Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
fef420086d91214ad43ed4213d1b71f1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fef420086d91214ad43ed4213d1b71f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fef420086d91214ad43ed4213d1b71f1_JaffaCakes118.html
-
Size
17KB
-
MD5
fef420086d91214ad43ed4213d1b71f1
-
SHA1
e686af3cfbcb6d67edf4ead8ee7db33eba57634f
-
SHA256
897c3e92cf6c519a5d12fb11bd68e98600bc2528ead84b06d67def731e3ba0ee
-
SHA512
79eb46d9d0b039f920f085a0cf2583dc141ad3c6c2525e78d5b60e2654f62e43ecbdf3a64ae1c95f9d477da63dd3a7e1e31625410b417fc6f58c30d5939ab429
-
SSDEEP
384:RvyO6Pxgsb8ySXEkCp9li5aOZ4f+JhCrSXS27QLKo:Rvyhxgsb8ySXEkCrli5aOZ4ZCk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3817C11-7E82-11EF-976E-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07e80998f12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000008a92b94d6abf9896e6da8e28275879d68e8807f2f4fa1c7310f4b119791b11e3000000000e8000000002000020000000b2a9e8b314cde9229189e9f6b68cda54cfc6a9526a4a2041dd73751301ee934320000000e3c6961a82c3e7cdc7e61535037218e4dc7caad13574fbc9084e12ba7c0c6fd640000000f90b2942d811b400b9ae1392f47aecca9182f28f52ee3064a241a66a715984c8701ae03fc2631f0b03df28f602631c4c8c195aaef6f7b60def83f0b6ba5a82be iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433790423" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2332 2572 iexplore.exe 30 PID 2572 wrote to memory of 2332 2572 iexplore.exe 30 PID 2572 wrote to memory of 2332 2572 iexplore.exe 30 PID 2572 wrote to memory of 2332 2572 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fef420086d91214ad43ed4213d1b71f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48621b18a0af2a6aea130860565ad37
SHA1c51d47bb06aa404e0519074c2e8c2cb5b132b02c
SHA2568937b9b3c733c4f858270a1cc41ae5eb2738d6cd561e6013311d4eaf26d9d699
SHA512b38e66f9382ede6c6949bcb97e1f6e2773f7a9ed999e0f73b7b3c6b2a6ad6323a812551fac5c4ede253213bf91931536e25c63f2968c6d1ddede29063fc4f6e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac023f96d3ba8da40283191647774d1
SHA1a31e3c2aa3116d58a10a825b0db7e1f7a78fc5fe
SHA256dcb2a90e7a762de1a702e56393cdef297e6f9f78f9cdaf6470ca9b318b75f0a3
SHA5123bb92fe5962a2529cb0568728fe4ebca88cec16521c2a6bb177313eee40e9f3a56666476ccee7381f5d1cd9b4f3511a3d63b958c01b7f9aceacb194dc9d05da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cde95eb6e5ef19b102605588e249129
SHA192a3effa4db14458f45968a5ef5761357a0a0b10
SHA256ed84d79c13ada324de5f11bde80bd16aa46f861326da4108ddb6e7678ed7f15a
SHA51271164f2e2ac054816b55c0b30cc6d1eb500f89156c2d5d5d064a35b230f38adb897a13b025077f2f7e0937a8c686d06aeeb41c0afc5c04834f4e6f7b3e705681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e77452c9b0308bd29856b5aa59ac90aa
SHA199dd9a8606be6463b4672da3ae706dedd60edfa8
SHA256fb83560a712deb199d910a98db03e7815b7bf99fcb6a9edc3d8664b35846df7a
SHA5129ca067e37102e7cd15b8acf10b8680b99980495379ac986a652ebadef6988f938346a73c9667596adc921a9dacc04af752876451294dc693cd475a512c4e5846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d5a3f5a58c3c62f7d97d82db004bea
SHA118373ffb73774f4fcd8c87954acc87a64eb8ce2b
SHA25615ff542bdee6ba3205ce2294598b8ce89dd499712fdf79dddf3d3e38aadb30a0
SHA512dce67e8e6f28ea977ca4550f9e3bdca2dc49c1c1d2f6377b1fa2baa6e1ef4b4938dce0d05773d2ea28187f047d70f54e758b7752874dac8ef53211815fafc3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542672634590b48c0eb7ddcc9d3d5cfcb
SHA1da7f323993be65cf8ff9bd46202290706ee130a7
SHA256dffa86c9cc67f6520df60d68c1d8d6319806aaaefc1d09771e0fecbcb44b434a
SHA512b5eb00cb61d30845de44e4d5ed3f789ba6720acc051a04d981b6e49f304be6c90f0fe868cefda9ad7daedf896fe0752f4536bbb8e3bfb9292b5cd04da209de76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d50e6c5995c49b6211d9b074c9d2d96
SHA1b9df7d2a2f2dd6c2f5ddb0f8737cd1a5e68cb882
SHA256dedd1a7039c3217b20b0c50fb6777260926a34e02c5345d4dc072df06117568f
