Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
da457d44950d727d81fb57cf5542f72c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da457d44950d727d81fb57cf5542f72c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da457d44950d727d81fb57cf5542f72c_JaffaCakes118.html
-
Size
45KB
-
MD5
da457d44950d727d81fb57cf5542f72c
-
SHA1
7dc4389b5e1292897356a5b4c4c46737d2f5ea8d
-
SHA256
67f1d9cf701aa51e9194ae7a09bb1616cead2f4e21c6e98fbf2d6888c70ba47e
-
SHA512
3ca6a67caaed57d72a28bb5d74ab200bf0beb2dc6d0a019b0a7cbff84d5a49e9186489fc17d8e078b84c7477d47686efc0d544305d035e782d347ba690752afc
-
SSDEEP
768:87025zzLQPRLoKhBn0ifxr9d8aD4LvOImLfST1xI/dhNoNXi:8704059/n5fN9d3fWxWW8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432216779" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b6fbbf693802085f39cedf57208dc5252d801ebac12cebc948bf6762722f49a2000000000e80000000020000200000004dc697bce4a1f3852960a2b0c3074a5bbaebb3d7db28c34a5738e6020bd7f518200000008a6e2901825587d6a7710fbbe83e77ced4375f17e9a530b758cfa85eabf9bee3400000003d0990057aa2883a77f6e8a2d7400db1828783c561a6f679256589aac856a89db676719783ff44e4b604af1fa9a7c09f9bba0574357fd3cd029c6634b99c3485 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6038F81-7032-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907395c83f04db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da457d44950d727d81fb57cf5542f72c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db49249741d130009de57aea4be653b7
SHA164db5d77115bdc806088c547bc9393a24a721cd9
SHA25628f2ddaaf3cbb744d11aee663fecfa20d9ca004265a013851a205fecc1aa1323
SHA51288749985970785c16c431cb45285cce8e480eb577dc51e07437691a10d1a33bb32855fa5ba77a9fdd12fd17f26611979ad6ea01a947ff97a652d87fd7dd80c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7181662253d040516edbf65cea7d20b
SHA174c171be65bbc023912e677dc2792193fd4cbbe4
SHA2563133473eb20f4f9bce034abe1525df97fa6d6500ca12839cd52204d885145f75
SHA51252a2b522b9a4bc965737af05801de46c9f86bdfdd005016c2fdf7359ccc3920d2a18b1b8c91194a0c7d9cebf8041602604b35ad9beb2eb7e6c721eff4626569f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfd381af69a7d4cc4994b94247356b2
SHA1a8059715b8aa2895ec6bbab32b4de5baa08165f3
SHA25657c4f2a24707471fee3cf84e674733fa481202ed4b0b17e371317deda8ac71fd
SHA5123550a2480193ff1e9ba239d3a9a84bd1b61a989a49c7ea9e43aa7e4434525ff0aa917bef7ee8e7867ed12afa1e7f4e07880fc4e6901566ccc6d5456f729859f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c2ebf0818aff3b8b0d4a8dec4fac2ec
SHA1a0d599053b98bf0489cbaf505487911784caec28
SHA2565c9f914303a1f94aefd83a1aaf501673b74d8c79857dbf2e3da7c86e94ff04c3
SHA512d6ffa7a8a21dc10215d1db37fdb2e2063efbd9dd3b4482c3917fc6c7ba46d63c578936ac2bbfa1f1a4129bd278b2d791c8fc8f2829f1e1f3e1838fbf279e3f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179940a208dec5f23a91fe6d8446195f
SHA13cf7aacce5733588b7c94f98d7e9af23185efa0a
SHA2565ce1d9549d7afe23e2891e93b2a7332d77842ee92df41b71459bc7dd8abb3cd4
SHA5127b3b9b36251abcb5744b1c9ec5c8d09805c2695196f3ac6262e314a8da165fc53814eca2d7484d835ea7f5a84cf87c6634590c23e7c7416092ccf5779335b6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec6e0e47ee99e47428b0e25caffbb1f
SHA14dbec79cbab3e1b2941512d18853685b37514028
SHA256dd6854d11e24cf746feb3b13247e03f4f6520cdd2d4429051d5f352e1204578a
SHA512782ceedd86fbe7da76c5045ca1a1f65df7daefea5be54273b3f8c1f78cf9205fda5a91634c89fabc5744e93083cc8335c32fbc7c493171961a9d69878d042e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183f2817ffc706c0ad87e5ee8ebb43ec
SHA13489151fe937e538804a05bbb01dd0acd3c781c8
SHA256725385b8e50050002f110281f6e7d877ac77d7fb4fae6a10a313a62223868c18
SHA512b8ee78c39b83abfb0bcb42555400121e22e1bccd5c10edeb951878090963f18b0a24281219945c012d934714d5ea439fe180822a3806f94811a262ed3da7fe3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52172c39af345f63ce4a6e3da99668c03
