Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
dbfed12ee0a261de769a750af2bbb1c1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbfed12ee0a261de769a750af2bbb1c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbfed12ee0a261de769a750af2bbb1c1_JaffaCakes118.html
-
Size
2KB
-
MD5
dbfed12ee0a261de769a750af2bbb1c1
-
SHA1
3ad3c8a6cc000069aa1a67a7935b8930d8b34efe
-
SHA256
e5d80d5ee92b1a3529160b6a6e19243dc0abe744adab1d9e7fb5f726f7f9ae84
-
SHA512
ec811c390b625c6996e32403a1eaa6cf1c4d51624eae9064554fd51b297645e7420824bc04482e541cb09d66eefbc6140193a0d1563a899530a12020e95be1e1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432284903" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000214480d7e21ed0ed9a90043c2e06bc5a205a38407a40d016d48f9fa7c5832ab7000000000e8000000002000020000000a3b1024d8b52e9a90294f71425ceb61010839bc7d1fd4e2e31ac72238f9e2c6e200000003ee1768ef9776b048fc55a717980cc087fbd7ea4b98da2f520f9cb7bbaa8e9054000000073648a0ca3d37d6ae46b42bcbf05c9088d5c1e01fa0dba8d64bb4a3272659023ad9793b5e7cd022ab891b35a9e14a50e52034ba8e7dddaf8398866723c01eed6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1000bb47de04db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7318C671-70D1-11EF-8F55-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2816 2196 iexplore.exe 31 PID 2196 wrote to memory of 2816 2196 iexplore.exe 31 PID 2196 wrote to memory of 2816 2196 iexplore.exe 31 PID 2196 wrote to memory of 2816 2196 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbfed12ee0a261de769a750af2bbb1c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a95837950f6e5496e6d29e780a1ea2
SHA13de73c45cc8fec6286dba7ec36f4e379ccdb4e4a
SHA256debe1166b65efffbe83178d27bca91d71a366fa89ae431ca39160cae0c466f0d
SHA51260b54f4981b52aa432909fda8023e2a65be272f7a218f0037d01305cdd9d567ea9154dfbf8bc53540b23058e72a29a40ab980d09115411227994a450fde1d390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6cdd893233682acb1df38e6b1a9af5
SHA15ede79a6440300e1bfd285745dbb6b2c8ddb2255
SHA256edae7cefb3c056237ad5949e46ebabfa889a59a9eeded837cfd68347df192354
SHA512f9f1a4faee6b2553c32bc5695ee803d787bf049dc2cac181ae43dfe80f779d92d64ec7f7c2adc3916c763069586e87ac3218df2f1f9c1458ce6f2002c1c4373c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d553d8f8c9990ff20db82215a7c7f7e
SHA178020380cc767b4afff1b589245a9f247d201685
SHA2560642ea365c5cb2ff6878983f6a9302f0779968d9fd6c12c98b060b47d0f01c71
SHA512072f1c3d7c8b5c7d25f69399c27df5f7bb5845973e6c6d77a7d76812a8dbb884f5142c63567c5c7ff8008ee26da4f0845f401042c5d62bea3b5d4a66fe218764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab9c0d7cb820259638aed47970482c1
SHA1010fba5f76090fea6d64e5e02d44c4ada957fa16
SHA2562dff539e50b7dfccdb4d65fbfd84475adc06c2d756d0e008e9968edc5425a30f
SHA5122f96523609518a9515eb7309e633c3279965f43d24a3aa49294f9255a9425511f8e0b2b5e4b73cc6778ec447dbf6ce2bdb9a5bc98dfd736f05a5505b50e061f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f64d477ab461c0bf1e378594d06cfe
SHA16177a91af3ddc4373fb86dd3d8a5ba752a83f6de
SHA256fe16e3f50a22e158da1ec1cc9417ad6b50b91e887a30fca0c914b00167181f79
SHA512224b70bc52f23f9c0e5585afa9e96ea866d8df84e608e383ca42f1c0cb1e9427091cf1e2ba1c0ebf85e1a4ed4a54c75aa3f93a72adbc6396844020f07dd2ae9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b993471903591e6cc2c08cc8e080c7a
SHA12efe01b7886d34ceebc3f3c058159932c440a4b8
SHA2563881dcf27512cde31fad9b9f876913c92f72a13514620468c7f0851e981d1ec1
SHA5123ddbe9763e7c6a8ee4ccfd6c479c02a12c47b93c3741fbad62aa9f5c2ba37c731c42d2987263aa75aa846020db7a881577ecca037f8d5e1791192a70f5a62549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d989d1cbd16b3079afd8e5d0ed2b69e2
SHA1fae87c742a0c75495082b249c5dd787c40494a18
SHA2565966417d4dfaa4782402d94c645152ee29c60c562cc07697ad4f329a514e66da
