Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
dbf1da4aba5cfd657c57d2a482a6e71c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbf1da4aba5cfd657c57d2a482a6e71c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbf1da4aba5cfd657c57d2a482a6e71c_JaffaCakes118.html
-
Size
799B
-
MD5
dbf1da4aba5cfd657c57d2a482a6e71c
-
SHA1
60b0cd2210414cc74a32495528e54eb9f39065f4
-
SHA256
d887fc077eed364a4f7816e6d42390cb02e8e018313686252c78462effac2f3d
-
SHA512
0157167b85a73390225c0ae78b0420d54aeeec2ee5bf13bad836d0bf70c23815870bf87e3186d6a8fc6d1578ecbae17418b8306a46e213468368bbeec57b3920
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8541C4F1-70CC-11EF-ADF1-527E38F5B48B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432282786" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000005af2771fa9f76e4161b5c03d90ff8d52125885999b719eb6ecdba60471be6144000000000e800000000200002000000017e59f3fbdc80fac1f1d07745735e694da4559492e9ec1f83beec13a1d3c07ff20000000b96d2c712435deaad2fca0eb209f6182b4ae852b5110cfdf6763597063d3083440000000a2dfc8b9865dee49841475f06ed5f560c564dd9769f3418af47c021a517ade167587204fd2d9f1c066044fc3ca052f08930ac7c7cac1593f073f3c0be4d13a18 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bdcf48d904db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2660 2700 iexplore.exe 31 PID 2700 wrote to memory of 2660 2700 iexplore.exe 31 PID 2700 wrote to memory of 2660 2700 iexplore.exe 31 PID 2700 wrote to memory of 2660 2700 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbf1da4aba5cfd657c57d2a482a6e71c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b757f59051c8f5013a3615ec49d0de1b
SHA1d90421516fbf3e888b02a132ad54110e0c550a64
SHA256932189ec6b1b25686b8b73b5e870ac19a6525d8da68efb02d813675693df052d
SHA5127475a5ecccf1892e7e233cc87addd58a23c38e0897765a85d4e4bc7d47ccacbe6a00c9bd0ea76a47d93bc8aa8a9571f1c4cdbc31c29fe98518e85a9c2b5b654a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b8dd6dd3c9bdfdfa6882cdfc8d7985
SHA19476249db4f1784b11fd54769dbe0a22e89e00f0
SHA2569f36520bb6f8f68706be3bf56c5d7aa33e5ae69ce95b83875b905c4018a78861
SHA512baccd5e217587797fc2cfff1632d85b52cfc273a2a2a64c96c6814625f713b36c0ee0b781a9180d5154671e3d7d74e7b64932a6fcbbab460d5815290987a6783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac6138ddbaa612064715bd75ae280208
SHA1c0a1213391a6fff0c24459697b44645527cfa2e5
SHA256f750ecee5493b955cb9197368b4ff64ad388923ce6414317dab53da1b2eebe54
SHA512b282f1996035ff2509da97dac9ac823cd71320d422d383a921156b560e90512376f58a1a7f3ed94f7498e369689372c5716d324747b36bb70364a11e62af469a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c439c1b395b8351271aaa9ff43769d
SHA1c6d9bb3e1a889b300eb7fb0616dee7d0fb352d8d
SHA2566c03c8164d41be3d0ab7051afd29cdd8cab032d00689b68fda964c8d8a25f559
SHA512a523528011c16ff9def3d45912b9b7d8e72271ccd95e0a2101841b881e74fa7d33e6a8fc994bb77bb6857eb3064ec548ac934c75d3c0b15f17093adacffba12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f80a7636c49a37353e970077b89095f
SHA1524cdef1a89a0500b142cfe4ba15c05656498dc1
SHA256cd56d943276ed01137b2f73739e8848914428e3fc3b02393bddf338494b5bdc7
SHA512d58e4d322b3471a7491b8c9e65d2557529da91e901dd43ecb9da08877d0e8008856ece6b9aae00f4a6d777b6a78b227b8766b11ca91e960eed25636b74bc708f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2e7966a71dd08b30be1aee9206d8a5
SHA188fdcc8214397457e10fb1bcfe11622663e7ab4b
SHA256ad5e90ae4c772b36c2569db526d5c62874ccef778b3e8e399ca2dd20c316c85b
SHA512ca2b51ae7112c0b031189cdfe7b0f8faeeca0f11bccb3ba0d4d21550dfb3b01f1fb91d0da6cc87296b8426c5938d675f836877fa5cee5f05b1172003e39d5e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93c6b407c451c2892a72fc8d89481f5
SHA1243a3613a11b7b77c769c3d5584a61c05f39a9f6
SHA2560aab17fb5a191350da234883c8f0772492cefe1c3a73c7d03597273b7b38d60b
SHA512d0e8f43a4d095632ec61c6e35b63e72f97930b2a60fb59ef255e4143c758468a9d2c7a82a7d7e2444f388dd4ca94ad8ee7f3a2f125b059635d361107f1313db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5de00015ce1af00c771387272fff4bf
