Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
feffec48ffed429ef6f4855b3b56cfe3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
feffec48ffed429ef6f4855b3b56cfe3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
feffec48ffed429ef6f4855b3b56cfe3_JaffaCakes118.html
-
Size
96B
-
MD5
feffec48ffed429ef6f4855b3b56cfe3
-
SHA1
dada734879edcc74f0b221e46f049e1180292356
-
SHA256
4dd089acb3ddda308890d4190518f95d01e58ad9757731bad481e30113aa9715
-
SHA512
782208af4f34dc4f42a092427978d4401dfb719842392eef2fd4b043ff4c254667f79effab8f997664c59152388b6abe81e3277ab5443e254d4210dd3ba9c2e7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000dedc286b9b292ad0a12c4d20da9aa7fc66721dfceff60a451692f6ddf978617d000000000e8000000002000020000000c0fdbb63031603b2538ef5a48a3443ab77f85c0adb2011881f07b1d66a696ccf20000000d1a1017ce0001683506e67197e8e7061ac348ef8fa8863fc67ab727a1114e8044000000055924d3bbec1d12bfe1d7a7399043a114acec29c13dad9783a8d3a7f4787f6909a6716c85209809c4624d05e498c50e0364c3303e2dc794d8d3b9b6699c8a97f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433792106" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905c81829312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE1C3B91-7E86-11EF-BB30-566676D6F1CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2420 2956 iexplore.exe 28 PID 2956 wrote to memory of 2420 2956 iexplore.exe 28 PID 2956 wrote to memory of 2420 2956 iexplore.exe 28 PID 2956 wrote to memory of 2420 2956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\feffec48ffed429ef6f4855b3b56cfe3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c251cfd5708fd04e1c25a43c4554ca82
SHA1d3d9a78db4d5ea4a450c027f07091a4ceb40b31b
SHA256f0f4b9a5ff863ab18e3f2772a01cb3e0e5746bc9f288ff59d7f27d26ec17cac4
SHA51243a0b7732d97af61fe70490874257fa00d116ce81e197961b8e63b02535a54a355b47979a87de4c5ce925e75643f969eafee3076f8ce8668250d02e9a64ab18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75dc6e454e32fe5efaff56ac5967aef
SHA192e071f3f654be13d97800800d260dc92f35e5f9
SHA2567f0bc4363cd5ca197f0e2a1f564862a1ae2c2e2e277080ffdbdca01f8ba4bbec
SHA512ddad79b47371bee2d2af38b77ca73a5408d7b9b76a6e0267b2700e11ecb9e18f9c19b6f7f1f2ba59c1f10b73aef2c08b3dcc59c73b7cf021be83ffcf97072cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5270bb7a09a28c50dc88340a42e21427c
SHA128b744e0ad5b68b553349f4b24d6bf7bd0942ceb
SHA256956bb6d1994d6f2acb0f28d43b3a22907d8bd39c124fb1ec725e01b79d91ba7e
SHA512f051ebb138a8bc72eb9473a22b5c6af7be93e102526b81c8c909513fe407b2a0b4d2bd9edae8e4cbb3022f76f9a3e22139c6869f3ba9b01bed54f1815c9dd4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9fab8c9e55a7b98f0a1471b2cef577
SHA1144a384c8abc375a5d12343097d33ba3c232a9e1
SHA256e0b767604952c636d4d0a5cbd61e477b2f04258a06872903402de265bdef568a
SHA5120151dcafde91df0c3c1518eacced9ce3adf48966c2cc4fec9ddc967d4b3fca04f566988a32801cfaec002a5773821a6f29f189648577190a37c51a9c8e65ad7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d1c0fe85b0ab3ad490706643395a37c
SHA16a04af453de4bbb0a90c4001e74fc035d0a775d2
SHA256181d9ee8e3bd5823d3ce69d9b242762d5e20aedabe540b5243a68c223b9aa970
SHA512150f5983624b5137c6b405b5de1574523dffc3574f929e5a20eacda3084fbd854b5a14c247f16af6233d0e727b690da0e636e357fb4513e744455693a43757e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7cc26afa19b93daa086686bec4c642
SHA1709c64bbd95cfbf41235f8cf9362be886922b4cb
SHA25670288cdb28f7e2747dc65a0791d998da7d838154bc2c4eed1561776c601d9eea
SHA512fc89337c0a199daf657459205f190d019b06ac02c16c376ae864ee2f46dd7138e060e314eb347a113f8f6a87a53ebffdeabb5f4be9c90b3428d3006133292dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0eef765870eb846d4e408f5976fcde0
SHA1bc4b7595e4c8d2e75d30188be2a10710dd671793
SHA256b61e245bdac40bf025cd87c23210ad6f8da284a8dc270028a60f9b472de1d42c
