Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
db86fff4c15f1394f768eff32a07fd85_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db86fff4c15f1394f768eff32a07fd85_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db86fff4c15f1394f768eff32a07fd85_JaffaCakes118.html
-
Size
16KB
-
MD5
db86fff4c15f1394f768eff32a07fd85
-
SHA1
7a2f78fc8608181c5e8c3e7848c25e2907560194
-
SHA256
61568c50f15a6a078802b131c03ab20a8d7d94bfe57c1c76487437cea431cc53
-
SHA512
d4ccf64919c264c39859878f0c0655dab41b973fc2e27f5b8861abd99a46fec40da3a7d2aa8e7e7c0112ec8db601bdc24a61cfbcbf33b1e4ddd7085e92cde1f3
-
SSDEEP
384:GTtqtLdco/WIHTMN8wMXbezH5/eDjlz08y1ifl4KlmbsBzFA7mLNPB8EuL:GTtqtLdcghMozxfl4VbsBze7mLhB8Es
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4581A2C1-70A1-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09db420ae04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432264213" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000004bb15d018bfb2f62ef5be40c02a040216600fa9bce79f6f0dc87fc31026c1a8a000000000e8000000002000020000000981defad959cda0abd24e5b033925f91fd5cbc4a0ff532082f803df5da2f8ebb20000000a211517e43b1eeaaa84ec9f11154442110ef4d9617f8a87e9a8e24a2f082eb9640000000b5e406d12fa9c1f9e41ff87acaaad1ceb96e151555b960bca92a90e6c05e9225f6ce1357f4f2e0480ac6a96a6ae9e9bbce7a6f69bead5e1f3fe6f617db68fdfe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1592 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1592 iexplore.exe 1592 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2816 1592 iexplore.exe 30 PID 1592 wrote to memory of 2816 1592 iexplore.exe 30 PID 1592 wrote to memory of 2816 1592 iexplore.exe 30 PID 1592 wrote to memory of 2816 1592 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db86fff4c15f1394f768eff32a07fd85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1592 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c3be2ccc8903b5ee8bd37947659acc
SHA1e4bf5479333c6da48c8f20c25afdbf44d1fd916c
SHA256f4cdad459de310fd6545fa838180b4fb52628dbe970017a3dc4f5677808817a3
SHA512d6f294713571b66f6d063d8f004a3d304b9e34427832a519fa5ae054a50b44e2bdc1f56dc66dc7feca2654c949bf6b47a92e12d8ce928410db081b45a224ee26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ad86c88c3c2f1b78308de58978f456
SHA1389eae597f4409609cdb99d5f26bad284d2dcaa0
SHA256966dbc372516aa2612813b881365d55c1759a4e522bf79d1934b8b8cf403fca8
SHA5123656c282d2746ca20b8ce8ca112746cb124ab564af8f649afd68eeb5a66182ac0eb48d38a4101eec0cce38f43630c73106dcc75ead27a029ceb3d105fc1ef63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519f75245fa030e9ec7cdfad5c3bf9b15
SHA15ce87bb8f42c274c22f711a364ddac5eaae1bdec
SHA256ffe015fb146717735137e9945acb5255a2b8e1f37280a1b2375139de904cf7bd
SHA5128ca837a3564b3b6f6187e8585f7d31dc17a012d15c2d2856ff93b5c622354eacee47543ef56c70f7355b9fcc0a7adf432dbb4a0ed107bf23a4601e7514e476b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ef8beb1cfc9473d34efb69fbed6295
SHA1fa40635e21a25467189de8c2b82f6152cfee7c66
SHA256d7b72e1d6fac6f5359e199e6d768a65b8c229a2bd2335fda56b7bb6df565262f
SHA51221af8906f347b28dae40447a2d0b6a03a7a1cab3e1b5a0d1c6b1d5b7b0f19ebbca4ac22cc429a0cbed95789943404ae48c348d6cfdc8c38436e211dfec9b68e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272620919811b2167a6d2706cb40fa12
SHA1f79bb185a93caa1355c8e7df8c5572b101be64bb
SHA256c18ab16e6dd82ee225c0e8e47a44d03fc9543707c5e8e16bae5d73ada82b9314
SHA512f9ad7d386361258b2de7566f025a8782a3ac750d493fd13a386ab98e044e2db56bc571cf04ac700eeafd24734c69f613395810db5dd66b4cd278b241d3084e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5356121ab3d858712222b1aa01d531
SHA186df53bc86469b0479e9ea67eb0d3416ed264609
SHA2560588111251ef8d2f7fcef5aeda70600d0caccbca60e676112d3a628900c73d1f
SHA5121479675a16916a9ca0e9b2001f935cb1648a3e5a8a435ba60bbe6f29bbc44249d25a5daa9dc759fb80b7ed723d57c712dcda0e5c989997550493c2b5cda5bc0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aaebb583a9c8012fad777f70765a5b6
SHA17c37856e092130f4b9482f494e85545af7349d0b
