Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
da6cf8ef699f587a72f854c55ab095a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da6cf8ef699f587a72f854c55ab095a8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da6cf8ef699f587a72f854c55ab095a8_JaffaCakes118.html
-
Size
38KB
-
MD5
da6cf8ef699f587a72f854c55ab095a8
-
SHA1
e81fd78d6cf443d7df4fbb8d48b62bb280741aaa
-
SHA256
2b7434b26ce4114c6b6da163dba7df5136d38bb5b04044667e14c07d7f64f695
-
SHA512
a4ec08aadb86fa1edb527fa669d370b86ce151bb745c3f1b7bb887fe21637acca956a39560a259f2dea26e7ea91d63e43770e9d8bfd44053de10161d098bd74c
-
SSDEEP
768:KAkERnyM022tnmcy4FZeNl+Nl4SeNlbYyeNlTNlVNlPOeNlcSyeNlWZdr5+DL:KHKnyM05tHZeNl+Nl4SeNlbYyeNlTNl5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c434c6bfefb5cd39b12ddf23a83810d843fa08cb1bf9ea987a3ab89e147cee01000000000e80000000020000200000004916fbf38bd3a973377e37388e4bf19ef2769741fc29240f840645723f8c34c120000000407f80ce8c8c39a1ca7a92ec30bda8983dae0baff262321f9beb96d244a6f98140000000a758da7a512938c2175dc49b1ab865c0d2b64039df42c7d1b27368847e545a81d761f29e95797b98918e44d9297380b04262b1b7457a33eeb2c7a80077eda4f1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08767074d04db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432222502" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26137551-7040-11EF-BF4D-465533733A50} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1716 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1716 2060 iexplore.exe 30 PID 2060 wrote to memory of 1716 2060 iexplore.exe 30 PID 2060 wrote to memory of 1716 2060 iexplore.exe 30 PID 2060 wrote to memory of 1716 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da6cf8ef699f587a72f854c55ab095a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523494bfebb5343d02437529f5fcb65c1
SHA1bf8363bf45d857884b9728d51c6d78f3a6a55042
SHA256601f3278aabd381a50f8aa568d1badca7416894ef05aa8d4d6abf50de2d7ba36
SHA5129736f79944669656eb42d749c0c6a212457f5af1fda0de58eccc41c85b2e0e4ab77e4d7ea2515b5d0c61691877b322efd61364746dd7d3becfd321c6d867c0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969623e39f6a264779218fc0a2044b42
SHA1175bd59f8e6f36126bfee817ebcab748cae07255
SHA2569d2e33c79185dd2c960dd83035ac914a0b97ef977a9135086883cdceabf1fe5e
SHA512a9f002cafbbdedf996c2e37001894c62634407d55c4e3306f74f8de8143d9009debc96aab3d2d6635e24d9a0b02884394fb61238ee41cabe41fc5298fd3dc16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f84e123d4fcc1d02d6c6699cd88f7a2
SHA16f3bdf44ce7e67e5616bf28c6a31a1239fa40d29
SHA2568a91f8bb7736e0e456cee24d8490e1df219bcf5645fd3953dbad2ec8e58f109e
SHA51230efffca9eac0a88e7f792dc006181629c89bb446d8c474b31a272e226b09ad480058ad0a2e047246234eed4a994d588319587c2e0ab2dc7b4ac8bb9bed18ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b7a9e6c981a872533dd29e707431d0
SHA11fb9de9c3cd0eb1bb469a66febfe2e4b082f2d22
SHA256020f213c5fa9f534bd0f296a5623b7fddaf98666c407b0db0a1d59acf6d46972
SHA512ec253339f9ae6e6d951975d7afdd7f95acfbd53846ed55f9a17ec2a393d2d4f9081ce6f2f8cd5b67b95354d83ecc99fc398854c9bf81214bc875421925231113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6b33ef94654401a0e9460c4838e57b
SHA1b2b54022df208b474589159cc6d7e976b6bd323f
SHA256732f82960483d9b3de89314273b2411abdd472a71eefb381350a6624bcaefb5c
SHA51240b343a11ad94f8a1aa08ac2353adc64a5d4d58ac65f38d211dd88344f9dcf9c6c44e4425b1b0dac0b2c79f27dce678882905595fde7f5a525c99f04f6e0a7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c998203f453b9c017c92f93b7df9354a
SHA1189afbb3a203a7e5485e3a6ac7b34fe8c9368b41
SHA2566840c291bd216e7ab354a1e9a0692ae32973bfb80722fb4a34c657685cc64391
SHA512683447b1de3f57617adae5a5e9e06da60a0df3ad07f144b1125f4c707a0682401a245253de15ce114f8cf12ed236f11ee93acfe06143b8899b9c1cccb5ade198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ccba8054909097b06f34e3b58081d0
SHA12243cbb2f4112a497519eb4c3cd5a090e7e78e56
SHA25698b9d19be1f0fdbd0d07a6013b10cad7adad444929d5db0f5bbed82601cce038
