Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
fee7ed13748e95fed0cae3653953a268_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fee7ed13748e95fed0cae3653953a268_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fee7ed13748e95fed0cae3653953a268_JaffaCakes118.html
-
Size
15KB
-
MD5
fee7ed13748e95fed0cae3653953a268
-
SHA1
50a97eab4a6743dd771894f542bbd4bb2157eddd
-
SHA256
cebd631f49b4373b76788a28889c27ab72672a5422d6f96581a93a91bcf1214d
-
SHA512
40b7967c5b8677a8308dd182c05dba1cd71ded8c115e9ef6600aca2a0690123578088af4de380abeb350494c27cb78a5b977c08df704321cbf5b251321236dae
-
SSDEEP
192:pren8VwgJjYXGAf/LwlLuuH8YRzJxtifvdLFUPEQd0lLXalc0Dp+vfRD2qFKlT:TYXGAf/guo8qdvCvdLFWd0lDaZtEfRK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433788772" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000fe9bf8d9ae9b4aa15309ece356986a4add740b372fac9504fd13579bfc3d41c0000000000e80000000020000200000004a67d444d9e2f08e0a8646bf6217751a9f0ddf8fa939af9fca6a298cb9d4b7e920000000470ba4986f7a83a80b05a6932ccadce0819db324194e72f9f6155b3bee03f8a04000000020b390bf17d1f575029fdb1357681b76857dbc4e43948356235a2a2c3072ac129c97f2eb8ed03a65c84f865fdbd2621c22e4d710e4feb61140e7ce5f1564a258 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB72EFA1-7E7E-11EF-923A-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8081c1c18b12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1224 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 iexplore.exe 2444 iexplore.exe 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1224 2444 iexplore.exe 28 PID 2444 wrote to memory of 1224 2444 iexplore.exe 28 PID 2444 wrote to memory of 1224 2444 iexplore.exe 28 PID 2444 wrote to memory of 1224 2444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fee7ed13748e95fed0cae3653953a268_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ece4440864d8d3cd00b940a815fbc93
SHA144be1dad5085cd01b626567831afc08808c3196c
SHA256ebd6e103934121aacbf9f1f3a29273db40b975446bdd9412834deb9460f4ebd3
SHA512cf8d7388cefac34af2d43474b226eeacb4349d333a27f3bc9c061533f9f6cd0e7ec75c3a53996e3b3ddcb5305f789a6e9f814cadc9ae4c8aca9a896d7db55115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99751a9f366e2d2975cfc53c1cd07c5
SHA1a52117a7c79413fa02f5729d13a4f3ef436a1afd
SHA256b2a2f43bcd26d89132c2fea2aec841e98cfc727c3d9eb9492ddd02cb53fedd7f
SHA51245aeafa5c2a7cca0bfe866cc1ea91c86e53270be9123831ca99f414432991047b9503c88d6b78e7513b75124e836d1c4654b05a24337908eb56aea10dc29371b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509ffd114b2aacaa84a60e564e39cd678
SHA118a8eae727618abd1c723cfaa0f9b49988eb22fc
SHA256ca52534b4515a4132c85006e4c84a23edc548f87e0d7b9385d60ad86ddaf5e40
SHA51201682f68483c51e7727408fe8c27a7bf56c3ef1e82523779427bce12295792974e1bffbb7571f8e97ba10a39f0575f4160cf88e1fd33f86fdce40cd05dab20f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57074e9897b8389bfd39657bb3ba8e2a0
SHA15e1d86cca34acdb8da61aa91e3b489162de1a9a4
SHA25667701202dc2875b50cf7c5cf103910a3232321a1fecf5d9808d93316f04f1b89
SHA5125ea45fd232b8afc8edb44319fde22696cd369abbf02ab2f59e80df5bf06b3b3a9a644c4eda22bad2a2b2e98655b505da4b599667bccf226b525e62634903875f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e005bb414c2f8023084adccbba264a
SHA1967659eae35da93e745a5191021b05ca92103bbe
SHA256fb3cf3ade542ed6746766a2dd6411becb28fc3068d4e20e67ab99410bd86ce9b
SHA512518fe5b8186edee965038db44255767d9159cc8d6471034f3b167377ca8cca3d4e22e4257b05cc582d46aba50d0fac8e35527ebf21e79c0b4908a72b51de8cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5890c6c4cb475d5ac7a3e24d012f0e568
SHA1c4dba14b1b9a621ec6b33cd3cc02874c6c8d005a
SHA256326e5b6915ef337fb157954339336b5811a7093d5efde69c53b482a8bedcc567
SHA512720cdc1bb75f39ec21b7689bf7c444449ea38640fc874822eff3a1a9077d879103bfdfb0d7a11b91044c51ea7fc7adec724422daccbaa4a7482267e96a6cb84f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5799f0520762a042088a2798d1f6ec0
SHA16e9f9205f131421023bd38ab5f5d02508b444c88
