Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
fef489ab6861b22776b8bb3ba374a968_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fef489ab6861b22776b8bb3ba374a968_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fef489ab6861b22776b8bb3ba374a968_JaffaCakes118.html
-
Size
81KB
-
MD5
fef489ab6861b22776b8bb3ba374a968
-
SHA1
86b117f7c3703eb0a2ca1291e92e72b787bed788
-
SHA256
8a4808f634d73ad8ab7eec44b0b2c1a82a0878b7d2c1865f37c5ec2de8415b47
-
SHA512
191d3143ce6b74680d5d365575f13df78392f14b4f4622d44d25bc154d3724a924a4059d93172474415173c90f70d0ea00ebdeed49bf0418894cb8113d11a63b
-
SSDEEP
1536:hfesfIsGtnVNrmafKvx+hA9UtnwHECO+iZ5E:zwsAlCvx+hmUtnwkN5E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433790476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2812F21-7E82-11EF-838C-C20DC8CB8E9E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000047bccbe6a62030955c054b055cfe0efd33e3707f1dcff63be476f5f3f7fa36bd000000000e800000000200002000000081b467ba58babc52d4dfe347148d64a5aeb4f6aab9f673580f6a21112e9f1e1220000000426868e45beaece8ec6172b501daac4d000c0ae528e9840c279ed95972a3c14940000000074f15664f5d1972a070df02c6a26b204f6e7f1404ce0b3073d451149057fbaa7bff2a7cf63a6c6e1993b02208904da8f90f12d8e8d851295f2d0b723f7ea3ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0fc7ab98f12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1496 2536 iexplore.exe 30 PID 2536 wrote to memory of 1496 2536 iexplore.exe 30 PID 2536 wrote to memory of 1496 2536 iexplore.exe 30 PID 2536 wrote to memory of 1496 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fef489ab6861b22776b8bb3ba374a968_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5efd569784f231d633d9eae2e4a2ef669
SHA1d676dc22322ba7e014bac491e94034e4136670c4
SHA256d9bbcd7a2cd1402184f6c3ef9c636fba6c4a848313d2361ed0671f1f12fc50e2
SHA5125977138cb3868d2b7ae41fb6cb3ad767f012e80e4abee10943842725e772684d955483faac9b8e699ebac80e84cc873b8d2da707f40d2328528806f920fead43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c5846a661c7ef10c09229b571bf9fc
SHA1890c93f2d49502ccb0548f293a56d2c57a265663
SHA25602a4228341f8af7cb1de969b12ec6e7b308a8352fe253b17ec68b56abfe5a116
SHA51234e799ab45b327521f88f766bafdbc31dd28e248fdfb740c552316542c2c982d594247a9fc942d30a5af17721b3d02095e820436f75c77e90dd39241578b2418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5374c12779f98aabf1b14717c236b4eda
SHA13b99799fdf2d9217bcfd1105eba2868bfb0ed6d0
SHA256e897d4c3ad29c7427157b996466276c5d3f808d938dfeadfbeedf78a484764de
SHA512bb7bd54585664336a2153b4f7ae9bec153f11d04c868b1c3a2d9f5378fbc7d1d7e79ca46300e9d7dc0f059665b4fae4b19a2e8f8e44a7d08e9afae4534469019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5247db305b0c65bcae486740dc85ff103
SHA110b1b22c9df1c7f817d383ead3f74cf494f998aa
SHA256d37cc5131878881487b34bf717412301ba81f8dd627288b1ab071e0e34780f3b
SHA51274c82030c7e2970becfb0bc00e0d1b420ed5186fdfc09659356e53af649bb6ab3fef8d1da976ab97c7e1896a42f9f9841d5b74f1179659d2ae05815727570531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de0c5ae994ab15de9ef8948492b721f