SHA512bc04bb4af848739f2d7988cea46ba351c256b9345628837e21082610c349ba6ec0e4d1889256e062102b66590d0ce307dfb62ba2ff1d6a3cc229e28a391f6128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4d35d9be0d4733316b2ace646393f5
SHA16f445979f1b5f321c7a73e279a9f1264b4b78f64
SHA2568524b868409b47a3b13f4bd9383f6d4baa186ae006c4ca305e6ff7b6609463f6
SHA512c383ee0ada5591065eaca5c5fd922843d9d455d29a28b74cf9af0f4194e7115c37eb7dab15012043a121e0dc447be64ba34b0dfb5d45f7699c6e764356214f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5620edcfb0942115c1fb3042f6d5ef34a
SHA18f76f6654914ae3265dc34e25d56b3d88c2c44a9
SHA2569569a2035ec452d8aa4cd1557542ee85940fbec78fce8e78bb11e2fbd568900c
SHA5124d22c81fab1ef718f7cd1cde9c1dd5733b8c18cd8ea50ef83e5589db281cbbd1393d74dc9684aa63c48991b9f74a35d5f4d67bc2f829c5a4b2116e79c3c5de1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad3d2b14bf307ccaf8dc8c656fb8634b
SHA1c4512cd42f4f3c0360934bf342d0c043ab51acbf
SHA25688e01619b0ac196d2770e7d81b3e55acc7f5cf549dbfa02e895963883d13f9e5
SHA5129ab1c1b97bd0376497bc9358794743c7b0c9190cdbbce2178b87cbd196fddc996eb9eab39679819e0dfc78bac21b726e89f90856e7a78c7c9c93de1d2a0217db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f701ce2f4456afdf190953b4105dc3b9
SHA148e8ff01ed74ca9a8781bc96d0ed98335f44256f
SHA25644c10c7086a80cd011ab48eabb13defeacb286445daed62b9893ccc27827c985
SHA512959f2cd03b934db2186d3e28696556fb61d7e7e6b05a5f2d7e27b2c74880bc6f9bb7bf7dd1570d65546d984f6511d4013f7149fee3f99933af169fe8ce56784d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5e6606de1788558d54a757b63a581c
SHA12d0229c078c74831e8a9fe46e9f3833eaf3d0c65
SHA2565a485a378600d30386def22bda430f9f21ca5c5686fa28dc4f1a5517c4ae8c97
SHA5122db54b184fef764a703501a7164395f53a966f8840e6c01716f51ab87006af20f950ed3d6f1ad1af24d5c598cbcec1d3f9454e596e7f6e204e64db704be8f886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb92a6cd01a624d4b3e71b3ba5cb6eca
SHA180f48405c6163b0cfb22df19eefb66bfa167dcdd
SHA256dbad3c6a35d115579cef34ac9867f2e675c01c7429d79eb1576d6982664c4816
SHA512fc5dae266cda90951ae184477037641f1e3ce0d4c786f8ac4a5082312ef0d38c92559311354211a3038afab44051825d79e730a83de16f9832ec211cada8cec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce76e8492b9306eeab3f962991182a1c
SHA176fa661e243323d12b6d736de558aa85480252b2
SHA2561f345907ce7d6af75050a3ddb2224b9b1dd1cc9879dcf40e8ac4015e37052ea9
SHA5123086deced7f22ef16e38a8f44363620c18d299219b1d0cb3760616f919da2a0b1a3b10c08492afb6669eae391ad9bd5310e8284fd103f522323b1262b0422d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdcaf12be8177f42b6667b2e00609298
SHA1879df0cdf0172fa6be190e81f7dae6876b18f2f7
SHA2565cb44d018b75674c891dd7ef81c9ab82a4e902bb3c4bc20dc42dff544cf27c07
SHA51237a1ad7ebe363b423faa110d7b30f38a9bebe084dccbfffefd1089f6e89c19cb6a0a4721fd695b4eb5fb5186871d63b3657ddde74221d51f41c40422b64cf7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f47bd37be2de8960f1ddefa8a5fc39f0
SHA11d3c4f51b0fb85cfc0c649d38ea7134d53846fef
SHA256aa06b4a1df8ac292120a4cc89e68cd0682aece3ff3e907b893c3e28e39a7bec7
SHA512e1eff81f3ab40d85db8c3077d3db8699dc678e14c90f668e7eec07456c366c774ea5732b94af49e1ad1bf78b805e085e6c4a1f57051385508aa3aaf42ee90b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570fe2fed17b8bca9595c9d25c2304b84
SHA11f410439de297baee0279831cc96d630b71ad52c
SHA256a20fb55ff19168d42bf60a3ca4206ddd36af74e709cb12b5ce1a88b8a40cfcaf
SHA512522fe4b1dc6b498f48d2476103d984d8826902b831ebe112b0a05008397787d2523a79820cf68f8a67f8f4b1bdf2ab71886c0e3232d91bd0458e29f0a752265e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542675cf5c4e12d680a4d0a67add857d4
SHA11c96d7eea3b9625822d5a0ede3e7819ce8f81ebe
SHA2568dfd70322cd57ca717f4ba126bdfa1ec27cc7103e64910a05756d775d244a5ed
SHA5121ca92dd157c4a72c7592c0be345549ac23848de942d1823584477a3ced4a1467afa937302c2d9be36f19653f7bca66d438edcc4d33e396406c28c25cbd1ea9ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b