Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
d6ae92efdd5ab00f6194832d3f2c0c73_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6ae92efdd5ab00f6194832d3f2c0c73_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6ae92efdd5ab00f6194832d3f2c0c73_JaffaCakes118.html
-
Size
13KB
-
MD5
d6ae92efdd5ab00f6194832d3f2c0c73
-
SHA1
8e3f330ab40fce8605deb3f09cdb42b07c673f3e
-
SHA256
d3853b757f395fd9e9c2f4476ee64fd994cd130a3a15fb08812ce1719ed80fae
-
SHA512
63f3c97e449961f0f978945236464adbcc56ebe705830452eaa524b70fbe3a76b57ae0c0711594907e37b21b442f6deac4a747ae15618a02c46d90f33cd3ee27
-
SSDEEP
384:CyiLr7UJXKfQFAi7uuvKjMKS0OpWz0LMUNQ2Bf:CyiLrgJSQFAi7uEKjMj05SMTm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{763DCE61-6EC7-11EF-946E-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000005f1d10a2f9065c619ed300ad61adb968461a6e34a179ac163368e2f1a8690f4b000000000e80000000020000200000007f24d3965fe433b2c1cb21efd960a4a50e049d81f22a6fcd7494e57c6b15354020000000e8821b06465140a8c19297a9730a591fccea4729bfa0cb630bf9d8153d26ad2f400000005e3d660e8b65a996408d8ac16a9bb69ce525be0b1ad4caee012ec662775908e6533318a41e01e2959979144d28dc043ecd7164dcd7c453cb73e8b72b3c031a7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a3804dd402db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432060711" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 3000 1200 iexplore.exe 30 PID 1200 wrote to memory of 3000 1200 iexplore.exe 30 PID 1200 wrote to memory of 3000 1200 iexplore.exe 30 PID 1200 wrote to memory of 3000 1200 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6ae92efdd5ab00f6194832d3f2c0c73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0b6aa8f071a742bf7707a044525cd2
SHA1f58913630cd155553642be29f56e87f1471c810a
SHA256f87ae92cd26a40591ea2eebb839d33dbe145a69b403599a4d269ca7575512acd
SHA5124126f538abcdb7cb5e2fa65b42b9459cbb9bc3854451c9eb93c8d345b4b90a5d57ab08162d6fa0e96a5b888b0661d8487e427f6c228686603eec4fe934c805c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbbcb877ca644722eae4ef2ee526da2c
SHA19f86ebb7985c751e471e668a8b4eb829e6f25dc0
SHA256e1842222002fbe3a9e8b8cf402f420b6f98ab8eb092ab7a5bba8a63b259de29b
SHA512872f5b64c23fd906f92531353d5a68d95b84027770bbb182d514b9c50a26223602f7ede6a1a12426f93f17c60122f6a60bf476b57852c569da78b7893626157f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea80a44e38b83ecb5a26c336c452c2ca
SHA1c8057f07597ee526cc5c5f8a8f3339544d7e5051
SHA2564b8da05374d8efd365fcbb84368f810df1af5011085b37670ee2afb5aa82809f
SHA512b5ee5cf1e2093dae8b4f3c1f7b85edde903bdeef20fbd548ccd09ff19ec92ed80be3030b6e210ba4a7b4d82b0ff7ef91cd2e86204ed5879a71c442929577f00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a804121abfa111acddf97f38b42b8b5
SHA193c28a228fa1ec5bf27ce291a379e77b06325de9
SHA256d43ed5ad27421a74bec851a1972d16122a07a3d08d7d2a73617d63a55d936869
SHA51298b013c443cbf5535637a201506dce6419226d51597dee7c0ef2d5941c0891b258c58b6d14c9a154cc4be5a3318534cadad5ec671d70e2bb0db995c0a1bd5ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e5bc866918f6384ea5b7eebd6f8558
SHA1fe19c0fc700abab2a75ed449db0d02fe12fdb645
SHA2560facfbed8f763bc9c78766dccb805fc1eaae67008091495de13b612013cda4da
SHA5128eb884ea1be58c7b62801ceb5e37ce759e5e5f5d2fd3dff664439456582f2b291fd3715ef7cf86256b596a96274614e3f5ab3f7bcbf0ce2b190042bc54a9a36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1a31ec0b9481b6823df30636e5488e
SHA1aed2167a8154917e3c80f66efeb7f395a0759916
SHA2561e83a311ae8c3b8f70d61f55ec41b415b39af0aebe5a4a9eb058f68dce24e72a
SHA5120f6a44fa449845b29ec56ad12a84092e0e584dc87797d1c952e0566fdf7a15d0e5a69600fb295b291d02f98d6e4c347b2bc3e02a5900856f270c0f5aae166ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288f8fee5db30261234a7611034892fd
SHA1e743fc19c51fc1980615e21be5fbf903cfe1e49b
SHA256dcea18baa860db711a4e448e3510c64add8c136a350b8c54b59d87ead2df5b98
SHA512891b807366fb8a491facb71430c84fc6a311de8db33736c69459d646dd609c0e482354d1ca3fdf00e3583bf8ac808faa67bdd3cecd8dc3660de52430c9c219e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597698dccbcd78b9cc92439b99f2f9796
