Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
dcdeb42079eb790af86964d2fa4c830a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dcdeb42079eb790af86964d2fa4c830a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcdeb42079eb790af86964d2fa4c830a_JaffaCakes118.html
-
Size
220KB
-
MD5
dcdeb42079eb790af86964d2fa4c830a
-
SHA1
c060a5e3e49d45db0410c00b357f82e76fe4d05d
-
SHA256
dd77b1dcca0e9c8b70382e285a097a29368c618eed76614b9432490d6d87572e
-
SHA512
fe381d1e79c2063cd8f70089a957ccb4bde39fed4d119bf151aad8575d7f835ae057ec9f8bef84b69cc419bba5525a6821d1862a4e1619fe1e9f5230f05dd96e
-
SSDEEP
3072:SVxFQrTO3jj7yfkMY+BES09JXAnyrZalI+YQ:SVYsasMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCC86D61-7139-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432329748" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2556 2280 iexplore.exe 30 PID 2280 wrote to memory of 2556 2280 iexplore.exe 30 PID 2280 wrote to memory of 2556 2280 iexplore.exe 30 PID 2280 wrote to memory of 2556 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcdeb42079eb790af86964d2fa4c830a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d4c41c6a71af2828490d171f890f79
SHA15c5ed24829c995310ac6fac59c618bbe20b37995
SHA25698621857788d63eb4c4eeb95756dcd1e7f819c4edc32d832c06d975d66211a0e
SHA512b2694b544240e5d47caff337a723e8f095d20c23ee4937cecce58596e5f6c95be31291a6b39b2390e385b7e75e38582d325d47fd6c650fb6e17640b3023a7842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55536e21d6de3017258ccacb441bfa4ab
SHA14f1160464eb0ae6bc650475ae318ec2098bf342d
SHA25658163158ac4e06275518a25d8740b58692aa635a9792370a7db4942aaf69c974
SHA5126a821b48af760adae49496c067314f8a5e87c7f8d704e5435bdb39d51194ff44c71c5eefe783d8d5ffd608c9fc20d400c0de298358b8d1c95b398ef18503bf55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53322896394ff5fd33e4ed24ce542182b
SHA177902d0580926160f256e42fe13e7e7ae3e88fbe
SHA256f40c601f07eb0e5118e8915a5692c819935bb801acf895c7a90e4039a654ce7c
SHA512ad6ae5e44477bb014d0e74da6920187fff3dc506eaeaaca47cb7ab49baa728fd8696ca1651758f8cc69915603f08e2b2581ed28201f7702a9cd3cd0b7a499364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc270c8d7b6dbd4464153ab2f1f8199
SHA1e61a5d9ad7eb7bac45bb949cd8d5c4888388dbfb
SHA256e778388167879eb68373ce1a3a2691286575a97253f158da4f8c0fd692004824
SHA512cfda5a0fb9bdaed32051e7a3382e5cdf2f6238aa6e87cda353f6bbb3351ef51988f0dd457ab37d04b122563a31196c68421b4c3223dfe6781bb87e40710f4b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b590232e22fa9a7e166a5da3955c9c
SHA13eae5eb2d47976fbc548ec0b071c8e011c236002
SHA25624cd321158ca795415c3dce3ccac54a4ebc6406d3d15eff04db88c026fbc200c
SHA512ebff2d45188222cc3a3b0bb432eea5bee1fdd7c95f5c7ee12e0e561c3543a94ac0b84af885e7f9a9105d7fb9bb586fd6c49bf1461bda6ce115e0fc8bf8d81220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d66387fa085f15b3439bd053fff76d
SHA10390ff00db26d75a7f3cd1afb98c731748a64cac
SHA2567e750e16370bc76498e27d9d98f982e7755152b6c5742e82f79a3dba065c79a1
SHA5127955cf201ef075c0c8f0a792129ac917f2963f42ec19b648fa11bbc5072d284032789938c6fbcef1e2eb8c8044749da47e4a871f139614d3b18157c096630174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27dd9e67759d68558481909571dcb0b
SHA1060ce788cec83b6255f06429bbaca1489436457c
SHA256218150013e5b7164769ff0df2337b55100c9f919def57fdf611c87577fd1fdb9
SHA5126b8268bfb8830b478e976abfc66215148954b3c4edd8119931068da43cc01f9a4e98ca0aa88cfc9cb75923c21acd6149cea63f7944397c0f282910ba878dc63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560bbdf3c1d0428e12216854189b6910e
SHA1a3d2d06d436d8dc5abf6011f938746bfdf8c8559
SHA256d9fbac31cd5c2d72bd9fb10fb719b475fdc29aa83f18982ec0e0b8baf0b1e310
SHA5129e65fcb970a60a939d1a38700c1c9dd6ade3d4a2a7f378a55d80dcb1210c5cebd9252098322087cda1a6c7aa455be00c9a90a6eb2d51bd9d57d34c8d11a7a400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9a93493b61c05b2d987e993631e3e1
SHA17821869bf494e9761bdf961c45318ea55c165bd6
