Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
db884e397fe1e4b47990bc04b39df9b0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db884e397fe1e4b47990bc04b39df9b0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db884e397fe1e4b47990bc04b39df9b0_JaffaCakes118.html
-
Size
19KB
-
MD5
db884e397fe1e4b47990bc04b39df9b0
-
SHA1
eba9a53c96c0f0406b3e24590b2945730b32c9ca
-
SHA256
29cdac156a1539e16f9682ea950d69c0d41bd88b29f0d5ee6235b992fbba1616
-
SHA512
68326dafde54766e2e85e0ad393e9209fdf82abaadc2d9636a46d093587a44aff6495b38dac316c561c640c77c96c384af5922d8f439776610ca458f4597d603
-
SSDEEP
384:ziDK8vLWmHVBD8caQ3RHMsMaOm5WcmWsXucfIk99heLmtzVc9B0d:zizLWygct35hb/mAOIk9SSFqB0d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000ab1d3fff01281bec9f8039c91756ae042852b931d719c2378d40138da2f827fc000000000e8000000002000020000000f97691782efc9565458fdf865cf4eee9cdbc08ca58c825e76ae856bb3747674d20000000c3f16ea175299e71054b078cb71df306fc3e5b22f5bd84585ee8d84750d0230040000000a79719bab59fa9e550ae6890823db39fc13e3f6b9113ea501986c49a8f84c0786a5f7f5706c5aa38356900d87894f1327576fd931711280dcf526ba33b32e155 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432264403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f019438cae04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7846F11-70A1-11EF-A5CD-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2608 2132 iexplore.exe 28 PID 2132 wrote to memory of 2608 2132 iexplore.exe 28 PID 2132 wrote to memory of 2608 2132 iexplore.exe 28 PID 2132 wrote to memory of 2608 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db884e397fe1e4b47990bc04b39df9b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139881626cf9ea9d8b66f0793fa3af38
SHA1d788f141aac120bedc691b7c23fdf9efa139f7be
SHA256976b8bf12bf4309026076bb08564d5ad58b3fe029aa74d12ca08fb261363c7b6
SHA512de3248d5e3ed3d279eb3aceceaae660fcc7d03524f75bffb9186cccc00ef40aa582b7d97950366fe04522d7a6c241baefa0ca2c814253e073a51185b019f0671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2183bd9d44ddae27b50cedd92a470f
SHA1442bf294785eb73ad020019e535a27cb54a9fd56
SHA2565c7e5e926a577800347aaba575fec74f29a698e018000fa1b46d587fc64d7a6c
SHA512834b382bd3624c27acdb64dd4cbb9d7bdc10b5aa7b4041d76c65346902b7fdfc1130fdf928d2f0c4b69d8c1404cea36ae28df7e0f9b55efdcf78ee198ea7f00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167363811fb5971317500023470a6d57
SHA1632724b019f625072cac0e7f471406e5be758864
SHA2563f54df34d1aff283460c3b2ee3a430c73e7de601e2c56bab58af7bffbc073c01
SHA5126d9d3110ef765ecc1835210e343c9d85af1f26a73e250d6b2da151f8f1a60bf2c5d8a8516e2ebce6f7f6865ce61af0d6b1f24d26de205b30bfb8976759f4f1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b21f47520ed46369b95c509ad9b8ffc
SHA119d28683ee3eb5c05edba8d35952f7c055efe428
SHA2563bf3045ba715d79ec513980ca63bd9782b40229ab7e0fdc0faa07a7e5753054a
SHA512e43a55ff68500eedd4c7464400a0a27ef447080b07b497be3f1921ce31005f0aa2352b58697762b6d83b4b55b0ce0fdb1f372a8a9aaeb8829fb955cee1e559a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b02602b0035f9965bed1493dea787dc
SHA1ba383c48413aa765f20e8da5191f4efd8829b42f
SHA2564f9675da476fc14f4045439999821881ba6107b2baeb6f525869ac440be76199
SHA5121ff235f072dbec386ac20af038d0e5784a8317e30bd754ead57908ef43abae5caef551e77700b4d18b49472152bf3e7ea96015746e807ed99d334adbeca51d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b549a41145db9ac8a511b7b2a70e6e
SHA179f0f450f8c95bd24f7cb1adceddc9197ab75c6a
SHA256d3dacd33b646da9b06ba822453d5489e86539c1910dc1e14e5534cf9e043476a
SHA51256640b83f1153422eda41370e92d92827bd1c5345301b1648e5fd2702aa7fd28be81ab15216bff2ffdc301b8ecabc076c964332be77a0a81b96bbf5f65151976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b120919aa410c4fc1e3c1d27ba6ea7cd
SHA178967c3e5943bb2c89780dff02aa5d8d289878a3
SHA256501363b4699783c056125a3af207a635f184f1afef2c6bc5a2ae183b968bada9
