Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
febc6a6d3d02b5b85b7568a724d0cb12_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
febc6a6d3d02b5b85b7568a724d0cb12_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
febc6a6d3d02b5b85b7568a724d0cb12_JaffaCakes118.html
-
Size
1KB
-
MD5
febc6a6d3d02b5b85b7568a724d0cb12
-
SHA1
2db459ce26520c8b3945bad1dce061bb71e02687
-
SHA256
7dae3b3883d249ffac4e3c95fa0dacb68b8a8c1e7dca37dcb815f6966a8707cb
-
SHA512
d26b5f930c782c26f174c9d396a4f41ae1a3b39a906e0c4f802ad95186c35c4979627a24c5862ddc11751f4a16431c91da07d6a307771feec46d972ef3a09296
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62F41131-7E70-11EF-869D-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000005803c98e93d11b6e55273ef5aa5f910da187ef802d89e200f99206214b8a1ceb000000000e8000000002000020000000e28885fe1a5866aa4037626611d0cb3efc3464d21b7974900e98c74e58db19382000000021ff63eecf7b55716db4a6a0d899a96134579e985a883605a95839191927fcc0400000007ab72bdc393a20c5dc71db342871ab1d771b93467df1da759f8603c663b8b9353308d87d680c8efe77018e31468a23180fdaac21a4adcbf0fa6e8c03c37e10be iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9082193f7d12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433782530" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2176 2072 iexplore.exe 30 PID 2072 wrote to memory of 2176 2072 iexplore.exe 30 PID 2072 wrote to memory of 2176 2072 iexplore.exe 30 PID 2072 wrote to memory of 2176 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\febc6a6d3d02b5b85b7568a724d0cb12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b730a63857cec15f74769744f3298385
SHA13bfbe66b9be397e38f1585141a292e7906296adf
SHA256380bfc8d5446f810fcd12e6b1ca4167402629579443701dfe4d8482b2089287b
SHA512aa118b322aad88839ca18ad5d7c4b6f99857166d7f35eb8fb49119717cb9ad8ac484c00c51ee79ea9e09fea01e8607675d99ab98fd7ed1467f4a786de2f4a4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c21cbfedeab2fcd33c6e67fea37ff40
SHA1d720bb932a0093f19aa8d2e653f304bb2ce1b6ec
SHA256f9524ef1dc8de251df5b5c8fd922f43d132ea2b6f04dbf1db138ef5afe843dad
SHA5123e90f866b160b2763828b867760bd04cb1a60bff0b7a33626d7f0d80515c0d622d51bb32c2d0beae7c764b18f0359f7dbdd532012588b67efbdcb48a9306c9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ad8edd8d92aad76ef179c147ca3dae
SHA14a478c30e8fab1356fc389952f2797357c681ab7
SHA25667cf98f3f8db39cd3cfc6f5ec9f033fbfcfc7ec7943a9fa49724ac943caba74c
SHA512b6d161f7e2b111acd46c0de274aa54eadeb34192ff69ee68a880c557f13f8fcd2c4ed14bd98bb370b620e8beabba675a76f90eefd75ba48fec592c6dcb3eaede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6b1113f311b3b42f8860db4a2785d4
SHA1bb6b57e89f38b9ad10294c24aba6a05a73d0d8e5
SHA25697d734207114e643892eb7b4194a2aaf96f89bbb302dd3d1833d11f651f5d209
SHA5126fd74623d487b7cf5147ef67d0c3ad18844f9709867c838c2f7c303f33fcb28099b87d0932ca9c4513411e85ca5333341707f241dce0e9c64efc006399c33b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec19da3f0aa256d3973a41056d1b5ab3
SHA1aae936bf6c5ba93462bf3f4013bafc42d06e329e
SHA256941c6708a92e4f3043fdebd92c97fe754c00814b8ff11aafcde8992a3a6ca7bc
SHA5120f5c9eae4ba2743bad0b102bd438d6dc8626dd6e62f7c6557f62db2c48784dfe13425389111e1167f628f4cb0d9e78f22897f76b3f55f5fcd5840ba8180fa395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738d35e176aec9839cb36808e0158bbb
SHA190536aa826cfe69be2596e87bf4ab4b2d0197f92
SHA256373b0826b96e7519a101ad4dcda3fd319c633c31c1e0beae8ba83a359ad272d9
SHA512512e32f491b05cd1b850a206712b458584b962bec071af90f9de947dd3855f640b9bc3c8fbd043b3d9a17964ad4ff2f9b5529a9bbd38b5d07924240158cffd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0fc9683689989c809990099ff842e1b
SHA1775bd2fac31600e2f22f3af8facb28d3433d1b66
SHA25678cb40f0f42e68429348aedd8722d0fa85bbd0d95f6fec649168b821ddd7c9b1
