Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
fefe64166293f6eabb36db2299a84f34_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fefe64166293f6eabb36db2299a84f34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fefe64166293f6eabb36db2299a84f34_JaffaCakes118.html
-
Size
67KB
-
MD5
fefe64166293f6eabb36db2299a84f34
-
SHA1
5dfaf35018d255f848a91f18b0bbde98d91d25d5
-
SHA256
fdd07ccf0625d73ccc89497411f28bb348dce3ff2f686a6d7afa3d3c5b18905c
-
SHA512
c9208c19b16d3b5b45c438583e0a8c8951567262e0408732631a48f4464f50f9e7f869452639a1bee68b16edff03326446ea50e3696dc59ea61f9fd52e9f72ca
-
SSDEEP
768:JiSgcMsSZ8tN99OIsKwtWvL5WvlJ0GJ0UQbJ0NWv7oTySqQCZkoTnMdtbBnfBgNy:J4WgkEA0TYPec0tbrga6cuNnzIjv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008a4fedd261739983e39771e48069f6eac1698a6ca305e19dcfd4fc9d42855a96000000000e8000000002000020000000ecb6e72c86348d394048163700d4a9acdcb317228510dbac3e94bd0b520186b020000000758e59834909424e0583633111272e08643b717881ce23c148f741ffe22b6aba400000005a90de3d4c73635703e6f49402331eda405d0803122df043368927bf80ef674f9b760f4bd10af07af778de8522ad00d071e333091bf8a1c8cfbee211c80273ad iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433791923" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b248159312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{403F5301-7E86-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2848 2136 iexplore.exe 30 PID 2136 wrote to memory of 2848 2136 iexplore.exe 30 PID 2136 wrote to memory of 2848 2136 iexplore.exe 30 PID 2136 wrote to memory of 2848 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fefe64166293f6eabb36db2299a84f34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b35874db8660e6c6a37ba2106cef3d5
SHA197b14f709815220decbf398f04cc9d3603f40b57
SHA256b9dfac1b4a7547921070cdd5c939d49d4a07b0eab84eef3f5b28334b7c5066e0
SHA512a1d2f409b505350ebaa97e09d59115914ebbc2be3e95d1286fe5f1b72a6bc37b06bf56875c836ccfcf08a990ee02caff6999c10fc00ab391376c2a8b7d3b2c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea81ee2ff2aea32a174cd8e981d0160
SHA1c6b106d01843c8f0b15e22c9365e043b555e3ffe
SHA25622ac90a899a1c7258683c04278400547bd1fabd7b179068881af71cdb73d1f8d
SHA512a1912995f664d53df094cbc28de13c6002b1a8b3d4a7f814ba29fad8c515800d94a4450104fb5066476094c3a33a46bda33d73e6a6165299aa5fcf630588313d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225705d51eecb5fd096f7f0a0af71fb0
SHA11809422ec4bb94c2b92f9b0982cba50f1eb1536e
SHA25691db53a413ce1a478b6e704efb8958de14ddceab85f47b837ee43988a52ceb4a
SHA512711a3d54e0ea8e064470ea780e5ac8cd53785460c99531cce7e6fdc4dcb6107d037e36c6ed690215141d108bcdeb12981735dcb7c67ed0887f2ee1443438b2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded27fd3088a0b030354fae512104c49
SHA1f47fc97510a43afe16552573e7ab4b79695dd8ed
SHA2567da15665935ca5cf03e924da6ac09202b1c07aa8fdeba12f1a5ca132d945c559
SHA512665259542c7e8d0c48b392be31b579011832bb0b74f6cc55dc378f615d77fa599c901226ae71542764dc22b8454011c2c49a0f916f2db5c1834a416550f009cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1257a1e4dae3a641754693c9ae9238
SHA154e6ef94eeb0ea34f9c855c822d14f975e2f0e10
SHA256a31a9f847c1b8ac8d7b56b809f8d4d8aefba0bd587605251e4c79843798f959e
SHA512b6fccaf64f3b978b0d6cb86ddc7e5b4f89d8ac09a4cf0bb2b10fec2c1a046be195c7cfc4c1118bb831f44680b60053e5fb18ec5a20dd7a9812a1ee63f388acbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ea9f313b9268d5248e6db49aaf62b0
SHA1b66f3f9409f99da0dfe6b44308bae2e89b5dc90d
SHA25677a28ce95038f83ab8a1f00c7b90c6b3a6c30069562db534019d684c47d8813f
SHA51207db5791ad6d354914f2f0f788f8ae08d54371ac0ff2bc2016d87131266d574018b91cc1c113bd9f7116af2f94ff380b5ca4a3faee5cf61145ca65d3b5474549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54110dfe7cd42d47d5119ea306cb51fb1
SHA1436239ac5bfee691c2b6973a12cc25fc59f2a89f
SHA2566381fadb84b6a5c47f35a80704bc9880e6d83193f3b8203ad0c7473fda6d199b
