Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
00fc44d80ca776f1ff76cb5ae66485e8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00fc44d80ca776f1ff76cb5ae66485e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
00fc44d80ca776f1ff76cb5ae66485e8_JaffaCakes118.html
-
Size
48KB
-
MD5
00fc44d80ca776f1ff76cb5ae66485e8
-
SHA1
aeca7e74e67c0361d4fbfa542877ade5a0b771dd
-
SHA256
e518d04b70c77401e4ca1bc3592634dcf7c4d83219c29ea66557376b5c72686f
-
SHA512
5aa8fadfb3c8af2be1388480a33511c32f8a90422fc9862948e9fb527e5e2251beebd2bf694e768e9b6013c203ea4a731118c5101b03c147c2bc3788181e5c58
-
SSDEEP
1536:Sf/5R+SyTosjFdb1CCcmaqqK65cFRZlPx9s2uhuqs5hma:SIxea
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409a887f2813db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000001865224227b93a10a1a86e9168384c996253678d2bf1b09e542c3b57833df22b000000000e8000000002000020000000e9ee632c842c255f8956ffdf14ebf8c4e84b79143fb42d9e15dc160f704209102000000066f67f5cc6269d03128984e64f724ac10218ce542b52bca252d2509531cc42eb40000000097940527445c21f3c320eabad5c4c13d3c004b4b684d8d5609e756f292bf8f292715f084d7da8dd33bcb5ae806813777f9ba3d13d90522fbe15be355674d92c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433856092" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8B73431-7F1B-11EF-AD4F-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00fc44d80ca776f1ff76cb5ae66485e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ac9ba2ce9a41e5b9761b732c93e611
SHA13df19eaa4b54a749c2d324a652628c6e6348f7e1
SHA25671f36aead456e4a1d4d38a4c86dc09e2120bd25bc651e7fc2a154754c61e8145
SHA5121220551f59311ad24bf7ee3dfbbc7d57212550793b6c903406ba85ec5e4b6f424636324518cee8175ee0841a18e10566a7d018e0738603de6fb90336cb1d7246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2ebccb659b635ad250cda540159b71
SHA1f75445ffbd0588e16a172c6aa203c2fb48d18ff9
SHA2567ca1fba998332d7d5292ba4f85cd732d54d8415d0e3413671e5585987aa1e382
SHA512651cbcddb0f06a33b413e24a72424fe995523d5c4b490c33b0ff9cc8384db0829c4c50fc422b04e2338363ce2838000fdcf88688b290ea59f8802b76bc25ffb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598da956c7cedb29bd44d6ccf62b9d286
SHA1ea88e4a7c7060008117a20cf253a4a8297a31856
SHA2568521302030545fd109af511f86b1dca43e819d3af83644a7246dbb92c37cd884
SHA512448d13635d438c14e7b5442d340bc1c7582e2a086930c993e90356955d60be53624400f125e544e9802756dfde1c2fd8fb1ed35bd4a41df6ddcdfc471d2d2a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade0fee53f95cab507b52ee1640e5f95
SHA1d714921b3e5e77af6e3b175942e51f9d8332a6fc
SHA256f08ed4650acb158694acaa8219f42a77eab3b3c14c8ed3fc2c329f129be07e2f
SHA512b58fb5418b5007a5f0c05ca763477f888e9e12706dd4ce7b920be1245b243cf89b29576c50f95ab957cc3e2a25cf968bdc1b9795c8eba5a3d58aeaf2f1e2d079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5542fee7b8526c6647d722d3a5f392
SHA1fafb057cfffd7b9e6b10816b79b59c7800e223eb
SHA256e4aa3d4023f3874924916b79cf2c3947c2a0d23cefa1148d3500156869d572b3
SHA5124aa25b4141e6518a81b24a8c31f2660a1bd9635cf11fa104e20d791fdaab492ef09fae088f70561d1d4444c498d8c14c4ead3204c78d8922a4207e20d8543727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8b98c1e101b6ead4dd3c64ce36a8f2
SHA191d823de85ccbe37264772962076b29229b23e8a
SHA25690a14efbf92d672575d000a2e5a26e6cbd435f49f2d11a03e0775a2022a761a2
SHA51209e13df0890b9a374e6b7fb1480e8a46409fc9ee31cfb3a508e15f99fe36916ec3d672cf9de4f1429df92f5b417a49e9c0b675e8893b17287d37568493751e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553a46e3fdb93ace9ec9d13aff9877394
SHA12024d517d4667239ce78deb58bd04ea1c7207ef5
SHA25620234bc96055ad99b1c4f2eba3aebcae54a4f909fe355103d43451f1168da2fd
SHA512da92af364ecf1056c502b604eadea1f36251a79527579508f9c39c0a5f2da733afd258e1c1f2641ba03689a176a1fdf5ae95df1b2ab34a8ed41b2cdd116f746d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5dcf7fffbda0f5d9e5c7719232d25b
SHA137e3b9adff3deaed8541022cc2ab458c8e3312b6
SHA256f7e0aa89f0a99d719d4ecd5780a68b243d8835af608ee9912879aee7dd2fa3df
