Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
db3c7f915087250e26677b9a171aaf98_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db3c7f915087250e26677b9a171aaf98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db3c7f915087250e26677b9a171aaf98_JaffaCakes118.html
-
Size
338B
-
MD5
db3c7f915087250e26677b9a171aaf98
-
SHA1
d2037a101b3f8dc4b64e4fd7d1b8ade42f6c3e41
-
SHA256
a4df87ed6805cc58d12fc261c85cc8b4cf8ff5951fb6c1d2bebb0bed7419d98f
-
SHA512
4a30076b40bbc675d97fac249bb2821321281b05fbfd8503adff3de536e5085a3851191db8ddefbd4b4e3429e9f6c8584819c5932fbb6ed3aaf15a42c6f279d8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{987A0171-7083-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000719f343b4e5adbe6ac1736aad8314f79e54afa23077d483f951781e9730e5e23000000000e800000000200002000000087584eda7f9d9ceab2a6a5614a02ce69c07c9442630ce82c9ee213b6ad03378b20000000ead523b2324941db5ce1ca869c44b65bfdc98a77331e5eb6c47bd4666f723d9540000000879145c7cb403d7ca1a10d87106c1020a78cc9bd2adce0916e9725949e016e0a9052346c78f9dc6fbc8d1067020ddc08373e9c65ccc3969233f24826f4803b16 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0dad96c9004db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432251470" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2392 2388 iexplore.exe 30 PID 2388 wrote to memory of 2392 2388 iexplore.exe 30 PID 2388 wrote to memory of 2392 2388 iexplore.exe 30 PID 2388 wrote to memory of 2392 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db3c7f915087250e26677b9a171aaf98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad6d30d1b4fcd51ce61663f4af52b95
SHA17c83569d835e56330f82269fde8d7a226815d292
SHA256bfc457fb65149b316f0878cbb4bd9a92c0dd099acca53b4e5588420e03430971
SHA51242937839955469346e9c63aad1a2bf844eb3d671fbdbf2c2508df8a5f5415e464304d0caa010c81c497fa0acf807c529ed1c8551726849a7f9adcb4ba6b31627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ae227e48fe1fe4f8fe3398594d585d
SHA14a709be47283c07fc87ca7d19ca1600d617ad87a
SHA25610dde372333666d1cfc369aa1a0a53d4b723748b12e8884eeb9f458d71662258
SHA512147349ef60cfc0435443043942b2a371aa6e27d6c0378d115b2f5a2f41365dc0693a0ae1af0ee888b7bef79a8b6944d927a72fc04fa85d68f929f7dd70c3c634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b414ad7ef37f499c402bacfa9aa236dd
SHA1b469a8d639510d54663096525c8b5bfd5bac7bd6
SHA2567eab2dc09310de8612ea1506826c2623139c7f26e6206c6778372a631b631a48
SHA5121611df18e39369ef584cce9a27fd69b9d6a0058c862e80f2736cf064b1086e0e1832ded1829a76b654dcd008d4b8f09b81aa2dbb23727a600b08608a6a9873a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f283671aef54b146f43f1030dea2fc
SHA1e9c9f9e714f4e9ae61adc3418f342e9032795a2e
SHA256fe5c4715dcbab64cc40222790e7a6d710ba7d9feecdab5e9ccc4efda06753607
SHA512f27b34b053062ff3e7b6958d8279ab71e9b7d226458b4162733fd89880c10772a206bc01f08157b6f9f91615f74bde536e841d0e2869757054404976e93c263f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59809f68084161ac25a5c7e4b0de43534
SHA1013e431b5d98b955d958993cb5ed48d97735466d
SHA256eaff9d47fa22a6ca014fada923f67286d72f50e6ee16a36326937901522f5847
SHA5124bb8fffa754d1e313391bf31bc12f4251d92569f85541607f3d75234121d271d86c500052880ae42d36c4263d74d6a54c2636b5f1c59645fea7aa231249a8aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f536bc7b660ad59098cfe663f0d37bb
SHA18cf0b8afb9466df35f572d956f870506856a9e2d
SHA2564ce0848d6878a8692ab054a88e1a8194cd20a0dbd7c601f56a2b5f9dc461e07d
SHA51228606ca4abbbd3eed030b4eba60aa48e5c459acd46e18344ba59cb89c26b1c0add31d3eb3a6fb3f62b6bea560bfa19de1e0c5309e8651d043871ecd9543b1c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba2309a144fdfc212e4457774a84328
SHA14995f438b017af502670cb6ea473feae21974866
SHA256fb2d50fe366e246d1a91b6418b9eedd049bf438081a1bb7895ad3716ce4eaafb
SHA512f686f68143e0ef44ad9dfb18f38a4c57a53e64e202b0b625abcb80ea916555b8b2b6d1debd0976ee3472f1e30458b84c0a39ac45cf6822416cb9405fb21c1f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa24f9c8780c2caec33a7d4dff35921
SHA128186d0904d576e29c79dc4c922633380785c616
