
SHA11ef616b53806d98482c0f84a1fc3d512c578b753
SHA2568519580d32ce7403fbab6427fcedd09926f99789a3394d4a413b6ea40dbac99f
SHA512b94e0e19da95cba5159f5f57704aa18548f37b79f450f35ab692018a67cd442d5f5f6c9a2560b5ce174a2cede2c9ff164aebd83b4874bbec883f10503e2338de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517768ce432c7d956754ad728b3382128
SHA13e3ea6dbdbf2a27bceb5aa83a87fb918f0e78b23
SHA25603c103ce57120d09c01977f77f02df5662d2001502be62c71a12fe0930f0ee39
SHA5124b190075737e7fb3311e4baa41983b7421800b71f11d2343e78be61fa868877bd0bbd710be83327f77fcf40e5762de64356c11aa448f6619107d2f74920ff3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958c0f934dfef6b74d9308c9f24c8957
SHA19cdfcd21c1a1851d2013e3b1c1122d29d985b1c2
SHA256efc06520895cffa2c213287d10587b6340bf453bbff97a745b0bb16932fcbd34
SHA51250df5f02423eec67b1418ff9a863dab3ebb18c2d3921f65f24fc84df83b8cd90b0c43b4dd69238e718af56321f2e20ad099f434f71fe0fde9e558dacbd403535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56636e9b97ddf2ba8658991cff7670679
SHA1151dd9316c94b3df4427e33030b68491ce967506
SHA25640bdf974dce29d345f319d45c936b3ccb68bc8aaace12baf9571703cc21e77c1
SHA5121bf4761ac31da4d6f4188a90891bedbd3d638de96396e3258f0bafd557af5972bc3d2bebde09b7e73d6af92368fd14576199451647fe116447d623d94a0de1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73e7cdb8a32379447c3f488c48d6099
SHA1cec6fa42a1bd1307f7d76be66b335000016172a4
SHA25638466d8def971e359bea42d2585b6e8351502f47f423a8131b52ff3ff6e19530
SHA512b60c5dc60d8fc425789e06e3bafaaa4f63494770addddb836dc31a2ca7ff3ab9c3930d0155b85fc1c01430d468c01601c0e94a55dbcfc3ff0abb6d05ae971220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7582288483f784eda93f1e03e6d9511
SHA173805b5fb97ea014d177434fdf2d234df470dc2b
SHA256037ab80ec8b5a18fa5bd030462b50828f934b534308aad81136af703acc1ee97
SHA512f89bdbc797a1bc5b5fe467daf6413d658ffdff32146da5e82799a7c88fc612937828d84a8921fabfabf0cd2b5691751859d58af4f5c378712d804b0571d578a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3ee349ab7c8cf2795f19c633a4f7aa
SHA18de20c561fc8ddd9d0c92dac8ea611530088b738
SHA256c4e7ab5996f98bbf5a9c9f366c92a01614c712a25d5ac11d2ac323420dd04796
SHA512680b32df5da4d8fff4345b60226574d200ab3b38c16d3c1f4f3f005697c7fcfe984959e85084856707e657515a22a38f8b9c25723b8005177788dc4f03257ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130689e75616379bdcefaabe84e4b971
SHA1aff0d783157740895a3fd13fe9d134d373f924e8
SHA256309ba7a57b7868751f249debdb03c6baba9136c88c0f127c72a970d567f4415f
SHA512d22eb3210e5a7b65d8a0d357aacc60567f7c45bd5eb655b90ca757ce39a324827c0fc1ef8c13b724e586647a9412f856764c9e5704e64412a2a4bd2ca8578553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516620bf0c07f981c0c5de5d75ff98917
SHA169dc2cb774f92c153e809e3226be12807c4ff313
SHA256a20d12d7b9e5f6b42b5597ec537d862c4b399061ab83eec23432f07193a5f77f
SHA512eda3eef95c9b690d941eec76a338d7fca794863a7eb37109674f756602995519dadf66772120cc52180b14f122f9161768a73288c8d784f10f485935699ce7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51887176b9f92f0239927866c283b5b13
