Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
dad080b423354baa5db50db7bead7d0c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dad080b423354baa5db50db7bead7d0c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dad080b423354baa5db50db7bead7d0c_JaffaCakes118.html
-
Size
218KB
-
MD5
dad080b423354baa5db50db7bead7d0c
-
SHA1
c4b4272a4432866a24de536efa9095fb7acb35b3
-
SHA256
d251bf9e3eaf7c57b43b124eb011f94d313f26bbdc63c72a96faffb373f68a60
-
SHA512
7c5fa66cb378e1c7494002aefc9e248ce31c3ceeac4df2bdecaa3fe0edb22913cd992e2c0bae2b779ee7f857f1367bbeae316ed8f160fedc73b9a8048b96d3c3
-
SSDEEP
3072:SEAzJQ4NvlyfkMY+BES09JXAnyrZalI+YQ:SEANQ4ZQsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d81e0e8ec155a93d677bf21c065f425d06b0258af5be7a368d3f7f8e08580bbc000000000e8000000002000020000000591f8c2ef296e7b5647a259d507f00a02a85adc56b32b2e88f55393ad9ec52b9200000001752d7b48080968245c5aaf1bd02efebfed68fd0498af17f52ecd387502b818a40000000b6ae3540d7cbb228eb905845db1f0f3351685909230d6cc1d5f857d26e2082a64ab704902db888d4f099e2bde216e2a412da21c783d15a06b9b1a9b293163a16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43C1FF31-705F-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432235882" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03a3f5f6c04db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2412 2180 iexplore.exe 30 PID 2180 wrote to memory of 2412 2180 iexplore.exe 30 PID 2180 wrote to memory of 2412 2180 iexplore.exe 30 PID 2180 wrote to memory of 2412 2180 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dad080b423354baa5db50db7bead7d0c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec7f80e7d6347a3c02effab6759cd25
SHA1c8af700d51b6e14872e5afb0e4558eed58fcb984
SHA256895a3e241de7fc171d2739058b03255fb46fe1078f6d6c5fcf49640b4250685f
SHA51208eee472a4f9bef0c65e7c6d1ddbf19fd05c7eae783a27b6f4e71e17ed73f29cfcbf83cc37c9d3c1c197b3a9f03f4b3794aefc527f9ccdf294eac160cfd7a3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f554f01d2b41bd35f944e0bf198ad79
SHA1c13c9851295789b00ed487df320134a3add1fc13
SHA25640b03913313d9f7354e55aaadb055935ca93afb90a48b7b0d8d915e7ff80a4dc
SHA51254fcb86abd349455f4f2f5e079e9d70e8b0ecb9f5136f5946cfc54adad89dd2a6e85d654978aece7b00a7c375799d80eb2fd276bcebf56222d950e5aa9c8058e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee48e287fd36bf33bf220f4c2852e1cc
SHA1487786818145e0805b8c3e41b358185b6c006b15
SHA256e740a96e16e270541875b62ae8bbee2287a80ea588c3ad68ff662ec5400ee854
SHA51258f2c024d86ae2fb63a6286c61c98c9ef03655f7e2628a8d15240ea268a865e77745da0ff0dd7d675ddb82667b1800c5544ef165aba21276ed1bb3e8708df907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e88448671eff9a4c1e3200387bfca6
SHA11858197fec4e82ede85e6988b70242a4193a024b
SHA256e037cd7584597857a01091ecad6a2e620d351e37f2ce54c18df164bd87b4d3e8
SHA512de0f71c44ebeba34d9cf28e29d6c090ce1b473d1d729af481f88250e38241f33caf4667320f5ebf3806cb3b1c29e6d430d6e2d09ea1b786537db3d1a8f564d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5932a6088bca81c17dfb84110eb7286a9
SHA1fff5d5cd6f9f4fc348ffeeb966cd85cba9fd5ffb
SHA2562c1730e0185c4b4bf4616f89f0c015cc18cb880d79bad68013c439d4f0969ac8
