Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
dc1dafdc84126c489a3c90488739cbb5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc1dafdc84126c489a3c90488739cbb5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc1dafdc84126c489a3c90488739cbb5_JaffaCakes118.html
-
Size
4KB
-
MD5
dc1dafdc84126c489a3c90488739cbb5
-
SHA1
60dcef6cbdc5246601f69ab154e9ff4144d6067f
-
SHA256
1c90315cb84195e24cbe1c512f03dc5f21c0a68388f694c4dc54cdbb8106a0ba
-
SHA512
5335bc3456198d1ee11b467013f36a633ffdc7dac47dd7c282619222b7d9ebacdb8e6871300616928f660b745f5f254bf14d3cef6f3abc07b433307184958047
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oudCrzd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08518adec04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000046a7f9c06d179af5772c5f6fdc520ca35a849256f5c2da79b6d09d0af9e20d41000000000e8000000002000020000000b1b898fbd1594a3af046696ba9230d3c7b45cb729763f652e2f79c1315c3bf4f200000002f183b96059ed84c05aa95f7d5eb978313cc3b1dd9f84ddb3267c4f9b0c64c3640000000215497fedca3f4abed559787f867305dd7cfaa65f80a5e18581a1aff137e8d68d7689d0733f57fe064d2de6a61e4c36198cefc620c54d5c096c0cccd12f59aa1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432291085" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D869E051-70DF-11EF-ABB3-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1196 2168 iexplore.exe 30 PID 2168 wrote to memory of 1196 2168 iexplore.exe 30 PID 2168 wrote to memory of 1196 2168 iexplore.exe 30 PID 2168 wrote to memory of 1196 2168 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc1dafdc84126c489a3c90488739cbb5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3299367433a7da817dcd74d6752cb33
SHA1dce85ef42e92866bd1d6a339a25c471fa99077bd
SHA256d9833a04349adc2dd10e7f756501c421f84a38bf6c14d5687814a7f4785d4aeb
SHA512d786faa3147740cc7a9c32d56cab4d30ba94024d0260fd1a69dd58939860002cee6d90c78a561e2a4061aa3b7f51e924942fe93134732577d431327ca9993c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc137aa12c1e1867284310f3392943c8
SHA12f0e794575e86b7bc1cd8d4c56b8e24b18ab728e
SHA256fa2f1057afad10601550d64b0e981667878e598c19ecae5576789fe7643ec91d
SHA5125e72e3b13f1bea07e3e2f69ec5dbf2bd6aec51e62a49e82a125c1c56be1f60d36084a4fc36165fe4dadb10a70e0512f6047ac4dd3bd1550e06bf7386a1c54903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752b7acc3ebc071df0153ce354874f6c
SHA1c6e5428543930382077fdeeae1937b1c7986950b
SHA256381df3b962686e21239c6984febd1b85b86726a018f91bffbded44bfa21b0842
SHA5121c22e1beda6623ea751963c054063cd9cdd82d86cbcf438ebc72fdce023d26d76c6782c25249fa413dfc4993ed5ba1ed7be02a3b3593a4af7c9d510ed955b20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1728268ca3d4bd8c49a8c544490487
SHA1a9b8a3bdf54bb54c72ab91e4857837f4ca8d30bb
SHA25629aef516afd1bb2240e1238e5eec76d6c07e9b5ed3e3ab494c1648bee1fbcf99
SHA512357a7f8adde410334d2266a23e6ee36bc19f3744a32d8d8127d74861b61255017e39a74733b5222fcc059f872b83ef76574795a1fdc7bea4265f940a701c3323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efb236bf7adeb5e55979fc2525f111e1
SHA1af46033d3f9af9f3b8e5ff17338bd24b6fe65962
SHA256cbd97b2d512d93e3317affbfce0fb3686f19cafd5ba0249d9f1542ac9cb2bc8e
SHA5122e132cf773ca062afa9bfcb60b684c4729261abd6a0e52615633e0d8721d8d8c8b88c20817b9b91950b5f9cf239e10ee1a2e9b00f75e828fef9e9600b7b035db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ab6903aa34c20562a1b1c5a6553b43
SHA10eb28cbfba214fe6ee355eecc127006b7510ed89
SHA25644e8610d262110530a60f0d02925200ebfd177ac097dfa5e63b602f16037161a
SHA5120b9cea64e8d8e5f00467096a77cfcd7b750d93bdd4924d43f02b7fb7ef903c339b9550594af828ad1ed15a6dea349ed2182d4460c7a4ee8eb6b439ac6e71b1b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1dd70a0b826ffa3f24f5b889262d2b
SHA1c90dda74625749bc589307b0d8d38d502283ef2d
SHA256baf12d5ac41fbb1c90d69628c4a78951a5d7e6ed361a32a3abc6e49ee3b30d8a
SHA512e0711d737f49139310c5317e1c89076aabe4ea67e143de7addcdc246cfab8e10bb1aec828928095e346df8017be0255e97b97782cdab5d56e2a362a44593cf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f7db3b1d59a8f33b8ce59ffd644cb1e