SHA5122771e6b97dcff0bba64b83519f02df4c1d4192601fd504c00990e99f785392cb69ef5323dfc49a00b441cca3a7f06e96b540905e1302737b03036c27fb247a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf3d3d5130f4c235f71ee0567be3832
SHA15c95fe56bbc4286bf373f874df96c16ce6cfdbf4
SHA2564e2455def3510bf30c687675a4bdbc8ff270e1082bcbca167084ef930345c4b0
SHA512403c67b385c7aae4e7bc7284ad5deb4d678e9ad3fd1e92b0c71d764e9eba5a8f2bc5553b9e9c817625b7f9cd9a3f6599c790846b2edb1dba8deb536bff03723c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc88df3c2ead6f148a4089fe9fce2cf6
SHA1dd267fe2cf856226201dab70e8eec9d9c0aa7108
SHA256122cf6b19124452050b1884c876482e6c8fff9bdd80b210146b870d3ba8e9bf7
SHA5120cd86eadfc89333bde2ad1ce559ab3444d4097947575e1feadbf9f1c04aecc6d98d4660bc01099e9f2ec8ef4a92304d0f59f12b616300162d0778511ac195ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e18e99321ffebebd140bcc8d4a8115
SHA1eccd9985a6258fa17788da2212a40aa1894f05c7
SHA256ea407f91cb19cd923505e1bffe28c291030076f6461ed62c3ef86aff71636b55
SHA512e932f68a4335ea2504cabd1b0a87bd801c4caf8ad5c9dd2caef62f0e76a88218d6cf1a979f0991e6e6e484adf1d9e4b49e9bfc3400016dbec95bf535bd903e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee264a0169fe73230f6cfc176138f3e
SHA172609d833379ec2f005bb6b4cdd53cdfbadda0f7
SHA2568dffc73b9d3ac1fcb06ad95d1d5ac84839e8133fd434f66345c36e61c94759a3
SHA5125d2809133836fc4cfb66afa7be8c46f963ccac62007c28ccf763c4af159951f4cacfd8f8ad1e08ea8658fd18f9127e884b13d384e9cf6d1d6d3ce21fba497831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50425ce0e551dda8cd6aead7c0aa33dc0
SHA106e82d6ee453412c7943f564aeed87288944d0bd
SHA256f42b6aad34c52aa57a5efb4af9f6be47641175536d3c50d3fd5f6992645dc8a9
SHA512d2a6adceda1ab749e3b70a6e324e9de723b4b9097126df4641044511087c92c8ac7ef549fd867ea93b63a07f7cc7185b728f82b6d0e42f2684fa21e5fed5bb61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b43c662f4a253939479b5dc2cbce82
SHA1ff21e004ae16f9bd5052e5678d42017924f9b22d
SHA256696bb22cd2be4026fedf0f2d0d9b7e3bbd411a5773971896e748ca53d2a5e64d
SHA5123d22d113bb4e3126cb4dd7aab2fe63d4c0dfc2e6f5e4142eadb5f1f08d829f328f99a9c621ad717cb48f5cd59475bc48320f5efe591de6469d968186f399be65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582087561bcb87b3a63d92b28cfe1ee5a
SHA140ce82e037c7544492b4d33a504f81bba4ff8254
SHA256e87a10034f6b09d89508a7403bdeca5064c5035637aa42d570ee9d4276138b1a
SHA5127bedfbb406621a4348576838d2cd49b3c6fff29fdf2eafa6e9bbae451d61606bef7e8c2508dcf662a6ec177862410f5c927dc79a8769a20df85fe2e318d1a8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa73347e292ed7f0ac20d0282c8b1a11
SHA1a32a2bdbdcdc17e012d8dac26954d160ca1c7376
SHA2561387e0d2f0e5b0f540e6b2fa194beee662a1a17997ebc54837989f00d6931497
SHA5126bfa98f12b188ba956b02b15c42e75c759c0f41923bc2b54a6d94245de00f7b511d952e806e97a23f68c7de2f2988b8a5ee7ddd0e482a863a40f5e98f35db14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ab471cfbad0b287aa9b28baee51bf7
SHA12610b76be211156796d604632edf133f11ef56dd
SHA2562c7e94b7c4137e303c7a88b29f02843608b633ef0c9aa8e1a64e7c0bd6544db0
SHA5121637d5ee40e38cf5ff6aa0a38dbef42ce1055b8fe0a37782d72f7cb4b9e2e3198dd4abdfa9ba210b5e998609632070672df2e083017faa5938e6c365a8254464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a23a45f5dd12debb9028dfe2824f9a8
SHA159adac51b9a95d47431276f1826c2c0398b946e9
SHA256c460841889eba1cdfbb86bd1649d9d10721f008b3545497f96279c9561776c20
SHA512d5854270487b1580d55279f771cc7d810462fc60ac02b1833a7a8ff350c4bc887ab647ce8f2e9f4a407445c530bbd28955f9d3bc597629ccc4c1baf06e9309bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d536b81010b57b07ac78efc19e9682
SHA169c7ff8327ca6461741a6a42a3f5f37907526407
SHA256e23eb9a45365e1f07ff798fc831170ac87000fcc1e751f0a47950dafdda23057
SHA512ea3968e77e38a4b86c36c34c9b14b55f8a7de10612b3cfdff415bc9359a19ded962f2e1121f36da1f720ca5751c77559eae970cd839d7c45b316d219c8284300
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b