Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
dbca81c353bd225ed5d884278512cc0f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbca81c353bd225ed5d884278512cc0f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbca81c353bd225ed5d884278512cc0f_JaffaCakes118.html
-
Size
685B
-
MD5
dbca81c353bd225ed5d884278512cc0f
-
SHA1
b58c33de79b23a2d874ae6d5cf5c0d2a55a17f89
-
SHA256
bb41e2cb5eaefe3920486cb4db9b8fd7f0cd060ea1593ec7c3946ec249f7e24b
-
SHA512
8d633f29104505c3594989934e70a5f66932c3c836c7e6255785762379c72aa7928db4c4a825e673d5861a2ea2b662b2ab28d4e7538a71bb5befcdae1bd8318f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432276292" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{671A6E51-70BD-11EF-9C49-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e2f9267cb48c8e2e667ad543c43911bdc7309f37bbd4ee53a2f80e83bbaa169b000000000e800000000200002000000084d6dee3659dc959f46ce47b47b430799c124813ef7d1ff3946aec202cafb07a20000000dabd198d2242ac42d5234281027bac8471bb7dad7de7c55ce126519ecce3435e40000000e77e0a0a796ef2bbd11becced347b36f2cf5506de3bf7265750eb3af98679670b185ac0356dfa83097d9e59bd0654314f74737e167b1a3fe02c0406854e99b12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c5012cca04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 iexplore.exe 1600 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1924 1600 iexplore.exe 30 PID 1600 wrote to memory of 1924 1600 iexplore.exe 30 PID 1600 wrote to memory of 1924 1600 iexplore.exe 30 PID 1600 wrote to memory of 1924 1600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbca81c353bd225ed5d884278512cc0f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ce60d913322219813c84c0182a3626
SHA19fab6699bba350824d8a3dfc95a76bdeede2e9b5
SHA256f0cbcb5bfbfd5646544022f0f5a5dc2ea504bd06b57f605603f2706c9a083207
SHA5121d0059b81774ac579b6df8d843880f8f18e224b077aad82b7df6c193b4cb0c0f058e45d55122f907406487dba7d88f6985ad659f8c738d6a8f2fe7470c6921b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553a47e47a6f69735b416a091ede95b43
SHA1d0f34a144c884aa61dabf931689864ec58fc41d9
SHA25611d4cbd3375422ccd26e00bb98aa7676f1f27218ca04c0a5f0149095ebbd9c82
SHA512467acf3729ca28ac2e8de458678e8ffa20e32e1938b1bb573b752d9703effa3f47bfbb323614b288ce1c44962302c3341399b88323828405be42809a8fa6dac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ef2d5d9eaa569543ced9316d5a8585
SHA149d252dbde06284ab5a7c1243c15cb83bd992d91
SHA256c5123858db263951bf78a93910f61b9b2824689b4034b7461be72897223842ec
SHA512299e5122c7d90ac5848598ce72d49af76a42389dea1f83fd58d6b506395e1117a6caea05643b748ced52f1c7b54ae6b55a2279721ddfdebca90a988a23da2586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b936ff206db46fd7fb163e3139eed387
SHA11990528d6ca48ee28003ea79f81f1917d62669bb
SHA256e37c182036fe3ea6612cebeb890816d6e6ad56c87950614c186e918759efe466
SHA5122d50fe21946aa4bd18d3ce85315aa793e6f40cd62ca49c0687f8626bab473af975f5f88f834af4de5af67db9bb28c2ea5ce5657bcc453f3303b6cd92b56745e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580bd1a5bb920563f791d9a7e99ea3bd4
SHA1e4aaaa7243dab3e1766164020b196a9dbfaf12f2
SHA2568c3e63cee983c1449c57e2d34b6b743d5e7e0307881b230d88ab9a039c6affb2
SHA512b0dffdbd51d00d2bb85a4433808abc6d176b27745fcf0c2d50c6ee13a0634a41026c7cdc85b0f0d8a64f451c157505f5f900ef80d6d6d96a9332eeccf530157f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d39bb77c217dbd6295d16a8f4c2dca7
SHA10ffbebf2bc3c3dcce497460391e08a2b3623fbcd
SHA2561cde4d311d59fa5c6537edaa5e629afc432e9d6156e91e8a0989014d6f67cdef
SHA51267313e89d14b4b17ebb3e27abd58d3329918c888bef769b73488c9d929c0c00a5049491cf47d4d0a183743a2fdd43e3a1af47f5c83996d6afa1f926ebf9b4e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd52196ca323e07702eb7975aa234709
SHA14a014b15dda9de25b7663c5364a3a5d8d060e7dc
SHA256b7807256d7e6b10a5a12de3514938ca3202ccb0f23cbf91290978c65de7edc24
SHA512ce0df349a747dd7695824837fc399f2ed06a9687f02149bb62752a87200d589ae3213e089e52f54842c94b22c410b2efae89f06704f065c54d83fe9437538e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567cc11117ae65021b73edd8d4523624e