SHA141440886a504940356819cb28d7559302339b13a
SHA2564740c24296c7e25d65a02be6d69658131990f45e4ef31c092feed15d1ea7ef8b
SHA512b26a7c90f0d9027050354387f82a2d8bced3102702625431403230f352260b5e80200a8b6e4a5ca1018ea0545d4087a40fc5b2825a41d7ff802a67f97100f732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b26792925df2f6aa7d982198ef4c68
SHA1400948028b7643978cf797acd9d42da863f6b5f5
SHA25627c78b0123f5ce3a14dedd678db2822845c2cddbc13f860b10e0587b37867143
SHA512da040e801cbfe565b595d7ccfd33d25dd574da1e990c7b2680c9781bc71fe50520be7d3129d5a5de8d1ae8e5803aa65f27cc2d430087bed32265f97764f5393c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d045b51f56bbcc736829f7a4309425a4
SHA11dd930e1b0a6437f70a600e8d3ff1df737ef985c
SHA2568a861892caae106902ae14dafc4440d9b56d163ee6aab9edc0a94d91ee8eba0b
SHA512b17a621c6c6158025768c809e817c42cb96156a5df76f3d7de4ad9eee7283e86b052b8546de3f730bcd3876fde11a268a353875f5708bb9fccd0f9634a78e239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c8657a3bfc0d18cc9f9945e6b12e33
SHA1e6d9ba95e4019c053138bc59c79a62f7362504c3
SHA256d737f665d610272c661163d075e565be42642d84fe8f43459a4cafc0de9d6c68
SHA51295edcb08dbda41d2aa55806554be2103fdca0844fb14a1b0ec777fd6b5746155bda2c339e4e2cab4d23dc6169c018ba09d62f906efaa3eedce93288d1781526b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3940f4e1cf2b321ab01d8120ee7f9e3
SHA13890cf10c0155abaaf4b3cac294f5466820c714c
SHA25671695046b8bafd480379ca3cdbfee3bdff55e656f4d2f2ecb7f565daf41db847
SHA512a14f5e737d7439e8d74f9fe1d88068ce207291a05713a1aa5c3e6c33c4f963f7cea58478e204b7216bdbe189f2b67a58adaa450b75a020b070e4b329b0c41ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5564ee677cc8e8e8b178e7223f2a80eb4
SHA174f02aca2090c4ce475d96d0b854c6981e42fa0b
SHA256fea6e31185a733a81e03c7ff55fd71d22459b03f296b599609ed36605a93acc3
SHA512cf130e125cf9bfb975f1e0a7755cc7cd999d531b2713c354944293d7d227a539a6fc66ea11837a8e1b14fb53b6ad13bc89217aaf5ecaa840ea4648bb8aeae9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efacce25540905601aeb2d190cf0b496
SHA1fbed8621bb735231f9f6994a87d93030f950d1d3
SHA256662d6c8f26036d0436b0ee81a86ab9b837c32f62705401d2c85d5c7815b7459c
SHA512702767b7b2c12f23f108bd33599bf380a6cf9376cfcb3ac6ad81eaa70960148cf6f24139ca0520b1c4609cf38563b337e4a648f2001fdcfaeb606a057f950cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b22dfb6f9cc19d57e4ef4f3aa172c7d
SHA19bfb69ed06927cb0cc9fa4db67bca72965e4d021
SHA256ef96098d96e85a08f9bfcf690e3cad62cc811cc887d0ad3c0b7b3362fde7286a
SHA5120d0c5f9c32b4b9b38221ab52d395ad3da63aa34883f728e0139674dbcf3053a42f99f946af1560087b81fb4ecd18a74fefad3d20b554c6df44943bd187f1eeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc228c96e00c2d90f9961d86b58b431
SHA1534bf9dc4c0908107c9f8687af3598361a2a8993
SHA2565bc48fd5e9ae4cf1e4d1d6d495c795aeaa107a77412754a88bd1d753b0dcc180
SHA5125205982b46cd195832e4a14f62d790ca4d33490cf32e10391f50c8000aadd569a4b1e5f723a6692bc9636bdfa49ec23c4db6b95304a80306333c7ecaff991edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56159c38e3614071a50a2b012678bb623
SHA1d2218e5b4df6a5b1bf0178f8aa532091fcd69517
SHA2561be955124f3ac2ec900b7d206da76129bd1a00c4e60c95be9abc836224de638e
SHA51286f79a9272f4d802438169a5883978c32628ca81a2567770b4020a7b8862101640625c06a646223ef618c5012cb7e4bc56efd2df06dc04d7397048ae77090d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511f4952c5d46362a009c9eec1f02b6b9
SHA128560690ba56e86cbe1b00a2b832e106d471f1bf
SHA256f3c2d5bc4384623ae48fd2a4c11fb7a640d5de51558bbe6a109f69f2ff65ea2c
SHA512fc931f207ceb82cd1751a945be473397735202a6bceac78a888f54708b2268f1d343ae2d92439a0d074acaf4fc903e08238c48d66a00823114bd2b58721a8f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63da78ca9b220fbff24d42c78f91f5c
SHA198910306e5ef0fbeddc86d6de383237141f73edd
SHA2562ce30a91a8c44d52eb975088989d32472acfcbdf7b9e515c08b217575a590317
SHA512616e1e33f299f0be6bde89d4432cc7e6a707e6c224c2300305cab38e41b5b8c15c55ec4c62fd824b779b1f83f439a5e147838c25d0c8194093ace5a0333d93cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b