SHA512c65ba0ea17c4ebce99b0ee4061e9c7bad06f517d6dd1a621bef16865f43af657ade1c1128fca2eb808173146ad196837a575a4432ebb807269aaa37c2b5f3d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50acc1a21da44ddc9c81a4aef64d89020
SHA148c5689f4ba222439ef722a0135d734a046157f4
SHA256bf98afd667bd4d899058fc0b34d9344846b92169684d712d3d0bd6ba5f5ada63
SHA5121e8cedb8c9065b33e6440620aea2c7fbd0a768d6d8f6fb71be5ba26816f86c496111d25623c14addae310d34dad50d539b0cb5c756b9c834d64e0eddb024a1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d4da7b9d2cb50eff07f1fb064f5078
SHA15ef5c2ee2d8ee4c96f9759b48a40fdc11c5f6823
SHA25662d9d47b6e79c035ae40ccb36a8b934e9897102eb21f63ec01d026f17de6f753
SHA51249b3e2adb76658a55d6170fd07b057621d10ee2ae7a5a6287a3af0e2941f3968dc1b32b9525d580e2e71a5f5022d002433279f5e69e34ee028297936532d2d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24489e4a73294e7a188d25ddeaed078
SHA1dd5225d0f50eba9e42348bf181fe8e4407dcc35f
SHA256375ebe67159de20850d9ed3631e0213363a7d4a6dcf712fe907d4184e6861047
SHA5120d63ace7be60f4fc4f1f650035afaaf7cd30f1eaba418fbd1eb1bc3b6fa40cefae4db37014ff3b09ff717ebb09b6efe50a7c00bf5209f4546a8ce3170e1b7cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d115129599b57ba4b6d2f59684d220a
SHA188b9fcbe5d21f5849253fcf7426f0a557d79e514
SHA25620154d8a621d6cbe2c105bbc2568801bbe3aae9685844f47cea1a92aa0465d83
SHA51237e5562f0b443e2f906bf9c278f62f5f7e0208e5ce1a08001edaa066a2aeb9723c029fb806faf5f81c7b053ae2a002a92f59192875b468c3d3739dbd7de69a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3f670cd2cbdb9b725ab68db725ad2cb
SHA165ea29acfcef4fb36cceb1ec50d5cbb596bbd409
SHA256fb96c71dc151f30cdc9ae3cd9fe2226cb2db92b6f95642ee4818c963288adbfc
SHA5125ab04cb8d7143f20bda10254bf867ebd6a717774972fab85e666f737c04d31e4d2feb1ae50fa1a8e3a68c1123c15340db43d32eb207626125792b05b06156608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19574f76a7ac3e5c2c9f49514fd15e1
SHA195f0f71c0d298bf1e8541ed4d7d73f223edd4232
SHA25645770978b51ddf2e1401357b7ab5156935c767c8537e896d8087487ca8348331
SHA512074ac6e4f2a2d3c865cec80a1b6ed10332f53a1561f26058fe792ed7d40e31f6412474a5414829493af8a58c637510187f74a1d0134410a4b632e79e441b4d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba94b2dca8416fa166eb21f49a3ad553
SHA195df5d2f53def826ad869686b20b32d11508411f
SHA25637ad819a9603c51aac3788bad94c102de12afc30ebca9a582b47ef8d8d1751eb
SHA512d496d32e293cd704d54db2325b942fa5fc6947b4f814705d33591047870d126a9c1add6206b38f15e0df4b64129b56f085a8604c50871815072b7e8be93d8a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f8a88256129e6b40b60f73180e88da
SHA1bf06670809cc35509787434897f0eb5ca75c6cfe
SHA256af8f6cd7ff260a89dec0d2696c1450b5ff2169721738a3cdd2de421db9b1c0cd
SHA512371e2a9e5d194131505068d0237cbda5a56948be71c3648c6948829620bb99f45378e0563a472adc9dce87b78b6bd6fe16bb4b802ef1ca749765fef2c1d348cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9558ac6c5fa501de2cd3c2d9aef6c5f
SHA1ba87e377da00a9327cd872384c11c6e54057635b
SHA256d0e6584fb721ebdc03c98cefcab91b5830499629add47e32b2b528663a2dad53
SHA512c14c5e78087617dcc70b125e5e08a8a4e8a11028d101401ffe5ff46059e4554de86db9a138d954302bb7906db78dd184a46afea2b295b7f8f88fbc98312f4d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f3a7987239254449a69d0bd44da997
SHA1588e9b7d83b6b6e21b1fc0e9711f605770364651
SHA256166c7b3de1874536a0c85ca3b44a63e0b29dde46c63d5866da6e7903f3dfee22
SHA5126017eddba398179e88e6f693cceb0caec88871cb38e78a5c84f85a2b45621285897dfd5d2bb1a54d0897ed0763eb3eb240300dc656f356b0db0efb99eaf93e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a04da603358080ac87fb875d85a8ec8
SHA15ab34b120259ac0e1e4f32fec08f28741c677ddb
SHA256e069dc0f25ae1aac6f357c4a7cbf1521b26a529787f3c6e1978213902753e1b3
SHA512e4c74034e83ac6450afa5476bd5d707499e125425450da3302d3ca5615e54039743ab03b1fabfa66b1ccfa64f78b5e72df255f530a7a5595fc5764e1b220db54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b