Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
db7db3501f5648998b55c5f4fba9802b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db7db3501f5648998b55c5f4fba9802b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db7db3501f5648998b55c5f4fba9802b_JaffaCakes118.html
-
Size
10KB
-
MD5
db7db3501f5648998b55c5f4fba9802b
-
SHA1
e4fa61e99e88e3b42a97acd84a955704c68eaa9b
-
SHA256
d5298e42beea1e5ab07e43ae5377377a7950c39521e801fe2ef727a4a1c8175d
-
SHA512
6ad31d48e7dfd70bf711eb98682e3348b5f0e181ff60fd90fe9989f10d0b3bd3a970856259e0bb4d46426cb06d7eb895617a038c573935ffe09cfe44b05a0715
-
SSDEEP
192:2VJlIsr03I58k/w1wvqVkZFBb2naP9Fl9016auBuLbdU8d:sJlIcuIz/gYFBb2naP9Fl906aguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60db2cb1aa04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432262676" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002d7da5976ee60b4425cb067e02fb1c1ec06e612a206fa2830cdeb144e573070b000000000e8000000002000020000000f3805b249474b81b02f8c9746c5912386d623945a7c656c99e443a3a562f52fb20000000924a212603c8eba8f46271191491c167d2422e391c053c934a7d968971e7033d40000000e2a49c3aa44f1c707014057f75dbc1572823421b4faac5549469afd0198fd1e2d574b897cad4e2eaf0c5e383fbb40c4dd521d4439a5499f6a1f3759f88d41e26 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2C53621-709D-11EF-9FF1-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1476 iexplore.exe 1476 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2380 1476 iexplore.exe 30 PID 1476 wrote to memory of 2380 1476 iexplore.exe 30 PID 1476 wrote to memory of 2380 1476 iexplore.exe 30 PID 1476 wrote to memory of 2380 1476 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db7db3501f5648998b55c5f4fba9802b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cc907e2737666fea537ba1fe4939f0
SHA10b445dea9c1461c187a46cfd6240be01c8822f51
SHA2567b87ff5b74aec9544213e8b83b26d7e731757a6d2d4c7d515ad340145d8bad4b
SHA51294ef74acabf99aac58db6a9745de6de16dabc33e361817c2491e14d417de9626b09cc2ea79f521ae564e087ccf3ea3a8b46f184543c53a38ece9a2286a1a2839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e64417d1e052c0b3b4d08b6a0eaf8bfe
SHA121b12a2d4bc4e658704c21ab8eb5fadae678a70f
SHA2563b0d87f69ab413887d49f69f4e5a0695d2ea6cdbe9544cf5795643666f5359fe
SHA512bddb2d90a55e5df87dbdae6b195752d83bcc6d286cdec6b5f9af0e27773ff58d072e0ce11ebbcad865221baf324aff45f9d25fa7393a0171ba6a93b86309fa91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4a99f9917d0f9eb9f3b66dbddaad58
SHA168cbe4d25d9b385d30cc5f73e709a163ca071dd9
SHA256df0330fa0742df41069a7cb84b8ef01d3ed153ec515b76266c10fbe3f5a2b806
SHA512834a709e63258a504d10a5104245465f5470ed641ac755d016ab5313607ff73e6cab09b249f1e043eeede4b29c00037aabbc2e1c059e46b56ef8b229b8e1a71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b711d330ae4766bd6e8824ae3d24d0
SHA19305d9c247718d356ca3e0851e27abc79f2a0492
SHA25666eafa7feec3b9d035ed653d2ca56d2458f6ca6e14a8c7940f46a8f3efa26cb6
SHA512a9ce774b99d02c76af323924756becaafeb86efa0aae59915bb2025c8d6dc31dfbec3999a3bdfbd1f3be2c245b157df3249e90d1e69e208d73ef66a1c7ea653e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553a449362e41ebaffa78c526049e27ca
SHA1728319455d95b9454ea29aabb8228f7ed6bcb095
SHA256cf0754524834f6656cd732e2b93428875373402c94d7c50f0bdca5a0dd1cfca0
SHA512b7c14b596c3ae97ae7c909bece0bcfa13718195eb09a54d271567392ba6d8f1f78dc7f2cef3311fdcb3b9179fee825e4c92ae2c44902babd3027d8e3b5b6b287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525fb7ab287a6bc4625d805504a0cd363
SHA1529cb026593dc8a0d7dd55d86b813a4db9492c9a
SHA2561f62d3408b80163d5a4e835b7f9e7c15d191b15d4414062a788a266c94352c8a
SHA512421608191c834c6c5a35eb22ca408626b565394970271de28d9a15a3ab2e47701db9db307a45d71762f01f09f862348c020c989b48cef71921bc7c2dd485727e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585afe76a7bb5b11b71f42cd2257d3c8f
SHA1ce928831624c2658ba816e08a99b0f63a6bc7691
SHA25628bf0ee4ed4d5d9d4b56d9924b4733469fabbcd3d2355a87771c9a954b5dfe94
SHA512ae5ed49fbc148f741119faf998527bd9c43de0214de013370b471e62379a682c1c5ae33387350208919171a5b52c69cd2d8ff1033d6b2d4a5ecb7f985daa23a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ca500e5471cb7103354e927d032fc1
