Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
dbc8b35f3751541a6de6b2c217430ca1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbc8b35f3751541a6de6b2c217430ca1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbc8b35f3751541a6de6b2c217430ca1_JaffaCakes118.html
-
Size
49KB
-
MD5
dbc8b35f3751541a6de6b2c217430ca1
-
SHA1
002a974daaeef8fcbd1d697474144fc9791c047f
-
SHA256
1c30c3c6e3a7a79c6d2915215b3dc03e4a712a6eba3fce0cdb0696ad01dc13ee
-
SHA512
a67951e75b542986b73ad743df442799a853098211c0cd806e328eff554535433f8832678a909669ad5e8571a56f320d73eae2674d8a1b1b8f7e27a0e21c076a
-
SSDEEP
1536:SFnNSr+fpq0RzyPO0XiSm/KitfR7yCuOQ8qmz0dupajTbTW64g5dnjKb+a0:SFnaGbJ1eqfc9G0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432275980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD26CB11-70BC-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ef3a9bc904db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000007be44dc707485638109e22b8c88a38ad1a98ad4be5cda87d7f5ed4240da28e6000000000e80000000020000200000007a0f8ee16a9ba34c023d00b5e3c1a9aaa4c36f14243522fdb7567f0884ff4f8b20000000eeeadfa4cd3f5c73d28eddb58c4b27b382a61676a6dd7ab706633cd04de50109400000008ad1cafc8c50c36679addb47dd1d2b3dcd76aac375247583fb31792c718dc400c6c22e8857fd905defa2ceac8e63c740e1fb4db2e16586c8d66fdf127ba054b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2804 2188 iexplore.exe 30 PID 2188 wrote to memory of 2804 2188 iexplore.exe 30 PID 2188 wrote to memory of 2804 2188 iexplore.exe 30 PID 2188 wrote to memory of 2804 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbc8b35f3751541a6de6b2c217430ca1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736c25e650b82f820fb4b0a058ccb34a
SHA1aafee46e543051584fdc96f44cecea7521199fb3
SHA256e5a1c8d8fbfa0efb70f23b24ecf152e622cf150289dd6dce8708d41c1ab7e592
SHA51231a09d14f9f4986a20a6bd4044e42be7e74fa3ef5326b00f40957e1f21c3dfa9aaa4382590c778370a38fb2e4caee954891c77630903534d872f61f0c616f084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9d3e2581e363fec6ba3c5b06010a2aa
SHA113bf5f2af739d1b8fbec2a54b86cb73305cb3e05
SHA256147d5842c8fa0c5fda1d8cb18d6bf4af0f86262fa006524e2b915fa30a8f5ec6
SHA512c2a695196a1fc97545f598fa2915bffcb25b098c353deb8aaa279399ec658a03165930090b52eb1df02e7067f2c6400db65be55423f2244ab7a468919c07b0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a35ea39af612118e62096405530d0c
SHA1b734f819233c64041a6aa25e149d8db0cb2eb9e3
SHA2569878094f69974869f2862c6e99b366a70f2924a21061e0e99dacfae01c547417
SHA5124d624ccbf6b8339d5a7627e891a0a1d86c65c5ebab8a39e52056d3c6c2cc64c682c4aa0f57781a8d625a53660e95a394557dbca823271e09a6e5c37833add32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54811ab1ba2a1277cbefbc0ea83eed8d1
SHA1cfa7b28b5ca388261a38fc09b924a5e321424660
SHA25610b41f010852ca3c46036c3e0d374afde4c4b187acc37e4603a9d0447a3a8900
SHA51256c795d1e9c93d671dbdb3f611080e9236845a87b22004a354db8eece454df30c43ae0244281a8eb2474fbe2ce34e5ff08800456708c438274905859fb74ecc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ba92a338247548e5b1b2f3a54041f1
SHA137d2a7f3a7828f42f1f7d43c0cb866a487decc35
SHA2568302c011db254a36a85821a2762c0c721a85bc88f0a349b5e9acebcd5cbe8494
SHA512957c42540d24d001c5ff1f28c2787702487029d0c61bb43f82b2383c3456ba5190faa00c95ad4df61a9f9dec3084c9b10bdc07d7a21390e7d5b3c3baa2da3201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce47db6e16080402bafd323b5becddc
SHA1c4b06127af8813fbd69a435457eb77f89abd92b1
SHA256c094a4fb643f52e627acfb5827950d41fa1ccfc4723c1f01cf4f232f63a1e804
SHA5123cb7bb8d95fd0c8ffa36632d6d9f342dbb65dee0e7537c6179aaa0b90acfab769021f4614df91e4d80d329d23f381d1f14e50963313b331d7ce9342c8bcf3528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ddca038eba7a502fb1bbb977e25e134
SHA14394dca17ffac2f393c9b01677ba0765fdd98245
SHA256037f47c4b0167d8c6013f4657aa8c2628b3f245e3986c9b3840228f1e10c5bc5
SHA512a31e16159cbbd47f3db948a18e4716373722429331231aa5b5b036ce9d29d2cfc4f97cb76e466541d7443bd607da93d6ed8ebbd8c511bb2e48ec58a730d3a5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac36e543cf60e460b2284d5f08f583da
