Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
dc925021b5cd7bfa291188d131d26e03_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc925021b5cd7bfa291188d131d26e03_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc925021b5cd7bfa291188d131d26e03_JaffaCakes118.html
-
Size
36KB
-
MD5
dc925021b5cd7bfa291188d131d26e03
-
SHA1
7456415c0768eb13bfc0436a9d5717a59f8f7d70
-
SHA256
0e5e20b530106ece76fa4abd7526106a20489d05859cb5057442680b6de3d332
-
SHA512
80ce3a5c169a7c86c9cea03f2ba53870e40f04ce90559883ed02d51de1e7f2017788bc5c145008c8f0f7417b910ba8d67dc80e4ee631b38b5669a4e0b318cad0
-
SSDEEP
768:64FQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34a3i6781DdRA4vEOjq6h8aRlR9:JFQW81D4RA+vEOjz6raA7IayC81DdRAW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A46A561-7120-11EF-A2A1-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b2a0732d05db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432318899" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002b908bca56896dd62bf1cd06ef60319d72bcb000534c55d2466bebaca41e67ff000000000e8000000002000020000000b855869400b84656640b1f2ee647e717e0aabfafcfec0e8946db45de3e872d4a20000000ebc408c19bea6d3f1d2da761c208bd9806110a649584c1fcdb1e7d0fb22e5cd640000000c96c1654b9fafc33ee1619ad84d30e8f2f456ef691a2ab3d502205ccdf141cc995d4ebd6ab233f3a3f928986fecdc1488cbddd76e827e82cdc76a1487ec2c1a4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2276 3012 iexplore.exe 30 PID 3012 wrote to memory of 2276 3012 iexplore.exe 30 PID 3012 wrote to memory of 2276 3012 iexplore.exe 30 PID 3012 wrote to memory of 2276 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc925021b5cd7bfa291188d131d26e03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e930ff18afa14780911e1952a900506
SHA16f97f332890d2a704d2b80c1a501371f51c64ae2
SHA25671319a2efa6fa0c1134fd897e0c56aec1ca6f481c9ad4e9ef22e016fee2cbc90
SHA512a9493d47a62ec7585bfa767e9258634db5da356d34f06a0c61e55cc551526a4152bdc79c22ef574fe3fb224625eefe83f19b7ba46801ea6bd83b376d74991671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189f7f4baac89dbd152cb288e6af5c6e
SHA1df9843a174468063abb572cfed0e16ce74da49f8
SHA256195ad804fee394848da49b1b5702941d6742d56e1c01d7d650edd499363f3139
SHA512a1b85b1399ef9dd93a877d2b1b53e56e75fc89e45fcee2001312731ddc8d8d9dd0d9670be281d8aae160f527272e376495f4b385778f02c351b4026e549a7a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536cba1472431aeda1e304afa213001d8
SHA1060070fdd742db7df8b4ad86544ef95382eaae19
SHA25606170e60b09271d379e4738258f840fbf64742cc5c25c7fe778938f62c0b7d85
SHA5122d1c7e75b64bcefed72d4ac3fa849987f7be3e7c08ab162d4dec02669ab79fadfe3444120487559d2ffee4817bbd3d35d7b1e6faac174b3808a4020e7b4bfd09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adae10dadaede68f5744a78d2c71246b
SHA1ec90feb28f072d34f38416249f0a9bfc8a310e3a
SHA256a6917762617da73a4ee107a6969428ac5cb30b5dd4130bbce4176c23cbf14cf1
SHA5128648ec40c9d4b9ffcb0763684fcfb7856861e8e0f96ee39e80b95efb9a76033f716169ee32e53f67c22fe1cd22ab926924be3819d6a9e4c37550cd21281e821a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abd1c88ea658bdd0be3d9d6590e5109
SHA142a7b4f88e4134e5f79cab53bedc012b01f77e57
SHA25645b7417c06c629dfaec00d4d739f489954e926dd28c6a0f50b90c945329c422e
SHA512222fa5254e6b914b171504a2e3478a754464a9df34315137a4121b732fba29afdc67cef2cd1ff20eddbf605b3a3a74ebb285278a9eb118876806317691d9d81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b45879f1acd9b7d55de7e16fac47f8
SHA1410d1d38ef485ebc88e6cde8562209a817e1513d
SHA2565fe6392115e4ed7bb50dd69c949c9971b14838131f431cfb0daae6d1fd5fe32f
SHA512db4382c41df14c079a6596f3af01055b628f45860455d773a573f70a72485a3c79afd9b4fa4e8a80d16720306a993a93ad86b20c4163c3a29206eee19f5611fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047439187390aad7fbad3e21a2aa4c77
SHA10c8981f48b1ef0c77317793f6d444bc73bcadd7d
SHA2561635365d5ee923b06c9407a071eb5f26ec8638410a32c8fb16e19c985ba8343a
SHA512268d85d24914644351f567ccf3dbb6395620037de6b256f181d267bcaeda9fa7b9594f0acb1dae37af67ea12f2d884ee44bff7909162108336499df4b0cbde64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689f759bdec683c184f0b35b866e7df7