SHA17c5cd5c2ecf0a0df624a69630c6ac71941416793
SHA256bd577a7bb100987c09047f72370ca270b2b7ca66059ea669bbc7ce62f61a2f33
SHA512eb97db803073bcc440b7038f322e2cf24db8bafa811fa5b61262057249949b6af229966485a7239c442248922d59d9e797df3ee34ce50fb933f6da6a842f7d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814011b9b2f9f88ae60537d16638bcc4
SHA1a46bc7913258096d351a2047c0f23458d2cae1f0
SHA2563e3d52623782516985f164597f3d8d10d89f8b6a759655e0bec8bbabe3642216
SHA512a689ea0d98939bb7651990824ac6f3a9902581a3696c4665913221a07572753eba3a255b23b1072176ddf44fbbf55413ed345f8bca3e6522d859b559127bfc70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba3c381b605d60019399b6a5b29332d
SHA158c70d6f406dc89dedd2ffaa7828d9d01b0306d6
SHA256ee8c633b0af64ec65646d21a61bdd893927448e5f45b59b158d527a3ce63deb6
SHA5125c7276e506c1ffdffb0054b9428479e44e0c4005985a3dacf279fc8ba3861546242bf8efc9ac9e85f493ba7bf6d486d401a3794aaa1ed6677f5749cc7ef95fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d26e242aa153d40225cefd2df53d24
SHA17e658d5cff53f5d0c303838f455af3f59144e2e7
SHA256a6760c41d59f2e4b9139d33cae8ab7ae135f8db90d87d287df4d6537a962513d
SHA5124eb3df46c6e7b895440773ccce23d62f2e7acb26bc7fcc3b8441f82e009d6b3a7e120b54743737082bea889becc53518f210dc012fcfa9f9eac3b8e7d6184fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f4b4f48cb59991e9967a055f534be84
SHA12f45685227e44d0d171c09284ca6e76aeee900b2
SHA2569aa9357eafd2b66f538eea92addbfac197b5360911d430f4d4763d19eac95055
SHA512668c094f5fbc89eb07642f44118a77632c37fdd4b8aac6bb6b9f811649c976fe7fe53436d912de8ff10cb9bc9dca6f1d2391a3283fa38c404897dc1e204de119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50933917e5b034d3965bc8108f4526b7f
SHA1d13547c6d05ab5ce0777534214f14a68fd5c5082
SHA2567d0158402c1d65e79ab56154711738759b50405a66c92f4789fdd4d389203d76
SHA512cd7f68bcd9f1252ef762bddd8271fdf6300cbee3c2c3f5b52411ee404414ab5e89f3cbdf1b065ddbbb84c46ce010068f796c67c3511bcc1a64e1198ed30eb2d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f46e6ae7f77e99a10c6e41996586587
SHA1a665046d85a4e62fe62026202a4548d5aa8ac356
SHA2564f48fc50c4c7b006077765e1e5bbff7b46056a6045b7e0f683609d0d6dd29cfb
SHA5122e98dd94bd6eb146f9f97215a88427cf5b8e60099f4f667a62691a9fcf8d5870e12c82a763ff40a47a3e320ec4f57c8c69455ea2839a6de09e8314909e4482fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c7b77b7b91956decd77645a0514555
SHA18f78791ec5abd02dd6c1d1c7bb03b6f84e6f9b47
SHA2566ae8e89bc740450a4e9a102ed0fba748ea54442bbf1243234574d03e06d2fd73
SHA512a6f7fe03b2d4cfc6aea3404744890613564ed6a30842eb01bb7df772de311a4ccb6a28158468ac12fdded060a360897b180a259aba222819513844bdd3ae1851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582cd1c904b35f917d0835561d4e8f34c
SHA1fd103b2b3ca11e3f38950d36e6f69533847fb164
SHA2561562d79b2ade2dee9ad9fb16447d7a94c203ff0a5ebf7196d96628b95871293e
SHA5126ec016f203246a95dafe9144c76c914daeb68efcd04f7ae7aee29ebbd4d4570c39cffb6c118bcc4e83df458418faff33e754e95ef89fd51cfe40f601f5bf75e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8d571a279da1314a4f5a8d6ce66045
SHA1f3b00f01a16641612a4d1438f4bf11eef10cf5da
SHA25681a65c81916ef17efbe8475e8917a8272fe272d79d8e4727052e0584c35d081e
SHA512c85a6707fcb0618e526010a5d37b1cb9883190c3757ac0fbdc9b785f82ec8bf88579d9c476b013f03645d0c9485159323bae2ac0bc435667f298a42f3e29564a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5405c739a45c5d5f9146286b4b51bf5
SHA135a7efc356f8ecdc9ef22dd6527d96891ad1f6c2
SHA2563fba6fe58c85e5549704d68a47e0731ea73f4f39be82d17dff90a03108403177
SHA512d6c3b489a80a6415a2cb97a317200d1763761b602b61224aba98f464193231076d31661be347ef2652ca4052f1c06ee22390769dc72cba0d583199a0963727d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56405c53e357f151b8317a121b0334bb7
SHA1bfc190860ebd02e1213c44e51a19045258bd3894
SHA256e5ed719eeb78cf1654194a3fcd58a2b71e1cd5207d2d67e9aae9f84a3a85a6b4
SHA51259254bce3552ed1e03095f0b583c4afe5a9d85e17bd33743c1bdd39a3e6b44ece14971e3c075738d30f0f173e2e0caad8cf63e4cc5cd7b8f1f19a6ac1dcdf063
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b