Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
dbe896a8cdeef5a37b11f625f2995e04_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbe896a8cdeef5a37b11f625f2995e04_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbe896a8cdeef5a37b11f625f2995e04_JaffaCakes118.html
-
Size
776B
-
MD5
dbe896a8cdeef5a37b11f625f2995e04
-
SHA1
91efbebcd7f1c531e9bd28f7c270ab8eca0bb553
-
SHA256
df185f693176c9d35f8ac5cb3eea7038290da1c9fb3bd7bed3dca049ae117fff
-
SHA512
293705d18df6d8ba7f75074459824ffe0f5e6da8dfa34b5623f8db2cfd6a3e5d5cff06152691a56546afa3fa77a6f89b070ed82169f725e5749719076b57fc80
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46F334C1-70C9-11EF-8250-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c4f50bd604db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432281392" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a9710218b581c3faccdd142d9e45619cbd9d4fcabcb726d36bf5841010f00c65000000000e8000000002000020000000fc403424d8ba222333fa1c9d06b78392404294b7957d69ebea9d8f1cdc1935fc200000007c359383dcca0a7e4c71cbf3b2e7d8a6a92a881bf0f3438aeeacce279788c3d240000000d4a564edf3d5041afef0b371441f43a426444a8b8b38a5e89fa0b3e236584e00f70bb690fdac999a4bba8e1a87410bc725ea637a1bfbc58fe524efd7018c6709 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbe896a8cdeef5a37b11f625f2995e04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53358e9bc4e0764130414618b4110f460
SHA11d1392a44837b9c686f8ca91223ae93cadb45337
SHA2566512deef653805ba287ece179c7c521493c97e889879076540a57ce6185f5c44
SHA5121647c6a8d4170ee763b2f671ec4ad29c8e8b347b9b860db06562398dc570613f13002b5a4b44da24eafb1bd685501801d84394b0d42bb3900ed37ebd7df4b97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c1318d05e33dfcc263b9b6543a3e23
SHA17c29d026dc1d09f2d8cce5f6a7d01b62f605e2f2
SHA256db524ac8829d3b5031d53ab25080b59d5bbd96cb218ea8be07223a886ca0e441
SHA51258fbbe3fe36ebacd70c7d6da62c2e81d7cb426f069a05d7971a0d89f7e60e2e0263e361675de8f6ff5537d4d535eac79bc3346f2f0172f4cde366e216a01896b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c45eecbc3d815208717c5f2e676e760
SHA1af1f2f93beb9c67104d4a685ce4cca2c502ab70c
SHA2569e4dbcf3d338185cbe0ab3b7213cb0a9204239372812e721bff44daa6a751f0b
SHA512b5195d118ac5a629eed6aaf0ee3b7856e2dad1d667d81008d70033e1dda93fa2267d09ad5c859868bf90d047026c8f49abf4760a33a07323edcf5c41342a11bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c5c1ced29e89bb576e6b6d5ceeacc41
SHA1ca7875a662a5022848f3fa8aebce8332614928b2
SHA2565df3ee1e362fbf8ee3faa48719b98593b33a92ba0302a7a63d2731ebde67256f
SHA512da7f1b2e6448d977b5a3bc8d3c76e415429e24c5703d79236b06f57818f047867740e0e14fdff99643b1d18594da946c1e62383adb1a350142f14f470dac47bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eafa2ba2a26b006a7d7516b258b0f33
SHA1ee12089c99929486954c374f8375bf3c0c3a3d19
SHA256b27e11a41d51e8e34f89f34a82b989cbdefb41067cddbd1417d4df33339a58cf
SHA5126151d9a94c92367bb92a61e77019173f05a1c3be9ba3dc260bc43884694e57a6866bd2654e7d96aeb81d8bd1080bb903d8b5991af7893b978b3ebffcd65b2bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce488c5f0cfd2a0bde874c6b7b497c7
SHA151e77c836f0a18740a78ea17dfee958811a2fb6f
SHA256ab17db1dbd23fdee1ce3ccfae7d91affc5f3072eb3052ce48b43a4abb1021b4d
SHA512b0a9a09171aec8f5d345461574cb156906bf39289842c7a6e755f4f1b4dff307c07c52b9415d1dbc5bec2c13740abaa3c643bdf6858a30d09cf20e434d10e503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463b437dce9624457e1f6144963daa8f
SHA17cf911c7a4d50909f935a7e9a52f081924773ca2
SHA256b5a8083ccd84b9dcd8f3bfa87f66ea6e05d1608ce56c79593627f55db6ea4228
SHA51200ed4de5302bc0188b0b78d4177ecb7608f51111ba6d8fb5bb905bfa61cdcc0212a8deaa150e8c1b5963a01639a830418c1044ff6cfea08296c5d99b8a640213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517cd2f7342dc29799dd8360c030ebe4d
SHA1cce52ca66fe6dd82fa8f050b1536c9c498a5b1e1
SHA25628428d07f88bffa05d5bf8915a112082b37dbd4e0e8b0665384a322a48cd1fd0