SHA2563439889bf25788dc3d9b7723dadeb9916388d989e6323c07297c4be066b45ebe
SHA512f942b7abca718808b99168b409563e1c705ff280bf6144fb1d5fca925613c81641a9f16b5c2fb5776ac9175365881b4c1851c8c2c728d9464f6a386440d90313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba8a5af17613fb1d3a85427ab9e05e9
SHA1096eb092e39b1f3df996e24ce1a9ef71c58c0dbe
SHA256066d9e4abeb1b1d019c04743972c0e07d119193f0b9ff404e47127ac624044c8
SHA5128e7eb787cd8d695b0de9cb33fd3b2873fd81f5559e4a84cac633685999d0b2f6dbbb8b1fd71d0c04c3494f2534605079bc287daf2017d2c754cf767c63d356ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53310279fac6d71169df0b713194747f0
SHA1a7e43f1820e476388fa27bd21124162f6ba2d255
SHA25699795914c7f99b8c2675d02606251acbda3e72a607501a77013fa3293c836d78
SHA51280e0d95d98cf9a7cd7d47af18d637922b64194e712625aa53b749c10a07d9903bf07a02582c66b0a861412f1114a2ca915981512d756d4db410197875e0682f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4120a13644a179a5a6ae1873e95e800
SHA1159c50557b9c73dee136a4011dcaddd79c0952fe
SHA256fc91bdb7c368012a170b4cad150218a3dc259cd193493e0422caafa63f159943
SHA512870b166bf6810290f3b2c5765f966071ff44e6c742871f5cc9e6ca2fb8a868782cef77311901da746f671fb10727aba0501ad22d4d05c073b175c721d9a0ca4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca6da9708870b8c790cc700a24bbaf9
SHA19586beef423d9303fe67b88670eabd47a15f5d22
SHA2569835af1970f70231d75e07bba7d2f6119e70b64332e58ac50ed13610fca6ad28
SHA512a86666ceb282aa2cb20434aa62f700129f5c1fac76a3c520f05d7ea87ece0540d8e917702eb512b01e7fa5f3a74d3e616a355f1bec365ad65902a3aed3eeb6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d204dcb7293d3ce51002b798019ce966
SHA19672aff1de4cad67dd5fbae28bb44972b343161d
SHA25610cc3c453b8c7e6f8de4c22f884a9ec07e749024d337c1b12202d42490ef83f5
SHA512416476c6c24f6509594d8d0c37bc8c4172f4d6a0bc86de756ffb2c5be0741e9641cd79e2f34b5d70b9bb4f938d082c1f721fa97f40fbd064cb2f643d19054706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586233d5b8a773883d669b4200685a425
SHA126f48ee53dd507bff96bdb97f2fbae44d011a134
SHA2565e88c15a087fc07111029dd6f562610761635cc3799c35625f280189883d9fc1
SHA51267dff55b5817d8f4d0c9e92c962e30f6df1fc25770ada310926237c49a100e5bb9076f5700f3b1db3c5a80b9120d4f9e4a9da77f41d49e5201fb6a8e6bbbacd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444638e0d5fd6d8ee88a2571fa640d05
SHA1a72c53930015f678b26191351e16fc8c67d78eb6
SHA256807a3cf9856593f07c3ebcada18b32c80814323c54a055a00c0c18a4b7eff952
SHA5128c911785913b169968696e19cfaa9dedca115b26da0a7ad6ae3f7d3a88e33b8ee3cf61e12f347e07c6ce14150dfa8b80a46262c0b826f4e4c780ed7a3d57ad51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc71380bbdaf6dc77b45582cde0a662
SHA1e7335eaa24f95f4a442cd0f9479c7185081781fb
SHA256828c820976b5a387ecc69e6805c3ee36cd460ed2cf934cca2e0dd925f1716ba4
SHA5120c36c6afdf8d7eabdea520f2a4cd6d9db4a9266a34b373d53fb7637270327f5a81cc2117ef662cfc257c1530b6c59dc041b52727ebb56538ce4415d3b1cf5c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8fcf0b6c3b626cc1f3840f90a82e10d
SHA19d361f7c674dd11d002bcf40add5d2074a07fadf
SHA256172b6a37fdd9a82b67208dcac513b47ac622b3fe7c68a89b55b3269ae27a9868
SHA51236c8e6b550a08020b9ce16c2715478033abf255f64bb05cf25d211088e2b097f9f3e21e23ae0a8ad7f386a1a813bf9eaec0c0cd54d4b17dc97df9df90cab3df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a42bf8788773670401ef64adf9f526e
SHA109c5e6e311c127e5ecc3247c259c175e2f4eeff0
SHA256100d967c7782f230ec3998ffe495bd7d653dd59d794bac3080ee976c776af8f4
SHA5128819e76fb8358c177c91ea77b97ccdd5112ac33479bf5b752ce0497fc20724fba190001daf36b4680c4f40e821b403fbdc7c44a274aa2137b96d047c4b0d5759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355ab723cf03b4cc28a572238b6efb80
SHA13c4575d7743ae6824f3aa7adbc5e90ecf12b8c8d
SHA256130c3b964dc9c803ce7aa60671a4ba5c389c3330e722d257605e06a15d643990
SHA512be457dc24b74bf9c8a83609cd85c461e98897ad8eb86a4079d16bd19d08a1224c7ba90c2a765de5e37cd8ceb264392a17c39ce6f05a69721d9f693196b98385d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b