Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
dc018088cb432851320ad288b14d6d46_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc018088cb432851320ad288b14d6d46_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc018088cb432851320ad288b14d6d46_JaffaCakes118.html
-
Size
131KB
-
MD5
dc018088cb432851320ad288b14d6d46
-
SHA1
9f88d6bfbac078fe19a586f9a0b6705368734c81
-
SHA256
dd8919161694b5c73e858393d8514b9aef83a2a4f3eff13c26886cc22e8d6b38
-
SHA512
3711ad68f5a4942e6bc2dc3d9a7634b1620667cd95c67b2cfd265b21ff82691f2eac5df23e8b305f887658d4f9999b3b19d29d6b6f09b2ce2c18cd6337f2ce52
-
SSDEEP
3072:UcOSd9v2O21FGuWwGIMgyfkMY+BES09JXAnyrZalI+YQ:MSd9v2O21FGuWwGIYsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73622671-70D2-11EF-BFE2-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04fee47df04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000061e35058b2594a1cd1d28f33419b6bc2664bc2654c11cb828a637c576f45f6e4000000000e800000000200002000000069801551bebaf538a26120a653b6cc32051fd36415c76607097d96d9b468fa8d200000003d08dd2bebf87aa5ca442c821c8b4d1758dbdc8cdb59fccfbd889bfb0e36a9d34000000090212873424325734994608b7761b221d8a7cc5eb88b0187a24f72af35c9046eec748bf6f0c663cd9d4115d6621ad859de91918aadcb83f515c714d01cfc7a2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432285332" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2884 2316 iexplore.exe 30 PID 2316 wrote to memory of 2884 2316 iexplore.exe 30 PID 2316 wrote to memory of 2884 2316 iexplore.exe 30 PID 2316 wrote to memory of 2884 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc018088cb432851320ad288b14d6d46_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b3a54674b6063a4f16fc0b670e096be
SHA1eb83a1b0b2b4901a9b176826406e3b160e2762ce
SHA2561a08096b4be753d3272ba4d74829be9aca621e7fe0deaba8cc4371fdadaf7e84
SHA51233befb8282a1689122feb30ab3feb62794b0bb13776e7c0797c525b617bb5d3f6147cf5524dbee6347bdac439fe73a5c044f94d691a29eb6d3b4e51c9eabe191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570655acb3d2742b62653e81b8578649c
SHA1491b00d4ee3ccb206fbcd466d419b40c9b1ab84b
SHA25680ef1bdedaabe54bcf7f9680c9bc3c5ca7409bc359c23500c946b0d4745307f8
SHA512edab4aac8430d3179165cfd02e09ceebdf175a25ec0a5047da7131e1c922c8f8b71a63201078742a2f654d1a1ecb63ed3c90deeeed4670eb086781d45675bfc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550eedd2fe3f7b403055be3408c0c9e49
SHA1e46f231fb18660428a9dcd24c11cc587b94bcfe2
SHA256760a131ba0926c13bacef8385c16017f0b65963923af41d4109a3840db6754b7
SHA51266b8ff5b24ffe025095722956d73571f38816440c0be7fe81733e8f26f65a6b91a9a6bd325fd11a57c4684fb27db284814ad8b1770a8cfa4ebdbed49d5649600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9390836c41bca4d70e907cecb1989b3
SHA182b2628d1123a33ea4fe640ce3be4292a9b26e07
SHA256322262ba37e92ebadf2cb9417069577486194c860e9f7904122779d6ce2f95d9
SHA5124089007dad8434213a60deb4f5aa890323b3cc7f395b82a046b651f0048f6d2041d28c6991eb299db56f1a78507d72e7f7e215b5f4263f31206059f8352421f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51119e53b307ad870e38443ef4a0e8615
SHA199dd4f8a10b360d77daa832d163e2b7cbb496dd3
SHA256864380e67785d7658b7eb07c21bc429337db1cea93460f0064b3addd6dbeb25b
SHA512b7cb2166e0d7e248d03fa6b5a5155e041819b7e20fd34527d07f844d01505473089e2e0946a6efa304760d0f8b1e4c34f5d06478a5a042a928d48af2fc3574af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5670304007e708f4a7401e337076eaf6a
SHA1f44c16ae686c861af47d76d342da9159a63b98d4
SHA256fed917fcb931cd7e5c948186171302b207b940ae209fa18715f4dd6318cc0156
SHA512dbf831ba9c227568ccbaaf4845cc16e1105b2622f607bfe5597729747339c8586e6e5c9f93b2ef07f286be71e8d9cf65d7bfcce3ec8a417aab5f3b6c15f0c548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52199c77aa2337924c68b766a69545388
SHA1ffd8697a24f9290cdef9648338c556e52c4a2185
SHA2564dab29f23805f6e4310b86034145c9fe8efbcf327cad49ba1b7dfee647e39c45
