Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
dce65821b0a9daa1e98ead73ab58d035_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dce65821b0a9daa1e98ead73ab58d035_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dce65821b0a9daa1e98ead73ab58d035_JaffaCakes118.html
-
Size
6KB
-
MD5
dce65821b0a9daa1e98ead73ab58d035
-
SHA1
57ad4173918fdff613ccf7f43802fad16b945ae4
-
SHA256
b758b6560cab5967ccb5f4c8f0c3d1e07febb66422dcea8aacdcaba7b21dd787
-
SHA512
d8a11c2f4b9ed83df75d685e6e12686dcfd58f4938e772f0a293f2e79ffd1c348782fd6c56ef246454d51d06210dd7e32257550cb63b35d7e6b56a083e954210
-
SSDEEP
96:uzVs+ux7X4LLY1k9o84d12ef7CSTU/9/6/NcEZ7ru7f:csz7X4AYS/e4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432330969" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0032aa44905db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000006af506df4a9bfbe4bf09a9d41be2b4bce93f61c037c738bb4e27db6822eae397000000000e8000000002000020000000d68ae43689fb2ca0116669865c4df5b795f7cbde575d97c16124f3f711f159a920000000d5927ec6eb8c8e8d847be11a0fbe638cad683ad4581ec9fb0a90e797ad7bca8f4000000071bc33cad61a777bfb4149ff080bcfa76c16cf51fb0cb695521d37f8db573306b77f307e7fcfefcf35a8cd63bba410a213c534432b26203f5c05b8182bd96656 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B521AC11-713C-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2536 1972 iexplore.exe 30 PID 1972 wrote to memory of 2536 1972 iexplore.exe 30 PID 1972 wrote to memory of 2536 1972 iexplore.exe 30 PID 1972 wrote to memory of 2536 1972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dce65821b0a9daa1e98ead73ab58d035_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4baab1903c607f08b46f1e91137f7d3
SHA129870559b14e32059fbb62de2b4e5dc6bd90d890
SHA256c58b6931b500c9d2bb28809ed492021748e7ae39dd3ba625170024fc04fd77e9
SHA512e3fbcf56e933833e1b9f9b77b151b4012ddf8fc92e8c4cbc1ebe69865842b7125b8d5a91deafd1caa9f1404ed6ec8345ac1e9a8a9a3fac3e501774bc9b781f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314414a74b91ca070bd5e0d9390b15a8
SHA1fbedbe0a7737643a4f78c3bacbed11b7a841da58
SHA256eae196d369c94179da44ed96aebd60be197d040adba153d9dfa4d752d303cbc5
SHA51201c5e04b37b522c754fd27aa1a3d24c5b0f1c74442aeed84b6b2e1da8ace9f83126bd2da2de0115a926a9e0a4a09a96af1f448116bb6f92363396dc599a6aa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc9eb1ffce32a1f2d11381977229f9df
SHA1ab8d24e5e5ce4a76b408f2b2cfdced014edcfcdb
SHA256278995ef5216cb46d851f372015b53698de2e1c4bd5b784af50fbf39b3216796
SHA5129fcbdb6a38c8647690dc671ea50f5a1bc24523f456504a97858f447fc2bdd63e064a590ee487d4955cb3b87fe9cfc3f27747a9bb22db4308933bd54603804720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6b91b02b5e9e5d13778d64cd6be367
SHA1ac1b16634c1fe5ab8c309ae58434a5eafb1f5d3f
SHA256bb58143d57295a8fb886ed30321b7ce5b99db2219c04eb604abed2b634691bcd
SHA512868a1eb51e71ac84ee789d2ed8f1dbc8852425537ab4392b770baccb2fedd143dbca0be3befe6ff26b6c6702672e8aeea5aa6c2719d0ee05bb711790f4908234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1eea9082c7f342f63f730a59140003
SHA1ec6f3d439bb1a77e7e41a3a32b4fe4e1a74da220
SHA2563c29ba9128dc900c57aff9849cad235263d1479ac7db7dccb28971b57c6883ed
SHA5120614db3828dd09f8b4bcf2cc11ea2dd20567f8678162f4699db0f78eb83b129eb233f18373683c993eee7ebe70c4ffa8362b389184b4b76e9200cdff8f52b28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554991b3f36d9f5cf357be27681fb1ee8
SHA1902f00864057d5d8e4fe6a31c986199913c6ce89
SHA25624ac25674970ba7c397d23ae7c3544675e8681a58b2993d61fc614393a8b2ede
SHA5124c8232eb43252d24ad5998585a53d90027ff48b03cd789a005e5bd20481979aa7a281214044bed80ab09076aefde088fcc32d1fa1ae99d9532bda500beb6ab61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e515c60d57d47401afcbd1c40e868a3e
SHA1e00d2903c62359d3088066db9b7343fae1d95358
SHA2566bec014fe0cd7c97ce0e9e4af75fe3de0029d4fbe035bcb5d27e9d13debcc36c
SHA5125fc61a5af2659dcac28096be9d4ea9a2988c0ca485af1df3b1060216424223688f4c5eadf26e721df202bf4276b18aa5d9c04d269ce849a03bac2ed52766dc82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c34f0df6bc356a5040f3f902850b2b71
