Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
dcbeca5c517b39219b6a6aa38d1e5de4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcbeca5c517b39219b6a6aa38d1e5de4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcbeca5c517b39219b6a6aa38d1e5de4_JaffaCakes118.html
-
Size
11KB
-
MD5
dcbeca5c517b39219b6a6aa38d1e5de4
-
SHA1
941dd08201c8fd8e77dc06267a0217698ef29280
-
SHA256
92fb7efe3632a3953f18d3ccd5615f4276156a2c0d4703a7c89ee9e0b2768914
-
SHA512
84c9bec95697d79181bc6775049aa1cc578a04a1eeb7394a67548380bd5f8e278c6b6b5cad9ac6debf2b66dea7071d8becc620018c920fa79bc2cd92f6150bfc
-
SSDEEP
192:2VMlIsr03st8k/w1wvqLkZ1BLmnK/xKWN01LB9euBuLbdU8d:sMlIcusP/gu1BLmnK/xKWN0LB9eguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000087e4173097606c73ea95a5275e8e2c266317ef6afa4cdfbb865fac994cfb9de6000000000e80000000020000200000009a1a7ad2f5a45d3150fb854ca836318a69af2f8c2cfcaa99f0ce3558af4ac93720000000cd41f802ee2a8da0f74bae30fe2537b6561b58fcf218cf32d412ffc023ab9f4940000000b24833ed45f2a213b0b1f392005b3d9db76ca866dc9bb9920ac689f0d8bf1bc12e83e31f136273ed76c9c2827f2f514a8036bb007f5a64a1e5d4d762021848ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06034903c05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9073ABA1-712F-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432325325" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 iexplore.exe 2476 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2396 2476 iexplore.exe 30 PID 2476 wrote to memory of 2396 2476 iexplore.exe 30 PID 2476 wrote to memory of 2396 2476 iexplore.exe 30 PID 2476 wrote to memory of 2396 2476 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcbeca5c517b39219b6a6aa38d1e5de4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ef9c7d38a09840f6e9ce0a96825f85
SHA10e89fa0b19f3fc200734b2b8ad318449f2d9b077
SHA256fe578919613546f4d15659b4cb8c60c31ae7e540cdfe3f039048ca88779d0df9
SHA51203e5bfb84460d6d3ea5b417e85167e4d60e35281f9833cd1357e57aaa508ade9d88b9140bc71293f5e3fa4da193369e02dea56889c5d5a69d82eb338fb6b6545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8c8edf09d82d2966cdbec9b47d01eb
SHA1892bf9a96e9d4081e02611710e9ab7f299218c80
SHA256c3a79b544a0b46251fcd1efbdb86d23b1043c5f22e400c804935b9b89bc8d32b
SHA5122530dbe74c22c2f47c458b98b7cb1b12fdbccd51fe317095a19e84616a84908d6c07f3443511ad15556a9ecea2dfa19691e79782cda9d2ca6a463fac9688b933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca666dbc049382efec7f35d5c4b822e4
SHA1c5e0c953c1820d1687aa909ce676fd4575253913
SHA256618de6233094da01020ed8fc0f4417cf35bc5276f531a0d0fe29f505fd07c913
SHA5127a1c37ffff8e80e06b152f271d29e0b4c622a8afd9f76d7561a7008f1960f04a2d0506de64a08c8f606b9b918206476f7cadf29f28354db45038600e06024e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527efc048ed563e8cf3083bda48f9d3e3
SHA16f9f18ca7188ab7606104f00fbc45f645e5d8e1c
SHA2561d00dd1bc21cbb82256fc7a67fe19580ea5e0604274e8d3eb5f3a674983ee871
SHA5121079fa127280819c2b53e7a4dd9f6906f89aa77eaee787ec30b31c3b6858a1df1a81cbf1db647fc4c3dd86a6f1dfa1080600804d937e3f6fcf8532c4f26c3da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967cafb4c52f9376f9c60a36d7151fe6
SHA1eb9852d1ff97182f29354d8cb52edc05316a1732
SHA25685a060a7606cf9dc1edc69bce06d740c8a26ce8f2ff565aa57271b31a5420a01
SHA512e7edb167643e5cef4f7851fa91fc4d9c4cd5631b0da7ffb80c9370fbd06f89db4089c3a0a544bc4e8b64041dd6250ac754556ef38d260331e5622da14a6b5801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da92bc985f5c02389a68d0c9bb526b6
SHA1f9b61bd9472b5957bafb2aec75d221b01cc10e30
SHA25616aad99ce4bd87c51318f9af2c8d0db793e3c9518491bbe60cd380f98b42a884
SHA51228a8f6ea64d604ab666ea0c1a5dbaf31a9f9cb7bc9fca1cdcfe4f10032fb4838bb017e41c546b9caf89f1587c4661675241ac94f0aa1698202205bb5aff710aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f40683bd6a7da247466b3a6650058d2f
SHA1e7668619b6ea4de9fb663b279cb59fe1ba1d48b7
SHA2569caf72eda39798aa4bcea87d80091c84add0cbc4bfae768b27df711ae5628331