SHA1be59ad34ced705f7d1c2afa6e48511ccbbc1e59c
SHA25627d616eda9fb36612ed722eed04364833c5b13fd9d0908456c0db00ac1cc5115
SHA512d08a3f6090328cd4176821602ca967231cde6af6e515973dc1c612cce932e79227c32541a74ee9bc7d281f97e607c2a7055995485d81a42d4411ef33d1163f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc0ea4c2c00327869ac565c98b871c28
SHA100f4e9946a3c3779c0fb53014183daa8c5d5fe98
SHA256f480781b52d036099a342a64aa7228183e8ef62a9acef6e8bedb1c6129daefdf
SHA51218f4ab7d66e0a98dd926ceaad922b038c3aaa69acc060dd9a31f637aef6e304ffda1073cba444ffab095ad7a1b59db59193bf13cbc51ffef6a41302d02c0bb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16eae121f3207a4d35401c415c64280
SHA1c15ab8ca1365d596794a87e766d8de5dad18a6b4
SHA2566924f9e7077012ae88702ea36fed95477ac6d0504cfde97c7c604e100d2527d1
SHA512c6647bb6b7d4d1f65d26f65b91a0b9dc11a5ee882e953b054b32475a8a09c88ddfd0f351bd57e3577206c03c556e852f8c8bc7e3a53642f924cee0eed139b3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d0c2fd722f78d0b08ad1f8464cfe29e
SHA1238f15d346981843b2a4b4cc6d03d9e5e449cdc8
SHA2567b3bb721d76b287256f25fc40d66aec48cfb055caa081ce81d8ceca511c33e91
SHA51200a2221e94c3a1ef06d3e0b5be9d5f0399528b91dadabf1e38eab435b7bbcf1711642623359dfd876d554283ed880350f12ab8952776afaeafb9d15cc9a9f7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540fac317e0097616ce50b68c04b0ec90
SHA15bd3b6037fa47efe4c281b9ef072c5467d703d3f
SHA2564bfd6f6020e277aec3b37452020ab4cebd87590e291905c2b120a1c8b06d2061
SHA51289985c23730dd5f30b26f38a0a34e2c40da6aa8a88d1db310835405e22efc911f7373909cf4c82873f2dbe689aad91717f85b1f01fed6553aad9d8dcdfeae2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c32b78aff83a4bbd033f46f0e7afeb
SHA1d5634a169bf8595593ed0dca9888a1ec44d1559a
SHA256e471cf07dbf9738239501faf96e734b703aa3aa5d218b892abfdbdfa01498929
SHA51260f70e1b36c34bdcd0004db0633bc43cf8a1d8de92bea9d1651906ea890d0afebbf9ae6df54c782be0a91141936be8e93040b4fe11a4c434f1686dd6e283a83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b36c58383e23d2f98c26a038b8acb255
SHA1577931b44895f7aa4a76cf5eb230a429ed0e37fc
SHA2569536da1b8a26f4b2f38a9f4dae8e10b96685168040a6460eb35c80425ecbc297
SHA512ddd5862621c66d91219c6ceffe043581eb0ffc107a5f82a47f5e3aaf821cd851f5d4f18736d8e7f82e4b9363c4511fa29eb0c68083931e006d865e3bb86935c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522239369c9026f4247ba087645d2967f
SHA1977d192b9c10bdbe7af4813f0b67d79025eef6fc
SHA25650d9953185bd1dcbb30fc4ed82bea59b047b67bfc0cbe78b11ea030ea8757442
SHA5122b788af2b4d2dfaa95ccadbc41185178ad191f5196a0bca19ed0429ce3f79c1360e05c26ff7b8fa8d5fcdad79fce9a3e7ce2aa869d0c0dee07dfa566e02f67f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e1d44fc995f3190c0926852fc48913
SHA18542f7ae626652ce9784a65fab912d63ca3502ba
SHA2562634f8f7ba7981f49aa5e30ce27d3d2fddb56869dac5b1feba4fc66834d3f85a
SHA51262c36ec41dfc1643336ef7611162bcba44828dd8bac6d12a1f2b5ecb5272657222b58cb7d270d903fe12f673a81f2add3cfe5c59e700092d5dce3603141ed02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570753793bc1dbca57d7a9c3826832b94
SHA1fb19e141cbeb78f5a10308ba301d6ce25cb32170
SHA25679628e52c09af4b3fb39ccbafcea4114f66281c8b42cc2fd32b9034b1d7aad70
SHA512b681be02d1fff920cad656198cb315c65236491e37cb4913961de7c27e57d5196973a17e4de7c2e1dd054004aba1630dd870abb6380fba4f1f92bc26aeb0fba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64d0343047350623b4e62ce255c3bfc
SHA1a17d269038a1f665b50dfe1a612d2378edf5e6d6
SHA2566ad36479c76a9fedea1190f8e97df73fad9fd19c72bdb1502898b00765dee207
SHA512eb49069f43a3f3a21f229693151dde7263db2467da9db5dbf1077ca9edc142165a374ca4a1f8aca2ce5353a3a1d3d662f5d451d4e78a89b1d1b557fcac19f1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3ace8c1a9417393ff9ed447287f828
SHA1f883de0ea04d82823c103e26b4c3d2e4e21d3b7d
SHA256a4633fd7c019a7fc2b89072d354c0e1b664723562696f48cdbb6a92a138a4166
SHA512e3ef254fea3e3cadbcbc3790c3675759091304bba23702180c619d7f2f8e1e61c6f2e1cce75a92d6ef234047f0673d09e3ed0af108e8e1e9770e19fe11066d48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b