SHA144237d5cce445378cc97c1e6b6d79640c086be6f
SHA2569368dc0276c585c3af2e4f59d111ca3efe4d8eb150ebca0d936a8a05485d845e
SHA512c69b82a3fd0cbd565b5a68ab6fc5f2ef5cfa1adc753f32954ad0b3883c439a15d26ee3997b37c3554287aeb104b049a5f308a105aa4c7c0609e836b9300e14e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a0f327bdb5038878a7f8422533495c
SHA14e7d34d77d912fe461d9d0253c8db1b667335d4d
SHA2565301a4536c56383bc65f577795450edd4dbd596e8f99fd9afeb9497b63df031a
SHA5121d1b0f47c8ced376ce722d868b808c6dbfcd966cfe9202dc56b0b1b9f48dd39b2ff566d9f8c41fbaaed5dd1a96f0b5f2d939a79d5511cfd05ae46d479e738b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1af174134e5f55955bf2118d4f3e44a
SHA14237b28755b195a5c434c0aa45f73f279d8ea5df
SHA256422cfbca60b3df4dbea45362ced753a55b25fb1e474d0d523a270c6cd66904df
SHA5126cbbd4c5a4c33075a91081d41565b0444534711663a86506ff6086bf5107dab5fe8a379d7b317ae41b2645e461b582cacf344008038cd9fe308871e572dedaeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881bf2272ad03bd8809212e0ca40abed
SHA1987572ce072dbe5232d2b2f77b9c2ec1c203ff9b
SHA25658e3f7dfbfa533220a5b00ba38213e28156f655bf3e055a1df8fd77b4a860971
SHA51296f9c51cd2d0eda69731538bf0554cb2fd79c6735c2c62293afd8b6cf5c988dfe5d89d5ef8b4ad385f0cdc7121c7b665ac65b4999c10af4cea4e0d6af95f7e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bbee58167f07c6ec64153611c1a72e3
SHA191bba97e4e464e894a440f1494c601bb8c6971d6
SHA256eca280427f9515d619512230b37d94354938c82bd65ee331c3fa23c15ba0b338
SHA51272bc84f4ef13d48a3140680fba9757a8f30c4ce20ec0a5ebbdf73884da2ac92066d2ed193a6df572444fc22cf656e51d41adb5ae2c55663af27d0e3e8bf10042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8f1eedb527adecda6f487408854086
SHA150670d8ef681d04b3a3444e87b30a7a8e4da809f
SHA25641eca965817043211cb5ebaf8804f31be060d491db0597cce32ba7cb8703aa52
SHA5127d54efeecbb060c11fc235d263d8582ed448a357abc11e37110f11dc6e3a198276c441937dcafee839f94be23b96b35d5003962fc61a0d53a7c209005b186c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b9280af016d45315e22dc24df0dcc1
SHA19b20d9eb970c2790a137adec29525b05dbba7561
SHA256615b52bec5d202485b4ca09409d3838f472f6a3bd3e3b45c80142467c6b8e741
SHA512152d9f9c0b19081405ea78bc5e4c0dbb95d6a89d3b324ee88411ad4b43a9dc95dce3e9bc31141e84145dcf7c0b486c20c5bc6e483216bba4ffea0fd13e5a5249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ee1d2d5e43c4c10a0362b925fa58c6
SHA1da7ff9188f45430b7fe527d159cfcbaf3597a1dd
SHA2563568cae41647b3bd91e80f531a6a6bbdc5a1d8cde7e28a8b1fc65ffe4e9acbc1
SHA512ec471daa7c9800f79e483052fdd4c3b3414334c40625369cc1f591e9879906d4a7ad2526c32d270947f4d99cfc080dde8837e8e9471c64faad4854da915e6b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f5cae6d56b9c5143c02f331246d4411
SHA10c9fb1627164b076b0bdf48e3a640ce8fcf69ef0
SHA256d0f68fa1c9bad3c2cce3bf4a9dd66927a27d5c635db16c2540325fa1cbb9ebab
SHA512b4c9983a52bb164a7b7966695424d8e0a385cde8f5b357509b69a623722930252c27cc626523eb2ea4a7aaee8a8bb523b4a63ef33de11e6bca2e8fd257f600ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dbf4601eab1d4a6244e57a0646c02fb
SHA1699630e84a9936663ad053c0f61af337649ac592
SHA25644cf9a584b7403ad19863e044dc019dd6a88ac4f39e63393e7bf315e7c07f2ea
SHA51277d20a63bd3bab59804243fab97412a710459807d9dc7dfb1e550e297875380baa9eb4a139e30cb4786727417d149a22bb5b04a66029750ba5d9656828da1088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5753e4264f2f9c701cfde675ee8dd7d6e
SHA1a25aec6f99c9291f9321c03db63390bac560147d
SHA25673e6bd63d5492f4290738ecdcfb97bfc24ee06f18fcc898bd7892d9cf39c8ecc
SHA51262649745ba712c96fa1486d9a4b3511b3290b70b8e3e1b343c0f2a35377fee71af9d135167373d02c7bce934b7eb945072fcb306e217e9aa8f9d56db6b63c8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534728c9782949bd211ea716e899ab7a5
SHA1dd9b73704898f2b044eab517a2a04675ed56e224
SHA256feef5c1abc5592b5089f79632871e3ae0cb90798d38d005268124e76506ab2cb
SHA5126684f21df0b1c9469c781bca948c6c3dd0e23d1dfcf601077c44453f622ac7e089947cf78d671483cfb348f2164a3bdabc3c011997722420c8b92dba03c2bd56
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b