Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
d9ae892cd25d9b6b258f3bc637d8ab5d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9ae892cd25d9b6b258f3bc637d8ab5d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9ae892cd25d9b6b258f3bc637d8ab5d_JaffaCakes118.html
-
Size
31KB
-
MD5
d9ae892cd25d9b6b258f3bc637d8ab5d
-
SHA1
7285c4d4db61c9e49a1f3f1502a17c5cac778944
-
SHA256
ca280e921ae3b1f1c347582f6fd9d0e652bcbe1294c65f9a6bf62a5f105e6834
-
SHA512
dd8879e52b15589c64de237bff15e13c019caa20834d8257570a7822651b65c57ca4672e3787e2dd89cc4b121f863b45be8c7ec63b2b659c5317a0a6120b1609
-
SSDEEP
384:O8jCU/ivBh22dw3VVgxWgKGg2gGKJgH6gwtg/gIis7ygVrAgLgdHg2VFWgwnJgu4:lzaySie9pZTxwdA0FgOdok7dH/lD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432193647" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAD44DD1-6FFC-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000007d3f72bca214be2593fa427339c8ba9eccf3288b5e049733d66ede4dc399899e000000000e80000000020000200000005c2acac3d95267d481446b948b891f69fcaf41ac223f3ea2760775b9ed9ca1702000000059ea96d0d03d28d9e9cf063c0b0836f3916c2614d10c4747fce7ab012be5d5654000000031f3e70d8e840ae04330b0499187470d4a6ef6ff9767fdea32879c7100a85d047db9d918d869ecfdda5a34c790fa1737a7cf7af0f1339f4e8ba38fc3a2368015 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f781d60904db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2492 2972 iexplore.exe 30 PID 2972 wrote to memory of 2492 2972 iexplore.exe 30 PID 2972 wrote to memory of 2492 2972 iexplore.exe 30 PID 2972 wrote to memory of 2492 2972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9ae892cd25d9b6b258f3bc637d8ab5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c94aabc76de51420321bea5264534bf
SHA1d4fcecf340bca552f67d499496b2294ea3ac3afa
SHA25682d41d318d04f1f5d9557147aacd0d92e8a1bc531521da8ec36c09db5ce81818
SHA512a6902ba8af854254315c4280c800a49d6abb6f390e44b02843bb0c5c4ecca4f3971b07670b9e173d5d2f19c32f9a6d9fe13f8f5660deabc3c2f216341446d810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6834deaad5fbc9e9718e4f4ff80c28
SHA1628b8ea7bf810960c8aa344c30122b00474ca5e9
SHA25630bd12b9a40db788a580f081c4deaf8479243900868bbe7d695979d745d1cbd4
SHA5120e4469d9884677d815d7db41936e366845325e8e1e10dd8586752478716d5a94012d59f642aa64752b8cc6d71a862d78563e05d7d7f3561f161ae3d252b32420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51d856e87811004de17a7d6151a6a27
SHA14377d0b20248aed948e8fecc94961262f478d394
SHA256964907c7e8362d39aa0bbcb025abd331bbff8b92bb349ea3600a4bdba91aa863
SHA512b0ca4d0dd3164099656056db9396bbbece80b7261147159df5940c2b7945b7d11d08911e0e01df665aad6263a763db4af9e7e3d14c61fea0ade64d192b65fa84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fbbf5a45b064a6d0284e9b810e8ee8
SHA15f5ccedcd61bf83e1fed4003264f43f5aa2ccdec
SHA256bee2ea8ef21ea7af365eb582bf7cdf76c248b9332bf257e55a7102f0aa6d1709
SHA512a30e3255a23b335784934aa32cb0583ce23f28c472faabc68b55374ee1a9804cc56653e17bfaddd94e1221b5a28b45104dce3d5710b87178fbf24dcdf8123910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542225bec8a165703fb33eb54ccb5b614
SHA12a2b103aa604123aff95955673f1ee4141b46353
SHA2560ff5291b19ab8e404df09b477cfedc2f05c054da5b93c0f62d0aede8c45134a9
SHA512b1837f7869ae14e8c95534225750fe151d0160f6b82753a565cda19de5ffdd54bbf09f7b2e05b560ef5d4f42314a94468a30a66c7ea0ae14df41f1ca88afcf8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58beb91936aade578c250ca07e34c0513
SHA1ca4b1e8ae14f5b86f1df91ffc75be0864ae79ffb
SHA256415534cf6ce434a9f0e97888e9c3374ea084085963b4a0d923f372010978d410
SHA512a22b655546e70a436bfe25b0806c2031a5e8b51b7af95a2fcf25a1743e4e11c0e1f3556abced9377958827597006ee71fb1a8de49f43793736aae2b0bc022139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd225324117bbac5c7561f3effb7186
SHA171a91d3c92981143717308c78681291083dd0be9
SHA2563621b1bee1897c15521a14f4530236658c290424eb6b120beaa8f2a672075da1
SHA5121e4cb1c2d1171971a61abf26177bc19bba73bfbc7a6dc9d3ad50e4079cddcd4f3396be131f7d81f9dfcb7675a05ac91d8e6fffd51b720ac610b020224cbbb0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58292f2a146aaa1867f001b11fb4c70c3
