Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
dbe0dfa9da865549e8867aae3f4a7485_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbe0dfa9da865549e8867aae3f4a7485_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbe0dfa9da865549e8867aae3f4a7485_JaffaCakes118.html
-
Size
65KB
-
MD5
dbe0dfa9da865549e8867aae3f4a7485
-
SHA1
e739b7496a5b5e3b9bb75bdbcdb0f7f32620381c
-
SHA256
6d731879344ef3e0e38d61e93ce0ed33494cc4a2ed6d8dc58ef028149d2e9f3c
-
SHA512
4a4e05af2fe7bbebdb3d4b0aa94003ae7dd91f24349b7d6857957e07d88e63191b27547ac990cd8034e4d3985872351fa6bcbb5edc49d565908dd504868307b5
-
SSDEEP
768:JiQgcM8St8tN99OIsGNjsPjoTymhCZkoTnMdtbBnfBgN8/oyo8QFVG8sG/IjkK5b:JgCrTNgec0tbrgae+NnzAC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402485f8d204db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432280042" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000091283511664699e5e5720a2bda594e6912fbea9b2d0d48eaca703a9426df6285000000000e8000000002000020000000965ec7f50e58309cac7a4a15e5863670a46a3d05ef8655de719cdb9e0c02b21b20000000e37eda94b83034293e3d5d2d4a9ad12f54d5a7bd2600500f14402e3f4a7d9c17400000009dd3c50bb8261fb12a5b6279b5af9596feb2f59a73d892b91a7ef6b66166f92b04efd2cac19f3ae0d1b5e34109d89a26d91aac6c5617132dea26d77fa3de4f3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{224B79F1-70C6-11EF-9109-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2256 2404 iexplore.exe 30 PID 2404 wrote to memory of 2256 2404 iexplore.exe 30 PID 2404 wrote to memory of 2256 2404 iexplore.exe 30 PID 2404 wrote to memory of 2256 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbe0dfa9da865549e8867aae3f4a7485_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3b135b65290e4406a6928b88559bdc
SHA14dba06e3c82f9b9ea5de2a98a665eea79237174e
SHA2566bd14653058ea9ae605499434efe828e73c76aca261a433aabed3559dd662ac3
SHA5125b16163748ec7ad843a6faeef3896101a83a3d8dab741d1df804f27b58937f6c7aa03883368588a67082eca11cf5c707ab57c60bdb9de308c5d736c34724e9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a08c01457e6832f2c839ac2c5d1de0
SHA1d0358d74edfca02fac5953b29f0f870243010227
SHA25620412793c68781b851a9a9d634a9c4c6c1a75071fcc5740c1f8f8c2880418e5f
SHA512e5017218964dd73543770b7e71a720b3e5bddea65bb602e26e1d20da8af2f6cd6fe50d5122cddd394e17e153f17a70aa18dd863818d9f3e3268416ebdaf81a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17ca1ba218cad16ea7a38e84db83cfb
SHA1c81a49be7bf3329375c01cc80c6f5c0b24783c16
SHA2563b026ad48681d1938618806190098e8fe97d4998941eee15c132c5718dfea1b9
SHA512e461c695dc9df80e6732ca78bd93e2eac36f4da5b81f958c632731d6adff4c2bf01e4af05159782ea9ba779b4f7c1625bf1607fc7846c3238b5dd7c6bd07a7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef423b1eb2bb5737ad0a2642891e905
SHA1cd116ed38406c1bf7128a8c5a82e3031459a80f7
SHA256f908463d739425e3a93459f0b70f0850776227075289888c4fcec64010a98125
SHA512592bca8b3f26187c160e2ec317cf5b4f28b601691d2b1dc67bd8f9d8b4c784388c3e636ba6f147ab31b7969ad5098c2fdccb382c672e38c4292674fe475397e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962174637b3ebe12e351b3d70e4813b3
SHA14eb1d95a2701a440cc7656da3e656d9831f38181
SHA2569b2227cb2b9866c9a3abd66beb7de48312650bf0e64f379d5c2ec629529d12e3
SHA512776539a91bc0b005709047fa9478e93c1a9615219d7bc13d747c1c8efe04f75b074d54f630608393580ed6a03617459cd805254094189faa664c666e613daaec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e64aeaf6678e07e4983159176858f01
SHA140373d25bd79960cab944bca3dee314b33f51cf5
SHA256f471904080ef34e01629d10f54ea63d18d762499b1125e96c54607b4ba66007c
SHA5120eb7e49d8c54e2b05632f068308f3f2ce76d910224fb793ee158e7b035a0f1cec14a4e7cfc6d767cd0a489798f9ce140138b3f5f53adae7c4a5593c1b88696ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b875d9aa2fbeeb7acdb7e0d57c954a
SHA11fa29bb5fbc769faa622fd54917c041b3e64900f
SHA256c0fe960581d6804c21d299576c50dfb3f12b6559251e8746aac1ae4e69c10419
SHA5127affd119fd3df10e7a5eb6c674051814ccf7021dec48801674a4433a01c7fa05b064e46a0b5b4c735771241f030e7afd77913141279e6723753382e6bf41c60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d46fa621d1c44095bc81b3582ef513