SHA5120388c5b991f4ed867733b45e2629666a58dfddd2151811d1b7bd41dee1d6eb169b75da28e7fe2495ecb5a1a18112d6f0339a24fb48e1f841b3cddbadf6220516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb55b691225e3f8ef1e66ffb4a878095
SHA10f92d24596ab7db265aa957bb1bffb82e11a5961
SHA256d79a6abf1799734baf14c71cc4c208e90759db9c6906abb22c1263514a490c65
SHA512b3ea83b1e5d7e5b215e1bb2604da5525392235a114cfc1950ff9a5c81b58af68cac2383bc1aa452374c9304f4682e392834a499def6cee3481d69a0db762f292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8750a91fae4c60fe5c9a38b75088b5d
SHA11d677907881fa2180f8fc8c7d988024bb2499fba
SHA2564e80eb048373cc8eef2d7d6ccaee77d3d732dfe6fd68de8ce7c2e9f101346cfc
SHA512f8fb85ef16c5811877ed9dbc66a82d77c47887ec0442bc05dd8408d158d61c3666de8c9270f134409700b3d4be8901e60f120a474d3ba392ff3546fad5f5df90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ddd38c371d043c18df9910e485377e6
SHA1100dca743c7dd7299e82525e0bdf70352efc8969
SHA256b309e5f4339122aaa319f718bc713e00773d12bb6c4566853ecc81046e6d6283
SHA512dfe3e5f410bf29e4d2966e35390220da0d721782fd6a24374957610e5dc461b587fee57562945e1ebf6eb53204403ee182670b4047a8bc7ba6a61b1b615c8f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb9d859be335c3e17b80cd1ab1425e1
SHA183729474a3739dab67736fbb3b9ebec2efc79a86
SHA256695c199a33fd84e727b4c99a59d3fa8c5be5a5fa55878522b2e61576f409e207
SHA512608e60422c1e1511298584be07f8c437bf8fe9e564da17a7b11cefd9d0e35aebdfb80e72bfab4073cefc2306a6c5306ee1a637a0aef4954d54a8ef650f263bdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b946a41c171ac1dc19050f3b9bb6c595
SHA17cf5819c5206eca3adf0e244653910f95f8c6068
SHA256fadec57078ad859e0ebc4da10e69211bdfcb3a47d9219ed6c55f72325bb81504
SHA5121fbdfec51ad744bd4e9b89d2899b5cfa29e30a2c3596c7b8c993ce188097abf020421f1bbdd05731c6587e08007ab09f0fc7c4e2c4e6a460e25a3759054532e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97d07e6f5dbf890555910d459c22b10
SHA19df1b1d7229ce7637c1839464e092f64e6bf41a8
SHA256bebd2da0339ed7d14f22d70bdfb4ae9c2e44e5b9d6e72d5da8b6330ba3e7b0fd
SHA51243b4d14df05f7cd96777541daf70f901a840649696e008477626dba69beca6c280d9694ed9d0333b210b5c266e79980198a03c4bdcbfb17bfd9a85f7b4743587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3419edddd295030b7b443ef4bd41e8
SHA116719979d033c0a16af6d14d7776bb8116c92845
SHA256eb8beeb971d1a964ede99fa7799ad435c6239e6976e64192d506f6edab782cd9
SHA5124cf503d4888e47c8776b328cf496de346aa73eaf10a4c955846948b4e3cc5102651b191c3946d662446f2a744cbc3ad394c26e5224cd5d81d0a41d242e17ea07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50afaa594da68b36d7736cb360aed5e6e
SHA14332513cb757c9c37627318525efd3aabcdca823
SHA2565ceec1c2996be098eff0f000be5d897ec05dfa59fb4cca1943318b65c95e70eb
SHA5120d7e1867586b9686b1a1303dc23dc2f555d0113425822bf1c333e7bc1fd2bc9c87d1c8d1eb3962829b39e659db5adac525416344269ae6dadf62e140e2669b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bca9c8a18d15edff446fabca1c3c2b
SHA12b06f5e4987e1a80e37fde64442ea7b83d9996e3
SHA2560108cfef9fae9ac6c196245dcba492268c9a65df6143bb7d9928d838c8e9037d
SHA512c6a0e31ff5e64537fe4626b95204b3263d308b72113db7c4e39eee009fc8f3687f7de35405c77c4463dfa662cd30f2538cbf4eab1762b7a19a4d92ffa3fc4bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8390a528b9fbee3644c3f1b1c172acf
SHA1f612942db681ceaf5e64aaa573d5c649708e9a3e
SHA2568dd6c1a1deea3753f5f7adec3f4bde604b794ad7501a2fb95392221f8027a6ac
SHA512b736e4a073cffc8abfeb3409b4d471d76736e3e03158fcdc84b090ca3ddb4717efd1f84c448e59e705ad097bf030646cbf361f8429d754e5d0ceb691047af93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f667988384a5a43aff9eb137fc9197d
SHA15a9c5e7d3c785b720ad0bea41add6729a30ef62d
SHA256a3bcd65670cd5092e11fb3d32b6599c15e23ef81999c281cdcb01f9a8aaf4a84
SHA51209ff39edcd8374941a54ff481f0bee090ebe31fa375044e184adea4430fbbd7073977caab64d122c6933a1f9a6056ae4aa50aa5a04e36a0099a57e83d6d94899
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b