Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
db8d1c9a32edfd6a755c8648d6585ad0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db8d1c9a32edfd6a755c8648d6585ad0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db8d1c9a32edfd6a755c8648d6585ad0_JaffaCakes118.html
-
Size
85KB
-
MD5
db8d1c9a32edfd6a755c8648d6585ad0
-
SHA1
f761d465f8e3aab5a4e684e385cac33441927b51
-
SHA256
4117d2d73aa243fae231d8a8b6d5372d54d4889e9596dde70be6e4ea7bb330a0
-
SHA512
68a8244303e5b84b59fe41229ddfecdf5c7456b8911577a7f0133d64bc425c90b04d0768b59ee32a35295d45c75e7a51f52df92e8e68dcc764c8dc112c2830cb
-
SSDEEP
1536:fWOrm46BlVOr3WQOoOeWgdLPccaw6E6z3K+IMz+5m5EwpoNJxtWdY0ywefYRkHXm:p6eWeprSwes5DcpjatZZ2d1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FAF6961-70A3-11EF-BC08-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432265221" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bafb78b004db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000adba3ebe9f393b3cf27633dcda242d771cd7ce996cf0bdccba34844b679908d6000000000e8000000002000020000000de9f37f241863fe81c5e33431d6313f63136871ba4fcad886d75c6661b9925bc20000000b628f10646de06c3d7167bddddb01fd680196c6b712ed9b89464400676f81348400000001da6e9102d97c384dadea470c92df7b19a92f1d711a234f34ca6af9eb5717856fb222b689cf24a57e21c8fd70c31df4782f2df859be2d8047260a7175e5d829c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2524 2296 iexplore.exe 30 PID 2296 wrote to memory of 2524 2296 iexplore.exe 30 PID 2296 wrote to memory of 2524 2296 iexplore.exe 30 PID 2296 wrote to memory of 2524 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db8d1c9a32edfd6a755c8648d6585ad0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fc3de3821faab028e6c813047a53f7
SHA1dd89ade8dbc4ab05a17b1f0e756a723a9ee1508b
SHA256296f806f9e005507231c65bfdb247e36b1d7bb1b1bbdffc810062f52b1addbf2
SHA5121941714aca0709832e4fd678e0bf1bf1902d01d4daf89b2f45a5d2ba61ff5f05ed253e4be4b2ad2d2d06a3b1d00b99388bd48ec925b2425e4abff218adc6ab34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502cf6c51c3cd5824cf926d006ff15500
SHA1a47b043c879c6bbd4f95225e94f2bd7d8f23201e
SHA256ed344548d1ea5dcab3820373e2891ac3b93eb31ddf630c537d625bfa82ba89b5
SHA51205fc05cecdd13eb3a0cfe95ab53ab9e9754071a18daac0945ed439f951e39188f07d27ba49539a7f931434943f29b7ad356712d7ba0b2102d36e008acef43d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f923b63a6be027312d338a73c711608b
SHA14158c860c7e9439da41491a3c15532d96f9acef2
SHA256d52c0b02e8017acbd012377b7c33d3310c21e60d456376a7fb5349aeb36e0ba5
SHA512a5ae64a7b7b80877493989450a9435a8c2c031a72f4544239df311d8e74553cea4e10e3c94e640e1110c516b0677cd35b43c69ecf0946c024b2158e53d55a4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556bb68a0de4fa02c3ae93969847f8fdc
SHA10f7e78455015ab022919d1e9289af9e304fd7b5b
SHA2564f39499bf059ec3d03c1301dae142e9c5f3b7f53cf12843d8ebfcca8f2b70540
SHA5125308df86d5e407a750f7fadd6ca3d378f57def36f42f3f6753f56de5f40861b60f98752b58f85b28fb32b2a1e66de15b038293c6294a72f37666f5bc1a27fac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf8c2ff636590ca3db234e6282548bda
SHA1a629eb0e47cbb1d1e4d9742e7d7fa385d4be3897
SHA256e749f013a3d1817fb7d6519c6357cfb1039330e5f7704b7e82d1c88fe9001e3c
SHA512ea6b1e9b80dee08627b241d01e4d38680a1746d48fbfce16e0a5a5164b6bef7e52ae929bc5a7c3d9929035188857a2ae37a07c452666ba02d356052b7e518e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970cdd413b60fb85dd807ec015d9ca31
SHA17c8c36bdedcc7e8dcd1ab219646beb0842918fa5
SHA2569518da2ba22eaf7f52cb30fc488e6b63ce0e1673aa3267def81a30c4e91fb069
SHA51218f63b1d8ea0b97efc76f38e37849318ce7f033a517fa4f8d6f47305fa7b958c8c88ce0c60befe6987063ef2bc015c67174b8655a2a8e9aee65c962bd0487d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2a0656bdf231aa99c050e148b867fa4
SHA19942616fec21577ee3a992cfad91de1ecb6a462e
SHA256c70fc8fcb7a661f437dfb6596a3f2984e2ebf309a6760ef07b211d950d56896f
SHA51284a861195f6502cd111e0aef6043f74d82c27923e2f9c7ca8ec36bb38110f9b2016ea843e7093d9623e881b521d981315219d8acb88abbf2ffcd1c655f23df9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9ca9ae88c0ae1abe601e9efed7b286
