Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
d43aeeacf905d7d2e5e3318c9a94a107_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d43aeeacf905d7d2e5e3318c9a94a107_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d43aeeacf905d7d2e5e3318c9a94a107_JaffaCakes118.html
-
Size
461KB
-
MD5
d43aeeacf905d7d2e5e3318c9a94a107
-
SHA1
4dec889f45c9651489d838f4e70f5820a1faeabe
-
SHA256
949ad56112ce2653282f396c735c13188a403c578b36be792577a4cb8658e4e3
-
SHA512
a299ded58be169fdc021057cc99b8111c7bf47ae7f9d6cb36c372afa589b8ca2a345e621a8ee5c6563f79ac08480257e5d62dd92e7f400c842f2c375442a1f8b
-
SSDEEP
6144:SIsMYod+X3oI+YcssMYod+X3oI+Y7sMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3Oa5d+X3h5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A0DDC91-6DD3-11EF-97FC-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e67e166e235befaa71ba10a5f735217134fcc8f03d8f8551df73f42210094999000000000e800000000200002000000071c82b3dd69b0ee85a9325b7914d34751069b1d21db8128c278b58bfe6f357932000000016d9bbf58512241cbd5f8f2f6f8e45984b85b2dd13eccb4487632c8527af59154000000018ff35dd89ce7d38508a481a9e9e8efc5af1310d95784fbf7855fafeb0eaf6e1cddd9dc0b949ca42ca7b2a5bf64b513d665275ea916e4d846a26ddc669db84ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502db662e001db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431955948" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2700 2084 iexplore.exe 31 PID 2084 wrote to memory of 2700 2084 iexplore.exe 31 PID 2084 wrote to memory of 2700 2084 iexplore.exe 31 PID 2084 wrote to memory of 2700 2084 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d43aeeacf905d7d2e5e3318c9a94a107_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559bb50af5df49a00282dc075ffdc972a
SHA120235b9147591d8290e3228c0bac79a702892664
SHA25698f014adbd9010f9866ff85de949f5e057a21bdfb23eb92f390c2df838511e3c
SHA512f32752169172d4ddb20cff59996227dd16522d82926dd284cb8c676903678082121f3f60236a4081f8b04a314ae781d7f2b428d27fd86efb14012d3dadb83548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c6ab590bc5e32ea8b43073dd7bd44a
SHA17530ae8c0e9592cef8f987ae0bdcaeeb82a84da7
SHA2565df69da11c2e87601e2c378f502ae08e2efe58629d1c17fff4f96adb9900d574
SHA51211ea90cc8dffa116cfd97905b75b5d922c6b5fc5c6a7c8fd10c8b15abca98429f1ce99a1b9c87bb7b411f220758924f1a643052459711caa7b3ae132b04b4295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651617746a7742b72afa8480f938f214
SHA1d2f38b899706a8c7d82a20e415e2eb4120c996be
SHA2560e75cc73f0240ca2b1224f6f18a9d8dcce4a1ae385e40aa9ad0791dfcb9b31eb
SHA5127839a1c1d7e431774ba73622d313d613a65bcf84e42f217e6386c2d8d7f3680d0b56a15b815706f9b9e96381b611bfac83a218527c85ae4188ed5025d8ffca8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d8436459dcfc841184f1de27044510
SHA16cfde1be1d21bd184dcad04deb8a1c7ce55b7faf
SHA256479fb5c37d59dc1f56d020b1abfb4874037774b25a5a6879f8118949e83c392d
SHA5128fd00598d8d30d77ca703827321031f564f2b0c04c643addde179bc051a2d135494bfe466b326fe84f081097785c75d1a7bee9a45630644c3cf3e1dcf7db54fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53205f4e6ebc2d976af608728b02af7dd
SHA11711006baa7afa6a23d5405c36ecaf8d7b49f9ba
SHA256fd0f53830eef521de3dad9ca9e48ed38535b105f5c4f3ceee5fb5f95b5df1ff5
SHA5127ddf1955e8c43811ea73ad11feda01e6909a0291fc0622087833e9bf340d28052df9f0c01093ae302df67465ff6b0e339d0a9befef7aaaeafa9ed0b830d11a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7007248b65d3e208b6f2a2fbc35b66
SHA1622dbecc07338f49c8699768fd6ac63de5683132
SHA256ea70bdf44076a9fa61baff1b13921c53606403541cccc25fdf6b6d56dcc3d91a
SHA512be8f43d20edcaa2407469a0555b2cbb9b2db6c1fc85912509ed082f1baaaa825d2f5f14dfdb29f7c5dda26f5b63c9475397cc5ca2f1350901f571387754c4a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b526f55c0107d290ad43ea937258f695
SHA15f0e63ea51e1f019a111e038007e5872579c1360
SHA25697b3cd84140f07581afab53449051bd0dfa21685c6cf45024c8075ff644b450b
SHA5126362569c6e606e3f7e15fceaa916d4148fef477e32aa68223e82545dc3d3e075ca820ac67d93131e08d7e2f4e9f85079d855acf67c029b4b69aeac271cd9227c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d429b4c73c028b8bfb4f0a8db867f7