SHA51233c11c0668f722b4d7771bc0c6cded115450189a7789b28be07ec6cf871b3986991876b4d952f7be9c62e1610ccf12269cd3a4d4b13db67abe674410cfd84d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a37c2da4c29ffb253b3992198c7626
SHA12f23adb054ff39019504fcc29627cb7a12c1075d
SHA2561bc2caa7e8e315926ca44f1fbd6ac0b99278811d56548fe423a8518fb868394f
SHA5127bfb35e57b386ca1fb33a1e280941e24d5fde4269e6ff2d550cb908f24b3b76d6e2fbf9b9b815b654bbeb041110200eaaf730ca773301cd8b5e0e518c15e66aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18e63cd8bb13a6b60ecb7bd21f69700
SHA10cab736be08c9def2d37f31ece68a631b59f142b
SHA25660e2b92e50dc668b0c57e81635fbcab693f69aaff53bf1de4b2ffb57c0cfabd9
SHA512823e07509ad2ab3eb78e4312ea65f0cf089bc0150040fbff1e30210360a6b86a5726478d46096d2e275c82b6c8b4c593fa51a8b3d96e0eb88187d90b9f546660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910aa581930be145a340f1319da20e2b
SHA1714874a5f7ac3718d2c1659169edf5d2fb412eec
SHA2562d5d3e8156849fef62f5a994ece9aec22ae6d8819da3de9d09e75b7c59177a26
SHA512d4b07b4efcc17df533ba5ac69d5277ed4bdc925d4e2bd5c6bad611864ee2e6bc046f65718ad05728aca4ef5c4303b379da6431c4bc4793c46bf000c0813adf93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500914b4bc70ff58c00ba7667635ef4e4
SHA19f7ef80b8474bf87b1d7354f86906b6fb1f1af00
SHA256455b91e179cb3443ade3501061c3bdcf54c5b1c7f307d862660eb0259d4af9fa
SHA512218f35f4068d3e6d1dba1d66c34bf783a9603d09a0b211c2bd93adf6b76206907f1dd8510774e70b84d711a32003e4c66f6265f47ee7c6c12c70e2718fb90b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3c4bfa492d6b97d17ee93a846a59b9
SHA10828661d986808ae245fd116c343b018c54517fe
SHA2561f5e6fd2f2206a9046d375bf7695224f3ec4af084c9bb9e7bb412c625ed01a93
SHA512fbfc3c90ab8f7759b473e483f06d33a295c611737fdfb2d4aac9e0e064d3a1f0e0be8b8c7de5b7f845ff2e6d9a610a1b51ef6616ffa2982a1d77edd4b8118555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f22092515b42192fc0972c24b181637
SHA1ed7da8fea6ece590272bbbad7416638afcca1ef4
SHA2561e4454f89a8c7c5fd112a1369df24da7c493653b7713fec5bffb701a33d26fef
SHA512029a4e0545344e9dbfd06f5a7fdacf8be860e589ecbb92eecb968e0dfde003e1a20cc5e0f76a4eea0c77f48280884b5b9d9bea23bd2f350da2b7e1deb064ea45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bdb66453a3f6b781b44e609ecd6ff99
SHA118e94845c4e8cfb5577e58755bedcc6de8f23df1
SHA2568eaa0a3f10da058e3483e7a36d651a2dc3cc16e321a995205e3f91875fa3d977
SHA5129e658d242d5da01f2099d1183cd6da0cc11bedee08e081521a14436b7cccaf6528aa1c232c9ab7d28be52ddf3c08febc92ef2e215e6c203182374e7ec989388d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04fd9afbabc073afda6e04a0a64b82a
SHA1feeed85f08fb01f915dc5def8f81e73a98914a2d
SHA2567c827c006769c9c52bda2e909453fe2737df06717a13f51f03ca7764b0638e49
SHA512277187f26ca41d98a7ed8be0702fbaa9d867f49ee0985e57f6c2ef20aa082fc464258932258621da604e1cbcbedd0f2b39a2c5484c2e0a5d8ac413537e6e666a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57060ced508a1d10ab890a654c26562a1
SHA1a58202a4ebc0dd4921eadd2306af30eac9a370e0
SHA256b650a5135850ee9c62b104cfe203474cb9e6a5c4c49b999b5bec4c190f6ac93d
SHA512c22abbb11f089a875f000c77b19d8b149bd83904bcf8d4eaf646277c9fc6435fa5cbc8f1127e63d018a369463b8a5ee159b26b542e3c4e773b3f426d6a68c167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56776c4d8f27cb5b3d91cf1e757a8568d
SHA189d803c2dc9292b14e6ef97ed072d8b33a287da8
SHA256e66f81556aa4ca1f291c2d16fca4f82832ee1bc3bca6e075ec7c703eb6585258
SHA51225f9ee2f3251a4611237c9ea5dd3a415b21347aa50c0b897ef79c3a0859d1cbba886e59643b5ae25608e123a54375df54ef81af512f6d360d9c63503ffce9ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d67c991549672ce51a8e9f4fce45674
SHA13256d31baa6cb0199251955f608399529831c7cc
SHA2566cca29dabb24ba0061a05848282f5601be036935539b080f904f5161c6db7970
SHA512a859b45879dd59f1f33f63b9b852b295230b4aa1613ae425c7bb141948e704f1aadf2c5a9342a5cbd9967614081534357ae21b926e60a682ef2e7c2b6751bcae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b