Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
dc8691e11d260e7179a1190eb2d143fe_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc8691e11d260e7179a1190eb2d143fe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc8691e11d260e7179a1190eb2d143fe_JaffaCakes118.html
-
Size
72KB
-
MD5
dc8691e11d260e7179a1190eb2d143fe
-
SHA1
a9271428023c472e5377ddaa712732c8d3c4d625
-
SHA256
37a651d9906528ddef5937d8d2dc46c67eae3e29be87ce5247db02c5c61592c0
-
SHA512
e97fb01b4041867e369b77bc50b46aac2bb85bbe9f4a4829c5126c538ada5a874929c983bc8a48d3d0c6751cb7cb970ba1ff5f0e7a35b564ff312cd6773488e3
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sdk6L5nHY/TYMuRuYXoTyS1wCZkoTyMdtbBnfBgN8/lQ:J3J1tYTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432317211" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000042df8d1a47fc20ea841dbe0551b0c3fd5b95bd631725521b210c40626f5b7b0d000000000e8000000002000020000000a0dc7c36baa6b6b1814b175dcacbfe0f406bcc894574a7ebbcbb0257ecc8f0232000000026cba3fb426589fa78e6d01b4ef89ad68a1c1077e7c554225a0261d03219ffd4400000004a357a0729376d864348b85c8e6954f155f1732c6028f3ca0cd5c388780be81730a1da4203f452224d64bfe742f96ab1434bf70e53951e8219aec796a87444c8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20cc37802905db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB88F021-711C-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc8691e11d260e7179a1190eb2d143fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d29644e6e4945dad4614a4995a99d1b
SHA1f9439b1391a9d5d191140d23b74a43f9a043e4aa
SHA256506a60c7b42e6a7781756f9e170610bbb462fd69d520328d9d242ac093da2fac
SHA5120eaac1161260c1c4aec616b4165b99b846e1ecf84884d8378087d08fe3b9c8fcdbb94e85b8c8e7824905c8bf3dc432f492f3953dad38490a0ec6297a982df2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa93fbb491f08c79becc9f828ce51db
SHA10108a8baad8e5a3f92ebbadbd539354beb782056
SHA256e4c654a5ff392cd18432a13d6e8c8210c6bf8fac9479d814dd8980ed7e0588b7
SHA512df6a8e297fb9a7df79241a3b901d5d3344d442af5b167cb253eb135380a20b14fe0c7e8c20b6346f3e70ca95d9d6c262d8f7823d0fd1e45f3a3aa3ed68c7d8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595fd846921ac7915bcdee4ed9af65a47
SHA10c7f91f7ec0be31fbe5b5afac7bc3c2f5db50890
SHA25630e678c11f09175797be59cfddefa4301375ea13af6dec2d5054a2553d80bd6d
SHA5125d86b0c69f7c925db344180b276eb9dd8173fc434c933d9c2806e82eed4fbcf042b0eb038cec847ffc8e4af4c0d3ea2054f3c4feb181814ae1457a46e462bd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d3f36ce3d37ef0a145334ffffbec43
SHA1ae469d9b477fe566cf19248d1aa2acd6dc106e47
SHA2567bf149537ec14b33c8257418d495c770925018fe23ec6e803b41e608886c9bae
SHA512226bafa3464b6b861f2501c0945c46cabd31012a81a9a8f903a3a380605d2b87e3376178bbb24575fc73da197d0479b4d886ba72605929128c18e766497d0a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc56e5dc9049b48314760b1f50698b9a
SHA1d3ec322c9eefa2ec864dd9753b905a6407e394f7
SHA256769419f0774d58f05ab9aa340f8fb41dd6efc41c978552a2abad0396cd92ce7e
SHA5128b7e93d9d0a3ecccda22a2fa3ea3eed350b16b9647ed670c6560e9352d0af6d40934de426f4ed14d343461b9ca0c7cbbe8eff1e8853100f81385fc3fc8c6b657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a85b05cd43f6d0c36850b782f8fcca3
SHA139c4fe34740052e45cb1ce683a75b34089d0ef5e
SHA25674d48843a3c27fab1801b31d6b075e614c24d914700c7c741306794d210a9b4c
SHA5121893f82082b92ba454d74e8a8270c988dde9fcc0559324ab0d2dcf24268d2dd9d30f741b2770791324eaf15af7bc7134161597f66d813d5a6bbc7deabb4856ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee68d7719b95222f606ccf3dc3c3325
SHA1d82045fa164f156830868b75b758ffc4161f5848
SHA25648e9de7dceab958c61fda8c2702bc981f889fec56d1e04009623f03dd5654bd2
SHA512d35a8cbef87688607faf3e059b9072895dde4ca45a18a7d6deb4f05693686f2bf6f3622a45a81b4c6bbb2c9afb512019a73e1fba3a40b6e78f5cb181eb7a19de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee009dd08e1a2a4d33f18f60076e0fdd
SHA15671453ef2026a328788cd96080e3f14b7fa1e23