SHA512dc8b02ac7460726d4411aaf3955abe19bd25592dde20043cc699fb6b0ad3d337c7fae7e1691fbe8ee3738262b9a7bad3752dc177cff907c75670f12dd981521c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56421114dd1e46db3c0f45a9588471a43
SHA1778ac3314c8089824be1d06f22a9160a09ab9554
SHA2562f1bebee041afbb1708f88c042182e7298917a44b3b4bf839fd63ddfd566c9d5
SHA5120da8244abe2d091bca0e2ed9d70dd22044b3084554677447cacd165e0dd40c0c1a779b7ee1bb92b9d8a08c409931cd154d6f755c94b7f7ee6de5ae476ad7ce10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4a73790b8bcaa9415e43c193ad5068
SHA18e2c396fa7c464dd211b25e882dbb00ae36fb62c
SHA25662630546d3eaeba14a6a55ce18b65a72bd2acb5cf6e930ce3d49d4bf6f44fc8d
SHA512959caafe4c0fcad3e58356bf871aa4fedd9ab5629115574491ad08dc25528b7b3b18eaf9830e8d2b13934445524d368178ffe78fa37408bc5c8627caab5f1b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec2e2d01e739b8154b11478e1600207
SHA10d9155f89ac7ef3e2a8ec060332ef73009e89d80
SHA2562e27bb3222c7d3eb08df13e122c85fe54d4671b3c500aa4e75116bfe03488b05
SHA5129fbd8f6ea737918e2e5738d40d7df0ce81733175926f8104949d6677dffd6d631bd446829bb3aa01b3a942610087e81bab21c1005d550f044a074191dc3ddea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad093a9ac6dd775dc14463b4b8c51e6
SHA1e88181952150768d9c4a323f0cb21ee4047b0c12
SHA256c70bce126e24e4b40824bfdf50c90f0a48a273fe8d146a50ae6d4a25b6a67102
SHA512a7ee5ea278e302ec8a746dfb356377692ef00d8bd74a3d755b36addfe2d68d2a91d2b2fce98b55b5c221077d6a4966aaf5967699205c8993f637c63ff2152a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfab1d0644830804860302caf89a52e
SHA1fb8623d83c23831d5c82a9b402238f712236848c
SHA256096819e88b863d44508ac73cc3d42bf26b749b41e342ea4de87c5334e89b9529
SHA512dc0f5a940b7b9ea81385ceb4ba32bbff9bfed40f23b8a12de58009ba93b5b467ed792882d4cd4b51a9cc02e9165429cbfef58a1e45b346a45b8c14e595f88eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5596cb540e67e3f4a6fa01f53c5647
SHA1ef8aa1fe2edb5b10db5113eaea5aa631a64c06d7
SHA256717e47d2a9af04e63b23b71dc5a515c84eb89498be5bbc2476c96ab02fd8daad
SHA512f316a44b89cc1092b224978f4296b6b987b5807e277d431bf83779b8db5af489319e7a1cff7eb1f6a6b4fc3d064357ba0a2939c9b726aefee3845217830984af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be8bb0a116eabfe4d681f88c8556591
SHA1bb3100bd92db86a5e382be69b4be309ae02dd702
SHA2567cf49492a17ee66c0c09349cff57b2ac8d0651b276c7c15944a8b89c88c274d1
SHA5122f084bda7d41cc65ecd0ac2b382b83fad18fe4f557d812187595c9b3a99c03262bfa9f9475e7049c60a0d4dfdd08e136266093a9f0e577e3249c22ffae792f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f71c894e279b7df4fb12dc2538827ce1
SHA1f5e4b838738e90cf1e7c9c97bdfa78baf5578873
SHA25618ed5250df5474d0905aee2ad4809943ebae9b498dadb837ea0f9997050890de
SHA51245283588b219563489688d7a6f2e43a3f29c3f4bafcefc86890164597bdf7f447c86a014cf8b6e0c6a17858646dff3e1b864a1424b299d8b15e31124d7dbdae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d77dfeec775bd158788ed146f7ee7a1f
SHA1a1b7d8b1032ed7ccba9d9eb065d3102bd01ba174
SHA256cca62d2cafc75bd0c7455a91ee93272f618388c817937a7ff091d03331cfb8df
SHA51234252e2dcee6f79af6df4050c837d10cabdd64e26b5be20940db7f5f24d3f45d2b42e581a594a3f10d112685ae0d56a8941012910753df1bffac4e4aad196419
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b