Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
db7681be229cd44e784dafc8b13c81bc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db7681be229cd44e784dafc8b13c81bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db7681be229cd44e784dafc8b13c81bc_JaffaCakes118.html
-
Size
91KB
-
MD5
db7681be229cd44e784dafc8b13c81bc
-
SHA1
afd430f3b4274d1bb08831a7faad8726a1008c3c
-
SHA256
41b2af558a979a4f4a7fc319f603949938b2055d61339a8ea5d284adcfbc4e41
-
SHA512
af0794efc4f85341110b9cdbd2e9176ef8d52c3b39f5423814d2a84a608539299395238edb92fb8eb3533e0d7a9704f103eb0f619efe44ffb9e2b6d4e04abe0b
-
SSDEEP
1536:gQZBCCOdg0IxCPN8M5MKgKHeIIWcQ3VAn6O4hHAa59wczjkgpfdJCSbw8A+c9U9T:gk2u0IxwPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF88F891-709A-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a025a296a704db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b00abb3875ca83b63b8d89479d4da172b8f10e7a6c09519c96b0f3ffa4f29525000000000e8000000002000020000000167946ed6cfab338676d4df47796147d3235d2f165a8e73d047ad0aa3d02e79220000000a2143513c64e49a1efe58236784a020cb929b5d20ab973396e85631391449d94400000002e1f926621fb0fcb2b78c82f6eddf6758cfce66043b30f0823a154d4a65b4799440d19a0cfa37fde3d8d28a8398012df2d60cf46c825031fa9e45a713b4b812b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432261408" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2100 2556 iexplore.exe 30 PID 2556 wrote to memory of 2100 2556 iexplore.exe 30 PID 2556 wrote to memory of 2100 2556 iexplore.exe 30 PID 2556 wrote to memory of 2100 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db7681be229cd44e784dafc8b13c81bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211d70b9bbd4a196686b7d4fc8da6793
SHA137ed0f382cb77915fb8ccd35fb2f7f5ceb0ce6c9
SHA256f6b5dd4e118d49832dfc45ab2dafc8af1f00be2c4146e651a02bab7380e9851c
SHA5125f2d7e825ba2c0d81ef30214cb07e979492251122d7b723ace2d340c820522102430243cbddaacbe7888e7110f71293c5ed2856484ec8f16540df622fcf10c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd464dc87302bc2834c83ba82b53420
SHA126d24e751ebaca9c70d45f2bf78cafdef34d9f99
SHA256be12aba32ea7049746ff19c5d495ccec0deaebabbc30271286a560d924834faf
SHA5126396e3abc1a4cf50dd6acecec59e8c1e1f12f0150e729ae142a57a22268b8610e22cf0c8418182718557b5050b59acff6bba9f90a081189f84df913ab2ae3aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb11d0ce068cae674873439186b854ca
SHA1b8bbad92e5b05d464ab190b77ff20c5a86648bca
SHA256886402af2d90f338f47a4df400698d6e81b7597f7967954ea2e6369db4784d65
SHA5121711bb62acd37bb0fa2c438cf7624994763025eede56d62f2cc7ab05d9e580f44d124ba65f945b5376ce9c4c3d302cd7f5101f2714ae37c377a8d14e6fa4f409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04eb545f78b79d069d1b4a1a6fca819
SHA166f339bab153e342ed1353c9cbb05352fc6000dd
SHA2568c141f3984fb58707be723e916fb9cdd30c236d3445425976c3fd9e71253fb75
SHA5121a59c179d8b0a0b66525ea599fc1613ec7c837ef2ec4c76b27d0df0e61ea04eed1912f1388c52f0d6379995de25912ea3ca178c2b421925e1f862127e28fa638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5866b4ee6929888c34a68fcbbae4d15dc
SHA1cd14e0c7322b2f1d94b6e506a16114c5591c7d50
SHA256ed1dc51f341ebe4e23030d2a3963249d77988f32658e51723236c01e1642ce7d
SHA512a2af22bfeac255cae28e7bb43371622d001a032cdf29ab6453a204a4320992ab0c02aec07d6c2e80ecd45116ffe5b42b34058502ab37d5ed04baf1177eb3fd13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d6e90b3d48427438eb3e96f8483966
SHA1e503219cf89447751bea0e778f10e26d1ae1917f
SHA25615616d299ecd05bbf4ee1564bd4d68dd68da7f8c6e8ecc4eb4457d3b9caae045
SHA51220e6adca33fc5d2a5395179f48ba0030766373fc1cefe92218a1a246c6386e726403462666fa3febe78af5bf33e0706ae4a44ec33b0ad46892b6f11deae3882c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e1d6c30c1248d71cb58e97b09e104b
SHA129938d2f11255cce326cbe72e5b6d02eade57410
SHA2563a27d0d0f6a2e8327c2d3fd9bf8c8d3e9365234ee48fc049871b38072024b65d
SHA5125c7708e6fd0415c293e92823820a31caf479e22475aa6220a86714de1b055660d323352a933559910f0b6abb629fe8eb2c07fd37256eac006c3ae15384ac027d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327bc6babebcc7f3a472ea1d1f535173
