Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
db49e645a2e0eed1d843ccf9b4839e80_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db49e645a2e0eed1d843ccf9b4839e80_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db49e645a2e0eed1d843ccf9b4839e80_JaffaCakes118.html
-
Size
67KB
-
MD5
db49e645a2e0eed1d843ccf9b4839e80
-
SHA1
f95b68db5b004b87e359362fe98c0b30bb836314
-
SHA256
7335c04e667d92293c1eafffce8fc3d71ae5255223e59ee39f3cafbb75929d9a
-
SHA512
448b9b8ca8af00778800089ade48ba559fcfdce2ee963d3aa76442808a95f42d53c491739d9818940114e93404586a27cd92731e0bf1dd27857e475f018d6499
-
SSDEEP
768:JiwgcMsSZ8tN99OIs3zbDdooTyfQCZkoTnMdtbBnfBgN8/oygcR/QFVG8c//Ijkp:JgWC3jTePec0tbrga6cuNnzIjv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b22ab983fb5ec86ee8d58c91fb9674664ac21bd555afe3be87bd573219d7b5e9000000000e8000000002000020000000cddd45fe727eacc727f7c650a589f3331a2344c493e03b5930962b4f94c97af9200000001e7db1315b2d8a962002220cdd988c348d3f7b720240e42e12bef0f4a6c1ea37400000008c7e49e4e681f07daa9dba786c488fe3fec748cc927ca1fa3171d9bc4794d1eeffec0f6a747e520459894abef41896d2baf8614d6dc5eb2b98bcaaf6a0221140 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4024b8a89504db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2990EA1-7088-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432253711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2364 2204 iexplore.exe 30 PID 2204 wrote to memory of 2364 2204 iexplore.exe 30 PID 2204 wrote to memory of 2364 2204 iexplore.exe 30 PID 2204 wrote to memory of 2364 2204 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db49e645a2e0eed1d843ccf9b4839e80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401f71afbb92333c8b78f7b55e12c993
SHA193cb9bafccde526698500cf67db9a982a13dc6ff
SHA256c3861775cd02fd416f2d635b4d5dde2c4005c8c329b29e0a7858e6db511801c2
SHA512612c6c84b5694411b9f328bbb016f4a14fbc7dba185b393775c10ed75cbb5c912ffdf514c8703a0ae3ef12887eca4221399f64682dd569296c21aabfa8605dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6bcde8de2c5e63375b6aa1d4cf95c7
SHA1b2f094c9a189d486de923d450f0d79fa5261da9c
SHA2567dad64d556d44597ebf31219d5df8d7c6e0d3d084a78bf5feb9734bc59cd63f1
SHA5127f655f20eef0f4ca0a690c672b3faf7c1f11e2c1d4ba4a4175835bb8d2900c9c0b8ce2051af9b3e6bcf656ca3ba8851e4e2e9c62f466d2a667cc8c123f9bb347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53273d18129ccc1a9cbb510c9b2ad62ae
SHA1d1e6111652973a92e05a984bd5649d5cddea8cda
SHA256cf09bb29ac3638e3bdae240077307a1e230b80975f74e6ace894e817013bd5dc
SHA5128b8c651a3e5ea127cd1d89432978c2ec64bee4927b1fa625bdeeda523b430c7cf0fc4096609f9317eb3f4c8f811fc235bc48643ccb6e3237045442752a42d160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221b6d1f7c4d6510906eff78b05196c1
SHA1857de5be49dd8049da3f1536292f827489142ef0
SHA256688baf092adb951f01a5931cbcf89894fa43b4b5c4f7ee7ca1e73da9e0963245
SHA512feca84cc4b67959bfb9b7650af26cfdd8b1a77a3e0c2e284c9e5d088d4f9e2633186437a139931796d0dac0de4ba98ca3d69e0f4544221fc88ba40baedc17fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b93a745625d1c98559b3e0e02194f91
SHA1c7183714188d7fc148376321e06e501cba540fe4
SHA256d918d3a1d6d2206b9b13e0538dc51ee9877ddc6b9516ee7e29aaf88010616dc4
SHA51204a8648b88e4d8d314d7a064495a829fde0f31d728c350d281598f4eee023f3f49ed6cf94edfc64ccc85de4339040577d9370817da2bba163d299c60c1fc4347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f7e9376580699b3406de7338a7a19e
SHA1a01c70b615d55f341e839bf16ef98f8eb7a31f66
SHA256eeb2589c1e3b9408ed04f6ff773c2e17664451a6a1e8f688e379637f01737d3b
SHA5126e5f1307a2d605b2f7db2b8d5684743c18e4756f49789f715b0259739e95b8b63fd5894e8f13d8ab7c695fe1536fed881331444b307dfc3570f62ce71288b0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9e6accd6c41b6982349b908682eacd
SHA11213b67ee9130e727d0bb87cad8489c24dc8afa3
SHA256573dae3873ef5f49b53a53ac3dbe03c69f18c2b5f9b71b46c2381b9dd7751915
SHA512b5c3a221c47be3827f75cbaa3dabde3af39d2be3b85b74dbf637ed3eba35f28613b376fdae1f91ad21d5741cd50260c0135f07c3911c5d37812829dec6b9253b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234075996326125c970c559c20aa520e