SHA12af2babc6814cd2338978aff2cadd2eacf587f3e
SHA256f4de9dc520ea1656023e0830d7b54dabf0db88655a65a790af40aedb2afa2a49
SHA51236b30e6f42f1946d62cdd1164c96a7829530cb377d526946f7d6a06ae02c93c94a2f5df23b4d44d5c821cd256f552204cd2005367e7657debc07394671be0f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db8512745f3353c28005a15127e2f4f
SHA1944ddc6bcaf4c8af600482a14c9254cd39829f03
SHA256b2c34953edf0d2a5657da9333e532e715614efa433106a43a09a4c363a0ac5ac
SHA51200b1fc53a86cb4d42064e4f985a4068d52a72284fd9e7cc045a02fc8e8e1c3e7dfe779b39ad1a56f0ff33bb172c162076dea46b5dd2715fc1dabcf629059fe2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57efa3bcb1ec841bc66cec1acfdcd26df
SHA1bacce6c2d8238a19fac9e1613bf8d48e3c3277ea
SHA256e0f591e8d2c7f34fac991e4347f7da14eea75967a33b8fca6b599de272bd106a
SHA51282861510f0132c15a7b3dcb61f1af4e14f2ffb2d3bd6dc1f78454f5dddb6a12f3e28225ff13b1735dc78c2403d5c43e3e1273c48376ac80e98f84202ac0d9a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389a39496966e6eac1997eb9bf7f387e
SHA1c73006782544fd27485f614317c51d62dea0befd
SHA256013684a077fee8f0437a8f0467ab03d8cd404318f7a069fadb0206850570589e
SHA5124d28c7cdcb42e12a6043f081ca16d0f52bf53916fc407b1e52bb6e6d1adeed035031afb64a3f363f7db51767d91e7cf12a74275d1162e0ae98a59b102ca126c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50467793ecc2eaadec17f7592a2da611c
SHA165f9175b5a271bc631c2fab257ff6408e93abc01
SHA256b64ba5a5b9462765ebb2359ebba6416618b9719b0c71277534b48abf2a4e8135
SHA51276570fc316e9d1dc9799e9a1ffb73e833201dc352f6e71e07750ccc7cc7685bf9f765a814e340d2457f2450ff034ef93d450bab749cfdf58f632fd96d5555601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fce20f927cff5955a77aad9a2507127
SHA15efbb4268f71c1250d7fcf3ca76332075b2c0e47
SHA256716063d16e2adee60facbe3cec12ac253d4ea4655de13b58cbd47c68f0a36a3d
SHA512290dfc02283156ae3c1337b219b1d8e416d4bd0a773f013638bb8df41a7dcad4226b4fd4478ccdf08dc47dc686d927fff5a3c08ab17835b8dbeb0f78d32b734d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f719696979002145324281af9e95738a
SHA124e1bd4f69ca003d427b6b309684346b99e88c56
SHA25632d6c7376449ff9cfeaab4b6ec252fd1736aa6a5a96127bf8d013e00d1e06622
SHA51221612fcd8d02f48d121f7cce7914af3afd44ef662d8fa72450393dc3d54f3e15bae25109c2130bc32723028c1b6bf04dc3b5c4650006efe3c100efebcbc4c88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba4a6815a5af06b7a80ece8b5f72396
SHA10fdf3eb4a74fb5b76326953c159082c47da0c44a
SHA256a5d357b6b92e3b09388c361235d54db3feda6a148aa33f040b0f519867cc17ef
SHA51224741148754ec917a686b4aeecab2ce6a47be6399e2232e57e23acf9be77413c9673ed1f42a3576b74c611bdf1ae8756361a634815ec7c44b67078f9b04d5c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5cf3da4ce78832cb6ea7971b50a270c30
SHA108d9464010b6394d6d9943d0a95c0ae113349ed3
SHA256f6ce315536957930d18ec78fbd1525c7a843c095f8652d8e5460c720b795c228
SHA512af2169fa0ac85cd57601100eb48c5f45f967521c9e58f876ee33dfdca13c641ff3f116c9b3c42c8b3f81a151bff6721eb4e225d0c57c39bdbf2610642dcb3bfe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b