SHA512b4079c132377f2a278ef544aa3ecd424068e9ea51b6432c39060087b1d16d56a11dc7aadfd57dfe5d52a922b37f955caabc01385b76af0df5c75a3129837c7a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726dd3a7521c2686d6f4b03c3b30e0dc
SHA1941b6dd3dfa90e54e636505d77b17dc7b167a41a
SHA2569d4d6805b53d6249c2384236ddc08d3d07786d1bb10b8ed79988ebc721f652e3
SHA51205ca707422de45f286d4eae031da3eb4a3e77eab420ae865d5970a07fd6300052c455364b777283b0bf90358ec522745c3b4730191567682ad0183b0d0fad02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007cbdad46f20a590fd108df294d91f6
SHA173acd8d3facaa6f0e2540ee31a8031b66efb554d
SHA256aa198cf242a000e17fa45d1227c4f9b2632c7b9e23914868b31ec833d86adcd9
SHA51263e53a097678205b56d9cdbc911d1f2b23f91137e6495e9df5c0123cfffc941713e8eee0254758f513e00645407c59719839b46b3f58be8aad9f17d5994407a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276a04b5176510c451b5aab3a2c7f9f0
SHA188a6e29e593f25f18952d3a6d8cb5ea880c8fdf4
SHA2568782e51619eac968c6a0b1d93a8895cde35eaf7977067ddfef3b074de4486dd2
SHA512e0dc6e92986ae19bf01071196f6d7af0b3b17d9436f7cfeed86b3b05725b3ea92503e8da354f4a368a53325e54d1e3ef96cd417f53f32fda1d6d59adc137e737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fdae6dfde520e34ba183a7853d51e3
SHA1a085d932a6d067ad2fb529084cccb4f610a8890a
SHA25691f4e29be89ca11cc7f2aff136bfd6652a8431471200ffe0f176e13d0f9f24fe
SHA51227adefbd41fc6868dc3a6019182feb1be12718105cab1dd45147ee4010cb3946b6165f8640c92835a6039e84541bf3428abd3daacb8d57327533c0fe51418a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40953dc7219191c9dbd791c958934ba
SHA1441fd72ebb7f4cfa474dc23dc084c270b81cc3b7
SHA25660b8270b25ad0c32aea17003a6ed86d28af47fa239270939154c6262db6298c0
SHA512d89821ff439246fade092286e16d3d8909528d11c58fb7ad201e6441dc3f1aa7686544cc67e52bd747edcc09f148ce1233c6960709ef0505fc034aa65e72713d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07d3942c4b4dee89c36f7e01507c06a
SHA132c6a13ee9f65d241daaf6d346078f4c915f01a5
SHA25645aaba8e432ef50be1f464874c0c95a5434fd910351d89f2da118a83ea8d6b87
SHA51220e740126a9b639e53a4fabb631d79deaab4951d9a6b0f6b32a6ba063b61d3568a5d3646fa02ff240768cbbe7be2a9d67845fc827d3b7ae47c8001add5ea9753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e51105455d9635bdb8f719bd17a3a96
SHA17e2d9a7fe7889d7183d217431ce6831843950e55
SHA2563052aa4cf28edc11b08409dd3e6d081b23f12156aa4a5158ef0f2480b8c587da
SHA5121fe0a57d3a4080f0a302b88f477b06774df4b1e6510b811b1bf8eff9c54b2d31fc34eca8f33f2a5ebd24ec8e59ab54e54ea49aab95f4f137245bf22d5eded6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538a10711b86f4b7db86c59aae5698b57
SHA1bd8848def9110631fa8777f17c7d7a0f75d8c073
SHA256a013f84dcd1fbfccaab017ec92198f20e360e7ed2aab1a0a4d2ccc7a98aa1c18
SHA512076503687a806961ee3058b36f08015693e2c6b4959579f78af8264c41db31e26b499acdc9c040e7aa4c1d69344334845118d16eab41f88f5ae4182caf492d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a274f6cf880392017d4849df7f3d8e7
SHA14c6418a2606a32b0a73c6110355d1448c95fbb9d
SHA2560cb67c15d299c77bdd68be7daa1c4650877c680e18127ab2f32f31dc1478d903
SHA51255c3e202cab87fe2f4dfbd0fdd89656c6df039a5a6191321f2be0c93be80b8a7dab61006bf48889bd0151dbe01ee2f0107120a4ac1e6af5aac6c1a08fb4101ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591652f8d674cd41165a912176ed05dcd
SHA12725c6c4bf88fe424e1b1f52c2c12e32bf7d36f1
SHA256bf80947162e64ad08d74ad55a41e00cc19a56dc8919d7e702b12386de3d1b7d7
SHA5123474d35df9f352637327ac406d9935750b7a231c9ba8aff300f6135ed59894410f205f3bae9814764c8414d2275416302579315523488ece259bec7ad8e9cd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ac153d75a67dde38550d0feea066e2
SHA1a751b9e620297a21399f475092a101a2e1e42d4c
SHA256a39370e9f9663ea09e4b7b1632c61316e5ab3e2bf3e32dac7f6807c27434648e
SHA5122453558fc776e9406a5d0e6e8311f6f5585729dd4901848fd9658d558ca59a2c9fe5a27f534ef440371a00fe7fe6008f8259f0e669825802fc8f889f045663fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b