Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
da638f4bec484cddae74f9c3a095ddb8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
da638f4bec484cddae74f9c3a095ddb8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da638f4bec484cddae74f9c3a095ddb8_JaffaCakes118.html
-
Size
460KB
-
MD5
da638f4bec484cddae74f9c3a095ddb8
-
SHA1
99a5bcd29924a9f5a7251e813f298f733aea342a
-
SHA256
be31b1eee1d5d2efbdd6094dfe967793f6a124b607078e9d11f23557af41d43b
-
SHA512
ec3300d4c409fd007d7c8a47f4c1208bf369fa8a58d0babeb4471a45c303329f9e610a51dd176bdad67a9d34f1fc258965f07218eadf7ff862435975da53edf2
-
SSDEEP
6144:SisMYod+X3oI+Y7LsMYod+X3oI+Y+sMYod+X3oI+YLsMYod+X3oI+YQ:35d+X35f5d+X3a5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432221100" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6094c1bf4904db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E58CBFD1-703C-11EF-81CE-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000514f8322e1a2c7336cd37a286406d1e93349b3edb21580a0bd2cc1de38a05c79000000000e8000000002000020000000a801f90620169d6b5a80b055be712bfbbefaacb49904584b26dba757a662a728200000009abe7e13299e9e21b730c3c5c02ac4178d96808ae2496e682133ee4309d4759840000000445a6c25950a6f6617fef382bc891af396cc34bbb1fafa1f42b0026444aae726ad7edf1b9da2eadf3b09d6f5721889f1e6f540f3a16f3d9c7911877956301c13 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2236 2456 iexplore.exe 30 PID 2456 wrote to memory of 2236 2456 iexplore.exe 30 PID 2456 wrote to memory of 2236 2456 iexplore.exe 30 PID 2456 wrote to memory of 2236 2456 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da638f4bec484cddae74f9c3a095ddb8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50473b4a5f22d64a4ec2ff65a0348b13f
SHA1455f7fcc0c3afa65fd7d9bdf751424c3351e9d41
SHA256c7090b46afad676c4d9f19a78691ffcec40331d77422b05fe5c054e8226765b8
SHA5120be5c2bef343a49a9eafd3934ed7682db3369304d8d99180f3c5f62680318fc550c2fb8165b01e15aeecbc5347b4f8612e6854f61715a933ae0b33913519e4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5ea0f263092bb30587201dec981c0c
SHA1fce55f89b812817197718763c30839a9ec3a864b
SHA256f21d5d0274f3aaecbefac409a4ebb8dcaa19db7335a311170baa1d71028636f9
SHA5129fc795bf8446a9fac78ad6eacee93f7e2c66abf5f250be123c0dd4b2cf192078b6bb91b5c8141e4aee01be3d1c29e23f3efdc7d8b649f05d7c0b83d30f7d9ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec64ba9bf6ec0e55b68538fcd95a9b38
SHA1e63db72e830ad1ababf740cfa3ecd09dbf715562
SHA256eae0e2ee92b17fa62dcb71f5f20acb7e1512d761440115ce623d715bc5da8a77
SHA5126181fe17cca251d12607c6cc5fb0f27bdef72319e04f9dffcabe0d187273e42eb5e9221773fd6836d83e6264a8033c2aa5239bf5b61ff91e3a8e7517f933971e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59780e1b0ead71f06afbd04177fce06dc
SHA135d6a013df73f40919684bcd54b615c8bba0d66a
SHA25612d52c309bae88194c7cea04b13979dd9efa584b41d8e296e06f28158913355e
SHA512327c70c536da2d72d48ad612bbb7ea822908db3720a7e7405d84178960516d78234c5550fde54d626c346902465b85669ca178ba07c672c3c419ab4cc9c4f9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c304c7c7435fc39b51e07fc2883400ab
SHA1dea19bb27b27cc2857a1f7628db19a0badce3c19
SHA2562214382d3f8e3f829108766645925f89eead1f2ce44aa982519f9647dfbecd58
SHA5127224854805cac4f19f5d3b600a34e840e53e691dc612f317956e2e277bbde57b48165b784e0f672f0c49f8cedbba837f2adcf64aed0f919592e654f3e616965b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e527c42815eb466ca39bd58e0adf04cd
SHA1f41d6db657e467040f9e7ae771dbed98ab25c409
SHA2563a4d5eafb49c2d447026d72d58b6e470de09e59a3f27decabc3ed2c92902fb04
SHA512fd284725418bc9276779078245a6ef04c93db5700af708fee82ec623bbad9853e5f37a695a7433bfb0461672e43166be6f25bf58157593dd82066793718bd75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef47ec9f08654229cd8888be4c44d00
SHA194b356ec3e685ee824eb56fa1159180da3c32511
SHA2563333db3cf4f9beb9e1a3ea7331031200de9a6bcaacebff8a7d6ec30675c3e5a8
SHA5127a88c67719d152976ff4a8e8645825b731fed310dc3b194490fb9c3527c70e75a2e3138549bc98dd9e30e1c7dd074cc8071679ae639d4f39701e4cf8241a9d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896b0c53acf47657b0d0c5c538249195