SHA14c23ea2803973b480bedd9de384b4cb0d5a1c75b
SHA256754dc2384b05118d43c81de1db74ad9629c03c2dd7604860f4cb9770726a0b03
SHA512879b75b310398df5426d4e16e42ffd08914f908e9b1ec039b524918113d07c49b120ec9dc87bfdf35968a614d5f1db1d3c03dae32695fbaee0b182d28b1eed96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503087f85a0770d983f16a4a3ab0c7d03
SHA16579b58f53f35afb29ab106506a5410eb1eceee7
SHA256beba30b8e3155cd196b92f65f5efecc6b414cb50a642701f995319cc632512ad
SHA51215261e45150851f8c42b8af346204747fdae55f9c24d87eb31dcefa9ea7bca5c10fd89610bc2d7ed844ffc5928a17c289c56f335721dc116ebdb273c2b8f2cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7181e768322cc9e24223b4efc30405
SHA1945eee91925e6937cd02a51c35434a89324183d9
SHA256d03680c3c5c762f5b45ec72c4b137b9491a691bc7dd1093e55be0664bdddcd5f
SHA5127da6b025bf363da417305652ae0e0982c5f7d6a765420e26984ca46c0c91bf4470139846d4313bbdcf8e5b781eb9f82b274a9f71b80d4e453f96d4dfc1511c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575e9fa7f32c864514c51a12e5f9c0ea
SHA1f45b002ef405683dd13a2cb10453932f863b414c
SHA2563253f41cba14bfada92c432aabdcb887c21bbdbd54a9c3ebb4288903fd76b413
SHA51281539bee22d44ac6dad801e383ab638ead16e1d5a5cac197f86536795a8ed989c7b5087bb150a105965caa47415f43774f0772f22689e9898b3e148f0a5c799d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f226328d9c9304862fd0b8b5ec54da
SHA113f3a02c035e33b4d849e86985d7a97e5e8db116
SHA256cc4bb4dab96b32adbad13e135bdb10fc6c783675359e87ce6844a50565a008f5
SHA512437df5527936593b3fc0d73bcad716d408814b72a9edac5c36229abc94c302ac485743b19761a5e0cf472767b2657f95eed44ad99de9f9cfc3fd0ba0ec5bf20c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbd2054b53ab5cbfe3fff652a00950f
SHA17a74f3983c8df1e452036ac4d8729b024bb04cbe
SHA256e1f30ed39d65188c686a19acb146d801573521d700fd9c0a91fa2b061701e327
SHA51255eec1c3f499bf6a773c608c895b04e37c3b0161392ffb9d560512abe9ceaf889a1f4edbd88adf3f11f9d7dc779ddebf3fb49e125b7faef7d2658d21243a1e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52907041e6d6a66b963c4ebb529a39899
SHA10562047e70684cf85f8a763e3f2f7a554babf016
SHA256666fe22f78065f68a452ec986f50da985a892f09a0e198d88179f2db5776bb0c
SHA5120fb1715973e11b420413fc87ec49a9a0e761543c55cb1b6adc49a66fa803c8e0c6ee7cc9e969404cc7a784cfcc13cf7a3e47ab6bee5615776a71b760e145bde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4e9a8e926e40a82dc5ed974e16c4fb
SHA1684d42e6d31e634265be42e6faba2959373b9e66
SHA256953aed51bb43f9d59e6eebd17c576ed233247c013341a0dc7b91da869df67b4b
SHA512c8ffe48edd1120e51804d6468110401529ae57efc4a2529e540ac113006c1c7fd6a3aab31261ddff2ecd170386e12804faf1a7a5e44d1fff0701567b79f3b428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574194c0c48641d607ce42989fe086c2e
SHA1de709128e67977b6c26c91b5e9720faabf536ae1
SHA256dc7607c1bc96d7dc62d48cc2735709b35b29476dcae00b67981cf44da60f3a8d
SHA5124b072fad992b4677dbd3db6ba93040da1ec9c5fc8d1ae95315f3c83fbbe047f13dc5159ea4201d28c74277844d6004760c256aa9a9948f7e16229df1f00ca786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a1f7bffcf35d8d9b7afb4368341369
SHA17bf6e5e2828da91f90c246658e76e64931d64b7a
SHA256261153c401e8da0ed9b2d69b0dc33370e272cc96ef0f77352c24ff3a0edd23df
SHA512aea65a139d4dc9968296a758c1b9447a5161553ea031ed4128a7b7c836c01b68b7887d343eb3e99ee3d3ac46547c20a3c4b67e9380e79c22b8147a1015eded5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50894be7e726b75a86a74852d15749176
SHA1e78a98ad7d83b474050c3d4b22081fcc9b4fbe41
SHA256015af332f5d48db7118f712bf46746b1564089b47b56d469546718aaa219d5ff
SHA5127c5e1b9a57dd98ecccc1bfd1e0ce3eb6584d2cfe0d87ba84d51ce17f0e0332ac2003a8351be7463c33e1932e1d9b0862816e48e1ddcf4f8a68f364da578b4c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeab780f097f8856ae0b0003cbe77187
SHA17e7a9a060cbb4e42226914ce09b8a2f5599a7436
SHA2564adcacf433bcde214417c35a4c62c84ab355170a7607ee9b6addc808b2a225da
SHA512320a33d1b4c797ccd42f3a440f8e9722604c49a70c913f4dac24b0214b5209501b3b0904383e6e1ca44c758330e309b1a7d51f8ad5b3fab1474ca59494020a86
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b