Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
da7c961443ea74c3d656abe2dce76b3f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da7c961443ea74c3d656abe2dce76b3f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da7c961443ea74c3d656abe2dce76b3f_JaffaCakes118.html
-
Size
74KB
-
MD5
da7c961443ea74c3d656abe2dce76b3f
-
SHA1
98a2dea8daa2dce2b5c3207babc47a530fc9ebf8
-
SHA256
963d5e78a6f46628581d17cff0fac866cf00f47e45ceeb1d17af754778126224
-
SHA512
aba013b5560fdb36cd2b82b65d5b4bb48122901bc80fd9e8eddf7924a7d7a151fdc9efee351ca031fd512faa0dc38fe7f3b41d385ac2b8ce69da5c4b9e330a97
-
SSDEEP
1536:SYSgXz4C5yzZ2wQzRKkFZWJRigGEFhH2csw:SYSZC59TzRtIigGQH2cF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D27765F1-7044-11EF-93A0-E2BC28E7E786} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0778ea95104db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000be3ec831a610ab5f027ee0304a53b8418b99adb8d036a3b98ee2468a0ddbef1b000000000e80000000020000200000001a14e9ad0170684551c9dc14346a8fc27db2908e3b40fba117fb9f2ef90f097b200000008ba3aed3881ad1bffbaf124b6fae0fdfd104e337606b8fd2c3d5b00f69ea39c9400000007697306b35f6e455197282f23e7578a14753cd4632d94d7c79ea35c19abdd39cf4b65f79aa4e7af621c335daef80fc35b7a4632c492014fd86a95f49b2089f66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432224506" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3036 3024 iexplore.exe 31 PID 3024 wrote to memory of 3036 3024 iexplore.exe 31 PID 3024 wrote to memory of 3036 3024 iexplore.exe 31 PID 3024 wrote to memory of 3036 3024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da7c961443ea74c3d656abe2dce76b3f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5813f3e0eab8551f0031882766fd97713
SHA192efafe6f520cdae30c64dc8e6daead83e04c213
SHA256d32bc1f798c84bf488fccdc38736a6ef5b28c7e8ba81397856a8715d96e5cfae
SHA512d8151c4963e9a1837a894c905c01f63dd7b8191637132acf1fb3fc29f58af70f99417ba37e0e296b7289833da20fc6ab6c43f866ae984bb0b23a308a9e4ce3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fae6b75cba29b92bb0bef9f01767ce45
SHA170a945274a9e482b74f4471523b1e115db42ae6e
SHA256c9631f83826ab05ceb6115d5049af88f4d7cece7696279f95a802d820176071d
SHA512f2ef92de37e033fc2325b678c55ff365c406dcb50de4181645accc6c4a6690e48e340448dd29cf61a0435c33095e69a187ccab8e0505d557a6121dbdb77dfbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11714026944e69b8b34b8f8d755353e
SHA1dc9d0ea43e01f52228b6fc07ec7e4565f2221cc6
SHA25680c5ba849323cb07666c003bf8bd8ea63a46798c0baa889b298fb22db322746e
SHA512721320c76d4a4d96d98e04fb3a1ef026e1bac805fd5865208671f25b40720c662b7aeece2cd404abe017725e2df2c290d173ec1e6405c5220e5b170bbc755a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e8cf24833d7654094335a05c649b9b
SHA1f418354aa0bebbc279acc1f3b03eaae2ec1465aa
SHA25671623bad41968ab84ce463d196c185336317a0f4a0fa9ee099338bd0d13a3dbb
SHA512d1aeaa49213a940aa3e09dc574cae5097805f8a4cf505b3acb5b99877d1db7e6ae80ef4dca6bbd0be076f041b2b7159887f2120e482d1c06a20113ccc9d0d0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567fe2e55bcec7ff0d268963f6b772a9
SHA18aa57555207ed0a201f50b315300b178f76fabc0
SHA256afca0ffd8f69a82b53993bc8fe173c42d6c7e305e70b9e2766bd6014fc364853
SHA512accb0169b29672f980a8930cff665929e945f5b64ed082aaf52a8632e94f3b937e074585b27cf548f093397eb3c778c5eef44424828b6d82f9fd41ed33a086f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b700584b415b218ca32d85662044dc0f
SHA1d250a870e46fab97d36a280b0d1a6da6d300056b
SHA256b996c251e99777a45f2916932b3c57b14facc6ebaacef05da4342e9fc62d84e6
SHA512287ddc1fbb889582d724759f5aa4aa722a9c246e2d6cc99af6e7833141dcc1ee6beb08673d6e6eb96600c32cc5b2d4b9f06eec97130eb8bd9ccf1359454acd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bb0355f6a3f3045a1b3e566e0d3b40e
SHA15765c715d518e25ce3ce4ad621b28b7fb0182012
SHA25625802eebf875ea03d7d7e9850d09c8fc2f8608c6575813c9710a7665276f1bb1