SHA120b34b060d1e680ce18b88feb25b171d7af00181
SHA25638409322e7582d336638c6c0f9b89d85fca5d7fb87efd515ffb789028c8a4e2c
SHA512bb0179e69a8a3cec01e6b7f481cc69f46fdcc934c9fa81f3b06938bfdde274763c73dd62bc9ecb9f2100f144e9ce5449825651fa4db4d1aea616e6ca1a5e9e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf98c4ba11b70a086943d71be5d0ea6
SHA1b800f04e9203857cf1ee3ffadcd7e20612bb3c65
SHA256ec57c24874347d5ac92f9839e32e2cc4a056835ff6a4988038f7b4b845051f2d
SHA51220c30fa68210532b7c69e364631ee5695b6b078361169edf0bfd95357849aa9fbd06ae7c2bbff21c01d1c975c36fb7902c4986aee4ed71ffb67f5d1c4449597c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5ca4cbcf4cf8f3bc31714bdba24e3b
SHA12d97340420bf2e16f298c0c5c74960a495e381d8
SHA2561c27c6607bd5ec7c265df793a6ccd1779738808d3ea242688abb914e5004187e
SHA51255fd2a970d5b567c883db1034924d431eea4c316f40f621c4b9c1f112fbf8d2fd11b3cb51c3da22de898b089ecb12a11949e4513611216062d9b41fd60dad48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504543d139d5ccb0434aa6c76910fefc4
SHA1f94f0314f1ed1209120529d08cf1c2fd5d8c0718
SHA256bff296af8bf07ce3dcffd452137f918a63b3e35c64efa0dd11b8bbca8cce4b29
SHA5125d9376d8ba9bc54d33644ce8c0e3c29fccce9abd888c9a9d173df0917abc540340dd4d36e29687a1dd9fff548312e46c39ceb250c0060dda1c8365ff15a59442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571caa47dcf582dd3adff86e8c277bfbc
SHA1bd7cd8e26543aca150b2430d53294ba5a2594c16
SHA25699164f54ba39c220597dbbce7247b5227f7f653d632e6465cc4a25225588ed64
SHA512526c9b9639bfa7c89c0b4e86a0ca8a0baeb89b8f22e1ea4fb86d4c8eb65783a502c077e81a28bed6536b74db09f83e2d5801b6b2ab995cbcef1e4ca20593e642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6fc8920c2b4f62784c535bb5fa308f
SHA18058dbc279a90bf152ad29bbab46a732da0b52de
SHA256775f2857f8cbb317dc68703804f4be2a661e94d03ee31bd5826e9b42985734c1
SHA512176774d097580998ca74da06ed8af4ea5ccacf214723f9a68a984476d3b01f06e6095e4684e2171852449673a2361a6b7fccd73af12004b4a7b8abbdca5d0555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a286af2d501aa82e5c7b2cc28248eff
SHA10fe624e0924a8342763d97c33fea1b96b63c6548
SHA2566b709db5ccc280fbf7c39e43361510bacc50263823838a83e5dca75dbab4de49
SHA512374ebd4b8ec707c27d39ef96c756468f0fe66c6308ba34fcb8a477c875fb4d5b229fcb92fecc6cf0651021aed18fb8b24937fb82deeb05c83706280f1709be3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1712ba2c0eaa5e43166f7fd6f0a543
SHA1c2b3f41c03bccd833c0a5f5539492564a2fcff17
SHA2567e14a224f919f7348ff117d7bb5281a34d4e74f74c2112aee18601aa57baad93
SHA5124313c90c509fdea1380613abec1c33d7dd7f552e112d206d264a76b03de154460a25b49d21383081a4b03031dae2f72b7aa5473cdd41362c89fd4b5130982343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae035f52f0dc91f20411cc7e7f0c587
SHA1a6c6b9a264467bd8f6b7d4d67ddbe9bec7757790
SHA25637a8c14ff3294f2c04cd067b259eb0fa7130f4da6e7338878f417a598e033ced
SHA51232fae7c91a0d9424e4b6d96cd0ed7b6ad89a8b762cfed74d36390cc00a7f620a1dc739b2fa554caac162fe7cbb29b325686d3e962b7c925d34414e0c7f6287a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49f8aa010c27be74651b027090afd6f
SHA17645972cc3100120223e866fea4f6f8ced618e8a
SHA256bb7b8caa1123bd6b68cd57fdc315ca01bbe2eca300f8b6c9cec33df80f5a38d4
SHA5129b48118242c04ac5fc07dc05ca8eb0cacde9b6506abbc253ed4c907052469edd230f2103667c9a10cdf4f04b758814d1048d23dc7feb777a51a54ffd2be80d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58015f7232552d48849cace2f2decdfc6
SHA1b06bb7ffce99cac3c2eb5106e195e3af830a5fcb
SHA25642089c75c6d412e30f4b2a7634dad7e95160864a62e031b404d293abdd86d0c7
SHA5129e56d9dcfa91ed991541cb40b20d3afcf148e0a96c11b74d000f4603051379370587cad22491ccfdb17a6fdc617ade9b00d1d632e04efc9d668034b7732ab618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e03bff6decdc35295978865ebd3642e
SHA1e3af135e1a5ce095afb7e92edcb2e499c19e85e0
SHA256c71a41af0a09da38d23984d39f026dfa3cae01fa9bb95301e28936c1ad3c2369
SHA512ba1f6bb9ed97d26d3e0fa52a3b12ac755a0fdfa1de40f3addfb1db0b53423f2eb0da6a1356a8ba9d0e909d3831c464849a08520eb5e62583266978ef63810d2b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b