Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
db4e32afffff5ce4e99e34477f91e50e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db4e32afffff5ce4e99e34477f91e50e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db4e32afffff5ce4e99e34477f91e50e_JaffaCakes118.html
-
Size
35KB
-
MD5
db4e32afffff5ce4e99e34477f91e50e
-
SHA1
4f20e85234b68d309cbef49c16c4f6aeeae8c77e
-
SHA256
d3df2e04eeda0d99d9788cd2e7b06f5f0f0c6b7ec8cc213edc4b2ac523b6e069
-
SHA512
de17f8d3a3eae9286ad0893d39c14b03360a83c7541d9d135d61a9c8a9b66d8fa3f012b17802730ed4417fe565d77d3f4b114135d3531d71e74743c1dc494e9f
-
SSDEEP
768:zwx/MDTHV988hARRZPX4E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T5Sl6zBy6OxJy6g:Q/TbJxNV2u6SJ/+8fK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B8EF191-708A-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000082531cca6a5974742b020c526d8690243e9a0ceaf5a1376d65b22ff371182c62000000000e80000000020000200000007faa89536f770eb90d8dca084cc2ca5cb0f2a87996ae16f099b5e7aed6a95f5620000000d18e44ba3886771efe1a739509a2875ef982fd53c21845d19769ba92c94ab18340000000b10515e9008664508fc9ba7c42557e9e69483a1f52e55b014a2eb4c0bdf89ff6896868dab247b49bb7bdfac2e0e36f4927ab611ffec7620f51550e5a8dad931c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c4115d9704db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432254434" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1628 2176 iexplore.exe 30 PID 2176 wrote to memory of 1628 2176 iexplore.exe 30 PID 2176 wrote to memory of 1628 2176 iexplore.exe 30 PID 2176 wrote to memory of 1628 2176 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db4e32afffff5ce4e99e34477f91e50e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD53f63c03a17b124755c00c0b262642026
SHA12e018d7603839196968029f74ea28aa51b8555a5
SHA256d85db4b1142b87495ee2610db3c75bfb4a52f38a03d174e76a5c3b5cb3eab190
SHA5120eefb74db6b92ce18f606bcaf6aed0f76d3d075e40064fab39f83f8e3345ea125153452a55a23c542cfc9a39d09ce6858ba2402309a869e4bc74c6ba9d9e545f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD55d88763d52054845c34ee8a7412211de
SHA1ffa9a297d97bc9f256d94e0a9d4f3c0aefe12c13
SHA256356fddb1779a071167249074fbacce6b088ead175a15617e7d2172edbe452556
SHA512961da23b1fcf6a1325c47ad59fd314481c675510b76e4131e5d70e315da691aebfa4aa44e4f18d91ed51bace62c56102f6a5e9d7b6d08e0ff6bdc6375f9d517d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6eafbcd3e485f6e4fff523f414f5a3e
SHA1c8f41a25ac63cd721d7fc7fbaec72980dc24f12a
SHA256c51110c50e57e72195376e277d144635b95c700aa52622cc17428d50ade5e29d
SHA5121fe15182ea57e24ce26f9c74c3e4786160d1a732297ae02ebd179c2254e2d3e0e32b8d091042300a605732355637f3827d8a9eb8786e88f21fd4247ea918e8c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59431ef170636517096606d7d2c0e3e3e
SHA151a7be9d42186dd60be27e9c20dd5b8eb2eac77c
SHA256d971d45b87f10aa07bc25ba7356b032ca5684b4f55d091e22f8c54c62182bb25
SHA5126f9e52ec0bc3ae86631fea28b7516d56377c40ce2b806a0e71d57f58a18d586a0f2c0173d9c499d8209e9075dc1f9c81ded5ade98b8763a8927e168f008e749d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a164ea9507f244da6041056d3f1039d
SHA1fc9b5c6558099845780045a091b0330088dca909
SHA2568d3bc1794b61609ea491423576b285eaf81437fd88faf1e4e7dca9fe9d762d83
SHA512ad75d4ff51a73d4490859d851618b5918df3d3582a00965cf991ecf6ea5b48b4e90997d4abbfdef2655e81d979e293c7afd2997743b062d51cbc794474709ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513aa937edf6fb6657fc0ef38eba84510
SHA182cfd2015b85920206d5d94ea030538d5e79f67c
SHA2560a58a75b9d8a66065b3a119c6ef7433668ab19964c89f6741e5b08240a8138ac
SHA5128da7adf3dca19039e77169bfcab7a443e4e2dcb3dfaa02205c030d691c72a886cf0317425893d60a1929ef116102385ff26d1091d13683c3b007ccea810096cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b18c4f3ceaef081b9bda96ac8dc864f
SHA1ac5508f600335ca7cfab1b8bc2837626b7d73878
SHA256c11f334c055b71d99ddfddcc755a44c5cdcfcca3b4410ee285bb6ebe7d5aa6c8
