Analysis
-
max time kernel
119s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
dadcc48aca7651381dab84189c3c1443_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dadcc48aca7651381dab84189c3c1443_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dadcc48aca7651381dab84189c3c1443_JaffaCakes118.html
-
Size
178KB
-
MD5
dadcc48aca7651381dab84189c3c1443
-
SHA1
031916982a3c363651b0d59c9656e31d69aaa67f
-
SHA256
9b55ff33e1d16632b8b4da9627959b5b487518e58240bc2321bd2530266bfa37
-
SHA512
490f32f46a2161cfea8ade8c0b79cf1362fdf3ff8bdbca566e58fa6946dff9121ef0797d14bbd68a3cc5fd9e12721161179f1a184d20fa6114d36b3880ba8927
-
SSDEEP
1536:EbA6Besou5Lu0sN+NOKAZEB+AJa00U0lGqpD+3OdrGNGMhj8ZxbijpjU9hezrve7:MA6Beso8LdsaAoB3Odr82ezrveS+2h2t
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000001b58bca372f3083b108519d3c8f892370f97da250d1e7b8efdd4ba4b2bb64d0e000000000e8000000002000020000000131fbd70bb5481c3a61225eabbac9e8ee6d670a36820616fa1b5e1ae478b0210200000003c193431a850f40c51f648ef1ca73a599c2d196e30345df7fd56f3ff08c78df84000000053177acfbb1a49340bccbc9e7d48800f4ba67377cc30cb774625fb551d7fedf852dcc78c56c0bc7ffee19fff26a7f4d69b943bd007c0af21801760a0a4e53ac1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432237573" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4033C2F1-7063-11EF-8BDE-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20332c437004db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2984 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2984 2852 iexplore.exe 30 PID 2852 wrote to memory of 2984 2852 iexplore.exe 30 PID 2852 wrote to memory of 2984 2852 iexplore.exe 30 PID 2852 wrote to memory of 2984 2852 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dadcc48aca7651381dab84189c3c1443_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ddf475fda0cba828c83a9010d5eb1c
SHA151fda05a4e31a4efc890601dfbfbd5e8360d10b4
SHA2566a5066b96799f7ca686ae0834cc617e5ae856371a958a261d883d11b577db547
SHA512a7e7500e050b752cf32202e847d8516065f9bf6189dbf17a80da5c6d8bec39d450c91b79ad5663ccf362648553cdc809d1ac863a24d4da35af738e03d956aac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298b9c3be24efc3bdb0de18f67a3a848
SHA1d02240f9b50a057f5b2578897717ece8c361333b
SHA2568d11a42ce2ccf33c7d07dfaf65ae3577a3f37da7ce8adb69b66a3d110c46be17
SHA512b8b12d05e4ec8407252bb9663ad9c74ae398719dca000ce348bcb59aa591cb9a00b8d917fece69f2eaf37e22a6c3d09fccb2a481ee6a92a7cfe004c82d01a0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6148aac3bfe0c231e5251144610a9d
SHA17cc252524ea7e508aa072d6fd76e53684b6afff6
SHA2567c636844b65f5db388be8f6e83eaef0ec7d33563efd3abacec8c80e0c06847a2
SHA512a565ebd13c71c0e051c60c2db519bb8c30bbc3d781251fcfafe1ff261a2d4a6ecb3bfa0939fcd10037a3aad89e82a97471aaa05aa106d7b1957bbdba8d48d58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed72a6b3b7759c483a5df4e0fbefb2c
SHA1891d9146d7a1e10134a04e7d10e2830b692984e4
SHA256c54fd0542f8f899e8b7bdb7d3dc30c9cb56607f24d2a1a8556aaa261e7a374bc
SHA5127a99da7030e23934e23eda4654c73dee02f7acd6b98c0fb26fbccb05ee23b3a8f0645dca4b116ad28d2fed8e0013da3948085ad8eccf8ed91020e30b50510985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e81158213efce75a8f179d2844cc2b
SHA145628a7faf055aaabf7c0c7f79bdb5b869a5c0ac
SHA256274d0ba33c62b772519d9127994ac3217b63d28c1cbcc808c673e38a838050e6
SHA5123a610f7c5adc10780084fdf23811c1fcaebcf2c076d9f62b8f0dc589f309ab3994530812a62fce82cba519219fc9ee05ca2e7564884dc0c1cecb586639e8cc89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ea5161537fe08f7aaeccd4863c6777
SHA1af397b9d218ed4afa62558c66d2ef21f3a2f12e8
SHA256d2802117d980333b517b7ceab0af6d89d01984e22d0a966b1f8e8271ce78a392
SHA512466fc3dccd207a2a167dc40e589efea2038600e7cfa2e623dc21a33907ebf54679b71ef1b5bf83e6dc5ec0e35c720fad7f1de319a2ed53d7a2ca265a81bbcf70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff81e09e6d9fe09429ac7535a1790fe
SHA11bc7a2afb3e47221492080d93cca2601f5a7de5c