SHA512e11204587b7500c91ea77bb6d47f71385507f8aab3eea4d20dc207f35d32c90b3cc61bcc6601ec5c432bb66528bb2563e348f2935a3fa1e0738c4a8e54ddba14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4803d6888a37eb1311d70ff9d1b339c
SHA198e5d560cc4806f518d66e6e5669914d8db3dcd0
SHA256d3a58fd1379a4b1e6c7e43156174b029c160487aebb9324541834bffcde03e4c
SHA512f08ead2c10da168bcac8b06512a0720102c2ff1c8ec069f5fdb66edbeedc3287fe997fe515110f8d3432572c79a2c740991e4a0fa39c564e9e8f6673ad604cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa82089c7efd1ff2406d79956ae5315
SHA1a0ab60b3101aaac9f4f3086c72345996a9238923
SHA2564cb99c0158a7fb6d99c26ada06d6008b5ba6a84db0967c6f4191fb39eb7a024b
SHA5122c0ba546144433be4c37a5fce3787c0d5fffab2980a3be5a6bd47da3cc7caba47f19cc8ad97dd1f373291a57c5098c7c66b556fe6d59d9805aa7b77193b82d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bad5285ff6ad8a1859d93164a06f28b
SHA1a4ad7fda88988810f6b51f424e1619265ce3640c
SHA2565de61544686b488ace637713fcedcc3b3022b86d8ef2b57be26594acd9012a61
SHA5127da826235ebc971a83366f20e6dcc3bb329ed870bfe52a3f09706fb07a5bab7fabae0d4a9bcef36c5343162bf12f10c3c7ab090505f6c59f407a52b892874e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bedd8d351d96ba8dc114fdd0015f2f9
SHA118591f43f26c7c0e82a9068ce7680aa5b0db72b4
SHA25663d3b51f4dd355701187be74488c999a4c99cb6c8659184bd6482c431201f503
SHA51297234daa4bd95d0c9c2483acf9f756fd0e4fc808dd71729859c4bb4079e6cb86e0034c4d3ea7d6485f0d682c30597d80dffaa5fa07d474464bebef66d318c5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524008400bb6916351591bb231ab0412c
SHA1e3be6e783c09a03d5785bcbad98839d79cd40c0d
SHA256fb60686bbd31a75a63d7bbca4bc77438716e8340559fe22832bd290a8398e5ae
SHA5120abfdfaedfca12713cecd3c490b88294e1ceca099f8d49b7f1cd7728138a4e301f149a2926f2b29fc4f1f5416029bd793a8c95dbe9a512e20af34d33a557e093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52e668a9a16ddf1dd3de4f0c214472a
SHA1709a49b07381162addc46e7f6d06ac1a631d5ba0
SHA256a8f2e7e4e1955b0edef0417a43d30c067c8ef22ebf1d1196ebdc2f56377729fe
SHA512b114fbb7c75a102d947e3887b2f2f4a4626555d4f9757d4290b09ad2fc3d2c712948e456efbe8f8117d6228aeba5aa114eac5c282bc5ad0994b0abacc63e5616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506de40de3507f88f38aaefb176f27110
SHA1fcbbd7b2628aee86fbbe7acd2726fb546d619f6e
SHA256d4ff64920ddb4ca75dcfe07c01964352d4aacad53cef4896cb68b0cad00f2b71
SHA51268cdd3fd5a8534ac1c646dd1dc85eebc0486e8ff159ef1530c4d81d2be4bc70f537da3f0a66f81d1b9f030e81d44157499199a00d62b830499ce389c16c76497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562048b48bada1ebedade3c6e6a7c6024
SHA19e7271735285fc62e783336dfa001c4fd105f5bd
SHA2561913d6b64b7ff2882ba11beb475a037d15b126c55604e702b058a811a8fdc837
SHA51251eaebd6cebf6a5a1de523b4f31154239ef741ea756f1ed1bf4d4e8ef007f5b463773b10bfcd90461c52a294a37651c465e80b3daf091597ebe5152afb902d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc93795015fa12b54f6fabac840c4f1d
SHA1156887a7df20b43e9ad4a58d24d2fa4b891d0fba
SHA256b1cba9ed2d247f58db3b5298b7b39146b6c769c4bd3e04f6ad0cca5bd653c780
SHA512a76b0bc942dc4567485d1b99aaf5990b9ff875399851741df20d4dc283a4ef13d01d5cd2b22caed310a3b217bb0adf268bb0614148a76c1c6fad1dd2387f6115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eeb5666b580e07a3328b0643360ac43
SHA17ad911029526d2e0d88d2bcd874fc9c5424e379d
SHA256974b1d44dbdffa540d8452fed7f8ba29c3d2658d787c893cc1e0908d71fc9e4e
SHA51255abc1c7b0acbeb5ea0881f5e31d646123b44396deb72c1776f36c6a91b0045bfaf0b4bad0add50ee7e4ef9ca277d20446860ce49b77172defa7c709212b06b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075e97203403a3a4f1fef1d5fc844a7c
SHA145a9dd63eb39500dd69163307a13b0948e6bfaf3
SHA2565a0bc960ac9309c718d7327d297cb62a8955ec1f9153002883ec3db08e771b98
SHA51296b56d18325c935704a1d4697975c05391df28507331a69cfa0c06b6a261a68fdcb9cf4f22c03e9ecfeb0e0f78040bdd88041cc755ea36963ddbb20afb694961
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b