Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
dc426f80cab08f3241e869dde1524f17_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc426f80cab08f3241e869dde1524f17_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc426f80cab08f3241e869dde1524f17_JaffaCakes118.html
-
Size
3KB
-
MD5
dc426f80cab08f3241e869dde1524f17
-
SHA1
068badb8e3f432292c18e73078d372ea70f9e491
-
SHA256
31c31fc9a41c7a6e9830296b52235107b0108783d1ce742a25346a16f4648820
-
SHA512
c34402ff78011d1def256061a42bd7bb390a8065a972cfbf3f70c34b1f16a03fe994abca9a8d3aae42cdb7d415babb48b2f083ac427d39545930eafbb643a2b1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89D2F761-70FD-11EF-A0E3-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432303839" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000aa666142cb07ca2dc6013d0d3222b1d32f7c371383ca2db9688f2f9f497f5336000000000e8000000002000020000000001fa91c600062a832809acd3c4b40ef6514e28c3033a8baa3c78bb9abe1645020000000b87d02f1be4a34de04c9a473dc6d1df41864e8e464c419cd0cb0e43068a718214000000040a3592f6ce3bcefdd369e489fafc4b4f869f198a528c41303aafdd08772ac4173f00a4252e1cc4f4e2c64c6c6847cb9ce32c4757baefa7f5788773606e19652 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02a4f5e0a05db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2712 2708 iexplore.exe 30 PID 2708 wrote to memory of 2712 2708 iexplore.exe 30 PID 2708 wrote to memory of 2712 2708 iexplore.exe 30 PID 2708 wrote to memory of 2712 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc426f80cab08f3241e869dde1524f17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c06debe93e8833b6a6e1fe5b844466
SHA1c406fb6360e37f0d87ab4ed6568b86c8d9b308cf
SHA2565885f20eeb48130eace97fd83626675ee1515f1839ddb74e88a0755fff70c85d
SHA5129daafb61f4055d90ac0d57385fe6fd28632dc16c470b0101a4b58751045cd5e28ace17b014648a49960ad1670a8b5eef20ef101b5e034fdf42f16497ab5ea8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb13867f84454c86a92ce17e190de1c4
SHA1e8b2ed728ec0611f49de88e6b6cfd2e7223faa66
SHA2562341eff6dd77589f51bb27f982716e81a694f6a0daad665328d35efa4ef70ddf
SHA512222f3e9ee70556227735d1d86a289967c3e68ca37ad5918759759bab46a0f67606069ef9e047a3d2c1cc6c671cb7e75bd429e70fec3edd281ed32b2349f95fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51303091a8138b6855aa1e3ad0f2b0eeb
SHA10471a06ba8c6beab3250b87c50a693c6e14d77da
SHA256f110d03b1bf39609192a1d6d039295aec5db6fb0b90867a99b2d514aaf0fb5cf
SHA51286a193daace39667cfffe4df59b62b3c51575fe97356cab95f673f05fc6300b349290177b1da9f45b7cb76dc00c1d978f7791e86e330871452795c64e31b6dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512e5cfa2044ab150edc0ea08d64c5a2
SHA1df65073d5edb360f6ca030201f5ed80629d510eb
SHA256f1dd1386f3492a8739b50ead7e25194a5a8050657ecca6c6f3287b009945ee80
SHA512c26a29ad11488856a6f04ced5adf19c00dfd508e6c6c42ed8f773f79626188df1dfcb5bdcf4504bd2b84758975138a8947e66f4f0f297ffc35855576a91018da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d2827ec498a60dd24ebe4e30270b56
SHA1a503e019975ee2f6045aad7e1014309db6017e2c
SHA256f878893b2f4982474634beeb58d29ffb5c20fecc59718afde2464033ffea48f2
SHA512f8e1deab7d4f651b220b159f4ec34bbd10a70d339354fd680792ac70363f346dd7a9b469390fed880cca9f5f2ad81c796974d64141508817e06a309cd6c8d8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8679fb9b1ede6ba33e4386136fbd3ea
SHA14cb9b57d371295a215e1bd6fb0da66f5c93161b8
SHA25609c484f03c35c2fdb8f45cb3447765dad39c914890927b76023ed55f6ce1ffa2
SHA512a35d0ee6b69f378fe01f14f54d11ca751a1553c51a3837733acc77923df53631e8ac5cc0651b22f0051442045bf8d7cd4b10a939c6c8dd1eb310a1f8d4434a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546091a01de4620bb75fae3531e36187e
SHA123a0072dd1fd76c92b25b5c23803e6417f409117
SHA2560c3306970ddf16aa1c1317774ee6d09dcfc6640c81415538ba1d8d21e3699ef1