SHA17826934f62e050ffcda2632fb8c61737d7a170aa
SHA25678629543f23fd54f2028f8b2914b858539dfa0aaf1fb8147532a5cad25c1a390
SHA512c8d8a176d0516be798c4fb179b8fb07004878500ece955b8b676c31103bd1cc4cc7a913c6da940d3717804f230ade243c1582aec113272949c36403ae9e44606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c5c5aaa30c3a67545e6fcc98b60611
SHA18de7578a77f8feeaf13dd0d6879bdf939aafa411
SHA256d8946157d96324af08c95ca83a09fd3a4640711ce3f0f7aa7233d6762f98360f
SHA512e5874412add354ac6ece18130dcf0c6fa9fc36991d258be3c3a415f88820350a590ba6f29e4608043c92c0220597278df5a1381d2964a9474a7b6e2b7e426095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522fd9fc4ee894625736c48b7c7b3d601
SHA14ba3870850131d01782e30625fcbbe937617435f
SHA25613ee3def51e4e035de37bae427caeef982d1773b0fad706f9366d16c0882e732
SHA512d866fc800bcd851b22b08895c13c19ff49fb9d9b09de117b494f3846fb80b0a53c8f2138e6cd67d0e4dedfb8907906d7473a57962fa3bdd164329036e4b76123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58400f25be0486752ccca0645eda1f93a
SHA1ed69b3cb578a9e8514c581198a1ca2ab5d04a7cc
SHA2561cd0f116c42b679470b7320461fdd018b2673a27eae187f9aad20a7b1d812486
SHA512e8729661d08fa75c5561ded61437c4eac9d0f072e5e7fe012d5e2f55c5666e21ea01013591be41a858ed487c54bc2034a26d4dd215b142fcf8016bd56ae993ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd3a2d83f38e41a1af2557686ac3f570
SHA19f37ea9f44e5e225060ebd7b5c2a2df464127699
SHA256a963c97923e3916e93b92e4d3fd5bf1edc3d3862ad4c7aa44d3b54bc3c0c49db
SHA512322d1c1d823c5c10892b9abe999ccd62811534999c2955ce9026baf709fc14ac8ba6588518bf9fb2952ceedaa84f89d3298ddf43efa886e3f1db2fa20f285be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3add3d9e6668e395fd692be65ce7d4
SHA1e00fdaecf2a44fbcaa3052ad3759772069309047
SHA256743b84bbdb41fb9e0aefd9d67d869b3338a3d7482dd3a9d515f10eb38fc94fff
SHA5125303d65147f200eb6dff1a63abed384f45dd1e913d2ca2ca1f6d5e58d410a3223a46a6e5d94bfa792fd80390d350ff26dc677e4d5d636c1a2116c196e8afc026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f5b6b3c42316c309206a0f5888e027
SHA1bcbd394b35b269633c19934ca5f5639eeb1ffc98
SHA256415ecf516741e60492eff4531d7b86a756db8c8704b360f9018344edcf0785fe
SHA512a93f9734be8ac810c7e56813b0d723ec8410ccdf94dca956ec5b82635ec4a50bd0c40c34a55d61cc0a725818f3747b4bb45a48a015d6bacdb0f70ae5983c1db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c266d33519319288b3761063696f33
SHA18c8297b0aa3a1c957d5427445c2a82d8ef3a46f9
SHA25672479cb604445cf8d3bc0e6f6a04582def04d7807a1c817339be21d23c62b32d
SHA5121514306d764be74f6ac58094f2f0be40167b4b0aa529e80f1be1fd9ba65b013f7231ec5b8af0e69f00e21e981f34c7345881c024e486ceec958c90ef646869da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5ade831fa621f2b08b0f24c2f8469b
SHA110e07265bb00c845327ebffbac4422e76ceedf05
SHA25627f2921ee274371c26ac177cb4e0677351b1b6b3e79b7b82e083b1e5f899ddb3
SHA5129f21682581891980f494f9d756a13773d2e584a99f43eefd7c7da4c964048c91c87012a2a0e4355d0cfb9d2adfdcc849a62d4c6da2a12b25d2a9c67d7f9526d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e750fad5b505ce5ebc8c413f3d9cb80
SHA1602139de1042a013db3e2818b49d689606bf28fc
SHA25602262b4f9581368c8ff29828087925033a12b927bcc5178654761164923b90a3
SHA512c0bd659bbfdb29dcdb1ee3099c3a15b78121ec80c13a58ef5ee7784d991796760f99e8f6ad5f391324448dff3b3b44670634dc69fc452059b46b3a0140789581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8aab7ae5135ca5e952b6c0f0a5776e
SHA13c3a45b82a36c76d231830bc3e96706f646611f9
SHA256f0c61d1cf3daa1ea96d4910ff0fef270a0df8d170dc3c9f979dbd9d14f86d74f
SHA51227c3dd1391560765b6d9d2f4787bf015238c86db4af7357e6eee18b2ef2b0f06218a68197b091268e79b02bbf418e62583d8a48e8df78420ea93aa644467abc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6278af721d1bee9fd5c4682f8f5c96b
SHA1142fda6234a62a181a312c2227b83e1d71500e23
SHA2560c8e5936a137b39164c898d8caabd5dffd9b054bd45630e8b2e8a6be2fa896f0
SHA5123a156da7fd10ced5fe36b778b3e9a52e0cb6a4307830fbdd12ca69c651ab1370d1f7c0c99650116a18e8b5beb880f735c99f0ba079fe6228ce94957de58444eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b