SHA1b085fb3000d77dea6c9642e4c5c373ce313f937b
SHA256d6f51f18b96d298219c31c3b05b6ed5ce2b39bc7fbcc02c98dc23a383db6c8de
SHA512dd112b0b08afc9cf8934c97cff48e075730359d1679a11e9a6aeb66422b2a6de4c0b46dbc833e4e07fd79f2628df6afb21b2590e60bfa4fde1eaf04431de3f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51352c379801a495af3483c227f46be2e
SHA125c7790031cd7d024cc8fd72657df706000dacad
SHA2568ca72c785ea8163cabaffc8319f129d746c0ff9065062fe16b7d1fb894488a71
SHA5127ef7293b08af12343b822a2f032664869090ec0da219ed1645a82d7c6f4bf3d94cd0a0fd05d34e1ca53e8d76a93d5491ff0e2be0791307e7aabbcd143af8ef42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e95015e1947633110cf5d12de83053a
SHA1c07d21cea2313fda4cf1a6938654b17b3626c5ff
SHA256f54e7fa55cb8ff1ecf772ed1eb7a1daeebf00c4f51aa8b68bcb9228cf1fa6fb7
SHA5125e71d82a4f711b25ddfc974ceec83fa64dfe8d0b0732e8a09ef9e590b1ee80f0a1a8def88e4493d5a8c736404ffb937f6df7d923c3e08c7fca54a982030692bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555dd793ab267ab738245cdd56b843517
SHA114f629fd25982cba22fb14b7671ec54a4cfc0088
SHA25646e862041a35e67e3034650d95c6f1fde1271abfb60c9e919bb50d0214955acd
SHA512f198fd85cecd80931d2d84151eea12328c4a34439039972aaa84543f0ba21efe2faa79fe8159b83b47c93b864ba24875e3b6d4c32ff053ee774fc312f9d27493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50836f32e21af4e1648d7575521bece6d
SHA1844a99edd06862b9cf94f4413927df43d95a8b2e
SHA256595f7dbfc123d7c69368b743c2bcb4450bb28fa7157cebb69c57ad2dff302cd6
SHA5124301d11a1c96515b7fa34cd07192e60eb76303c5205c4d3b6ebbfad4ee595457019d104e39534fc0bd458e836e632a9ef37f1eb7499d8af07a694bc59a955fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2c258f4fdee7cfbf75c9b0d1934122
SHA1eae285da8726fc548fede38edb6ace4d4f1063ea
SHA2569f19f69b07178cb77bcd4fe530a6c08982de7cc402b3aea50d298da3575ee265
SHA51287352de7dd5bfc0586eb345b12d309086ec7133fc5d7a43357d0eb864ea1f64363e09dfff16958c340ac506d337cafde1506bbae92632772211e699094c8d6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799ed932f5e60b0805ecdb3ac5fae91f
SHA1a338dfd0677daab6570cdacca690cf61eabf1996
SHA2565adc1e10c33ffc5c2dc668afca2d0df35633fa0708392337c0391551b169da60
SHA512fcc214fc64a76c87ba479c0bd52cf8abbbaf1cae50f4865eb54af0321e93563b3704db8cb11fbe0b80b6c77de4c4c2858ead8185f12d3d3edfbb237e8cfa9725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e595603cbaadf6f635edb71eaa9bf7f
SHA1c114b28b2797a281cfdc74421b6307240d5bda97
SHA25678d0c0d820c4845b9b9efe155fedd45eb93116b965fc90277f37e5a22c8d125b
SHA512167620f735a798c504d79a4d47dd62126f40435f6bff332b6c23e886ccc92f656049857e9c88cb637bfe40d8965fc5578e0cc6467cfaa9d5905abbdb8602847c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd19bc7ccce74570894b1a0769f340ea
SHA1048553f5f2dba289be263afdaecc491138b7a147
SHA25637b55e34a795422268ec7ad13090d5a0c2857ee2ba8c92f49c59c8191e307301
SHA512e2019312c8dc923d559ee0cffcccec97aab0ba2b6b4f6ecdbaa234717cb2a91890e5c8575a26b115a150b329a52ef05d6c1f1a8c25507b5352c03fefb48fc318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e1dea0991ca4121740ba77f3ef18f8
SHA154b8470b3d178b4cd198c23d75b587093d04fd5b
SHA2564831cd76a2c0fe744dd0eb6bd290ca692663caf35968d1e74b34514a90e10ada
SHA512b4f7c6d5af535114c225fd510835dc115e7ac7e430c56bfe7d2822d8e63218ebe6b46df445511c555238168e8385eb6e8bc76ae9e798da1764cbd8bf77e64154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5610d2d3074dceef3d739e6b0754e72d3
SHA12326da9e68921af1c9df33c4537649e225f286f4
SHA2565c1d5a3c2dcabd9b18105fe7547e2cab0c3cc276eeb0aab2de5637450881efcd
SHA512018dd84bbf0c1d4345bed7e22eb7bdfa875352c9485e28cadf0d0cf6747a2cb5904d7c12e00be8b29851427a32e5497fdfd8b904b205af1ba17989c90364c2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51648b49c87302182dfa33fd63c3e44d0
SHA1b53ff4cb3565208a30efc20a3f5141618fc204e3
SHA2566970c4a3032917aee5c4c937e45ecdb16e65894a0ea90d4330212b2ada2ce545
SHA512dd540ea78fa783850fd0935b7a27715c97e9c195054b8a4fb1d3f0aa07e57225f2285c75f8a2730b3a5b9281dd1f01a2625f7886e28f23c62566e1f1b6be93b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b