SHA512165dd844c708835b9296d6be5b7c7d5665d7faf764c54ad9e6a74982b3b301247110e9b7530770123ae4a00603fdbb7172b5dc6dc08929f32ab21757c883b4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004cb4a1bbba01a33d9ed5bed6d36804
SHA163518b899fdab95535558414d8f6576c0f85a93a
SHA2569f28090cc9e0aea9c758d06a745064bb315cf7be92c6c4f41f4d55eed966f0b5
SHA51200375220a22f844617758964b11edf8b2f6760507fa603aafd151f915af073d3ee1346a42ba8da9d65e0b221dd53b777c999d6d7f9274028ec7ac5a9c0772f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9bc6afcc2eba6a089db97bd5bca71e
SHA13def51662ebaa496a69a3273339ea513151d644a
SHA256c1d8bbb45610d7602145772b4c7ab0f87f70851605f54b10e2f3802d721afa4f
SHA512fa34d966381f922ed2de4b2cc7d41ba196ba205949df53a08f90d44d7b45c75b47ee4ca75b0b88d0899a579abf40c16c57fb60535e7c28209c4d58a91243c4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bdc5bf8f8971aa52bb64dd386ca54c9
SHA1394267bbac66806161f31ab074289f60f162f45c
SHA256d2bf690c05cf254e529b5c5af9d29b69e290f9902a05a79b4229159fb6ba99dc
SHA512667ded36d4d1adde78190527a5f3cdf451468d8ac71e251a407f34e2cf5e85f765b238c48c87e7e98452b97e038c0ff4f8ec4527f7fddcc35e8fa2925fc3e284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57376a68290cf50fd6ce440d7e44e2c2b
SHA10094a006dff85a13353e244ec939223132985224
SHA256d48c69b013ce6dafaa21e32726d08216683c9c3b6e974876dd1bfbb32d6ddde8
SHA512d4ac3fd0f021012d880a7313797b8e9245041935adaf141db43171ba144f588f7a71639855d9ae1f17720b694eaac073a7e404954af69936653dc462d7e974fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5212ae0e3a222751ff1a77bad1de2321e
SHA1394089373a03df8a1d7c3b907b18bf6115366418
SHA256d638629ee2be9fcef7ac9f6005ff072dd4c5abb33aefd8d32d5caa0973a9fdf0
SHA512202cda708467288a3704bbe6070a1e13c29fb289295fbcc11710e35dd0e1f1d93d205df7bb431310fe31df9d72236a9daff0776686200a5358d7dac8b7922723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0bec736c67e14078393af7440057540
SHA1a66cc945adc021cb971d994f99e5a2d3ac6c914c
SHA2564762d4007a8a762bb4465e746de56a3c5803b9e2c065570ee3fd7f42784250b5
SHA512bb6acc675fcf426614fa9748a446f158e8a8de5e941601f4cb2e11ad03f66dc40ba84c4a7a47c2ea3a298e43e63656ca3c71daa4a906c64e7d152ea89b09cb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d49f16687f805fc8777bc36754e164
SHA1aa9d469aaf700cbd1895f75ba513cfba032266ee
SHA2567b1c86cbcde6330a447fc6c749d867bf12a706202d06e988ac9b63fd2cb39246
SHA5123eef48ef6bd50bb986f00a15c111f0b6e49d12632eb1de03fa4e4f23314cea2ef5fd29a08bd7e58d97d62e1ad0a79d7b7efa36590b77c12358ff6f1fbc7e3e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ada0e1e6755450b1e87c36c5b93adf1
SHA1b0e5de1c547e74d11857936ca40a1da1898ff81d
SHA2560b7de417013e650e62ae2ea32c8881da852f331b172ec879442b238cd9c779c2
SHA512edb60eb2fa64d5cf8b8c466015b717ddd104444b9eaf5f103387d841e40fe196876a05c7923cffcc9e8635a998cc49c341325efb708da949a3d35b6d25415892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b65b22a08a66e8e20afcab3b8b8eb84
SHA141ee5c9901a808d54903772ffdb40dcd59ddd0f1
SHA25678f16e8baf52afeb56d0ef5c371310de3e112cf759dae19d02e1b154c255d0ac
SHA512b9b43fcb2c4971b774c408a968d58658bf9376c3ae37398453eb75a8e39433799bef0c3ca84ca60b1905428ef4d8d80a2f28a089a4ac8080775e4e09950d39cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566edcc9ff8d7259f59f260f7c00d5aee
SHA1da8c63b8b6360912da1c1e297936c83a2c36476a
SHA2569d931f6e19bfb4493242ebede8fe1bd4f8926b94d47da2ec09f98a00f49565c6
SHA51261f17713da91b8121a9e8a3602addafd69a2320570e2635a13bdf852bf49e3376a7bc755b017d715dcda27a0864bc7e333a635f8dc85c0626c29504832fab94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a65ea85b1cec1d66349dfe3e5a34dc4f
SHA1d07cc6ceb8a9fff3ae02cd3bfffb134890d03ea8
SHA25634e07da9b8a5d8cf7456dff625cb6e05322a067cde255e1d76620e4508ee3a41
SHA51293f5ba3ccd3d793861b25c4e974a4edff91aaa08240564e4bb1aa24439ac54b8e4e9016df132d74d10bf370c83a0bd8fb4c9d58176bb60d8d923ba5154ae70fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b