SHA256d369e6810969a4af2ffd2c14a9c99dcd43a3fb7d3698eb81acc6ac75039c86c2
SHA51292b25ee227527cd491fb72e4704c2f1f450f6fb6c47e0bc7e6ad457175eac90cc792a8a338f3dd41be6108e915ccd7aded1f61b7a01420b25410ff1378e4e3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532afb5851d47fa3fcde177c6d49ae152
SHA19b66991ada630b6f8a71585653ca2f0a57afb344
SHA25680ccc8800b3e81ef2b4ae6d36a556ab9b982f4a167fc640d2329ef73b0608cfa
SHA512d6a0ddad050d798d78afbfb977d6f35f5317350f5ae0ba3302c2a674ef1cf4506954b2dde786ebd87f1509fbab27527df4130fdb90f4651d112902f27e0e5689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bdd82b5afbf2084c327c12db7d07a6a
SHA1cdcbc0167e6cdf09997b9d2bab649af9d47316a1
SHA256dcd76a3907a86f2adcc6f69c9d1791e17125d161d24306774695552b934b7d61
SHA5127760d22bb3ef4f85b7023618b7e65c077d6c14da639fb10237ce0d319d1be3a3a02678f1dd6acece2bf2bddac886ee8d47c75d4164cbd145d644e2632cb95f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0e93eaeef6b1601dcf79cb11bfdf9d
SHA16e9bb2b6f7837c3db17cf5b872f1ef9a0471e9b1
SHA2564ec05b126dbd04ec49b6b0f2952ab927eeec5b84df30c673d79f6bb04d1d039f
SHA512d974d417d4b581f46eb91d644febf7f9eb49066a1efe278aae0b385e1431e6b87f4011cb5dd1c5c0926536a3bcfdba3bc2428c9eed8c57b895f21348edff1ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d67633a65cec320708acac702c01f2
SHA1a5de52d195c0bb720ea8c5f5db90a5f2a076c78c
SHA256c26d3fcdfbd74a7a2844da5254394a983643c97d46e4b8c95e6a35dee13116a3
SHA51224e161c9372e5e4c8b4053ed59d6de41664e319b27b572efdaf58fe9c19c5168faf4907aa37c393cf50c278cac48b7257cf67fe8d282ced2d257c7355f1f0053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbdc0500bf451b09987bc899ea77895
SHA122cba4334b3a029094747a544ceddd0c561316f6
SHA256bcf89ea16ecd3bd077b0f005b4d25503b38e76cecaeef0da5fc4582f2e707dea
SHA512e85484963287152c97a1efcac83933f23cf82d37d76a0a285246792035840373a30472a9d6101e56c45c4237e1794aeb62395fff1af63a428fcfc7e3bf27a802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ecd194682872379c8863f68081621e
SHA1c6eb477e9a819602f385b1691774b861f959bb9f
SHA256ea9b1856d70ba7413bca05073178e7410cb9c412ebc3b2a01563c3b70378bbaf
SHA512c30dc0bab015a13877b31b2ce055b49a837250e46587e2459bd26b225939a2247a3aa61be323953db44cc77b5636db8a785dc7517d51ea8283fc12b281b755a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001bbd8f555268364e9c07a3ccf8a448
SHA1cbb85708ecd7e7d16c6d96a2e063be0255d30dd9
SHA2566e418cf1d1b39077fdf12c7b17ab8673b1a526bf94d8fd90a7a28de6c5ef419e
SHA512c5c1439a53ab58c443bdb2cf88603cd95ce60f0d294182647b9cc56ec25651454e0ace1bbdf2884968d7c0a7f4e8a343334fdef813db2ac877bc01110ffbf9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c7a05f7279c12ef5bb713d43bddb17
SHA19b6cc0c1e11208137bf62c7b8f235f8428d2b8e8
SHA2566d7738b9c690db08ca35daeeb235207e82549eacb39a0d1d1af0658a34136943
SHA512e7da63d42fc976f8d73ae3b6bb40214ea3b9f441a6f68e7fe44d340cdb1352167ffeaa28af13a9c7580c5592cdbb04162540f2861d98ca944c0cd2a65d3ec4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc361e3dea9e97a985ce040e7803635
SHA11ae9666234a860e755be9286b550efe165cc83e5
SHA25659a578030972b876e8bc351c87f9f083080b725d8536d50b565b4d28e30d6618
SHA5128bbc158caf4b61a600c792a33ccdb18b9393f88840ecd178ef0cea53508863099c0527628003a6e242d327d90fda984b054fea365f595a3f2b11321fc498f2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c51d322088741b2dda51d8a2c1b91a
SHA1673e93163d8826aac09392a22e2232483500b908
SHA256281b96885985a88730e9ac642957eeffa70d52e279b4ce69b4e2d8d929a0acbb
SHA512e5fe708a9ffbcb855290511338557ddf46d72a1fefc95c2bbae93f58f0fb78ab1272f4e9f2f57e35e550dd2b92b2ab6bb19223bebd224d19e546001681bd1457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a79f45a35c3fc89f2b0fdc8895fd905
SHA1acddbf092da3a93d61be0d19e4b932bb2894fcad
SHA2566a47d9177eff1341057215a157470ffcfa49133ce75144e603f3961b1e1aee03
SHA51202bcbf2c1dec31b56acc8c9e3265badb1b194764efb35ad0f89f67e8a5b7617598dd8cd8cb7982d3b7e568725ae1661627d65fa5fdf4ecb64c136165583b49d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b