SHA17248465f0b641c4f961438593c734c9127d87968
SHA25653674142bb8967db0cfe0fc391b7038c0daa8eb713886473f0f19205e91ddcb0
SHA51240fbfaef4ee13e7fa52c78f66bce3e6def4632ffbf3d983b4675f84be0ac4ed12f1768c5b2422e3d8fc79ca265af84c9d2c44813c9ca634038a64d514ac757b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518283b9ba37407155f55b2dde222f4fe
SHA11ae618275514e47742b065d89dfbe4cab2a1691e
SHA2561653a1191d56f241ceee82d061226d7b8d473910f3075d61fec7e5845b80ef8f
SHA51230432e18cc1c8413ee81c5869a13481a55b57be8daa765fa8a85da6328f3094cfc9981294bf550fa13b9186ce441ac78bdbb0547d6b1c5a7ec99f366941c31be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd2f2853ff8abff2ed54817b91747fe
SHA1b72558b01650c1799cfa9096f3ed384aecbc7b98
SHA25657dd60eac397621bc592284a2db9657413fa373d4634e2a3fa8ac0741fcf2f96
SHA512d316eb5b0db6fc9fc51eea10dbef9c59ac7cf1cca28f36c997a27ef28f19ff6f9ed5a29e2afdc664db915be8e4295811a1567e426e934f566f4666c0207cfa42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504153f90f6dc38ec6d9ea25c735c983c
SHA1d891074fdb475fb76640d3ebfd18f2284911b05d
SHA256a45498793d7528158e93c8ffdf65ef4743972f6796007fc230f2dd2db573b733
SHA5120a82694851b84786c443565404e294a3179b13369177bd50b293a20b45ca09867699925cf50b54087e1ba3bef285c490086bfa5df43af111cbe6b2a02cfdbe7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51885f4017ee6cf82c8785fe8895026cc
SHA107238d82f32535ff7b27b5cb22d69f65cae2b313
SHA256eff32d70a5e7b478c400c8daeb45735b0276afc56399de65d0a1654fd2f4c57e
SHA51232727fbe295f25eddd6947356eb63d80b04872fd19c6f11cd68c32d44fe3be7f432b50e2d2d3e2645a79558f7b7e932b83a5647346059ee022e55cdd999a392c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5201693a6884daee1e807ce45ef53723d
SHA14290ea95f718e0dabc4276402d9e9efe1fc16d39
SHA256083df5a2fa7d72f88ce457cf464eb048e8a69d64eb184c80562932a5d87e9350
SHA512d77c762d5c4a62ee48c4187526869606be94dbfdd3e938d7d9c4ae6e0584d360c499e168bd51bcee3d2f60e7b4378f6b64483884821aab440efcea431cdad724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af48f9c69809a726cf24fcf775e3ad55
SHA1310e88d94dc23741b25d3aa75ee33dd7992831f7
SHA256fe6c434d94842138ded9e20269a73802bbbfb5045eb8a6cc837229da0a085498
SHA512dee934df7a0f27a8af1bbde3ea715836ffd84436141af90f3148724c1176d256125dba3ec9ed26d2ed4a9603d494f0da273002eace6630a232ed4a5fb3a8e98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d670fe9dd9b34e7d342096dc60b6303
SHA135d661e95702f109c01947a15a68503e138a9da2
SHA256867ccc0915b5b1b5fed81f650d8fc15dbb9f9c7ebfd8a295d0a952136ad1f65a
SHA5121a74c8b31e5fc2e38c2404f1aef4569c9d140ffc33609204478c34efdb05141378910409348944824c89fdc4d7c5885481ea6442d4bace22c221ee9c94a185e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd54dd975b5c56e91d3e2b40e2222e4
SHA165f4c706393426cefd34c9cbfee6943765b3c574
SHA25601903d7191ab28fccc26048026322959e526bbc6355679453d5d0f122e7af564
SHA512cf0a1fec91587a99da8b1dc86a8f18b8a9ea67104e7152f9af4b797db5f6079d45c246c2c79e9c5b9cd9dfc20b3dbc348a6b83acec033e7bef0bbef1b76fbb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896856addb514400b9fcb2ed513e9ab8
SHA10559881f24745c528acd9b90759d45479f99a708
SHA2563ab8457fd8224e1efb557e65024aea93738f833a44cc112196f3cdea1c217c7e
SHA512281e41d45b509ea8bf3ac6f49e6007fedde6979b0bd05fb8c0831171ff7bcbc621937b1bbc112783fd655fc8445d6b516827e16a5b497d960f93e1fe8634f666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111b19dc1e7dfc69ada6eba6c1b8029e
SHA14d71e11f5c99d3393b055dcf0b0af486d535e29f
SHA256e5c8177ea7d39139bca3c8c42f5a2bd64f7040c505f6b334329fa36c3f088f29
SHA512733c3406c71ae4205a49dd75fabb17ceef486963a6709a5d005475affbadbf6e8c7859d0d47ecc0f3324b7811a9bd2a00bfe28c35cc3917a08b5f49045d74378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a85a051bfe28ae07792d523e1c6c3bf3
SHA10585a5cc6ab1f503d8933d8fe2071eb60f5e5e84
SHA25670aa987f76d4549ca7368c701ac33057f0f3db18bda1e06a5e5cbd5c49f86ee5
SHA5120452df7523b5ed56aab747b69db4b6a99a674f7594ec8fa52affb0f93997a20cfe34f2391369968ef7779a069d5b7da9efe6d91d750ab5d0e39b79f729b605c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b