Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 04:40
Static task
static1
Behavioral task
behavioral1
Sample
fffc76796f3c3819d8612d17577e19ba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fffc76796f3c3819d8612d17577e19ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fffc76796f3c3819d8612d17577e19ba_JaffaCakes118.html
-
Size
6KB
-
MD5
fffc76796f3c3819d8612d17577e19ba
-
SHA1
2379d06d964ba1eeed011e1d54885b6ce82f9cd1
-
SHA256
45a48e57ebde85da013dba0506434ee41207e78d87e769176c2031682e9977d8
-
SHA512
25436303b7aa5d09fb8364b75376e64714a798869f24f0ac978487f597713ca8f5b55c727577c206db4138dc0bfce40b8bb8c0497e3d425712d33930065c04ed
-
SSDEEP
96:uzVs+ux7jFLLY1k9o84d12ef7CSTU9ZcEZ7ru7f:csz7jFAYS/wb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b60700f312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A850811-7EE6-11EF-B6DF-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000058d8f9c3f83bddfe5d7d1366086eb3bd7ec438ba4fe161602e3660975c18eaaa000000000e8000000002000020000000fec430c6bc29a1271a2f6aa866725cbbb7fd0d0775a55bf47edabfe6053e3d612000000034fcd91b864c9738ae415633dc074ade415a1f2c6a8f9c8f452576126a3a3f1b40000000e78319e1c4ef4b7cbaa10948782923d4854f80f88f69ef2a91cff66bf6a88e77ca2facf7aaec4f214a10ac1ed020545ff695314288e6a45ecf73b95563c7dd9b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433833118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2720 2008 iexplore.exe 30 PID 2008 wrote to memory of 2720 2008 iexplore.exe 30 PID 2008 wrote to memory of 2720 2008 iexplore.exe 30 PID 2008 wrote to memory of 2720 2008 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fffc76796f3c3819d8612d17577e19ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524fd31428818b87bfdac996f6aa1bf18
SHA15dbca84611410f18264f33f840f414a9d488722c
SHA25663e0ed2182a6563588b55fc43fbc6b4c701811405c0b36706dc5a8b4552debec
SHA512ff9eecd3cb20616fc4876d960bcd3ba17dcc9f7ab543a31a144f3df0730bc756a2bb6f9c60e404851939b4c07a7653df5f24719ef2fcc245dad6b6d87233d9f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c60987c23b854fa6a28238cdc45b4c
SHA179c2b3aae64a744f3f6db9b6797b9f9093268416
SHA2568d9c3423a7314b8bdacb9e854a6fbc29706dd7a6de5dec7c9caf80c8fe832062
SHA5127c35893cf7b3ac6d378d8cd779c36db221d30252c4fd0310ca39dce8e254616ad2e540f9f997ac115629e7a3ec2232a96a775a26cf1b1b196789d6f97f798e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f457b90eca511deb803ce9f154e2f6d
SHA16d807c2bebefae81b15191a2cf11cdc0ae4c8246
SHA256326279442434feca33f02aeb7f15468d3215ac28c5b660e6477546ec17effed5
SHA512b158bdbb2c8395910fb2c86a16a3c1489d86cac7819cbc08a85061517d7bf18afc44ecea08d6a0eb05137a5c9f5fbad95df14af2de775ef409ad34419257eec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2a801b42ca85d8fe8f7abe5d62d4fd
SHA1339e7e2c826b26651e152b62f98d3a7b15d346e6
SHA2569966cf4d1979849903d55b5d22c521ee15441d3378de5435f3acbb4a51a5a8e3
SHA512c66ce446f0c8b2254e20d5b9acb58edd2fc382c25cbbf4040ac906febe641eaa6e1a2cffe0426b2c4c4f700e7a2981c171c477c7fcfb8daa456a9e297fa7905d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c081f5fafeed5bca47f8bc57dae7b436
SHA1b8fd0bb101ede24066401e193b9ddc9ee7e44da6
SHA256e623d9115c23a2f0dccc16783eea904f0ff0ae3ef8106b86f4a5febd6df92281
SHA512cc0f06b9862697e0650d4b1d579b99a935c024fcfdf10d3700b1af0fba3c3bdf1d033b9827bc4bce4c5f88ed79b6ac8964f8623aedd42fe2ddefe798f014e250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b7da79559b00265cfceab553b1566e
SHA1dcc778c7057a23e219583e6ffe31b24a45d76523
SHA2564fdf172f311f6e78e50221601b07004e4a825ed745c13eec4aa215c3100c3891
SHA5127fb90f4ac6d3a27f2535a21fad7e5257d2f9304ffc27cc84a19fba704a774745f53e7d8e81f28f579ebb26e32017d8b8cdb7ee45ce73cb16cf7604e346bba6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87ab60c50426ebd37d755292835f3d4
SHA1b3ef5dcbc24214befb8fd2b4e61beea02b54dc22
SHA256b286bd4bc2e5574586ec3b13cd35db841e969e50aefa688ab000484b44c429d5
SHA512446a41347ea082b90d47e301d2e1f332251d509889a2a435363cdcc17c17d80f0743a23655dfdeb4e4bbb19c8261330f768e3ae30eed19d81c3badcc15f3c412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6271cf2f3a688a93802dd852cbc1969