SHA51296e5d2c615adfa02f4e8ecd83f81f39382f901be89e0537605a1bf481a31d22e9e24e7a03bd0ce5bc3d134e62189f914f9c488152a054232fb606639d0dc709f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158f528943920550498996362e2cfd4a
SHA1e31e45c0efaa15f49b814aaf52fb0b91ec7c3260
SHA256bcefb9db5f591a0ef26c898ead9e3000410293f9ab3974943e03c518b0ba4e0f
SHA5124a8937301b5dd300ecd9b8aae2f4e81173032444c496afa6250b2e67ac7778daecf60e4f38fc497401824117f77d1375237a961781e61804b21709c9e139624d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e20ecab678d91e2847a7bc8d488c02
SHA196dcfa614ffe5e652bfdd58d49da73165ff09008
SHA2565d9ab7cf5fe793199d0cbd8f6536e12c29761fe40f3cb59ac2e6d2504ba6ab19
SHA5123a4f39991a4d01c58cbffc55431e2a19a0ed7bec43baacd88756c633effcc7206d85d5655aeb39a62be196ae39e7cccea29fd70da24423ef2916295d5acf8db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c12ad225ff6689e868522387a92db9f
SHA1c28c8f28fb12b868149722ea2402dffbd1b8ccf8
SHA256e5807d933c3cd512a3397ee5390ae5c96710bee236c940bf4a6a1387c0317d0b
SHA51204a394993f85a378efb96142fca4264663472c1346aaccfe4a8ad0514187dabb1ebed36a9dcafbb4da39060e049b7c84833af1fe6049b54768e78ac67de2329c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503fd58c8451f1f91400dce00fadc7538
SHA1c563cd50a1649252b98cb7f0cc23b4c521a1ecc7
SHA256eb604f1718cff73496f3c7b9b735781b0eb308de99f72b54e861e80fe9531a13
SHA51294db2015be5e22c7b96379dde431de3f6220ebbbd3203d539483c0f070b812e54cac8f2d9af66a3c2be59d2d228d245f1779617bf2f14f58994477f48682117d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2fa473149e3ffc5f11a2d5bdac7dea
SHA1142eb443ea7eef8cb65bfd2d97bd41237b73d6a7
SHA256c74025e4851c2b0181f6b7d8bbf4997969af976d076c8d2cb9bf64f211304bc2
SHA512d2417e9c6f650fe9d278301523f67c0539d163eba6d2fc30eb89a390e4c681da97eba8364a5b8c07de82fc149952e766ad19c2627254904a3198e6dff602064f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b86aae7213c15c8a0ee601e0b01208
SHA1093121777002ad4481d6392d9f97f59a18a8cd7b
SHA2565a1393abbe7a6a3d23def88014b98ce38efc42c3b0f6e8c215f08e43432501dd
SHA5126daf87b4f9f8a800ffa935cf7feccee4327e760b14fd3d0269d27205595e788537d0466d766a8d362184642c683cdb39bc6f6a0b208dd16abd9253af91950365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597861c4028447a47cb6a90e83b7d0f28
SHA17ca8497cb068277adefa9ebad848515c822d3593
SHA25659f2df34f294749483c860c5b15cd2db74caaafefbb200463d65f42315e91e23
SHA5120b4dae79b541cfcdb510b0a2aae396d524f52ddab8f3b1df620fb48e4c8ad0bc9dacdb95c635d439e6e41c94354437c575b06b09476337a17f43557ac50b4529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52681af29415a217b9bb0f19182c3dcc2
SHA1e2f37cc7445ddbc3fc20d63b4505a1cd38310cbc
SHA256e18e7ac8e1e2206172a6a972529e3f29ac690543554b363d667b5344de895bb4
SHA512f86d8a1275eca720d6e9f41a0d13435837ce0ca59bd877ac2f4e8efc4423ff98cf70211f4a02b93c0500da88a71b17e8889429e99b6bc911f2557ff102337141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c66ab6c35430737b9ba633e01f0d82f5
SHA1b71871496cd5251df7ce12b796aa106d427be4d4
SHA256489eac1a4224907be4ddd0726fb23fa54a2372b922a6d674bd31a1841a03e766
SHA512f416a768216a51a771b8bdeb6cec0ae1a500bb5559e6956eff28723cc1ad1dbd41ffcdaaefc857a9f43961153eb2ab4e2fc45098754a8e68c47be20c1009117c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b293ba88e72b924d47313aa0041683f5
SHA1e2d83b0acb90770d559ae2957408f87205dd6f4c
SHA256ab5757d961eed71fb1e5a724788c5d33c4f2a78a24150c6a0c0a29734349465f
SHA512adf6c9c38807f72138231a9e432bf3dbdbabfcb501928ffe9f319fa76f3c31aab719f1944b3778d105024ba699a4af269d408ac128d7bbc5f60f00eeb2ed7a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa3937c2916ccbda7059f90bf0db331
SHA1e6a9cdc1274d4065e10a55f3e4886ed9c9f6380c
SHA2563e04ade1fddccdd8b097b5e7ac06d71d33ef45453ab82da0a399cc24dcd82a87
SHA512ac5563be77090e97c3f5a16136065406601623719ec605a26906ee5a6669ce3aa51299de7f9c1f72c846533b87eeb2388911daf4ef279d842928e9113ea2ebd5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b