SHA51202331bce9ba9fc4cdbc432f6c1534021e63b0930d00b9f30071afea0b87149ccf54ed8d721820f8c989d18a776c73bfdb8b695cb80efb674f63a5371d8983edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fefd017da1f389ec9d6f960b426f7c7
SHA1e37ab7ce9f9bf389258ac01ef25a049342d93e30
SHA2561c4c45cb4733016f2c6dfa5ce15021d1b717e70bf08adb5d2964cae12f10f03a
SHA5122623e5bc5d36eda6a827847e2c581b05097879a5c58a571ad87a71d78cae6d732861a68bf225f2b506235c81c235a767fc7e9bc7842bad4e4ac261330f1b6fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4681888756371f4170b446afb582cc
SHA1d0a9a7804c070773f8737370835a93113ae530a7
SHA2566cdfa5da7c8e28e2b2364921620619e082e7877e060d3a16ca8a558f83db8ab6
SHA51204c129d7039d0f8cd581299cc4c94bec081d045e3167f94c9dc12cde7d261978611c775e67834932043b43b75f033418cb5bc7bed20d316df4b09ce375ecfbe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa5699a1073bc110401a47a47c0b1b3
SHA14e119c78c690c77fd9b38237e93644f2ec6799c0
SHA25690bbd03a6a269a0c90361b461f6936ca0b3b17da12bb58da85ad079247495737
SHA5122e81af6cd5356e06d7858269c52e79f6e764f561162e35451503f94578c44d0505d47335034a95a19a0aab80bb7d23b1da6ca2345edece3e17f61c942b86a015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba73f0479a2ed7a00a40a3d98553dff
SHA18d23b2e6164c87f3a492277fb64ce7ae1fc2a486
SHA2563fec3f2fe7a38035ac617b66bb524e0d7d5a89bb486983cf6398c0007da1e5f6
SHA5122b6c5c6dd3250a93120192d87e463e9c38840bb08d484d13d7108bbdd4996e73cdbb8385fce934ec29f5abd6b1e0005a4e000dbf624abbe51cc0371398773fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d85c34766eb639051062f2ea55aefe
SHA13a280159dd9dd34085fac4d30febd200b84bde95
SHA256b037db1420a521c759356eb9b15b8edbf1f01cdbd081cbcb0652404d8bc4a5d0
SHA512781c3728defc49bc84a5d94be2df01df6b40a5afa9a0cf5dc27e5e2177b0e59c16c5ee09c9381bbad9b82e0e860b26497cacb5cb97fd725ce9daec51cc7042df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b085177745ba81985a9bcdf0de2af1
SHA1466bc2a723a27fa60682d5b81858cd9b77368756
SHA256e98a732c6927f390cfa2fed94478ba31508a35572826a14794028306f32312dd
SHA5127c2c4eaa3933d4a38f7ebb95f4f12735a20013f06ebaf2ce6f737f3de6a380be0f5e9088f14acb6e783ab4093151f6ee573dfa5706ccbc140428bb5caee1bd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e52e93f95545ad77a45af3552bfc240
SHA13bd1ae333f233eb2aa202b5e4e1a285b57a74d7d
SHA256f10128cb9c8a9e1ca44e42f2dbb6c53def0e04d0fd56bb4a5d2ae02996a2bc95
SHA5126c1b3ca9db0e825be54a4be912229add9e1713283f1e9f24e7d7b3742d873572311948aded6f13464f2167d79a7042518b13592528825cdc07cc42ebce7649e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac944ffa0e942e379af7572c97a4e29f
SHA141eb47d9e79e62fc901b821ded36782dfd534509
SHA256aed4c0336855686e476aa95107ed174483987244517247a72418e2332fa05b7a
SHA51287a0a5e584d3f6ef778734d90e4c6089d1b2d68836e1f4d9acca4810f9e51136e200085b11c29333b561d79fbdd4dfd4442ebb81f9581f81be50b88cdec5151b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f7e130f3e5b3976099ef523a75ef70
SHA1ac44ab9071fd3db60d590c66c3f3d8815aae97e1
SHA256c68f133b8127f81208aaa2d58194690b44396d03d70ad03169361793ce360f9e
SHA5122de7cfa205a26aff4fa08f6d1d96f8aed1e60f95c6d8ed26328ded2be18e9ff486dcf23a504b214ba757a46e640bea727f1671c3db283216396ebd9c8b5e0a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2fa6b0bb9e14654f747a02aa61ac75
SHA148b307ba4acc960acfad971f94236f1b6554c3ed
SHA256e90eeeb02972513a10cb42e822a56bb0a76e1e67c96bea36a0ff25b2c9e332dd
SHA512021d734307d8202ba9d32611e01b90dd01576ec543cdccc7a816d573f834d1fe45aedc2f3e34811de1f3f460ce4df6003406be96d0b9af429f99113264aeac23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab511ab2db451568d04e90e03a340f6
SHA1d38a1fcbd40b4d065df266fbd79db078b9b87311
SHA25682944d6f508b838d1843a232acfc668999a52ec948affe5cf61595ab60b2750b
SHA512f88f7637a1e0edde2acc45fc15c48c5f214474ed7463a69f1606978eca455669829fb1a727fac48b0b8d6fe03fd3b386bf838e23ea34dc9ac2c90d517d87458e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b