SHA1f8129bbf54c123fff7d75c5275efbe3562bc301d
SHA2562da218b6ea9f7c7979714f826a71bdda839bc4b60e7c61b7da822671892746d1
SHA5120444590f45e1152aa39c0ebfb799c3a5bb4bb878df0fcaa343d941fe29d0ff727304bd6da05da3571f7d2b0f0241b9557dd643d56bd0a636590d24ec082f9d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0a9f0031577059f2a67f7ad85aa208
SHA16ed0216f4e0fbefd6772c8caf4a7de89fb14fa87
SHA2567dc461bfd07eeab0832f9cf3095f8f791f2ccb75f1ab1a9049e365dfb0658c69
SHA51287d87ce27cb838243c8ea7fdc30ac403e236ae206e461336062969a2f8d44ade20c0620cc72227d798b63c9ceedae41aa422b58c9c250dd5811a3942c779e6f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b78413c9bfc3937fd7e4210a5cf818d
SHA1fdf9eab2b176509ba09b9a21755875b5ff134d9c
SHA25621e87ae8ca7c54f0ab8f669ea3b8bd9d5d015b947a11799c62bc7e242c0a0fea
SHA512552b995170b2713efeb142168e943ca228e7ff78a69cdb92db86b5c090ada233c448153767b5c6f1f1bdb93e63b73a69527bd6a293ac4866fbba4d00f0a65cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ec4dfe4ee42f2211a4a6073df7e6e6
SHA12c532c7bf95ee279a4c13ca7f88c1cffd6db1cc2
SHA2562bbf4287f1af8755f13b19df8420e9ea3b8a7d5b6ef05d035b246c57e89fe4f8
SHA5125677ae741f06a02a364e8a5e277137862a5fe09b951076c250edb20e1980bbc7ef86d4ae4a336c54d7ee846160161ea90e9c049a101f26eccf8c4fa7be5cdf06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb39fdb989a7df8124fc22a654455880
SHA1be3be7ce01b579f605b595eeb53e33f555f3bf8e
SHA256b75e17a14af2b462c7b3a24667a72c85ca898ab3b7d8f7fba45586085e7c0f6d
SHA512a15840f522f00a145081c458945b3784e8b5e86d471ba1086f165e40cd1fed206d309abe952664262ec3e058f55a7d95a5945e078499d575e9ef3ea068532516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2170a1aba0c851c91749bc61bd2d9f7
SHA181d7f5268120e3943cd57f5973a93c70df52803e
SHA25678fd8b598db7f361b0c97308921ff4af0af4700b73ee89b2108f0a56536f658a
SHA512b5360e5d43ef103d2c76e7654003eb9507a19b0eb8f7414b8ddc498c99531b2f44273e98854210f78ab5f0118b60b0280f8104840d8354aa88fdad0b05f80ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f646d3850af119229c06adca35fc62f2
SHA1d5777ee324e6275c3f8775800efc34ef4725973e
SHA2561f0beefd6ae2e02f2020f9168dca5bcb5b623c3cb598215c1943cff24f649eb5
SHA512f15613448627477243019b659ae6d0fc064baf6beb4d5a493f0bd599d0059587ef63de408b53c1e4cc16855c850e6d4b5d22498c77a1a274ec3879b5c152c6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e960aace970f119897eb1119ae923a53
SHA1de3c546720f0164d265f44777fcbc3411ac67182
SHA25602c27f3c6e5c0ace943996fa7ae60dc0c8e5abb061d518af17ac53c0eb9cb025
SHA512285fb28f807fe18ccbff1b999840a7fba3bbc7b0874c7c039b9ed97d83c5b2b22336934e8196ca1d8455cfcb52d86a07bbeddb7883d6182020b92130479c09f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b0b5d554514f9f1fde9d4b3f213b47
SHA1c4588efd0fade3169bc13923053d5de7d9ed5b8c
SHA25620dcdd30b03fa37ff2593056c8801f6084efa7bdf1b79c8c27adccca83e3784b
SHA51242630a27ac467d1e3430a9f77ceaec4e4560e31848d61c1162749075c2890d273517ef0d7d5612c20c85b9ff0e99d32fad76fec62555fd6590f687a1bbc627d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23273e9a30284f6e6634b6e48c28fe6
SHA153483dd1eb80834560c5c77797ae846dee60fde6
SHA256577d350eb9f9a731bbc0d2a7afb6307d0d5542a6ae071fb6d002d56757fdc58d
SHA512f68a12ee1629e7bbacfefcc57b1b1fe77322310969c4ae2db5336c89b87a099748ff9709d45fcc26e1455380daea95034e294d3fa940f16473745764fa0196ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f34df1a57380d2efaa46b32b24b00ca1
SHA1f66aeadea8318817ae0e0a15a5e23edac85f919d
SHA256bc890fdb60df47269d879751125af7295302a9b86bf9fe54a68f0a9b12e6d130
SHA51238b3fd5cba2407c30f21f03846f1a32963638fbfa7acbd1bf5e716b4b1c2bc0e5b3d95fa11a63103cc1784566270a362d7cc31fd39a87718078358949cabf5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52095d0049fbe72e29c953809fe06c057
SHA1349e7777bab0bfa06ccc158870473374fbc3ba50
SHA25628a3f58472615943e7d71f003d11ea73ef7f7967bae5bf9587129a70676d71ef
SHA51254998aa51f6546a000f5d3b15ecebc58c6963961221fc1d6329507fe6fdf407dbae3d3ab202710815e4c894c0f101d2fcd522819ee132eb42363576f396f01a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b