SHA256ecee33595937d9f06d180182ccb00977dcc9b0e00e11e9fdfc95cad726d7deca
SHA5120e37f7b54eda90a42d63dcd6bab8c55e7be12795326dbc0f71f4f7c23ac96f1684d8a6fb4c09eb7799ac7400ca0de0d548202b2814af6ee83a2c53ebcb3782e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d2d0bff79c723851fd5943c1c5380f8
SHA18960625823e70b406fd11ce3172ffee9fecbe6bd
SHA256961b51ac34bf345d05eab8e30df90b62c09095e9b04317036c9520a140f6e776
SHA5126595fef2a2d024953ff6e5eae161c2cf9e655defe2ac50fe342125b0daf5825ba7a006d03d94d95fbd4bb5b7d026d47e49cebc6cbbc2ada2da377434fcb1313d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de840e7e989114eb7c54f7d2fa110fad
SHA1b17b05d35ba66e84c14ad19486ed65c672676113
SHA256ffebb15944849a0ae14e077ddadb2f8bafe8d38de246c3d57e8fd8ff157cdcb4
SHA51235df3b576591072d4ff58a54015cfe654ecd85dbbeb74de1fafba3b3833bc32b3b6e9c3b39f134d8ebabde2c3b371438d54260e77a9c9138cb136e8fb1b21773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f26454c8a098cc4f660f18d34075f7
SHA187eb28f6b4f9be8737e51d761a651f01c9046119
SHA256bf4401b4c6dc5ad6279e2bfc1fe58a3696b02d74877d832108628c6aab308b33
SHA512dcfe46edfc036749a99f0d2605389908c1d026a975d70fb78e708d17db984227ab22abc2e39ea33ec103af99850a1384e2358f9f50b946074677aa81b7ae5595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f5029fb6d987aab5c163b07dda0ee1
SHA1cb371f88ef5d2b760f1238aa9c3a5dc1e20d2762
SHA2568cc183dd503eb09fa281e97665e6f46eb1f5b56e8a4128f31a15ce799c5db499
SHA51261415babc93843f503af5f88114b83ba0555f3ac451c825648520d6d62cf321daa596e55d889f925731ba224c840ebdccbdeee035ccf0483508bba741861ab54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcef06794e1dcc33548468347a7f2e72
SHA128d051a901b9d0b563339fbb7d3be5a1033f1b42
SHA2563f10d9325aa092c58f0a8ad4a6495a10f5fefea6febc78a325101abcdbf6acb6
SHA5126ad67c37f28030c2c5466f60a11d426819ad615802371ed158544229228683ae0af4817f479f4865a8a0603f01d44033f14ea46fccc484a9ca36052fa0af3613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5606ac93d90c155e701ee2266bac93351
SHA11c62244ac5c04d573d54efeed0144d4e9aa726ce
SHA256f3ee4e884b94fa53b05f78e91f0c638d419dab060d4f84d40a6917c47147ba66
SHA51254b5791c1dd8f5c862fd14d4529de8cbab28c5577ac21810bacefc6d4c031af435ac083c45f0b901529d0aa972a5582c27031d3a4aac9d45bf48322adeedf144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50621199fe83e042c7da513f991bf7ccc
SHA14a30c337c44586e5e93abcac1c5f84a28f3fb316
SHA256d157a1c77bb2bad003d1c4d4fd71b4a865bef67318f8e08ae8f76bded923ee02
SHA512b78631655d6906f7332bc32d72a84e8881ccd64e4b295adc11cfde83175240be15b434d6b10b52919aa6c70d312117aca9fa537e16439cbe813bb824e7852861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee449ec84e440d6a3b3c01d695defe8d
SHA180b11f2c7af4419cb64215d0a49060dc1c98df5d
SHA256f3101d07166d7cc6e9ebfaaa0bdf0851667cac127efe9fa09bda07a2d17841d4
SHA512e1a45fdd6985021ed20a82f08ea3283858066fe203b0b7fd72fbd36552e01c0796c86812e6103ffb180c4d2023ebd82417e3386c743cc10128323936b9018973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8ea2f45a9f59b7e53b90945e707474
SHA12218f822460551eca0c460e33934d924a1711849
SHA2568ac2877d8ad2e7a6e996749054422bc88a8c4b4cb99b3eb39eb6ed8c449c38a9
SHA5127684cdec49abc10c05230d0b358298f45242079c3f23deb48c0bd4a240bc05abbb40545ee51aedbd632d69080b1e93d6357638cdaa0520fc8940b99b2598de6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d3956eda78900624517e7740f51764
SHA1cd3184b008523ed6fa0cd374ce50ab4986e37ba4
SHA256582894000759cecbaa9443e07f1e1020b87ca3bca6f2dd26a1ff3dc1bf93555f
SHA512657467856b2d673d046d8774d9d8b484e11f710e68d91b7d80bf44d7fa3ebba1756c48f14b3ef2de5d5eba9d8eaf810e7696a53bdde26bf87bfe4b745f8aa42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508610ed24abbfc2cf8123be3a3cb697f
SHA1ebe6ce2594d5f1cbd19dfac130b708d521535c10
SHA256648db918c218496da4ff53fc6a9284c6484d286caf0847991d2f2abb37109dc7
SHA512c0a00186a2957b1ed167972614e1416472d8aab6d6a47cac3490e01fd8699bf03b200a68f52920ab0532c8d486c927a30eaacabefe91210b641b937ad9d072ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b