SHA512d769bc142740e12a933cc810773a7849aaad5a126de7ebce6c39c0b2a8a0b25246ec9c657edd43d117f9151860d7cb9ecba54c37190f719e0e765f702c397674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b143bcb54addddae478118a0294d0a2
SHA1cccc1b92f74492bf10bff441e7a2b4675c1e8862
SHA256ef07b0b9b0852e98a737abc4f5de28bbf315c1d53cc0bee692b42b16a354d28b
SHA512c5e132f1bef6ad6a9c550074d5987e99fbfb2b17f383a34732e0c5f3d6bf925e4805606efce5af7f44b62e8eb61c1cf554e69fa6f99d8cd4fbdcf4edf2bb0462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6727f6dcdfb9c768d73b519ab80ace
SHA14f2c2fa467ae3f9775a8127e8d61ed45a4a9c20a
SHA2561be591a629687d7ad2c4c01bde2c7891d6e13f28b96de0b86ee3cbbabbff4549
SHA5123447795e473d94fdd5df79fad592c45bee76ddc6da026b78c364d92bf1c29833d10e747314c649d558f81078827475f7c6780092419a394acb78630a119e6c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fbfa8736a5c743fcb3a7b984c3f221e
SHA1b36865dcb33cc25ecc9f1c19d0825b64938e3553
SHA2566b90d44edb591b14b246d137d62885f3251f4c754fa896aaa4ae68aa5df2fabe
SHA51256b898aa04d267487dc6e9708c136f674c07ef082358aa15480189c069dd6f76c8af802f7947d7a5697ffbb27b3a920c58a1e33209ead76fd5c4499f13bfcbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6b0ddd2140e159f4276f985c2f0da1
SHA1345bebf7c46d8a26fcea1e5d8af07a28c52016dd
SHA25689fbab67f436e626c258c58910fa96d06732d0726c45bcc33ca013833e58e767
SHA512311d0b50a5cc51ec1d1e81929e104ffd3de524f4ebf1277eea5a20003f79727ecf4f6b77ba8aa3aac3c818f72680f0636ab866cf37daa6b8bfbb150d1880a4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548de2e7622e9ad92ce1782c57fea7938
SHA1c4ca6274b187e0b3809e139835b0ebd2c8e0947e
SHA256c9c5dd8e02d282644c8350239f66c59664fa71115bbf3da295bb13b7769ad847
SHA5125d00e0c61c97e00a6eeec73f7f05313083e15dc6954b79626bf619c94d2c7dc1cd590e3de3246511665e200b47300a830a282435b1d38809764e7ebfd05debb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a1b280ae9783dde5ab7bb3266b2f16
SHA11dc1b9d606df4f2f17dff26a097faa869ff51a35
SHA2565563c6b744536a2bccd58d888575ce7ca82c1eabaded2dd0f75408814345679b
SHA51229049d7c7703a48837b435d27be65423cb42ee3e73601164f243df368195cdae83fd508a6ba8a4a03805d4f5de6a3fa6ce8b324d703b00115dd00bf3a2828bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b26eed0768ad5ee6823806ab74bd1d5
SHA115e54010acb21fad01a982d2d3b75cd0655164de
SHA2561f1524c3f8c55bae5ddd1e8a8fb1996c187a21130b89f467f1c3c567431237b4
SHA5124a01edc5b2071def8aca2de87787c11dd8a11bdadb74faba28d7b19dcd9849438dc6ca3520b84dfd2bfde5a365a00ac42e411ec22a65105484922f24d25ed924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4805e4703a6d70b870abac886f08a51
SHA1703492f01c061ae5afa46fe8187629a375818d71
SHA2562f29452391d77757f1b790c9a1806316d72ff04decafe1b11a6384eaae7f6276
SHA5122a452f5b54b1f0eeb273ebb2edc35b03a8aed776a56fb3b4dc96913924459305503d54966a813368dd433a72a0b5d59ef5dcc74b9ade12860004516b253ff263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543cba4f5c425a7db5cdefdada00db677
SHA1b7294792d930b07cf9fae54829ee1df65945ad68
SHA256be186541d144187336cbd3f4755438cb564b0748cb9d0b1f712b3d5c611fea4d
SHA512b3452d9e85288c88c04c9be2199cddd6a66015ad56033ff94a96be56b40ee50e0fb0d510be92146be13860605164e3582ddf439648f41f7173f2b2958bf2dd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53de7067e267c52c084f0e86a6fd468ce
SHA148b525a487323ecf8dc2a3eb3f4db1e36aafb99c
SHA2565e865a0ca49770e00d3e6e972f66bf1ac4cf447ae5ff1990620fb7f7c0a70ece
SHA5120c0cbc9746e2d211614a3ce4356507bfcf460740797ba7a56b3bb5f5a60fa2b5acaae387c7bfa166c42c0cb2c0b340a2e76179157a611df739ee83897e3376ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560f32b06ccdfa17359a672072eb4a12f
SHA1524fd8372c81748729f2daf2cc5047ce488ec49c
SHA256c6a1986501f3b26d01ae0a072a3a707dbff9e6e5cfdf7cd68b82cb13bc258543
SHA512d58ec93e4af4262c366f7c4b0b50b83ae1331b714ed0e5254aa6d948476bf83d58abf5bc14cceab6d2f33b15f2d46dc75925af557a050da297956f5faacc8b4a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b