SHA15bcf279a304e0001f74915373588b65621b3dcbd
SHA256d15fad52a595b9fbf5b1109b60db13f859851641ab517916f1363c85f37820bf
SHA5126ee877d5f2fe56d7da55dc203a0e24e44298cc100c364518feed9bd99dc216cdcaf1f9b3020893ad92eda8cc6280e48be811a402d0a18b0441d5a0dae538fda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3173e1c03d787397e59cf058f0bfcc
SHA10a62a892f73fdce8f90fe1a52d823598442f4ba5
SHA2568bf5a6ba7b48d2a4b62d22333eaada42c1cb157007dbf04b7bcce27f48959b75
SHA5126075a2c969c81b79576973a5af65c702857dcb20cb65e6d418c8bdc5e679f170834c52583737cec66e416715a07c9c14009a264927a475737a7c2101b1e0ef83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591009ce26fbe40044ab1c761e71983aa
SHA18d316496155e9bd0fc67095a0d67ab60f39298d3
SHA256a609c7b312ce517839b5f65ef509f36d15ae75e9c10b1c2a201e60ec6a50fca4
SHA512c2c15f1fc0dd3f23c99aa3a71dbf55ae613bb9cf0ed1e5359aa14ce93a43ac76af71323a78c2e947e4f9f0cf5465089bbf7be2b864e2495d692e8c89d5795d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ddf0da97a5524cba57c8c12b4a16e87
SHA17ef042c7e41e6455e20b5add776740ba00e60292
SHA256d2e939cf7edd4035c901ee886fa90dad5c178db6451d061ad6b0eda5045b842d
SHA512f19f1f132c301287d7b80e3754c9a2fe5396c629ebc95a9fd66a2cb1b8cf9cd64e7e90cfb5a8d4e14d96870e519fae7f21cba3cd359a1f0e27973318c8b17567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731631648534e58c9c56f4dc259eab58
SHA1a0d63e8dd17587ea78d23bb6eadd83af1e23c647
SHA25624f51a3d5243f875918054ecdca8f7c4e8bf2003dfc740c0f23d9970d5488ee7
SHA5123f24abba12ca1822be12bbebb530d9a538eb9214347b46625553ed0e392ce12a8ea8706ff0c7b1bd9cbc3aa18acf73ab2a8bb5192be145da48f5771f454a856b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa4ce7315a63009c3edf5767bbf6d16
SHA1555ce8ff27ae47be70770083f5effdb1ebb9512d
SHA25629f23e7619a485330f2bf23470f79a2ea63dee7e2cf498d4bda9c2941a15395d
SHA512afa4e1b2c630db7c1dcbcd5b7858198afc0b7d8a95610cea85c3a108771ad3172f8cd6cfd3fab0a0b9cf5a090efeaa238740eea90764342f39ac599af3882d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a44ca954fc10f2183c0daaed20c0aa
SHA136e66269677c518a0401418999eed2a95de36e14
SHA256b4bdfa7fd21b8e31219ef5357242839963b4ce4305ae69669c7169bbd366766c
SHA5124569c9b4ed5404862984322db5dca9e1d2862245e9d52aeb62695c4d90eca65aec2aee0a2483e3e63d620f00a5ccde6a1e54dc5b3641f85d205769fcf806faf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf066e4e7281c2a47da01d25a128254e
SHA138df5cc768666cbf2b3ecc7e1f097e64087fe1e5
SHA256571b5b361f145209a57024b77ab4b088b81f51357db4f9708b86c4e147f4ee89
SHA5123b8ff77e8f856e6ebc2afc7c86fb731ecc818a3d0e5bdd7444931ee01dbc2f2940773502a06e2f3c1fba5ab95ce8edfc596d21b1eb97f51a395bb78bb532139d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb660cab05c3081fde95a9922d1b955
SHA198c10ed65b6090fb23da6fea679edaeeb69fe0a6
SHA256979be665d06fda81d993062a0f6b565af3ff1b812bef9e129f8615f9c0ef0a4c
SHA5129bcaf799407701f2043947b7ec06a5cfdadc42f5b49338a3b8edac624304365efe889175158b5d5d4b926c64ae99e549415d3e2cc6699289b0538e573058c213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5663de6cf01ed04d4ad15503da655f4bf
SHA13bde5fef4278f5415cce74fa1017469ee0ebaba2
SHA2569f3668dde188d8babf3b21fe612376db4f0421777f13ee9ff24dd141d86b711d
SHA51293e99fda1ee5f103a035910c5c7595681a3f318bb822837c03ea194bdaa59e6d09a9e77c9db21702a7b20cc86db10e8cf0ddc06913333fbdb318794fa4aa1d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb7554500fbd661c14982f91e7c9b86
SHA10ec42d6c2156883aca4426826374d221d3b47508
SHA256c1be905d33b20ca6c7e2b3672b2a1860b9698077339fa8877fff7a9f3c5d5816
SHA512abe07e9fcf01c63ffec252caeca67badf641343443fe9e8a6b56a4025f08222ad4001071328a5cc9c6ab003ff795888d007cd359ea92366cad2b19af7c06ba17
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b