SHA1a62206cd6853a7328f5fa79550c83c6808aa51ec
SHA25613be7ca51ca736703d64c3816c0589fd2e46a53f6cc44f8190d5c670ece6f719
SHA512be109a0e71fd5875463ca3e1918ba5275184591d495e00f9c2bd282722a4fd0cc7be933c00b0ef3816c61ead157b2a551b693b0aadd709dd42f1d9387a8a0e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d5a69840ea3411b251eee5553f76c5
SHA148c4102a2483be32d0c3534ca52d8fce01a3cfb1
SHA256f7f9bcdc579a514fe9096e1cf41002553fff69f403644d0b47ce0d7b9b1a509e
SHA5127a31125fd52ef126eeab0e02344646e817249952c72cc7381b5975e85eafe697a57d92508627a8bc48923f61f803f8c08f225f0f8424298b9a8982c0a193627a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a9569c571046ca09f09b5618545dc1
SHA116844c7bffb361a1703b4851b0d1349c9d80da3e
SHA2569ea155b0096aa5580e106c3e025a8f6baa9f85f9b379c7da3cd026a3f2af7589
SHA5121ff84c116599929f89fe7a5510b4586b0241f51b5c5ddbaa047b64eb3ebfa91b4c674cd8a7357e1c84fa012dcbbc8b352a439e68cccb6bfcc24c50c8c71f587c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd1abbfd1b9707aac696623f76b4fa0
SHA15638785865df9aafe6eb4b23b0fd704dead55308
SHA2569969390bc0496009618f6616b28437ea4713b2c502b09589753975efd9932fa4
SHA512f559a9785795cfe44a5c666c49d054fcc630398353e78439a505753b4ab20f5cd7391680ef59680d9c4faa0194f3828d565ba6e473694d8be400f1de27bbe659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59917290542da1dcfb7962b44997e2e44
SHA1ff52ed05219890ec81e552ab215d0d27f47aaf38
SHA256417788f0a5d7a52f44fc7571737ced654e98c5b48474a23fe4d10daf9b8f2df4
SHA51207e9bf0bf26d3d91454e02a006b363cfb2ed41edbdabe77bbaeed4b318ad79cab024314630a1f3d538f38ffd0fbbc7d3b0032a2cb965056891852e56968f93ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe4a580718e4ec276f8f6264d9e28d5
SHA12063b491aa0680701ea8d520025179a1bd6427e1
SHA256169e045ce172d9ea3b8226e2416ea92aa41b25c2f5533ff6a2093860f71a1c14
SHA512693860a23d557fc636d6ff8bc4b11e4e88c4982c430a570f3a073340ba53eeff10a34e579e09d2a57c243376a2f2f4df32101c22a1ae2f35aed3bdee22b0096d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66505187075f15221b220c5b31f7c34
SHA16c0e1d5384d5b71c0cb7fed8367785dcd2a73fec
SHA256e247b3218a5a1e6a3de95bfcfba887a9ef23c39b1170c36e69645cba93cc4232
SHA5122aaaa9b4aa4950e68370852078090d52d82f6b1adb50c15f7ab599e692108dcf2cb758163806ea51964eb9e286c2c14343612803ad36cc0a3b12a14138cadeda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5a5bafb6376f7158f715a33a18dc2e
SHA13ce599cdf294a8e5e927658d790431f58192d956
SHA256ea9480547f1039bed6a6ca4ebc44f64c99ef477e5764eb721c4623fd2cd5b55f
SHA51266b65cfe35a7a80a29c4a17009a11a804f9885e4f2c580bcf5be843defde7a3eadc7c931d38bf051faf9e7a899a95b7984a68dfa8801596a49b6b6c082b51e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625a657fade1c4aef095fc8ee97de181
SHA11ee18a933df8b2889258c4de7ca1357a7a2fced3
SHA2565fad096f0b0dc01a03bc15d1d5ade3810f4cb41bbc66740f51e868fbeded526f
SHA512b00ce71863055d83db9845735fba50a3e195e20fefcc6d4ad5c817c0bd7c593d1dc662bab3f65aecb4c2822d47dcbbacdec0473d6301cc0a0534cd4bb98a09ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a4465ded3412e5c04203aa98018f20
SHA19d0d56e5b444d4dcd6f19fe82652e29f7dd5ab63
SHA25695b5786e75c08c1ca08d4add4b59daedc144684cf10b7b072038e25c4b91b9b4
SHA512be87e8383adbb3c2c597b6cc64c9030ba682e8c9993e547f36fe50dbb12d7491039940004fa5b71fa0c1df8f97161de6bd1114abb7f81b1192ca2f173d375632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b480a5a9e89d1b8cb003489f3ab9da0
SHA1039d220de64e498a35057c7ce5037db49ff43982
SHA256ce141e30305e8b2a32cbf7707c164d8e2518a53678d73333ff2ed9ec305973c7
SHA512b286aee28d0f21917cd359f019722d0d6357303ed43198b6e935f1580a882304199f30d285f02bd2e6638dd4cfd6adcc1d541e7f8ee91b5e1b687c34586e8f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbebf6e3e2fba1342ab4b82a2490102
SHA1bd81024d6fec7673eff44c17e0b3efe152fd8cb9
SHA25667aa600c80e5a95e713a26a508257cd388887c018bab5b054db8c01ccbc789f2
SHA512d4066d1bc9046d680d2206df7266e92ee86c482b3e18d0e0ae419f530907ac177c5b9aee16142d8aac11f716080688aea94829f6be01abd47901866f08025412
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b