Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
dc848f817fbe6a20e28017043103e93e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc848f817fbe6a20e28017043103e93e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc848f817fbe6a20e28017043103e93e_JaffaCakes118.html
-
Size
4KB
-
MD5
dc848f817fbe6a20e28017043103e93e
-
SHA1
3738b30158ca631dda6e903e76c122099abd54a9
-
SHA256
49532d59dd3a719bf3b6018dfc73accc01b8f0e34c629b1d33d33509cce2c68b
-
SHA512
1eae9688df6b1b33060164a53c0e187e4be98af72d11d0a186f3f333c4954a79ca1d7829d7380f6196a09a96cf4352cc79496eca29d667e4331e75791d9f7946
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oY1Vd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9020e0cd2805db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432316910" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F957C021-711B-11EF-9DE0-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000432e0de8fcfacfb43d32b0785eb8512d34717c2fc2b619544bea8986053dc773000000000e8000000002000020000000dedaefbf3447b6d23a5492d262d5b6f86a46f0a43cdca3d9496bf2b3b0df6898200000009067445602db40ddd78d06d10623143488f60a4122518ecde07d8f4d508d51ab40000000499914453bad67df6cf6e07ca125e86ae070d2285384086c623aea67230124f5d1b48fa34efadd0cbc12756873e23e8f70ba56c9fec991771aaba03e6919e580 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2300 1972 iexplore.exe 30 PID 1972 wrote to memory of 2300 1972 iexplore.exe 30 PID 1972 wrote to memory of 2300 1972 iexplore.exe 30 PID 1972 wrote to memory of 2300 1972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc848f817fbe6a20e28017043103e93e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d4eecf633c00479cee46010bac68ad
SHA1d2fa55667bb1488a9324008d30154129fdb037d4
SHA2560ce218c97f419a58c88387946075c222202720808787f130e13c6e42c39d38c5
SHA5129c8c7be1fbba55a4bbccb50c43a8060ece45231c17c6a8a8c9e8447bb06298160f43d1b3d5fea7be734bfd0935f9cfc563fc1fbc3d873ae872bdee995a64c145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ef02f1c3b934bcd69f4b083bec4b63
SHA1b43aa6a205f3aea6e2dd19322343676ab66a13ab
SHA256a5a5def5c5d4090e5e828e3ec1632b9ccadddb79c147b5ad26186392afdd1ad1
SHA512b2fc470daca5f221daf99e9702fdee5e581911335c2e43b6cb256d8c45e8b7706cd5530ad0ac2df8247cfa86d3799078cb4be3b6d0a87af0b40304edc910a72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b02f2ed39038d43f50b08df393fc86b
SHA1e91745891072f75cc293c6bfcc5f13e388481305
SHA256aa2e52f807effcb952d5d5d1a86b5c0c4c8e150149809e91c445d0a21bc9fe66
SHA5123773d7c72d80e350f12d1e97fd18345359b26e287cc37b7bc7070ea3222b14d78d7d7dd5788bd0d7c3d20c49b565ff591b37b0e2280dfdc03de3b1d3873d4a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26c5deb52fe98a067a75af24308d0f4
SHA15cdf45eaded703745426db3890b210ca4f94115c
SHA256d3b832ad48c03398501c990f27aa2b48766fcc6a8e87c74464d6899cca59f337
SHA5128dcdd405bc7d5137f24903e6dd7c8b22084c76ad64f8834263e9f862228b790ace9fe5b1012984d736a3f927b996ed3009b65bb15b3f8825661f45b7fe08218f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee8604895589a132a376e7fcefd53bc
SHA157c7640c6a2f21a1ebf6d310b27320a2fe53a890
SHA2561bd543b3de3e6ab24841794764a5248ad65860067cc93ea74a85bb41c1d03116
SHA5120297c9e1c08bf37237e59c75ea6c8605b1b55c3e13cf06cd214be2cadef5b6dcd56a2845441f311da1ac3c50077f61bbae1a3ceefa7be0a171bc30766c5a5255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3957441f0fd9cec6343e304e13cd4a8
SHA127c54a0b597b65ec0f10b2b6b47d8daaedfbcc83
SHA2564d9b4364ec63918b198a4bc14456cec46e2e51c19a9c32293fb6c913a057cd19
SHA5124a6efaf06ae190ee2254260573c9122f7e533d11acaf4fde7c579ad713b68f66e1c46e4dc31e27502a942d0724c979e06bd9d155fc751c715cbc33c1b941c90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553954048a459a90ac17fad7a3bce5243
SHA1bc2ad3193e951e1378a2beda67f65ee6e1adfd27
SHA2564fb6eb686674236ce5bfd6e88c3644dbd4400a6a616288f60f7016bef3b86c50