SHA169fc362c91638e7010816a136ab6d639da6c9f1d
SHA2561b41ae83f89c462399ca31179cdf35973a7c405df77e03c19dec07d186bc9a8b
SHA51268de6accd54295471e8095e43669b72f746c37e7a9423f64c80b6b36499c1eeb7611610d0d8310e1c5b0f9bc3d89799b9d9f9879bec1b50885370bde6525932b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5132b52193f134cfd9db31d2ce37c8bf2
SHA1af66720b58da943b8795664adb1f26901108665a
SHA256b121b0797a72caa8f992e1379b344b277740b121f90b6a0b2f8fdb766db9be3b
SHA51288d8788b07a74cb3f54f93979eaf24c6c8209badcdf035990fca1ff880570d72adc97b8124ebb48f55943200f8b3e821345922bb4a83f52395322556cec76582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f295531c98a717eec620b43428a0a19
SHA1609c2261c0b8e64a8203f38fbd128ed0bbd1059f
SHA256356e7a7a7b48ced4655143429e333cb6f7152d5624e050a39b9718d282b99721
SHA512d1208704bf4c82e2bfc28572cd5f8dc13c981e0b3b3157d981d3b786c9fe30961af0a2a70ca0ed36786f7b07e5b0efd02a3d18920d8c75bc5f5ecec1ae18f168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53109135511c904a96ab9ad133a6ed86a
SHA19384d6ab295e0585138c768179d94822e25e231d
SHA256fa34f7d53f4699c869585328083f9290f5b696a9218cc2fad31e5a73da1b7bd8
SHA51245c26975f84f55afebad147f5225094989b1c031aea22b2861074e4c988533cb9349e1f9f5eaa47b968718999f217207549d82ff769849683c5c2c142cd2b82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5509d8b185c52e00256feed11b9f19335
SHA1dacd7d589610649a28ea4d082300ffcb5b50c1fc
SHA2567b0a894c5682b22a9647734cde0e2a23155f02f11eb56059e215cd3c4a84ff97
SHA51208840bb8f1e48cac802f526c5c268b374cee53ee6509061013da60ccf6f7dea765db6878050bd8407aa11e58d482c8820d19802daf3222f8aedc8f7a1e344330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5c471ad1db1bfc4acafa71caebc2c9
SHA15456f9880d2e7ca73fc427634c358176eeacbe1b
SHA256189795e1359625ee35c6923294f2be1c12bd9fa1eef86bda474b36153a48fd81
SHA51245436c181419b5777a376afe5bdb7ddd4ca0d3aad8e6d79741a7113039862072a69ec2703138b7d2a7d2b0a5957319ed17f036198e2ae60ce7d1c7f064542675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc2e4efda39263f5820d958cccfcad3
SHA16566ab800335420495570f934e51540060206176
SHA2564dab906f7ee4db15cfbd748732d207b779a7e481910dc630b442c9d64d8373c8
SHA512491cc7e023ae3d565df8677e598a988a831f92c5242bc1277ee858cacf94b90b865f6214511c720c043aa8700962e905e1c28655e247b8611886d50b10374d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53299e28ca8753724aeed185473c9cd3b
SHA1b34241f2e0b89d9402be3b701c34072b4640e081
SHA2569d7be52a00695fe2f5c7840256ec56059ec41528e57f9640655f8a19451c56d1
SHA512f1d6d24e834978faa33b97435dd848004898fb6eb7d55371f86e2f722d16d4035a8ac377ba413438d090ef5bb8c73500a5107d3da0cc9e3e7c2c7accd04a8d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524b3818514d9b92267e5d1cf1e11a2d
SHA12e23d42d119262b8c3b416f9abde26cbfc6ba8f2
SHA256475bd805554b65eb2ea6e54d3ba476bc660f003667fc6d9401397296028684cb
SHA5124b6ddf3a07dbe504e213700575c81b57a8a89b6c4e087acfa8276ba18a35a159f9c3ffe1af20e792ed2b0ecef73979437ba00d27d841ffd375d49f48380e0806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509cfba3a090b577733f02f108f706f09
SHA1addc5d425794276425a9de7adb2c9e5537c588d1
SHA256e721801e4c7223c73c6f7133ac985f2eedeff49530dfc53cb415925458ff4fd4
SHA5121aabe5a3ddde9474b41df2d13ed82471f53c5c63592ab257c8d38ffcb93c2211d31bd2fffcff687aa623ab6e62d1a62e14e2ab9c37d44686b968b95bdcc9fb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7dc2c83b3e2399ddfa8b6ea71b9107a
SHA1f57f147add8a9e853870463c572beb9e0d2df876
SHA25693f3d47fde013993091f9e9cd6747ffb811a9e2569665c6cc8f650feca237e68
SHA512fe5e82381544d4eece80b67d206ecc5f443a12cf58076fa4f2880a68c9b6aff9ae6899df78e66e7de4a43366f1ec3647c70079237b4b6efa90ae571e37947a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190628e0957966d461f8f7adf8922443
SHA1515d6a3a879db9f5d406aae9c68da10a939e83da
SHA25617f2b5e4a0ba66c01e842c2784f71d75752827429e2db50025679899d0a5d9f2
SHA5129e092b645a182bb3b7d771a59f8a93ad0786630571b27dfc270c52006a3b7509c6891c8d799fa5d4ecf4e503add4d505b812d20d39228e538ec9933cd31325ed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b