SHA256a23ac96322079c0c979ca49f8d8463959938866e2c33c82926f298291dd21c1b
SHA5122fa58203f88b88bab6e3fd092f6dc096e286ac746d7d9d5bce891dc6fdf3875202989375e01c87f3264ef8eba5ecaaee204d93a57c046e77ea880c380ba8faf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a9b47ac11080132f7dcb33b3a6aca1f
SHA15cf0291a0ccb8121165723f8560da42617ac0ce3
SHA256a4bd3bbef99a6e38e03fa9e1b7ccc88082534e20ca462016dd880695e2c11dcc
SHA512ebd23c40edf6675269f21904f69c89ea7c47f1f515e6847184aa075d81df27f74b95dff50cf8b96aa7a682aae7cadf56026b306fe8c16dff4d92526bbd8e1932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527f8ced7406261f3fa7d0d2e3833596
SHA10ab4438f355881add24b4f46872ebd6dc963d858
SHA256a149a370a99fa52c37f365923f5a47af3ed8c27ce39757aa4288a2353dd3f9e4
SHA512224a9a5c63f3f8ef9fef7b1a1cb0b8476d61d7fdc820bff39215c5dfb3d47f9f3fdbebca069aae5c70d9518085bb4f342c4cdfe0057c1debb081f3710881fc35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eaace5e1f3471272f6356acff2c3237
SHA1a355d9040d509748f8b1af5a8eaae1319091d7d3
SHA256f12b551bf8b8071b4293294f50f6d183055073bd3c23cbcccf3e067eb9a605c7
SHA51218976999beb2fa6ca8c1da2d3c3f653d913a757cf33623c3eb41e2d52dc0586c5507cc5ce4ef2ac11937361e2644edb5d3e08501c4772fac330b2429186bbb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e3e359cf0733c8088809a6b29d4c73
SHA126c958846a04222d17a4488c938d1579c439628e
SHA2565391c48b4b6b375115c2ce84a6e262383ba68bbd857d922144a033d100210cef
SHA5128e9698089258ef71bf5aab84ff3e02278cca13aee1b1b6b22fae75c139055fa3f24bbd3e1bf8d2b9c2a8c460ac8de132d62a44da5e62c2a228fe8bde4ec94e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bfb718f2fae0b1dd0a7c14c6064ebeb
SHA1efccc3c7499bb5f215d7851d0c5184206f1c8f0d
SHA256f6fc84208a9e7a4c2913685c3a3982302228fc67b8373435f95733bcf6f69a36
SHA512279131a2c483e7d29911727e3f19e069c51483d90f402391cecfff2505beab1265feecb7618b3bed6e5206dd4407551f2b6ee2ae627e7ba78776c7a2c07a285e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a2e7ee0b80360a5b13c116b3fe056f
SHA114608623723bb6c2853ba9f9b92e04f92b441560
SHA256ae85e7bf4c4a4998d91e23c86a9358677e77679feccf18180656417a67575269
SHA5120e7c3479c6f120bc0eb3ded3f879db64f36fedcc6d547303cd71f4daa27b7da5c3a974507e7c1672c289c158fe48ceff701ce2f78558cccd3b572849bddf8032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b968ce9929c4e2c5fa2331e9e38babf2
SHA163d8b2d8c5d3ec50ee72223936e7c656030f11ab
SHA256716c916f3f305faf2f8deda064b7470779a0ce01749820bf3581dec060a5c00b
SHA51249a763e41acf4087b8ce5630e1d6e29d2347d05c15363caeb0b98d3f164b9ba8fe3e64d5bc412e593ce35ada75acc90a8c0f100d73829ac847e6666d6d887d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2419ccfa862eec9b98a44b3b137061
SHA1488a1a7574cf92916259177bf059d743e12f32b2
SHA256377c2127cbe741c5d3f4681b187a9675b518a58391c9f624a006809051a45773
SHA512ac5cab9a72e443aad42fd799be044ca103ef3b25fdccec470db9b7986fb8b409d9b0c274f242b455b3b7af1e2ec652b5d99488942f85e8d8220dfc1440e82e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5030f1e47150c1076953bf3b9c07a8fa7
SHA1f5e07953ade529713a3ef216233b15b00777a4ec
SHA2560bad004520d60fa7867ca7f078ba76b319462376ef72e0495820c5ea614ee9ef
SHA512b565d453ba38a087a4e4ee19ba4752061b4f316f3e19fe78988987924d859576ab840da92e1678779d3c5f583a71a75ebc099c6a41cb5a0dfae40edc4605c59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558bb661ea1436f3d1e62c705f0196646
SHA12535631e5634e78711c28ac07ca61d9a0adfdca1
SHA25606766f8bb6d92fabd0396e38bc5917c52e5f885dbe8353f44272bbf0d51cb51e
SHA512f4798d762d25c0d6f48c0b34b0a3194645e0c97df6559f6698588be4c57ed9a2ad42438194017d983ff2a4b43b178f1f3085fef5c8bd52e50191c29bca4e0847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff9a455e9906c86a3ee206a048901239
SHA1184167e0c2ca3d6c90822095d89342b0cef09085
SHA25631dbae7d9603368d7b344540f0ff86e50f99078da34b80a2ad7184d6fb93fb1d
SHA512255de2b1f60827b1ee5bfdcc9dbd7d9361a67bc5159e28a7c8b526c488d9baaa1dbf8ba125891e797603295e3c010b9e86547b1cb087ae106eeb301ed3b8f590
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b