SHA1fc4b60d8b81c0bda1940aa66f2a95ae748e62f58
SHA256198e3d54bde8459b2f93f3dfa76d95bf3c8f4dfbd05cd9649fe447dd4889987b
SHA5127aa80b467c5a1c4542529f777f2d2a8de156320d0422e6c700c33d11b2a34606586dc6cc19d76eeff1748ad75f959ad4321c64873fe7ce9481e2bbbc04207a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb9f11b9efc19b6089b0918b6380ab1
SHA1aa7f3a6892eae49337ce1e311a4a5d423bd35059
SHA256476ead1425fdea21ec62cedbcf88543092419289215331673685a24d03e2000f
SHA51290144e02fe728980fa7bbb55fdc3e73d80b208158c2ca95dac5acafd753c2c733643b54f500091b105b9cbc74db0225f80e364016ca3fc9c2cf8c4d259ea6b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584fbe64166551c2ca90543a5846aa02b
SHA1b93d89acc7e7dad32f295ebb00e3ff209ba8bb13
SHA25619614018fa49d36993f17cee169fc611c85ccb75df524f17404371ebb9fb31b1
SHA51227b79fb5b579f2becf631f254f3ae077c98fac50ea872e10f3483e101f310c8877d8731f6c596eb436446beb1ad8440ad88371fa89cd8f0ce8bd067ee8bb6ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd17946853921654414a05333cd5ab1
SHA1be671070ba5ef5382727f5c05c684eb2db000321
SHA2565bbb4860f568f1760595f2d525ac26cf1ca783b09278f308dd5d859cc495412a
SHA5121f71bb1662f1a29eee2411feaaf7e15c85dce06982339d53c6f0566da55169fb925946774dcc62b07f78df503a84f960c65c324a92d5c6e536d74ddfd9ac175e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca146acd68ba4930fc92713c847d9f37
SHA11f087bef025faad52935ff291dba537a5c015e87
SHA2562faac9ae9e7963ffe6dcc31ab19c4653151e37856e76aa679b5c0422c93dd19c
SHA51230a4503180876549c143a0ca4e793e61561e42506b10f60a6c311758b3fc452e134ff4772f1a66ce782dd6207e2ca21455cfa47af0813e134a7d5bb0a6211a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3196477bef3c33f34f4918ed4836f3d
SHA154aae13f0b1b9ce731fb6b36d671ce96c046e22c
SHA2568b94dc4f1ef6f2d66d564d6a7db8893ee5ca03374a1cc4e9c78a0711be0b86f3
SHA512df4f40dc22f1877deec7cab8853e27b521816808842e7e279f5e3c0c3a9efca31870d0a4e1123d6692c8e9533d2904d5b7e42264cac392beabd87f9620dce837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50571175327317f345e1d241fcffde83d
SHA137ab6c36828f2efc837f8020019cf75fe2cde230
SHA256de397c978cfdf69f303b749ad03914f1b0dca5567184ddc1a5817e8ba9346936
SHA5127de8fa00d1bfacd1549b048baf74bb31d37505385664163e27989006fe8fe0431b66ba98fb51cf0e0ffc426d0e1b0729688b906df10dcb4f132e5c3b73d46faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4be1136bd85a2f4758121eb5df6240
SHA17e8c0a523473eeee5ad86d0d1e43699fd14c7187
SHA25624539411a0b64f533836167044108fc003779e081a377192e3c3ae03a6e0ed16
SHA51208e05a1b24efb8b604f73a01bf0d89ad0438a667c26e33217b3ed57ed106ea84a348ea18d99048c2319ad9e83eec61e6f11c80fbbd685b7aac03137cabcbb288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5566857eff762ea460e66008f0af67002
SHA1569716faaedf475f9c52d9b3faf3f80a2fb862d7
SHA2568bfcc609e772ab458eaeb3e89d7cd34c48c3fc67d57c08cb708453a10f2d1414
SHA5123ceefbc81179136861d3c83988bf69e14cf93a4864ffb46576a0a0f896f1dc8f48d1963bccd36f02b6bdd6081388c129faad34dc2f369a27eefe358662078de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55190e3cda85a47ab873edf1df81abed6
SHA1d4c5b9f8a7091617ac9663a1e60a8ba6e3aabc94
SHA256573118add266d64c6915bfd9b844751079718ac2b839069d9fc10a70631327b1
SHA5123fbbecf5c2cb73003728fa9c885b332d7f8127acee89cf15bd10274db7802cd9d514a276b7fcb6c7d3c592a13d9f294398d818df8eac89e8801af7d5435fcf5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b9e0f30a522001582992c878d82ddb
SHA10003e627745b30afa12543deb3ad162b7b95c493
SHA25605b2b8643ef684045edad2f20bf7daf561d776e6cc2f9f523d18952256af6d15
SHA512c48abc64226f73f25446ee7092374ae251f88590b56bc45f89743f8cb5be73370eb86411a4e5140fa4fd9804056a4c5cd4613a2ee6d86c89aa5026f634ea542c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261d79e3771aefa2c40d3e191a46760c
SHA10e87ae5fc260bcbf93125be19d03ca5fe0e8bda0
SHA25644e905ad37b9dc29c5b298571b5e7c312b4770654b9fdb4bcb1286c442e7eea8
SHA512cd7e2388a515616dd9102f6ba11c3bcf9914849895d08fec7f60f99ae17d95b0ce358329a688d3297bf74089270c9d08ade81ad4628bc01012638559e4b0fed3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b