SHA1877a8181e6ec39008079ecbd3b98d9aedcd39055
SHA256fde17f11d1fb310ce105362614070f72b394c6ef30dd0bd9cb274b636d747b43
SHA512721080d5fe5a70cbb37581d943177db4363455a861217aa6b9ba4851a1865bc7403f24390a9dbbb9cb655ac764f583cf6264031bc535f7f5e7863889f5750f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee22512e86131904c644b75d335d667
SHA19cf114c782f6c55ef47bba9151cbe1fa79b417cf
SHA2568746f03d72228855832c4c87ad0943d19d9cebcf14e7ee62d4f030ad401fc33b
SHA512038b8681514255a4b9009f19e083b7dd55e932eb644c65e2cdf7db677021426fe21ba28f9b5d97704dea23e0e96dc9cc4f44ff6690657a56480bddf0bb9129d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ede659122461358af5647872c9dfe26
SHA18786fe647d537366fc58f9e294033d07a63e3745
SHA2569f257c837efb4b540e38c26a2f7e1abe4e9e402f6c1d83bf7e78abf5e7015e43
SHA512b3c98e91967f0249f30bc5c922761cdd40bbc7be1e739ba619f1d63dcecc6ff385f955c34f3e62bbb2afad44174f27827c3a6298af9029eefd080731e5c67cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98a74f9302d569a303b9679e51c69a8
SHA1645012034fcf07b497c7966caff6846b22e0b188
SHA25693d0bbde3fcdcaf691730d939f235ab7c915763e604113617fd68d45991f98af
SHA512d4c02b89e4bed6fb5fc1cd55a804c3325493b106a24f9be5b7d96a9a577fd59830b062f619a49d76508705eb243f4e414acce95ff9a340ec28caff0180ad7c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522319d843cf00d031c8e7a81fdf1c8db
SHA167deb88817435a4cebd0833084a089c9e98d9524
SHA256baf1334116577f0b389a7b5ca975d40366410953ca3cdbcd43c3ed672184d697
SHA5123c2bac2e18b4880d6df779b72ee31b801dddcfc65b4b647d6643725c42e51c9aa8757f8aab3ef0d4118dfde601175aab1ca6980e1b2bbe3691f4c03049f3f091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7195ddf5344c261dfc220c0d92be03b
SHA1cddee29bec365ef2bd33266e8fe4a386019a4619
SHA256b1ce4a61dcc03fc2fc0a1b99f081e0a1e1faca35a97c573726975aa140f2ba93
SHA512acfcbbc27cc4fc9666a1a6def5d46a4fe432f764aba03ffb60500f5616022a9e21b42ce3a78f5648e345c02cee13212c490e0b4247d13c6bb1ad6587b00dd989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b531c74f5016ee19df76bedcc9f24a62
SHA1713a93e49769e645f89cc30e0ee7d2898f911994
SHA256bd431351b9f11ac903e7af183387a5fcc604012bf5a343eac3b2b8248f1e28f2
SHA512295fbf6e311826e91e59754c1097d23ccabcdc6757515774e33fd95a10b52ea001a598ff91035f1491b5d7436750b163258e2cf2fa31c8bad7e95765a2c49527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbef908717b48f42911352d927038661
SHA1f79e952e4241dca7d9b6e5e993740c650936206a
SHA256815b5ba6ece29dff06d739ddc8996dcf0021a70217fa7f8910662769cf4a5277
SHA512468a3095f825bb711892663a8dc3b78b54d15fcc79c69d0188e5748c414ae20d4e2bcaaa496a12933097702341215b2dc0ccf2aeb1654fb7a9684beebfd087ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54915762181205c66148dfa865680a715
SHA12234781bf88b2463713cfc77f6f20eae9acd148a
SHA25630ddbfb926b8871ad3f8a0b0937b52f968692236ced6316fc4727a898dd867f2
SHA512c264aeb2296e615187b347619ae8f0165b8a124bb4ddca377e4a4aedd82acf1720bd9a2094ddc5883009ef7a332f9d1bc8a1ada16d13a96720c62c823b766db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c612c34393c6b839d3cca05fb0f93b
SHA1a2dc33cac00dab2694fce0518c3bf614dee38dc1
SHA2562b8624e4c4560be258a89fb222d4a4046e9181cb2ad98f585ebd8021261e1cc5
SHA512bd5e81b472753167b528bd463d393924f0677349bd274ad83b79814d9bc5b60e668455b055e1142989226113b131d42537779fcabf5a784ac1a7ceef301fed95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908a893aa232a10c614f8ed08e1496eb
SHA17439cf64e713d1652f27d72707f58c19df139ee0
SHA256166811f7f28634027dd26dc87793848f463badb3645aeccb70f3c5c811792ea1
SHA51203f79f5ce1c65d9882ae274c1cb169dfc83cd54dee03e42ecf2b5b52f01205e6c54fdaea4400dbf1368875faf9604c01f31c36e5747c3125843dcce743c4114a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004c43f97c23253d2d709ea56e2f4115
SHA1230dae12b0832bb8ac8247943644330f45ef37b3
SHA256e212dc97cf37eb9aff4d4a60b63876b929eb55de69ccdae3ec0253fdd210d18c
SHA512f9c7922c494d3cb9ea9bd3b900355370dfe205f9d4b6068b171530894332507b413e8a768b938946fd1feca44fa2700e80f579a9e9d8452c010109a33dcc2689
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b