SHA144cd489c267f47369d0decbc5e4bf6730ea969f7
SHA256e122cf33f8f996ebd98b10a2e896dd95e10057807ddfd42f713df55e5bef187d
SHA512f8d352b455a74e64aa9f3416420a4ddce577b39bc9d38100b9bd8a2bad0024730ed6561c9ab5ac51fcee9a69462e1eacf6879bb1801b7729026dd712b293ab08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057e26e519f4b0d470ba90781802688b
SHA1c12e0d82d1867b20e48ccfd95b0e62ea1bd74b92
SHA25658f9e726fb014b03f8a06fb9e2cb7169e7619291599992cd67d27cd3075043d5
SHA512bf1136a2acae0879b2b24496f9a04c5dfda7e20b1214e6c57fab11c4c2205029f82263f13a1449b84ae1607412ce9f4db96c6a158229501e8e4e64f0017c38ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2204f27e0e1ee2963c96b4c834c7c99
SHA10827785f873dbdaab377a61c91a111a95c9c274b
SHA25635d2ba079b8e421007c52b9b9e7b665bba9b141a8d2bf828c5bd189c7e58612b
SHA512e715ebb26f29a859dd5d06fd16f05fa3eafb32ecdd80ec9208458ca66f1fe9e0206926abbc6820921bd9250d8d8b0fa85074e67f9117082c9ce261a2af8c6202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584739ea975d944fcc990532136610855
SHA165dd7e592bfd1aef23ee219fe4c6f7fe7c1dc60a
SHA256961de5af4ca56e11834cd6440b28bcc6f472c853220522254deb9de0cca58f24
SHA5123d81c82339a70aa2c917cb45832d93bd7424d3c258f62c2aefa921f939855b5d947b170a39ba79e51c98d243c349af6bba39c7a52e9fd81224ea0cb28199bbc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b532a67e247efa41f7a3048886a8c2a0
SHA18607ef027db21bb64079b6b9fe5d27a706847023
SHA2569e46731215b4e398ecf0c23be584ec5ea134a540ba90e22de8199adbcf0bce9b
SHA5123454e77dbb146ee0469c317494f779fa0154750782714f8df4a5898cef4e236b29939a0429d633817c9385d481869c32a38a7dc66b7b98ee473811ede0ff0ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e29ceb75c74b7304cde2df2eded8f3
SHA1341a29195fbb0b84f7c5fa2acf7b33d18184357b
SHA2566748aa47f5aae0519b1c638675e5dbed0cf5ef9d7d71dca4acbc4fbc9af9ee2e
SHA5126d31fecda8a3de5d19327c351e6fb4f414a6f5372f33d3f576ed04624abd4e8ca0259308d552a5aac8c5ab89e7ff8605ca991ec69038068375dfecc7e80444aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588bc501b3ad17942457e0663e02af289
SHA11dbe840137ddf7a89da14b46e001dc84be102198
SHA2561882559c934df8b52e2e332ab668e9fcfbccbe5420eee527d361646672b6e64d
SHA5129af75255f9ab567595cc2372749befcb20d4e9940f3107b520162fe579573bdd72cb418c06cdb51e5b4e3c4da8f02835f21ebcf33f078d5b416720b845487c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a30345bea55be173710644c214a00e3
SHA1a3ae2cf13b3e56c4e801bf6924cc046fa77b9175
SHA256c2e5dea0bb6160e7809b11ebf4196ea72b9211f7a2708a2643755c49f801fe71
SHA512720b1a7e83e70ead99ab125ee270445cd9f7eed64f1ad41a7034c14c5fa10357aed9145e6b880faa32db16a0e62c42592836a186259d8959e340a6bc5c995ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537661bc6a45a2485223eefef4891c496
SHA11bfb0895b09d397f2f29af4be9ab1b700c6125e2
SHA2563d3d181f39d3319aa8a63130618809b319852ec0c3e422df5849a7481e82f6a0
SHA5121cfba117dc3a1cef6068a6ff82fc668b3721059201cd556c6c307e48fc2131545007059a8981a7a00991848d79a79620cc057d52075fac8581567572297e6f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508500916bba7c89233c9a6cbefa6fb96
SHA17be0b9e28d8ddfe1d66d8fa2451cd3892e70a987
SHA25647ceef8af9011b8eb9a2531345540a703c979238eeaff9521fb77bc9f2d635da
SHA512c0bead767144cab6b6dc715990af8122c037b44c99c4f76917f2cb6227318eee5e4c43b802336327f83b82e6d66de11b8125fee422b2427a474b1992a9b94ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58144f3b4e81714dbe022dc1ae7c3f069
SHA1c10204abf6dbb916f71b0ee5a4f0036277ab962d
SHA2568563dc559290c416dfce0273b88ad6a6b46087d09ffeb06e38ea593693936238
SHA512006eb559db55941e83f4fa6518fc3cc9e35a8a8ed64281e98a89fe56e56acd4593b2a10146f789afc1f2fb0f3a7a695a6d45ecee62c2eb5394167106c6e87dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962b11b405f81562cdf8bb71bfa4e947
SHA14554827706a359c211c01e9340b7aa043735a4be
SHA25695055b177472086d56b163f89aed48053a6006524843ab3735e3022ab2d39e6d
SHA512994975271ff4c7c4f707563c6aa10f6d91aed6d716e0e2060d4f65a172f1b76a285db8f4c5f96ad450ea69400ec95b983d866e045017fcb4b32c0545807ace11
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b