SHA256becd0a82267de7b0a13c47dec4137a807c68351bc53244aa8f332c2f32516470
SHA512187819e0f09ae4b7eb350c98316aa18ef22fd66ab2a035563cab1420b476cadac42a37c95ff951c16da90694ec997ce3ffcd80d8d044adf9064bbfe7cc614b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da5025a548ca0125a20fa70ab4a354b
SHA18ae2d0ff5aeff63ffd143517f82922f5a1382d6c
SHA256dd0d5b2f20007d3554c9e6de4e491a7c932966f8c91b293c44ce4d78c8939f71
SHA51205724f99ac52031907e24fd36aad8a43a5994f4d9f56d232246c0b83038b5cf438b41b6c8854c7a9b23c8da3b308f003d2170d84dfdd05b6e1453c950a43ebbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a573e63ec3e6f9b0fd5ba2290088d18f
SHA153dcfbd8452c470a7ee5aa44949b735fd037c39d
SHA25607965b2617f1f2faff07058206c83cd5368cd4c56c8a0daaf102cebb8523b6b6
SHA512c56647cfe2e00103778c6798ca77d688c1ff05c338c7e56caf4cdd8692aa208f98ef7bf1c18c44a0d5122ab5eb75274827714920893b9ffd305af4cc28cff8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78f491f4cfe4ae233e1a1d37f9f5ba9
SHA1b249be4616c0cc8e8911eaba2ce2d1715504c194
SHA256cc0eaa7c6680356a41b282048dfdc334bf6334fd211a1c87c0fbfc321c11523d
SHA51247fb178dc29d34a8cf6820774d18ff523f89c1867cc249b1252a4f690dd1f476178bb6f3d65785f63f1e46ff2372345b73ab0db964760c7777aa5de8373887a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abaa9c4f56495cbf72e7c03ef66d52db
SHA12ac8fba67c8dfab0a7c637d685663ac541dc304e
SHA2563c9bcd4bfc0624c3ad5e896cb0d657b0194df286c3eb95e32a43ad8f6bdfc535
SHA512fb97414905a82a4ed992d593f05f1c535d0f9bbf5d6449e6f46304bf4864d9a00b9b011ba88f0309d3ff9e6d9d65a31c64cdb02255d3e26ac627e0a4ce87999e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317208d6587764d2461277e176965eb6
SHA111f53c53f26d2e7e8cea7d60a2549ff6784b18ab
SHA256a7e3c076bcfa12eb106314be04b2258f0bb2655d9216fc63fd5e535c40cef40f
SHA512795967e96d573456ee6ded78cf5002dbdc3dd464a0fad68b4005cdb67d8d284b337f2ea080adabb8830822d25f31d246123d0fc10bb96529fefa85dd0aaa7103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb67a12fba96ab367970fce8ea21d1ef
SHA1a661a9985825088dced8b1f8ff1ed1c03d15a9f9
SHA2568191fdda84a69bc0d8b855149a7d482f2c3dfe64d7f4235d2a0a821716dc738a
SHA51299404cb6886df0d2fd36e8488af54ecab4aaac5a44532cb98fe3047d6daf7f9acf56262cb3866da38875cc356bd562c3abc357da89fa0893d69de3ca73ae6763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01f7ed9cc4437200e5146237634ff88
SHA145b07484ec74ccade910c8713fd8607e79fb62d7
SHA256270aaafdab1c0f5643c44e4104f831fc75da212d03a6e80162f2c95045f12853
SHA512b70ab9a3ba7b5c557e8db97544555b2a9b4c1775428e7635b72514221d991c4cc4ba80887352d5806fa7d1e2c096871486250c6655f1118b9ca3a8ecd0d4b84e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e611901185afe74641ea3a8cb09ce656
SHA1145846587bbc0b78ee2458f43044cc5c2635e2bf
SHA256712c1f0ce40133fd00f75892e5552878177f298181e2a536e7817f3288e7897c
SHA512dd70f2dbec0e7d3df6a35791f43b42358d1a57c4149eeeb98cd3a4d5fb3e0622188935209dd743b81bb65cea7ffbd41375b2ddb91a87bac2907afe5a8f6ded47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8a197166bd21e16a83a4315c16e9e7
SHA1dee519353966b6ac97ee4ccf7dd457948bf58300
SHA25645cd764cf43dae7dbe0e66ae1ce4e4f9133c3a74f39ce8449d1fc0a130a5a6da
SHA512925523930b1d597beec819634714475b88043a1b32fb895db943b28c5d12276ee8b10b3171f3f706bfb46d8750c34bd10431bd9735f5279c48003e5c3ee6477e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e653ec8dfba7dd9981b614df311386
SHA14de7d2db66e52a6b7bf4e5101f2409be336356f9
SHA2565cc66635b9b9cbb7b3a2f1f532dc35235ae37454ff58f39a4539877187d95237
SHA512eaa388da7b50940377b44c4fd3133a3e79817ace71b9e76ead18b22b8ca7ca3216c95c6724e270032b1d4a7ff3cea886651ae0076df81b492b854fcdf6b3a758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580bdb90057494c79be086dff8c5f4729
SHA194350e9aa8b11cd2b09d7242c927413112d7940a
SHA256ed4384871c771396bb5550ddc60377b0420dad48e59c8b81b85d73b51c51cf39
SHA512eba412f90783319196d0c97f230e79b5046724a019c3127d6cce1c59ab030ae5874c5a6b42da93fd1be0d2ee957b839b1a7bb61e9c34c29469ca7e7d911b76b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b