Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
dc6009f238d852a0741a2c2b6109e735_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc6009f238d852a0741a2c2b6109e735_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc6009f238d852a0741a2c2b6109e735_JaffaCakes118.html
-
Size
58KB
-
MD5
dc6009f238d852a0741a2c2b6109e735
-
SHA1
0c3021dc7ab6f393f8b66c120a77007c113cca7f
-
SHA256
1997f07181ebe1eb3f6db9cf24a416a49ab300e220260d9171c6046fb5ff3bbb
-
SHA512
328c7873cf4e9715650d2b8ac8730bd51584339a6700da20b091489a3f88660949e6de2850062ad8999f4211faab27cc7348d9d1287bbb3c7935ce69dba9c757
-
SSDEEP
1536:gQZBCCOd+0IxCLX5zfIfBfYf9ftTfFfDfQf8f1fgfMfOf/fHf5fvf8f2fmfFftfk:gk2o0IxCAZwV99rIkNY0W3fxnU++d1gH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38DACBF1-710F-11EF-B60D-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432311436" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000307b9a2c487f448f7844462c0fea2b4cc31bd00a749979eff005acaa9ac655d3000000000e80000000020000200000000a7e7c97cc3709ecfb86395f93c23fcb300c4bb436988b344c5ee6d8691b7fe6200000002439b0ffaf553de57cfd5ee0503e1df43a51f0eee115252bce51d3610661402a4000000011b2110ead2667972eb822ea472f197e0cf5d45052e7bccb3debc141e355a1ae7e2fc70c34d645c8e7fcb42545a74b71b852e7b50ecab0eaa562b5e7f05905d5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b24e1a1c05db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1072 2404 iexplore.exe 30 PID 2404 wrote to memory of 1072 2404 iexplore.exe 30 PID 2404 wrote to memory of 1072 2404 iexplore.exe 30 PID 2404 wrote to memory of 1072 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc6009f238d852a0741a2c2b6109e735_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505268b439cf76a7567f5f28791d73cfd
SHA1dfae0546f6775eb7c3e193206aec1d32f4b1192a
SHA256295340d2e9081e76e92f404e5f0b8ab7ceb5f6d4082bd5da884a7dc85faadb81
SHA512c4c6700c818c2f8b97ba3bdbe7f7e9d464c70b1dadc3ddd98660a2252d4d52316d639915ada47c8f9ff7c1418468212f0725a7f60a11e23dab658ae8daa141e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dbe706b27a2d14e5e79abc361641a06
SHA10a24bddeb8af353e060965c9cee11ecc597eae80
SHA256b522af4069b795b61b5f797641d023f682aa9114626e3a670da49bf2547f38e7
SHA51215948cee25bc0a2c17813e98af8dc328da6b0bb6fdadf11c8d573f9bc141c9b9f1bf333cdfe2f49b99ccc82786deca1fc4f790a538573ae8ffe707c3ab4e5b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c38284f6d05f251d40370237b189a12
SHA130ef04538b0a6a666aee79ecad3685ac7059376c
SHA2562c145516cf9be889cd65e61ad8635603a31f30b6a3e5ab91e8b9a4fde9b8414d
SHA512853d0e10c17f291da05d3e93661543993478715075643172d17eea9d4edf20e0332062cc550321c74137f3b330d93f75f3a18298af6589629ce144058b3f67b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ff4764ede8591dfd037b3cf4a11f80
SHA1e3e1ab8d7eb75e52d035a7558c77124518c13453
SHA256d02367354320c488af63f884df3f6fd4fd72d9cc784f51f6c0871c5477fd0448
SHA5128301d951801a7cc70a348caaae7789e78d501804d1d94af0c3f4e0e3a37924fcec8a1edb2592a170ce78515b31966b7625d0ef60eff72273fd0ce93746932cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f680dc3f1a7bb074ffb11f4573070a8b
SHA1aacb3f6d516bbdf2e96d236f040b25fb2648a7fc
SHA2567eee6b359df84e6b35990d56bc319437cca3ec994bf4a40fe91a9ca6abc01dfd
SHA512979be57b3104ddcf5f62c7ccefdc362ad88710d3f370cd14c53c414cc169d02d6df3e0f5e147091c3e8e024a3d2d0a11cbc735dbea538b00c344a037eb76224c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4aa7dc83228fbc25dde59c3c97ef29
SHA1f02df6a99ba1d428aa554336910ac62ac907398c
SHA256ab366e3173ddab38b566a71710cad5650b53ce6bfc0a429d8dc977ee0ba7c955
SHA512fee0c81b8740057a407a283b9e1e9797accfaf622b2616912a945239e7fc226293ad259a4a3d95e366b5f9e1c1c828b3105f8b292c4438564bf1d96f728651d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af9e550d52d633840366ef993694f3d
SHA13e07c97f79b228e2840dbdd5c5208874e7184b49
SHA256d500bdc269fd18922427a134eea5cc0518f7b1743697ee20f20dcff44e28c299