SHA100b744989e147f536cdafda8dfea6a8f85d3adf1
SHA25684de954a41d0a781d4a689258e16fb1c98e36b2bd19d64416691237420320353
SHA512848dd9f790242256f322897180a08185b32c72f00ec327cf8645d8742dd8cb2de32750a37f9142c53891f644c8f1e360d9c17e74580111b9159fd7a66db7aee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50510afa64df71512840477c96d79d88a
SHA17897342d5783390698fea67b4bd674683684174c
SHA25690100ad45b7cab24408db003afdbac1385bf6cdb79261a4215a9a3a76e0112ce
SHA512781a659ce4b6745f3c8348e736680cd9c325d3ae1f011eb6d25d68e40d18272f31ed99165f7237f96941a6d909bf9ae958e0a817ded5b19f1b235e0d51d88cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc2d8f9e5851d96c1e115934c9e05d8
SHA1fed73b93f4bfe2c24a225caf573b04b64e73345c
SHA2569d4156bc638f219048a47935f2c197a1001b43d664202ebad9667596ccaeab3b
SHA512a13edca6aafc46ce3b6f24a724f9f5f0d0f80c133f9d72013a3cb9a1fe48735a19b06bf1fbd228dde44529024a86570660c184df7f1a2356b80daaeff2c19dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c95426ad3f17c2fa348b0a54a046b9
SHA1ac91d82c064d870feb203bd51dd3dc7385ea184b
SHA256496bd7ce59be4b942145e02dc24343298b1fc6ddd00cdf8c1125a00bc874e8b2
SHA51202fa95de84f31756dabe4d56400a39de920d72810e0b2fc1776c41c57c74a9fffb44b7b2cfd5424d181e73933cc129054f6ad72c291b6e355edb3dcffe1a0237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2019765353089f199ac2ad55f8b8b1
SHA14421cd28c92267ab864be97d14913b8dcb342e82
SHA2562d9e511439a97aa039154a8e7a9a083133dab461e32b71353d2208cd9ef9edf1
SHA5129ce2524c8f8131cfd197afb14acdc0733adf1facf89682c94712e8f6febc9710f45c658a7ef326087bf913007ee6f9954d9f34b58b6571a647a4db4864b188af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee49aa7e958aeca825836c6d865eacab
SHA12467881a16ce07b94ec0c7bcd8091d19326617cc
SHA256c03a382148e7cb655077179c327eecb4f822f47eab64b63af3255e6596cd0dab
SHA512ce196489e90d865b28bc7127fec722e33cb275fac44c69973f2b0aa4c40da20737ccd7ea3df7eac1718af19c2ff111b8229e78ac65aed79c956966757deffd88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e9ca73bc538827ec48b8084d90e035
SHA1b59b9c9a224468a18bbc900d1eff2883f9d8c04a
SHA25652c109326d72e65abbef990a222f7f7c755e7eb97ec448ac3ea01e266bac2c08
SHA512d8fbdaa2686ce6fecd8c1f7cd9dacae1d5c014bec44ef2a86d9813e381b908fbe8b7582f90bff504c14b21844b0bed147be175645ba90ae9698758d3b9df6e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c08c2747eec3aa5082a0c8a056a5a6
SHA112ea6a3d1dfa6ff3b92ca0b641bf4b5ef00e7a5d
SHA256a1c00ea5272736983594ba1565596300225322c72b909e7c1ce14fcce88f1db5
SHA512c05217bf5f28458ec21dc592aafb8f0d053d174a5cd81a889f4bdfdc85711744f5252a5b34138a7780bb3d850f3d4b028557e08f433231d7361a4bc60de42443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313d4a33932fed89805080bffc3b2745
SHA13591f950f0fe594070d113fa870ed87b59fdc77c
SHA25658ee9b7409902c6cf4b8d5ec34f5d7bdea58bf5afa8d4d36f3f203f01afd0c3b
SHA512acdfcffe2ce5044f3f1763e2bd0bc068665a15922c127442a8aa3dcd603f52689e5f203408677b039039b986d07fe08adbf20b6ecc00b31b8c9c26bfd06ceea9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b