Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
dc06d49507cdc4095c52c2ef5da86954_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc06d49507cdc4095c52c2ef5da86954_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc06d49507cdc4095c52c2ef5da86954_JaffaCakes118.html
-
Size
99KB
-
MD5
dc06d49507cdc4095c52c2ef5da86954
-
SHA1
933ef0026dbb00bc259323cc0190c63dbf7c9ac8
-
SHA256
6682f265c720f25e35f722490b46c64926c5b0b8a7e76cbad23fec8e90911662
-
SHA512
54e5fb02b1223325605cdce5dfca1d9ef44fd3615126dec7d3a11f3fae85eb6e2d70cdba86242f747a4d4353d7dd1b77cde7db51c13cd3d788491f5044a60c53
-
SSDEEP
1536:wD0Wh3HDonHeT2dQZaVNqG1WjhZYnO7h9C/2nZrFDmg8TIDMLIYFTCwp4cDte7N1:g0WhXErm8JDtepoB3K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64811EC1-70D4-11EF-A3C4-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0622e3be104db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432286166" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b6554cf8885abe0742cc78d6d7cc0e05de33449e9fe378a03c0c64a0efaeac20000000000e800000000200002000000078be753ada9746519f6851420f20ac78c1f201f5e5bace41a1edec0a552bea1820000000c6765c485441c9ff5fc1b92a40418aa5ccf071dc036e9e4a7931a6451580d37940000000905cfefb203df5a188b429dd788b930e3b44af75c631a7d24d19a0fb1eb7c21522aedf6481add22185bb6b2e91686e25e916e8578b0047a0262b6eceec0793f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2452 2236 iexplore.exe 28 PID 2236 wrote to memory of 2452 2236 iexplore.exe 28 PID 2236 wrote to memory of 2452 2236 iexplore.exe 28 PID 2236 wrote to memory of 2452 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc06d49507cdc4095c52c2ef5da86954_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5360e7ac22df5406621ccc093b29dca3f
SHA18dd075e0eecac76551797a2ca233b832e8bf61fa
SHA2567c5a4500c5dc3e462c6684b0cefea436d98ae519ac1bb16f59f1d12729fa36b4
SHA5127bf6a333454dcca33cadd2e45e7abd3baebe9132f7be7f062f3ee15d485ab75931d72867dffdd72151df27d1eda96e111803c7528b0dc52198d8695da7d0b6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14f6ff98b08eb6fb8d7c3ef5292af86
SHA1f6c628c7d449983ab79b4377ff869fa1d16975d9
SHA256d89f6bd805b63233c854d0464f8bcd4b758b2c4697f872afd311747d4bd890c5
SHA512121215a6fc9392bbe108444979b76bfdd6c29e2fda5e096f14a92ae02ee5f1ada403c9d96d3ccae4bb2fe9554ee830c82a8fe4e5eb5cae8dae4f4250a016f800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e460e488b8eab28d4de69340f9dd94
SHA13b4892e740430b9e841b2d7e541a568db006345c
SHA256a2ee119fd2cbc5bbd1c8c59ff5472c3434aa6df5cc8dbd63ac0e39a01ed4fd67
SHA51280a3c036348c9eece249c01ba9f7ecfaf2cda3c5fceb059c7def99fbfa70d71e0b0acbf72b329a1fc0b90b090ff9cefed56029fa0bbbd9a5cf7ee89c2f99a668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565bf6c78d90cd1a0a51ffdf715484ed2
SHA1df6d57ab56a53068196d3fd8df6483a42ea86e7f
SHA256ed27a978d40930fb8396e367180d37e922d61339783ef5075f69feeec204e4db
SHA512e4dc6aeeb5cbb344761165779bca11845addadf6fe1b9bb4a46f2f419a8bae410cbefd3a60b0ce0ccb3045afa6b533abec25e36b058b245e1c0c942d66afa1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d9b414be337b4fa071ca939105cf37
SHA1044410a62d0aab67512387cdf2d7c4f52e6eb4cb
SHA256493534e386b262a03f048f3e31dfcbda4cdc600690498fc74ec78f467c06337b
SHA512080880d059e9e6210011263a2049631c816aa90632813cfb5ba2657255f4927a3163ea8c67f778f6f55aaa9987086d5ea224292c73cc6094ad7b3184709fa943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beeefbe1e30292e86c5638669ce8ae68
SHA188124887a0fa7dd6b15572e7595aedbb1d76851d
SHA25678941b3b5af2f8da2073f87cd28ab2719062df741543530f24db1f0ee0ace9d6
SHA512bba557493ecbfb50c8ba7031895c8ed776ab3067531c51fd232c65043b73c7316061e1251968495f088905f0bdcd8bc8077e3bdab22d20def7d593f948643f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b74efbc1346140dcfa46983e848b4c9
SHA1be0cf2a4cacc1bcc66c68d2de62bc0c47c88de88
SHA256e7624eb12b1499aaed08c076ce416b09417500033f94f073fac36a09cc8856bf
SHA51249ee97193a4fd59ab07cb9b892ef7d2e69425fe3baa8e8e7b03218ee38966b94be1af6f79ca997c251420b365488725c3f902fccbbbbef033d3c485f89b93bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636f46a49a630e8d72df3dcfd6e14dd5
