Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
dacbc3c757b17b38567ab3d40168177e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dacbc3c757b17b38567ab3d40168177e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dacbc3c757b17b38567ab3d40168177e_JaffaCakes118.html
-
Size
16KB
-
MD5
dacbc3c757b17b38567ab3d40168177e
-
SHA1
63bbfc3590728e03df4d5880cc047a96d07a5d49
-
SHA256
805754fbd7e8fbe802158851622d335bb4c42f8a73f2e351187e0cfa9db8aa0e
-
SHA512
d17af5f3534b2fc9edb7ee04492f231bae76d527d4c2fc939ca512f7fe9c8b217768bab53a4485a8a879ea0455797341317a1d0bca4ed1d90d7490592cba98f4
-
SSDEEP
192:MzjSZyO4wBN6Ii1IkT0WSPa/arxMiS61mNM0oNwqVMk53GH6RylC3ekWQDmh+C5P:EowzZozM+4MHpVMk068lSDmh+w9huueq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000047048407d11012b795e1ddde2c8f72c7e8eff14b0e4dc17ff5b3ffbdcaa41c5b000000000e80000000020000200000004bf70192be900f7ab31596edb4ff22e39863591433d79fb2905bf3bff51496e1200000009716e526bf999ab68e6dcc10fe04b76d97f43c908c9f782f61b0cfa31e00c3fe40000000aad0ecd1f476c7d964fa3e8a3aea076f04931217b7ac4bb9e4856729f217149115a3cc906c9e9aed0ef7d6b64d0db4013265b80768c009ca6ec59aea9f60174f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a062b7ae6a04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432235249" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5C602C1-705D-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1676 iexplore.exe 1676 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2144 1676 iexplore.exe 28 PID 1676 wrote to memory of 2144 1676 iexplore.exe 28 PID 1676 wrote to memory of 2144 1676 iexplore.exe 28 PID 1676 wrote to memory of 2144 1676 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dacbc3c757b17b38567ab3d40168177e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13b28e1217b69c863be4a65a3e965a8
SHA1b142c575dea150d1aca5d5ea27909c92e7eb74a8
SHA256d35f9b9d6dd6cfbcbf0beb54402ee1f89d3095bf9b8f85ba641983d4ea8bdb35
SHA5120409a0571188845663eb0ce272aa879ee12714f620fbdbcfa76733bd233bde0c0524605599a73e2f33b82cd414839cdf93961019362a111bccda2ba8ab0a9a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6603e7f1a27fa8dde804e2baffcfec
SHA120f2b754f54a52926124d630fcec282258fe7e6b
SHA256cadb63292f175108a2ac3bdb99248dbe3f29b851c925fdb957e280d7511504de
SHA51287106d49a092cbcf38ee3e1118a101675e040f244f03a9f0eb6b921afa65d618ff340bb833d8ca3ee794e21194d590136a76ef02c9e8d19c167bde04afd0a8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50d1070fb7a87b53fd84952a6542e7f
SHA1ba9b13d306d255c623f781b176c11b05c7f28d69
SHA2565133c61030100ef5869dd7c20185264f31157e4f5ebc8a36bdebc564e03351b5
SHA512d334f4556ef29699b37ef26bb3636ad0708551c5c85d2b0190d344abbe051c5d1ef1d5d0ab94b7be41653f6c271c56db557ebd194307f2abc47a7b07741b4e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb24f821c19762fa8eb7adbc2abbe36
SHA1262c9ebbd0cd958ddfbbe6463c46a26f8c9e4756
SHA256eb80460f906a8f84199abf86e0551ae45e393cb140460c0e2241a74ffd59a3a1
SHA512e45b93bfa5d132423ef751fa2507f8a95c3819b3de633fb976bb76be1366613b1eb132453d90592279c48a5914650f630834fa5fc05fbc370b7f490f64f5aa73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599da08dcef4130a3b62d98f0bf4be70c
SHA15137416531e72a08296eff9fef5035eb0560a908
SHA2562fdb98f7e218c3176e6824040efbe427675891a4d948a07e1e62834951b4f0c7
SHA512bf9f00cc691e63a0c21d2634065c0390b7d32e1cb6eb25c217197b76270f9c5d490261d8ade79bf870038967e61e8c9c10290c01ac08d0e9ece4c31ee4c5a89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe3dbb9c237559aa47afc727a034ab7
SHA1c5ca5b8fab8e8555ba4b92565304f714e991ef83
SHA256b75c5187213402b5e5a26069ac28a06938edfc26ee04092b84e2401d6ad69a42
SHA51240f2ffca8be63c56e3106efe2d8233f690798adac7f80c17521630124208c5c8320333b0c6ec49ea114b33d236f9dbe60fb9d5d871082e3078f30e928f2ebdcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42d1c8ecf8cef854a5dd2b867172e77
SHA136d883ea89f30602e2e0f73f965dc21d6e1dac57
SHA25628f7028561e2ed3b1267da286dce76ee4097d2edb812f6a19d6e8f23fc6df230