SHA512f68063375f002bb3b6897fa9a65bf74557506609af23c3bab9015ab85946759b02bc260b8bfbc5eb04f043a1173f5beea3ee4573fb272293bbdb7b15aa715e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574830b85cf721f4ae9a823e91a426c4f
SHA1c0ea571c8188531bf8d636065623baeced1ac420
SHA25636b0a1d32263627f9b60e3a3cab50d381a485e0b63fb7d5803b1b98ea149fe1c
SHA512b88fb8db0d01ac26da3d18a9ea3fa502348c93db0b3a93cd82851484c58e8c8660dbb30c5d622b797531ee7dae2edabcbdb917b5f0803155f95cdb3839c85dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568716a9e0f6faff166d4fd73282b5637
SHA11907eadde8585c9c76e19254c882776cb5c6c63e
SHA2569199bf8a0a5a6ec67db2d20774600e21f9bda0b1627febcbf852590d4badb585
SHA512ca2304a5a1afbfbbf7f0b2507d14964d104827f10c67f5d61e3d55576d5756b692becf5e5076f28c72c409e4d352d8ada149b3f0cc100368e7c372f3229419f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce25df624f5136f5797d9ab45ed5cfe
SHA1790f58540d314168b901d93c85095c8ee3e02309
SHA256a79389a722d1092b2f9bedbc835ee4d576fc29de6941689f45f969422298b117
SHA5120d4a1918b0bc9fa7e2084a528fe0937e213653cb356ab85dacdf1178b1a0ff1106bdcb05f7b84b222bacc6fb132d7c3ed5e75f73dc7048cefab19f74595d62ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509693677ed7fec18d500ea347813ab9f
SHA11e9fb0d74be8211b5c6c583745206db31ed4ca53
SHA2568bd2fb5935e715092f3650a0fb26022956122cd4d34bc0c6b7628c64f4f4b7f8
SHA5124629081961b203a276bebb64d41df3f5d57085df7f5c9e4227125f70487c13889fe4af8528edc843e70395c4290476850a8002e0013f24f68125f0ce79a4ef5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf48f99305de41941c47a088a7c5dc70
SHA19e237780a912ecd04ec5c2d99f3d2dd2743f63f2
SHA2561da2011dad259cf50032b935297b3774678aa5755bb58024a81e2acf03c81b12
SHA5123f591d4351b331814ea501ca4a1c6499aa293bc347c42d231e08f368a5691e32b06e4609d37decc1755d176c465c123af85ca8a7403e2c21b5bb136c1b99a6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1633924cfbbb9e28f212d7a4d626b96
SHA15dba4921dd94965cbb691ec6ff72af496d538bf2
SHA256414b9601dfcdb9917b126df1c2c0d9723508a368f3ac5c51890a6c3d72432c34
SHA5129acea35e76ef36b9da7a78f2d23a262207ce735ed287772f3752fb8680f3b065b092f5e855a09e34dfee547d6cd6916ac3fef7875b5666e5f7225a8f10adabfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b9856b44cb9c041c927c79a4afd7bd
SHA1f3a58682beb6424f145c32d6ac62d98a421b59e5
SHA2568c0c725ac00472fb67afc1e4965ff053b6b27a0f6762277bacb5c566ccbdbe4e
SHA512cc8686198ee43e0024df2435ea382c06f1f8b2d68837c0be32eb25e59199a2cb4aa3b8ddcdf3e4f39aafa3f8b4bc2d1b267f97989c63c5d1b494593c7daa497e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e42c63c1f47f9e8d1a1db5c0fd8749fc
SHA155cf3d4da4335f6307b1589c10fdabd6a5607af6
SHA256f1620a252328c8ac67bac5665c031919846ce362a0ee10a1f6604d3ca7ac3280
SHA512895194bcdd5ae6ebd09494f46ae78b7da53baadc97372d88e10fcbb783552407e5e837bb2a13bad0ef0a447efedb4967a17fbbd60d8eb4bf26a4adf7810f3e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20c09dc1c052cd4d2216db4fb2945db
SHA1df2de50fb23bc99f5f0658f98838093490a01bb7
SHA2565a7d568cd457fc3f5a1fad8b15b6d400642a1a225ba5a828cb51977edfb9bd44
SHA512a508a6f65dfa6796c1d27ee27f1a7de31b5b1efa3cb3bf9c3d309029e3ea641593dbafb7816260003e7e04f4ae42917914cddbf7fe611f704e83458ebcffc096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80268dda4e7ceec16dba9b54ad02f31
SHA15dd44220c95e9563a1929cc7146eb27d612cef14
SHA25615e1f7ebb8e730a428e100be959fba1fd74d3910a9fedb55b523d73885e0eda8
SHA5120416e2d856c03cb07f3b8d46d4370ce4093233294045c02e8b6d3be8d3118a1164326549dc821fda799197ce970f744becc87804645af5b4f6b336085ea1f9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cbde809253e8fd2dd8275ca1850b3ec
SHA1cd403c26627c6bd7301fd60221a337dc61d68ab0
SHA2565f4d64f73822ea6969d3709a3238a3ba9f764036ebb8ed57dffebc2340cdcb52
SHA512529c1019c85c2db6eca898ccd50024f4c35a12947215ce0b4e1c482b810f9e42e8afc5dc8f835b3292b822f4b2b15977ec419d75f861553818eb6cc7bab1e0cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b