SHA51265f63ec9a9d0b664fc96c160c7a24221ecbe1e50e320a5f73ee5a6449682ba62183f5d4cf359135a1a3f6928c8debba9237e6f5cb381a65a8467068317d17d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58702c89cede863d704cde20e527db34c
SHA1957564cc7af71fe4047292517419f6f6e41adfc7
SHA2568220f9b06ef7f4cd1592a76dfbf9d2f7156fc63b262cad29e78dc20646807797
SHA51207ccf1ac9a47866bbeb9edd9f12005412b269ceea2ffae3ef77d9d65027e3b753b8bf895e7e322ecbe3a05094ee8fc7d70e016e427b9ebe6f9a3188c56d6c96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a24b4fe2c9922c3e91e863c72b1e5e
SHA124bc92570a1a157514c2addb912d3398ded58fa8
SHA25622b702146bdfb4f77655efe227d61e9592609882c95c4a71f667f19f61dd74cc
SHA5121fa6e3c707107e243eb810c743e65978638728447454f02bdd0947d46125ad861161cb11ea5eb8b56632529e765515fc976a93a7048fd6e4bf5c4ff5aec8112d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b00ca497bfd96bb84f09016f3a0d91
SHA1cbc052df6168ce4920ab85f8c1ab8e4ae97bae72
SHA256a5ff2296e1652679161e258ac8510b7c78c827b64d2724847c51168fce673c71
SHA512b1343c6a6330e833f7552db75b53e365e19015d942e1d26c8a27c5fbacf51840f5441dcb0a48702d4589f7baa92debc2fad449787dc42c1e2d887c86aba375c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c5ccc5ebea3facf636a904c5720e2f1
SHA113426cefa826f1bc935bb4822ca6eb9305d74cc2
SHA2567464cf2c32cdeb25cf1650a36a2498932418e3959e6d796f171f6e47740ce2c3
SHA5129720992c7c6215d8bbe56c4532c1ccb23c1b6ea73f106d91002d8a7743583c8b0bdc44d3a534bf067105d0af495d3383f253e1c1d76c0d4c5d0fb04671eaa90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556918d6f2a44176b2dd8ec657f2f5799
SHA16e8336f3011e19592db5f264ce0ce72e2ec167f3
SHA256796935c262c8f85a6d2972fab2d168d6d57d58384a0f46073c97d9b358895a26
SHA5126127191eabff0a5baa4adf75940457b653bcb74a4c17ce670c99ef1b20f4c015c54e7b53392481dd1e9410876b2944f660b34b2d3c2fd7636995b82328d9e724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5884ae612fb89d78855040f034ffea450
SHA10d4ae6dd9d957a514ec11c0bd11f0b44fd2df368
SHA2563dea72bf55080979e3e509f0d1cd696f1bd409ad2afe50574c6b25bdf512b5ff
SHA512030b92b74f0045b1bf007194cccd17f7d4e3dc6ed21f725e9d7c557420f25cd9450c9c1748fa03faa25abed978a3bbc70206f937f890d7336053e0794301d2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f455c78ebcad7300f58c17ec62edc873
SHA1c5e80622e4213b95c68f92b6946c802ec7f9a47a
SHA256fd26d36f65928c03423dfcee8682904b8b9000523c1ab2c15e9275c682f7cc12
SHA51289a495d88a99bf78c341aee8f0bc21512d887b190fbc8a476172f680c8a59731e957f73340494e2f32c632b87eeb2543d238f0fbcae0b49c8cb63cb4258e7c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c092e7558f5ac340fdaa06a270108b73
SHA176d60534f3b1286693e2ca80367b224b1ca085a0
SHA256982c35f209d0b9cf3520b81fe427aa7c7434f7055e2135733f728722b072583c
SHA512c7aacf23f67daaaa8bd9653a66dcdbdba2675276efb1d0fbe862d5f6a91c528254452fcfc21e276c7277b8d520362ee7c3d649177531d034fa8680946092ca6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba842d0ca7eb068a15f4fa804fe96a7
SHA1c325e141580c2e28abe1b02e10d1694979ae9867
SHA256890f139db3ab18e77a8a30fa3f8e3cdb12206764af0bb108870114bffbd6a946
SHA512db836175a7486a4280be40ecb54880eda59b90822ba6d8550671edbb1c4d4b4ed4379566177adcc3b936eb69faaccb4be12d39c678afd5d0d8a5b31230777e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5917f181664bf8e2414aa41c3bdee51ac
SHA1873ecad7c333049ff549a5dcd5f3f7839c82d16d
SHA2569e9e63d41bf530c1e23091b12b97a01a090261f8cf570aaebdffc18c70579a34
SHA51237ce36cd3c01d50ce0d5e70411f982f7110897cce1879bde7eee742a231501193dc6a53f45b5cf02a7005df4758266254c91266b664972fb131e3277c5f59297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586732cfeb502d13ab652565927f169b9
SHA1b18b3860c604f8bd3b3496b4f5b3f2ff7cc1f583
SHA256e5b627e7fc5d85fc0c9d864675ee796313967bbec1fdaafdf17cc1b17e8ea133
SHA5120d1f9605ad58c8fb6180a4a98e4e509f60d9cf8cf4050ffa2c137ef245dfc3dad29572e49dc9612a3e3b838ff5cba532576111dae2499a08ec84a6b517cdcd42
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b