SHA512d124d243e469c68b18652ec919e3f3bae073ec6f3055a9488f35488fec97caccc92e7cc5831035946a192d86554f769e6fd98bb40bfd91598fe6ba8c8a121733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a36f0967db57bd406f3b5f83a10035c
SHA1c24b030bee4f5e684dc032f7c202e3be9d71ad1c
SHA256d47c4d20348cb7d834f17c70cfee4c7e96ff9d8866d9ef5c5747a564d285a551
SHA5129bc96969188165f2697bce06a36b0b4a71332278a90b2daf2468bcbe3a70e3d68955aa504d069202db73b4d2c2d3f7ed06433cb4b8ecfcf39452e1dd14da71a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6704fea1d9528b566c8013a78975f46
SHA11cbe4bf91220bf33046634985e730ae29a4452af
SHA25633a751c5650bebd20cbc12da20620794a415f33cd22d2d727510d5eca23fc928
SHA5124b59e266a4632c3970454a52c29f158f4e1b53445ff71dde0ad5829e60e51a1b9eea03989c6e2b8d544a345b80ee99b40b9bfde45efd1504ab61e5b515c623e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a777fa4f62138be46f5b2d7edb6ad82
SHA14877cc5f3363376c9c4a0698c92478b905fd6d25
SHA25629ca40a6aa6a2e1d0314f7502fb52162df659c17e36e12ccd6b2e44859449682
SHA51228565f9541307d6bf7379ae0592323a3585b373f5fcba504ad28762f659f98721f8af871981a3eb4e84a8166080b7ab587dbfe2a759773fc046ea4005df5006f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d087b86228ee2770e11d72fa16cae8f
SHA1aea9652cf64bbf9729b1ff4b65c9c53958e5d083
SHA2567e15f0f27c1a2c41f7b2b928cda4ae3b8c9da0453d449d572d02835f17317a89
SHA5121957f9873dc9a685256e17e7998c85c38bbf42024794402211eb0b67de7a9475c1e3da8cde2cbed2363a94cddb95a371732aef3933ec9255d716e4f91e8fde0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f181983efc984a66bd26935bf29de711
SHA1a451ef2ec6fb733227554c3c8ffc0ee474f8562c
SHA25690898e456a11a959dad7f36562031adfee2b19b33eea3cbae775a177255aef2a
SHA51264da5c28c562196fe67add034e04fe8c78f886c69ceeb64aae7495f81cf8e9297443c31b4f98e1a96558795076c7a1eaa6407b5ee438a2cf1bd55c7b60f1dd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575551d7757feba905a59f5681e6407d7
SHA1407ba503ba9ab0a896355df67a92721f428f6fca
SHA256bcc7cbe01acfe3bc350285d404194ef85318c6d04901d18ac75147beb48fd0e1
SHA5126310c7d2048015b2abdb87644f9e3568dcbab2dae9ad481745f5be7a7d63b1208fb61d97a6c9ee0b86027d3513dcd80d1e11d75c4da6c70fb4476625d885852e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3dcaf7c4d2b4186188578b900cf5ac4
SHA1ef734a864ca53c008f370cfc77f3013d945ac120
SHA256e82ae7d77696913e7960364a587f1195a8cec958e8b4a9fbe372a2548750332e
SHA51214a3bc22455cac73cfb0419673693268ac3d165940c9b1dfbb180e745e52a95290ee015f552cfa46f9de9afd114be987a0a52560ab3a30baf3330af0238857f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7749b5c8aad63e82cb70af1fe05039
SHA12ad253960613d607280a9146a95dee5321c45f27
SHA256c2ca9caad636e8d2b8ccb3bced0509b50ae2459232200b95fd401f4c9239097a
SHA51204760f4331b0be9d2efd9c7a9deb863d6c9dd620dadb94df7e8a14c3c5320275de925fd13aaa24d7522f5e6e498a6e644d1aa3af9d50370f0e5133a59a08da5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5068c21461ffcf9f2cd4be5b7ee842c0e
SHA1a828256346dfb94cd43503f6f5959cf8dfc2d3d6
SHA2561980dc0b5182ed776265b1a0c9d8c1271670af266eb9b7b21cf1e3dd088e5c50
SHA5121fe6d61eada1ee585ad1faad1cd05dc6fec4dca24baec679d2ef67a3ae59d88dcddbdee5bd3a59eb325f737af4dab95e3b8cbbce7faabcef8086c5713131c338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185198453d574d4cf4ed0cf3b09944f6
SHA175810b83bdaf59fdca44ddae0d391b58d1aa406d
SHA2562d14decdfcece380ba35161d71ea067663f60800431ab9cae229c65c94386bea
SHA5125517ce2846419e0043bf9b353fa625de2795e21cdae6c78efaaf4e73e07bf72a69907f1280af5887f2ef93afea496419ff26fcd085b429ca33636c7692bf1081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c847ec93b7caeda9a2ce1d00257acde
SHA1c0b87b0bd4fd1f24c7db75ee7322caecb2d0f854
SHA256e6ff328981d379dde7baf5e41b114d3d1900b60e28ac426a34aebb5542d8c2ff
SHA5128404adc5cf70ff37a8df41ee40b9186bf5afee701e7808265c109501e8043ba186f7e06ee2318cf0e9fe13cf113eae3b4b4026838ab2aa14e19ee4c907f249a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b