SHA1cd1332c60ecbe4ae0887c042fcd74c9a0e0e31ca
SHA256384857c460e97539c71f491a13a045c6fe57e70f3d61ae4d0258a3d4f3ab6ca0
SHA5127e8c2bf3c83d04a9599d124d4504e2acbb816d1f1451236274fe7c207e0b0fda36d721dd067d69cae0fd54657ded4ebcde5e3b69e464548bf81c2f68659baf31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c708ec1e2c8e230f89abb871891eaf2
SHA1bdf423ae6a059b73b42b1ad9a0b5ea7a21b4c142
SHA25626e1000f68e646052b85c205ed07d225154c5827a10706195eed7bc74fbfc58d
SHA512429e8ebd3a0cbc7f22dcb52c707dea7db21046201930646ed7c441f0404d2c14d7c1d52fd46233fd2d559ac617ec8d35cfa069fba2372bbe4b61329add79feb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cc1348a82316583df1453c8be04716
SHA129f74fe10832c006e631dced218fb2955bacd6b6
SHA2562b83030096a4bb13c8842a060559c8773ae340621d5dcbba7d0ba8fada07754d
SHA512ec503d5bf9081616815c97f166f30b08e107c47cdc930b5f35bc0687129eff95f3c5c143a418a2a8986be5832194ad1b0a9781545be76dbe61642edf5f982d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572dbaa3ed2904dce77cf5cda8df4a8dd
SHA1ed4b095666c3e02492cb8715dd0ccd644376baa4
SHA256d09fccca9ea9bd653ea76a288657e28f50e6a0aa886f465149ad89f35410d00e
SHA5128d00d1217daee12e3f4f05da7f8a90148f88db7834df3db91ad4d29a1e7cd17ba05f87c5e72a2bac0bbdf77dace0f3d5a2f0644952242b023a8b3eff58f5cbb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2465c2cbda538fba01f8865edfe4fb
SHA13866f245a403b8c90f3e3932b5ef3907fcc7c938
SHA256610942d09d5c2e61441f4f8f40d454188a427a1e2f10a9873498715c2c1080d2
SHA512747a2d38e9002352d4134d243ebb4375c2f92c8e386199d957a4e89850388d6922747f2270674facd305f67d7e3e7191d3c40dd0e40734503bb68ed23411f3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c15ff0107b4c0cf9d59ed206516e241
SHA1f658c93046c038e2f575ce81af115e4bbaece56d
SHA2562bfb4a4ae46ea90c0c5f711d307dee1ccba7e0bbef5da46444f7ae88ec9a18be
SHA5126b1ad1746884ebd4f1f30a121a8f3afb5f2fb20f875456548d51e4f5d4d29f56a6ed08b7028223e4c6ca19076fdf67c9e4f728aef2e7cde5bb7a078c611f3132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555e0288b29f7821911b2b4a43918678
SHA1f89528280ae68e52b09df37e3ac52d820a0cadd6
SHA256335636c72e33bc7ec74d52b4952f2da30cbb6e3510c0e27c63395881fa73f4b8
SHA512a80449c8b3955bb966c572fb0a9fca4da0f1ed84cbc61b8a2c59937bcb78abee0b6de775a4917235a3ca2daf5526cf42f0f7be547533f637af2de532ca71e39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574201d4a2537cbeaeceece544300f3d5
SHA118687365bcd989f0d26f276ca7d41033017663ed
SHA256ff60d7e308bafb6cdbc45888e4fba97c55725c580b23398729b33bb661bdd9a4
SHA512b4120b32b3f8f39cb5bf4d33e523e67f32b2be5d4c39f99aa62d53cd76b752111e64ef0198ee94dcc0a2dbaf7a62b0e5ada3fe5e9919ed321b1ed4703962be51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e050d1caf2a623d1d5ab0ed3aa3ce25b
SHA14de12bcb48bbcf62ecf68019332c038838308b74
SHA2569eca1b924c4a0dec21d3e1929f194ed61efc84b516b77e9d99eb7493c6913525
SHA51290c76e426f41c0f854f688fd9435f48a261f9f9d5e365ba6953564cabe8076a704a494c981d7b59cb8f5a9620742ec3e0b31740582d7cd0586b97a947a24a6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539b9a1120f1cdee99c571c1513148615
SHA112e2de42afe8084b8cc50aa9b21a4e79fc25c334
SHA25649596395cb00b6edd98c05868361d7c75938bc5d0659f97c4f1eb24c78ef006f
SHA512b954a595445e3511022644e61e9d05d359a931828f53c1fd5676d83366c8b3ff38eec16247809086ce9feede5f6075cac3477995df86e17099dc92d15e39e3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961521975733e2d11f3469a33117a7ac
SHA1f382efab1677d3cd72e9a1a2a2a112bbbae9c480
SHA256e5fc2e1c7e3e9c53378af0c3805f75c877fb90f49a0ce3256695cf9d750a46a5
SHA51293bf2a0902a808890e3b871477c6e5bb7dc3f90585daf9dfa30b5848fa6b1a60d50db4c458167c75340f2268ff7a76e5123e828a2d3d9e0bce6d254a9be64f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49c15bf59d76f2675b93bf5b5a04f55
SHA1a49307ed39a636a4d6991a3899d35e513603e959
SHA256eb77d1ef45d05aaac5373e32d24358f2db42a090c3936816cb7c6d39079dd31d
SHA51236abce78f3c6017adca05500e92322241c245267a4ed689de6c849f67b180f1e6f681aa66ba415475f3c13d49a9f53f766b1de4f9879785a01a46c530eb322f2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b