SHA5124f64ef4a09a03da94c71e9818c6ccd5d8755c6d1fc4a0c40b50f3508953a3e8a263ab1c91207f73b006d204d74d2ff3e1a0b63f12175451f0d11d5db971653f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb153a66f541c0ea867917a930bf8a7a
SHA17b3a9f77735c2c0548ed127bf692d1719f5b33a8
SHA2569626178db47f979fa30073c2026536c417c282c865f238b6ec4250654b51a3ad
SHA512fe9566a85c08bf37cbf7a16565b235f766a388745f740b49fd556e1a11320b0b4070343bdb08441a4559d009f38d70da312f88a01a650001c9aa879943ecc787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc86d488c1b8b002f4ea267cbea3fb2
SHA10ffd1f3d821971f5c2fa963976ca68236c15eece
SHA25677119e5a24efa4c3dad529c4c6fd2791170a77db11ec147230464c107796c671
SHA5128cd5183cba690ecbcd515844ac937604fdd909046b71416a79ce574406088b697b4d03bb2c633aee87386c76560a5a8053151953b4f7bf552e747167e5554d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52606094f1a6106d70e7a93f35554e6ee
SHA18c3786b9aa9d75d06551388552e874afdc94f2cc
SHA256b5a659ce0f2737d16e97183a275742854a8f3b34961fe9f6dd270579e7f69ee7
SHA51229d2aa621daecf71b78c7aadf3b440704a2af7417ee8620d539e05ccd6696a3c967681dd27977cb611eafc515a4b60932d23c591e63727375e8ebb35fc1947f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d192d44cfd4fde9da1f4234d78c325f2
SHA127f63d03a539114cb05cbec951e4c0232e976e74
SHA2560454a63ff662646b4ed17d641b2cbcf7b7c34c5441575006744e9e682f92c801
SHA512b10dbb2d1be2aa04212daa949498d3d3ebec5921431e8a1b9ce9a4a2a36915350e34ba99f550f8dad5fcbc3bd4d055425fac42b43adcc8c34069165ed29693a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee100eeaeb36a92f4b41305361b9518
SHA1b0b2c6309b374cfb96df38bd46814ff360320db6
SHA2568bac6f545741c5d7f0d906d86931a8fc0261297bd6805eb1fe0644038ddc370d
SHA5126309817677221b82e271a943049f6dd188a9eb27b494595491f946d6d17dbc60f0f7aadc91da822644d0d3ac993e347e2ff7df6459dcc31c769db85aeef6b075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338979abf474c6898374450c9eae5879
SHA13e81b260981a2cecc5ce192015cf9c1eccc559c5
SHA256ff8fd08d36020673acaa02aa5111b2ceb13a7567456a57f771ccbba073cbd573
SHA512406c3b501f532e38d2c4cfed3c599ecf9bfb833afeda9f974f795e2c0e67cbb9da5fe22aaf102681e32a554ea6223e242a201e4d35d7b4e4dee2fa383a5dfe69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007cf5f39fd870c3a35d0ffd334e9cb1
SHA165ebe72ef0f6d0a6d50a1042c9ca65edd6c81c78
SHA2561829e2ae777d59afbe9bd49611bc36287944790579b87df27d9ba104ce8046f7
SHA5124955bb99dadc033b8bea2ea39f512785727aa1ff5c9c8a7f42d6313964a59a10a0dd423c87f3eef675805d1fc60d8ee879ded35dccda99d6286d7dd016d87f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070354225603ec2a634a08934daf39af
SHA1ce7afd2dd6f411bfb3e1770f75d86c6711c403cb
SHA2560e22df8e38962e0e4264806405600b344b68f3bd0e90c67862589c831064a798
SHA512efa6e4e8117c2615be75d8b7ae5c1d571a9047883d7cfe2f90ca6833cf4c5625c6c7ce13cabfdc019d127c9d184b7cb891c59231c4d2eb018ff00382b271e630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7022d9bd5e142174b55aed435359b00
SHA1286be9a377b6c429b7a980d32d0970a666d52a6e
SHA256b563766d151f0d507f47cd04f144d5e0974046944be5243933a600f62f9b3593
SHA5128a0ffdda52eb9df93d0b45e2d4fd8c40cf5c3a9bc03b98427d13508b2f368a80fc469b9c46f1ef65f701ee15f3c9165c3dc462e58e9b8efb168df0d3b2d73cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768ed6d4350517fcc5d9a518b4cdc6b9
SHA154bb096e0183491a640a3a44c5a584ea63b8c1c3
SHA25690856ce3beaac08dce27f205cc74453f73c78b2f7e267b21981dba57953f4c4a
SHA512cf53cf7cd4b9859e08811cf72ee968476a8b84b7a03c98c36c143b967699d658ce90937e629bcaebc906c56d2987c97b8e021579d9802df153406a4704de0c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5031636f869ebf18575ce30081ae85e5c
SHA14ecb6a88c8b2ecec176b3571892f13b9cb0599db
SHA256393fe480fbf67fe10f86ad2cb94be1818534926a72fef8d5c880e73997af7640
SHA5123fd9969fd5d0233e91becf625039fe97cec54b620683093e2aaf8c8877191fac63110b0be074880da0cb4d51ed6eb944c2bee3ad11ec5ffb30be403e9ce9cbc7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b