SHA10957dedb8f79f8ac679f5095f129de02c5a32f07
SHA2566f72cfade17f7df8ff38234bca6a2505a88a9074a8471e1f355767a427e157ae
SHA5127b7914b79343a74041ab0514898f8cdc0831a3a92ee39e6822304751ea4e0a7564c6825759a55b31ae527da3cf8ab19f237025e94a8fa64b99bdc7ac20230711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7afa9801fc6826ccd6f9b2323571fd8
SHA121f63ecc11f5e6649738abf58227f056367831d5
SHA2567503868965bb755e43564a79f9bc16849138ea9c18178dc3f9d36adf3ca40004
SHA5126fa0e55088187e404a2e58433539f7337898523a34f9f140d6d92ce5f9d35d30b2fdc18d6371bc3451c0d579948f7cd410ff1eb07d92dc2f763acb4d0cd1b420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ea1b612be20384ac3734b5dd96b741d
SHA1f1b65fc100155b6bfae4735a90a3791029a27b28
SHA25670f21d5032414d284103c5863bb523bbfc6a62fe6339012fa2a8bbefec5a9209
SHA512b9b0ca5aceb5cf1ec5a137bf9895f7537738fc6a3684a527b8a3fd187cbb6d7f5311226655fc2b216c44f586d011ef57110d06b8e1a19361310a869c59b1184e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c817a978536961fbbf14c38ffe1fa544
SHA1f0fc76ff2f33f793e407e9923bba1c6892b20dac
SHA256de85734ed0c8d4a070fbc3c72a7c40514cb295434cf1a4c1c7ea3bb3d84deffb
SHA512cd3681d4d22512e5656a8b7cc43aca97ffb6f66d6900ec806209a4bc4c4ea2df37873a99849c477adeca72d4358f6de561e26097e23aa5bbef6f84d2985612df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5162cc9d36f91e0eb362e2ebdfc117c
SHA1362e8dd26645529340311bfa25b3b9a4e7c4115e
SHA256839c7134650271cdf2c3fa4df68382c7215ef9dbf3c7e0ca6cf5b45547c5d843
SHA5123d6937c33a9a853d87b58b7aac17d4beb7e1877592971e611760e5c9056de35e5d5e240f3045d8edee1c869fc46e114bfed46511d17c92fc02e6ed776344cfe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec8965fee06170bc09d00d656f94225
SHA1d2d1495993b84493a2192babdd0e56481090d17c
SHA256a670fb40a44e91e26e2095e57d71ad4de24a15d166257f9df8cff3b8cb092075
SHA51242b78ecc6ae635f4607f1c5549c7311284c9aa88665e4f66e37b05b0c6840827b68c033015549b11a13f8d4019d1fc778c87df2516d4278da14f8ed556258005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4bc2b2fd8747285b6c2767d42852bdc
SHA1d7b3500bc0d7acca40abfba719b63e37b07cbc47
SHA256bcce937bd14ccd6b3519e113f6dda734ab48bf57a6bda41d717eda469f46b595
SHA5124ce76e4ee83b75d2720b57be3882f202e645e117b894dd59e89ba470e05c0759b2e690c6c11dafb2a61ddf5e05bc6cfc8ce007c11e05aeede2fdc07732b1c67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578bf0fd74f5100d444fe06cef65a4006
SHA15bc7cd4df1365fc7a01e1176941d4a9276a97c44
SHA2560f711ad04820439bb8b6efcf2f353ff25eef065950d1aacce223a7b7aedeca04
SHA5120d1f556b74cbaf28d8ae2d8dd21721c04d24f2bf5f21ec6a7a14aadeaacdefc5f73dfc9d40879d98cb52f567b8b88cf6169ba696741bdbcbad76a1576b519b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580274f0573e7a91e8cb2c19bde027bc7
SHA1b34c1463429dc68a1cb5fc9ab66126e8ff4d465c
SHA2566b68928fced4d85fab6ba2b0104b7acf6d94ecce73a2b4819b2cf4895e0fc1f8
SHA51295688a3908138848de138df7a7ead4643e0a157a07f142810d59d415979ba9237add99cfdf65ed7640ab9eb5d507b86f5eae433f60403597dafab869ec2ece22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fddd2c1f4c4fc2c0e08e0186527fe59
SHA1369d67dc3cb7a5bd1c342f5bc863280634cf71f9
SHA256bf982ee3beb40433e1e1f8ad1b7ce0d8b080b1ef445eee71474e63424a91f1bb
SHA512f7f8f644df085a174e4aaca2a0425ecdf341e168981897b9ca51691adec010ae6b7336286782f7896f6e9280ad3ea63fd6bac86df03c51aa3e5bf1f5b6ce264b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641f1c4a4a81c13065bf23e84e4733f2
SHA1bdf9d108678cd003560e8ae9e0fabac7068ec34d
SHA256136703ae158a309fe1e115156c4b5d6f15dba299fecfe0693785f48676310ef0
SHA512e5a315cc9907a193b046d557a15ae7cf487a8d559aecc64ec4a3dd9a93f55d086d97add8d6fb5b734fd907ce30eeeb6191891bae0343008a59c6b9ce1f8a3c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529bab2e105abaadeea71b2f68f03a699
SHA11ab10b0a35981858656d00e9a9b4c966f9802b99
SHA256eff0e150ba70b133e17bc05dd3b43a13e1c0ae39dcd3441bc23ee171bb88f46e
SHA5127675c21979a13a505ce5f30b684bc1ae01abced31cdcc7e8f479333d83624b94c8b6863b9e350d6b6356f8580de330937cb660bb734428bf97d161d68e47394d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b