SHA5120cad4d7f925970894f237cf0344646db102267fc156511429aaadd562d8563f89be5f967938a4e2ba222b3c5bbff58c8f48f4715232c4678134e78db3cc73773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518bc4a6ccbc06d7bb20aab04c69469aa
SHA1cda35a47b6b4957f0c4ab4162e1af338ce598424
SHA2567e48bbd03c15fe050e74e3b522db3349dc8d507a6355ff9493fc6e8a2fd1a13a
SHA51260a312738e8ac666f70f8c8ae223c94ff176d080d75d25776b8857a738882569419962f6933d6b8fa9ecebfb134de9180cecf792d72cc1d70ea31f4d0d47ef14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bec162912603030a04371b80337b3d6
SHA19cd6da1c297a0d1c8b6740ecdd6dfa4bc9c3072d
SHA256d4e6bb13ca7b23f40b34a3a7c88b468e12e8a1b8b7759713c9962419f17a128a
SHA512b00c339612141b14d9e4c147d0b31a6a025f417a9934476fcdeb223da66893a74e52faa2a93653744be9bfbf9ec6c7e6c0953467e344afc535c2fad83c58c60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd6e27ea8944af21bc6f2337563ac64
SHA16bfa5c2fbcca5b74dfbb6735e106d200129a3a3d
SHA256c1eb8085b1ea4a471254fdb4e0a5be8891f3f6f3babd6b5f9eb7bebe9db98a48
SHA51259ff71a403f17b264cf9b842b0012bcc2fd971e8fd824f3e6bb431e41829042f79537bd9cdf1102d383b0905ee8567ba5bc17139f6a6c0b1659de6476729fb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59faa6f0c67697c2bad1606a32e867f85
SHA1d8c1b1e59b7764a25542474536f258b0c18b8b17
SHA25659a40d5ba8a2bee70dfff71c129c9bd5e15a11335cfd58ab47e56f0e029aa094
SHA512f9260e04e16d26ea23df7a834ab700be0539ff04eb18f3fdcff9a5a35cef4a4d12598df6ee57bdc19fdd2a08245767e5d039d3b593eacf365416a0b71e78e5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593d4a4bacc79470c4ded0fa77673643
SHA1f3511e204be0171822394838917c0c76151e891e
SHA256035da76391d5c80d471258d4a83676e9565a3740cb78520d518e8cac53428c4d
SHA512ccdd26d8bd6edd3a2c167daab7fe44da822a92001876bb3d85cb9d61c9e5e44c7a3dc51c39dd359ae40c6ad36ba2b427d029aff99b0c7aecc10e58980bee11a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff2a8374dda397d26ed42dba910a5d4
SHA1113c435a3453d20db7c6d1de009eeafd5107b9b5
SHA256d8fc7ad6f50fbe706f6823e210b1288a84e3e81551dea1294aadaa70b47cf4c8
SHA512281535ecd56b08bb57a521c4a88d25009c364f21325a8099d4a93d29899e5f566cf9478a2b7198ab10f7f74c9c3f0f689784eaba1f962c347ebcee8fbc9226cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c2c5f6ffffc3cf70e08049f7f7a673
SHA17223bb4d7f965cb364e0896739aed6ee36945d02
SHA256e78c7cc25d85971d51662d341fcce9ee9f1ee5c2121e06e607802fb7632bad4a
SHA512317d3c14c1b2b5b5bd82d9878c2da2e2bf73b70fa681f5b20513a19d7c5096c1570400bca32a4e471fa1a1c1f33fc0a49f2ab36d801f76999be187f334e08b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50a5548a7e7d6ba6a11ee3e03029f3c
SHA1b6752823817035c292f9ecb6def8e41eb10c446b
SHA2561347dbafd0036f585e8f9568aa423fc5fe313a3db5900ca6cbdb77e09103f467
SHA512864961583361996124752e616dfc9e050ad350f8af2c511ac9d35dab02d67fb9fcf75515e16fafa7943857e1c959f29c404952d39fe48fa2bc1318d5a7fa8408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d7278ffafb8f16c9c65067e754db2a
SHA188d9872e4c90df207251728f777a4de7b932ae68
SHA25621248b600efbe6a2b2a408dc0e68cf19e52ae8567a3e9d02bc6d4aba4db5613f
SHA5127912d71f12c6e39b299e329dbe4fbc33caa268653f096a43f8cd1b7dd6c55d6698fdcb3e63b2e6c689d83d70f68c22e6ebd0a151cb523d4ce84ab8c1b18a3b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c86aa0ec34c99d4cc9169762fba7be
SHA12957e13dfa60054762977db75b750fba9d92ebdc
SHA256cb4d18ae942a634ab6edbc3d81d652a6edf7daeb4d35d365f571beaf51bae140
SHA51258ab2e72bd9418cd2e2cb6a18fcb4032c88c7bda90b05cd9cbcb98223843a0ac5ad2a378346178dee3ce9063f3647aa37700c7e21d1d6857d6ad3937c3485c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e541ff0aea5259642969c635ea9a41
SHA149a02fa99cbbe8dfa17c9b48ccd4bae55d2db759
SHA256293afeef6e32ab4da30cd663ac1c3f317908ef353be2c279dd816526b84b4fed
SHA51276ff9bce9f4f74ea9ec8fc7ceeb54c653171d71b5449d39085d2273da7c6b48eaa325b01593341d39ff29f16096983dbb40b1ff8b05b9f8182572d7f58f6814a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b