SHA51241d9732baf3e9e3100ab8d071c2678001cf5e0f7d124799d619e8e685414ec30a9f105d420d0c3e3c2716eb33f291f18321f015ebb903ebda4ad8918605a8cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52272c6759cbde2068a13366da6950873
SHA183700a48af47f9af33d8d0e56ace025c7cb16cc9
SHA256dccdab465b1f91ac71243f2f893c1443afde9a3f694a6518c3a1f9c3b52ea993
SHA5122af1e6d59d07a90a38cc76f86ca5f198d46b313b03c4727ae82fc5de4eebd3d9be9e04159320186ee96ee261108d14298f6f619577da5c016cc55c972221a5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b4bac862074c356028b5fe2a816dc0
SHA15907335e975e43b9b2a6ed7d964c3b5adb604251
SHA25626419dfe3731c7741b99631684aa1b80f588c5a454918c5f107ed46fc7ecda7a
SHA512ae8474da11c249fdfbc5ce1a10c313c8e6eaed15b776c3a6ff4786a609fc635e9c16228564d7036cb11d691072e8348131ef82a7f72719ef65dea2540104dc6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5965fa98e11a0c1805361bdb62ed32df3
SHA150ba92042b31bdb6f65b7c42fe55fc54f1e92cf4
SHA2560c009a66830f0afe924c74fd0fcb2dfd943fadcdbf5031e322e7ffb28396e6dd
SHA512ed782dd907b8ddb0bad6e9fa1a1ebf4bff48a4511dff965b2267fb884d16510a8fad282729c3e3f1bf2cbbf45d38783206a61ddb12109c98fc604033ccbd3f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc74756511aed182f19e7ea3e4119a1f
SHA1483d2fa2e3c7b2b940e65d3ff99ed8f3c98d3458
SHA25606f5487264de34004e5d705b3e8c9f596bc14cd34db2d6145f32266e2b666be3
SHA5129e7219df004d4da99628dcf1ef3a8514a5ffbe6e1b3081a33543d4f43ce640233a125f3bdaf20fa0d56bad808634759fb7495d273c0e7d743e7f260df28e3b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307c0648136267bf72a3038a07967683
SHA1b961532734a7b5a570c743ae8ce4532ca48ab509
SHA25664be3ad333c5c119b888504d08ab64edeed73605dd74dee140f577bed099acea
SHA5127035019ab95dafb450195bfbb8a4b4152dc4e63ca3a0b0472acdfd18a7b6d3d12aee5d5c2e8b9b3aab9a72c691975594156b1000581acc3caafd87f7fc369875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805019d3541ad47bb2cb1fbf7eacd457
SHA1eeb302be0d085a1827ef011a2f4c2b098ff3cc2a
SHA256275fa158d0aceeaae098ca1e55d78e4b2428739c377a100a5e8869d160fe9b95
SHA51281825439c384509dd2256f4dc6bb75649eaec3a4befd8d676379f2b892ccf13878fb9bca17e56319fe493ff5ea1ad9a463730b9f1161f802bf6622f86e743b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5590d3066d8cdb5b6a0a375ced5274591
SHA1fc006e2ad941e43c2c2246b7545851afbe182ddb
SHA256c26334c55c8899053124c5126cae6d8d2424ebc74daa242c5d0418d93403e4f1
SHA51222ffedd0730b69999c6d9053e9929c5ea6c8912389efb7c1474822b3191a1c541556ad6009e430e38d3fa4bd416d8ddc7ab69cb1082450827061a3cc48ae9172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fb5bcbbc9466d8d6be4be4bce6cf12
SHA143916f8c5cbbe363cb90d44a66a98b6857363279
SHA25611d8888b72472ca318414e0e3e210e0ad23557371ba1ab670471370e36ce0d20
SHA51294633a6679714237ce97f536b1b554377bb0411da6ceafcd7fad6b3b001ed0e84a136412f62c766bdf07ee30094000f08f6090bab853c27b43285a8f9d50aa53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56973ab5ae3e1d8e9a21af562f40b26
SHA19cbebbe9cfe2db765714dedf3f3712cf9f5a0151
SHA2566ce745ebf32f9becb0dffb9e04d24957b47d7d694c6b996daa86f666e4b27c2c
SHA51230fbc8f2d51205d98e4734918e9e9db7945b0f1be51ef7e2ccc9396d72b9ae93a0d691befa9e96daf3dbfe04e80b364f3db48c733ad99c4185563ba7b9decae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b05b04a1d7fe2873bb2a932345f68da
SHA18302f1e2bd0f478a070bc4461ccc6c4d9e811ef3
SHA2563e4cf5f4c1156d5c10f9459128cbbe1af1ed3d53e2736dd20b3386d9acf3c5d6
SHA51221e4b2cbe45e7eb7f00319a1e25b49757f3deecd6fc9f391f158457489a6edabde16a72dbe12b4a66b7e38ab6b0dacf89b3912b1bbfe7bf92ccb1fe3be0c786b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee93f0a629e830e4798b557cde500427
SHA12c624b2b366d0d77060df065ab667f38aa00b76b
SHA256464062f3f8ee423d938f4e8130913a4891521eac27b4cb9226600fb8111aac7f
SHA512eadbb4832cea2beda627077e28b2bffb4a9faad1da5ac3801492df673c491243f91ef041c388ac118a62ac455441cdc1afacf5e4dca95552e5c53627f7369c45
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b