Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
d078cecc6bdbdbea19cd742cb6772f37_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d078cecc6bdbdbea19cd742cb6772f37_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d078cecc6bdbdbea19cd742cb6772f37_JaffaCakes118.html
-
Size
12KB
-
MD5
d078cecc6bdbdbea19cd742cb6772f37
-
SHA1
3766433f5a444b04b8936a1e77c11b2d9b6e703e
-
SHA256
7d717570128ceccbab4fff220f68b6ce549b19057ddf808f2137e6967a7f6eaf
-
SHA512
1e4db8df99b683382ccdc7f161672c64f4455d79c9666de24fcda6c6fa3a7b0c7777c3c24f3a811e9c7ed77e0a79a1488fc3ae7fbdc6cf487b6a0c827949f66c
-
SSDEEP
192:iAxW5k6ciZT6EEkJUGV0/eqfpfL1gp+p+qwlLi14n9pbCasCi:iAxyk6AEn0/em51gp+ptcpbVsCi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0BA48E1-6C95-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431819437" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000045f24d8133d9fd2b577bd16c98b7535181b448dca4dc3b0e2e765e8950cfdd3000000000e8000000002000020000000f0d10a8ba309976325270a7f5ec4f90597c0407971b2c9e74cf099e59ee2bf3c20000000d32d08f575cd0fbbdfeb54849e8ac9219a1bced2413d2b17a4c9a7538d4b1bf54000000019ba08f7485e3dfdc9eac5bb6081ce964fd72b6efe0682d575bc31c17d6a13d6687e4a4fbea0c4e028a25cc7e9189a6e323d20bb4ef5912c43ebca0447b32e20 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5088f787a200db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2308 1292 iexplore.exe 30 PID 1292 wrote to memory of 2308 1292 iexplore.exe 30 PID 1292 wrote to memory of 2308 1292 iexplore.exe 30 PID 1292 wrote to memory of 2308 1292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d078cecc6bdbdbea19cd742cb6772f37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a295824f0cbcd9ee8d70c8fc14dbd71
SHA1569a792a41c3e3dd122b57510d4840e164a524c2
SHA2567e8cd45a50e23dd2ed141677e57b5634b6abe3bbcb1023afbb6a5f2f8837e65f
SHA512d62989388d64c5eea6eb27cf5ecb22001eef761e5573a44edb1fa3bbae5104db3107a31c50a899f464c015c530bd3aafb68c3576bc8f193b0d138019efe8df2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bca602ab1b9f5bc49324aa7e812598
SHA16bda6bd27508eb5026d2a34fe67898ff7fd9f6e8
SHA25670d4cc2914bc20e0e643897156fa916c1f0f30d1c77ca2352ac012557c905967
SHA512a0b10ce3da6d049cccc39eb36e12564d0dddf133f5663080b1c6e6b47f141721bf3fc17bfc3f5773e955310d6609035d71adb961e624ce5f608db51f52566a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c738be85c1951791c3c7954e975d309
SHA123ac7e4deaf7b7820c6e2efa352790da2f06b78e
SHA2563f8ad5a02d92d6845d00917164c69678a8a0e5c5aad5b2fc87d2fd37c9204913
SHA512d1db5f8f94f5ca667555f7f9e07e4f180786bac49bcd66e31211baafbb7887bbf1d2c30d6e4480aa94e8b7cd5114559be9673f69cf256a0e061a8f284ebddb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4097862e31bdd24d2d1764a7c71675
SHA1d55c85ce8de3d5cf894c5997e6ba4c244d428788
SHA2569ff21b5683f92a58625c7845ed81c1ec3793e95f827e2e97ae49c5004eeeeed7
SHA512cf45546cb8d9fb39de4e022d1ec47d8c9b88cac15e93fa7e6ccd7ea9e3dfb8be3c342754fde241f576748c999c13946eb2c9fc071e8f9ac3cb75c5a956ee5ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c53fd4db62d9a75f94f8fe80af918b6
SHA16f699cbe997659568741d378396693c5ca977be4
SHA2566497d91bd27ebbcf2d86d436480bc7ff5824ae04b4f130e68a0c82c97aa7f125
SHA51225f2129fbdbc1099adf42d95361bfd2bd587503d7a0d5a161e46debca1108b477f0a43b166c9591582ba96b7694edbcffcfdd853f747f4c381c858dc4be418ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba3ee81cffd1f6142f47ff22eef84f0
SHA1cc001a218f96fec42b07d97e1c97a623bc1fb353
SHA2564bdfbef14179edeb05a496be9fc544250e7a7be4bae53856a6a92d9cb472389a
SHA5125731c1d3774ca52aba4208022b97d0a5f73ab0bb9dd85e7f0d6269da3ec227391d26717fd972a5930e9a657109f64c9afe0cd57e5bbc3062c051e5258a711aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981a65c3a66e8b81997b07a276e422bb
SHA1624138edf43e384687adb396e68d0f880f6aeb42
SHA2565c91884a580f61ba16f7ffad3b3f1d17da710200bb550c2047b7805c1aa5ecbe
SHA5128c644bc026d1c65e8abb153680346b46f8128d770792610eadfdb83e7b0be0c45c8de33c56d2870f48b14c9ba8252948fa354b4e88c52de569284c72ccd01da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5404e4e69860f22b787edb869223b6