SHA256d31e754a9744f2cf1fab464526e7659205ac1174a6002c6c8474b1ad0b0480d7
SHA51245999ca421a13c28f12714dd5b19110808aa92c4357d2844f94c9bf465ba6d5cd7cae526771863d5e6b4a096c4a3e6904ebef29aacaeaeb8b9808fe90b699aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769707040c3a8f2b7443d8da0c5977bb
SHA19d727d3ac1df709d4060188dbcc116d339831db8
SHA256411e6ff0aae1a35f61355ab70937cc3e05edf438317e62df5924e68a57d13a8c
SHA5124e6d0fd88409f82681ec7ccbe5035e5875e6da8f5a18fdb37546813943c7a11c66d55c9d2abf89b54d72f1304cd93867761117b1c28f2a96e5bed154d8df9aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031996c6e6f533fb878dfe8e807d0d69
SHA1a6cdae384de83341bfb0373314424abd7c5dfdf3
SHA2567194e3a94c7891993fbc8c724aabb1576af2a2394c87bfa35920914a240238d1
SHA5123ebfbe4eba93c29a419a7f7a81416e5d7d3bb90142c4a04fb645dc46e9e5ca3d5cb823c3d832f794dbf2c114d6be1e90dc8ea0d375418e97e76330055a37ee0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58440139e821a15033d179528fd72f7ef
SHA15373c41124d715c47920a736b8b8fd5737931d51
SHA256c53a54cb86ccc0564935c1a33ea76a0d88a69eefd23a08a2860db7c8978cdb91
SHA512fa0d0e38f2cb27038e4841dda6e90bc49c930385bb1f4ca941598a5800f29ea12c4e75df7383ea3ae08c5a1909196064c85fe25b3e5f6746445c68b1055a2044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a617d86706383479fefde151e2db384
SHA1dd9f7c421c4b006577b8b9e16ef67165a636ddd0
SHA2566a9585d5ee70784aa537cc290c002bffa1959fb1ee2b3e86f9cb86e00d7c8297
SHA51258c6bce6c4709fbf992e66f4c383c11eb06b9a80eda733dd0e04938ac18f5d27a9945c96ca4a48ec1440dd89f0508c55f2d557ed299fec6205c217215fb9f902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518152bf30b75396709af007c4b45e87d
SHA11ff68942b929b823a574218f040256851a85ee72
SHA256eaf4dacc08e95643e16b54552230fee1b2a8d844d4c80e8dd47186dc059fe530
SHA51247d17367254dc99dab8799ec1d34b7a3b8eaf53a1b3a123eba8712fdc3fdd986b0902d2689b6525ccb1fbc23ccc7002c0e6f3b939d04adf5e5e48a99bbea09a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f450ed78b007e8a84c649b04a29b122
SHA1ae389732604b38a355f519bd4ee0fc9bb9e09ec5
SHA256e068e71b8cfc3ab7ca7c6424beca23968d4fe02a9b65760c93461a4546aa0588
SHA512c245d875004ef6d333a51a118b4f973204a980cf3dae4bb46444af779e577035981e482cf56a2a5b68b0cfe19442cf8549124f2ce9375485895c4c96ccf7e498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ddb2178541ea07709f45ad22e1cec6
SHA110e7fbeb2fddecfcd6bfbee9103cd53bf88ab857
SHA256c264828f70c825d75735c2a2e1f1702f82d79d908afdfbf4c876799c70041a76
SHA5125040244f204a660bd6e7a8b9c72d0768fa852d154822805cc8ac078633730cee48ffab3d86d007abbaa4830056163dcfabda972167d185e555e60e993200337f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c65d0c37830aa63340955c163059fa
SHA14908f960e56590d7916aca3f45077629f95d31be
SHA256ecf4f5aa9af35b5835ef7caabf79a95530cce15495914d91873f90b3a9fec53d
SHA512043a2cc583417c8ec5267e284cc96449c970cce6a7ff65881f7ae3bb56ae1dc0e450fe680013e341b50c7d21c8552485243d7eb8f3eb8ed7cbda1d5dab747be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c851e41318a9f88e7359f195514a1c
SHA13b0629c0c49574d002ccd0773aab536f47b8923a
SHA25646548246acb36b68b6f650ef2b1bfe9febf20046ef347fe45ba1e36f71a19128
SHA5126b39fda0098fac3c6d8e053a59120f4b75df52d010c24d3e250c618f928c9850c1227e01ba6112b7d93743748d1701e43eb790bb3b30d8865df3090237370fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5239b122b2396db778094ba297d037665
SHA1be4ae72a988e552f3844789c2c795d1676534023
SHA25636cbb7715ff4e0d308f0e655393a3cd6e4129acaa2348fc064c6dc3e8b46a978
SHA512dbf3fb48964483e3c23623b237e0a4592f40556bba472e23395efd76554b38f447bdd93460e84f9682fb7aeb5e6f21281cce5a3ea2a3c78f406bd4d63926c973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c0c5db931f3e28c7077aad242303ce
SHA105d67e3b86e510c946b6f1093324ccb4dbb83ad9
SHA2563ef9770fc27562a0e009283523f4cd53c7a0376469746ffce5debf7ac188e5c6
SHA512fa06c6368ecc5ccb38c72d2c9d7b5f69bb7b1e7b1a064af4f0abc7fbc790eda991b20cd24719d771e5142b4b8339580f36756a1fe3e09dda339b2bc8b54b44f2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b