SHA127cffe84f8fbe9e1b15b8160e97998c5b5377f3a
SHA25622a1acdf85eb572dcdc5f8c37600b1ca0b2a73ce30795cfd4324063b2fc3683e
SHA512d3fa1b80b25593077d60443761eab263ba1a5b24fe000e38a6dc535b543356d3ee70a07ed0f8bc06dcc9c01d7e98cf7e8af32c5a0744cc87c09e0dadf9d82793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db83c116b655323ec69f2fa5bf5dd11e
SHA1d4736dbe02f6cea1816398251e1da0a6f4c7fc0b
SHA256b7730d27cd9f254f7d6cf1a214f528f4a20621bc378dbf88c70acd8d3fab817d
SHA512fa351d4528891a79b45c7cba6f3c9a26261843844ef31570459b95d1041b444e678607c967dc85a06c65460efceb080aed68e4153d326a79df11c1a0e0c4e4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d01247f5bd54acc3d79ca39aed5e8bf
SHA154686787386e624db8fadfd8949f41390e88e6e5
SHA256e0bc4cb031254c869826580366bb0d22a13815997c173848a83cdbf9e3be6d54
SHA5123bd94c022566a03dc4e8186934ee8f8721659b07a38e127065f951d0bacc2cb396ff332840151daf21ead460b616adb2d5c4440cbe189989f7a169d06e0bb99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54714aff928a0705f0e15768cd1c284a6
SHA109846820c8cb398532aac403433b8b48ae7b54ad
SHA25661afb51f41de6a9487ca0cad25831a8fae16bf5950c6eb4dbaf617f6e0873e4d
SHA512be37383e87fbc5d7642f1cede54352fe368f0020ef649fc3e41d9d40686edad22f6286333f7dc0091d634e1707f8efdd209907727c3675447bb096803a7395f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a7e7d1e2d4f8da85ab7be79c1081c3
SHA16fb5b4e11c215f1cc53d23969466f61816aec798
SHA256210eceba698129bb817b398157883143984e50195d04ab729512955c996591a3
SHA512f59b3b977eb56028e22a140f6a7face7b730e45b7d384baae23acfb433d46b8b2fd367119cdfc5de0abf4cac58129caac7c0e03183d4285a389d7dfb2a6a6c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e92ec5a2325785043b0c43c591991d
SHA14730e12b0a6cbf87990e2030f8b617bf44318d7e
SHA256fcda6c627ae91fd229224b0a63b27d452271431721550b5e7212db192ebaa8e0
SHA5129c11f04f2456c60ca937b67f325a74e7cf1473889481532673d6d4dfd8fe06fbb1e6a4b01042068995579e0ca4460f9c0fa38d8df6edb58f2a4c88b6d0c08db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c01de8abe07b7a716f6f669bccb0e9
SHA16fc632f107f63186b950d14a68bf1da9052f3670
SHA256e43c9c3816e1d76eee6c02a9c167db3cb507a9135379716a7c73e5b7a0605a84
SHA512e02962216d83c39204e50436148fc1bc5c3ed75340733c92711722ea5c4f08dca99376feb1705c19e71997b91d4e74fefacc68b5985aaf38408c418f7e35ad4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0e53b8563d504ac77a0995c30b13c0
SHA180ae949825a8a71e3d6262858ccce03a4c3b1563
SHA2563b01eb3dc79819f2cffe14ad11fb0aab454f0274745c9e954c1a3bdb637d5823
SHA512dfeeeb48e5707bbc6032a6c360762336b378468bd8d10f448b9c070adbc712f9eec187e6d1e2456b891bc19cde8a18f1e4425a3ef3887e83503776b33a4ebe81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57755c8d4c1d2cb59234965639ec12f7b
SHA1511c47d2ad7b70aa7d159009ac38ce9f7cb07b94
SHA256748e2bfd9c80d912237aec6615cbf131a2f7153304c1af71fe2c98bc2619f90a
SHA5124294016522beea3c717a53d2508011464dc8e86f832f3b354bffe419d8320335e147974c77426f8337374accf34474dd2fdd7f85780e3725358c290969154303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f6d21a490d0e38d583ee8fb6853e0d1
SHA15178403129c3f3491be20a07b716b486191e8014
SHA2561e3bfa6833f43ab4ef778c6111a7d55011fbd0a265cca34322e548d451f1a9ed
SHA5124278f723796398cecbdaad6d9a963e27ece3b1e283b655d41b9dbea4a1be575d9a81dacffaa756ad2c231972d922cb8bca25252b59be3eaf884ab56b39039518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0fbbd451fc06a927e86325a6a948a3
SHA1c461d223b1b5e16e591dc6806d13398b885b4979
SHA2564dfb00cef01016ef40c6d6f68ed9c4f7cbcac421ad81446726cfbcc8415daaa4
SHA512a07615054685cf91b9c37ab3a94f25df24ffd46d1ce5a230e85fb16a66c533be7107870fa93a65ca76bb11efd62ec2783c44ef0f8d5af45a8c1bf1a548f2ddd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671b12a603623f7a81853d6e791014c0
SHA1169f81afb2b74fa5e9c6dc20b621897928841483
SHA25678e249490cc371882114c120bcd656ecf62de03b3b37524fd765e12498185b74
SHA5128cebf6df597a5c5f24ddf80c2bca6bba2e2e535b740bac31f1adee641d7756b640f72ade371a76c057016bdbbd63e02fa5f67d9bffb111409f41d4517975853d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b