Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
dcdee403aa192866a1fa2d2e61f2714d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcdee403aa192866a1fa2d2e61f2714d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcdee403aa192866a1fa2d2e61f2714d_JaffaCakes118.html
-
Size
12KB
-
MD5
dcdee403aa192866a1fa2d2e61f2714d
-
SHA1
c78bda971dab303be035aafe80c466ba53d2301f
-
SHA256
fef6884c827b97ceb3bc3a87ed3f7ad70c7d36994a8c420941cd9b0f71739b80
-
SHA512
2a329246e0788926c4a08c445067dfc14b3943be5409a98b78a2cf0ac051430cd786bf473268ad050d72499c455602261e969a4289e0f7152215717a6c669d6e
-
SSDEEP
192:iKPcgd0i2NemJImJCK8mJMmJE0Mnaj5vTiRliAN77+KX+rtsb5jLMJxHrCAf:i6dL2NnbI0vqQLi7iM+KX+CNnMJVrvf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432329775" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000009c44ec759bdba3f78fb3fb74928753e0f4d7fbb6047d90bc53de85c51e1c6727000000000e80000000020000200000008e6ad1dc3bdc7b256457d8c8f429f684e44df57af9a8dbcb80e1eb1b79173f81200000007d53e24184f2e6b2a001da04ac32f8d918541dd1082746c34350cd845c1664c1400000004d0514d079b4c5f96cfee449a817114c13dd5252cf7b50793af01655a3db41d3c5334f4876e793b41a543dd7f89175533a427c60dd7e7860eddd723dc8e529f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03677c74605db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED8176B1-7139-11EF-A7A5-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1868 iexplore.exe 1868 iexplore.exe 1848 IEXPLORE.EXE 1848 IEXPLORE.EXE 1848 IEXPLORE.EXE 1848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1848 1868 iexplore.exe 30 PID 1868 wrote to memory of 1848 1868 iexplore.exe 30 PID 1868 wrote to memory of 1848 1868 iexplore.exe 30 PID 1868 wrote to memory of 1848 1868 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcdee403aa192866a1fa2d2e61f2714d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474b734cdb83b0a670d31c76759d038c
SHA107078cde5b7a69fc2afed47ef99d1535b3e1604c
SHA2567389916bb7d029df78f282cb10f33c8076e19ca547c4804eb75d41d0e19aa19d
SHA512571d67c08db5791b5f9330b5ac8ccf0a7066a088a4db0204e7bd10fb20607664a08b8244203e13b051a218543da84de36faf3f941e295ca3dad81f0df85368dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e82ce2ea3d2ed4c2770283803275613
SHA1bd7c3b0ad3da669819e859826d901311151a916b
SHA2561c0f6f33b4f87e24d0b279e2aaad86c569e0ffe23e8c055cd59a3f38823da67a
SHA51248a56839a108bb280e3327511c3351e1852a6b68307db65ee4d35f52ae05d87406c19d79f975551887be1dca9568260e3ae742251407854cb53e0cc02af99330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6240161f100213ede247a0d1cb80a1
SHA171872ef1a9afe798c0984ddfcad2d4adc35b9b78
SHA256f904443df171b1e3bfedf18cd8052e984c87176a2c3ddf7e553328eb55ecc500
SHA512c4a12a9aba4862db38923cbfabc12aa3e88f88ad77cd35e1fc0215c66f49a4ef26628e1b3e9db0056ba1ef7e82a97ecee931a0b0cfb827956ff4cec12cdf694e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53570d4273e3da9b06cea87089b60a162
SHA16b66bb2f0340f045dfbe1ff580d8f6903f53449b
SHA2563eddf99fb10364026c95af7935d8ef4a510f926f30d25416aba32c9e010f7dc6
SHA5121999bc0171b94faf8ff50636b6de58de1bc862f0d913c78dca92424e5e6c7a3ad56f3f5c4c65e641334efd64e804320e3fca60f74e09fac2c816966f87c37cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf7090d4799d28d7236a166dc8d53df
SHA1932b212cd9649dbb4431cdada91fd34a53aba869
SHA256cfb651463cb37c162c6db300c58197e9c5969fb4c995ff5c79c0f52e88422919
SHA5120d2f4a312d1fd330f358ad735531024643b7a905d612505c12161fd1c930254179522137b0ce2bad0b02c478fe1de10efafeb8c96232c9a5d9507288e3359411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852cc613eb1763e70bdde063c421b3de
SHA109a7855ebd506b4a37e0eefc31ecf588b1060626
SHA25670e1d7ec48ff95c9cfd314ccfae010541bec84be616d8982639269c89769b277
SHA512d17581a8b727e3f2416089fd92810965822a58373752ea6f29c0e1ce3789937bf523b7678ad9df7554872ee560f7df721b8ab72f208484082e406b66a0fbe8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922777c2365326ccd0704530a941f559
SHA132773e7c84f80ee3365dc892bf6701a7e8da4c64
SHA2565bf21c7851a87a6e27b924b4c37639aa23098cdc374e83b5b325005fe2327c10
SHA512686c6fbbec878247cc543bf1f43b6f71b9cea35bf2c4bafdc4be70d4b4077db177c3982eb4eaa76131e0ab371812f5938479fa2146227d8f4574a5eaef29b457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce2cd8961435d7dd9fc0d9dc0a65df3
SHA1c87f9c72edfa29e6f9ab0cbb39114c49ad60608d
SHA256ff1df2bfa4d9310b456737975030bdcdbe684d1a6c76d2df11bb55d973cb54fb
SHA512447f26877914ba793bf46066f049947755a53bd3a8c62651a40133348ec0256249903ec5fd96a849808e3f75f3e940f3fca2e6b56ecaa2ab9d0a2bba8d2677e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538300747f394911c43c092c294ba7950
SHA1e00b9f6d8df02d598cb83fed0c404aa6153d072d
SHA256c2770d020bbc3bedb468c80ebe814a74d80677d5333058a58d3973446ebde119
SHA512139463de85268449a14d9447412bc1abb73be2348dec8ad6868047bf836b08405824ada12cd226ab7d6c3670219feb8e08dcfa1e0ef806a450fa9e8f2cf284ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cec67a7c830234799286232ca528c14
SHA1bf14151bb4f8c7802621fc3b3427e63db7f06fbb
SHA2562e87420949253d0cb5d6adbacded81df04cc864b7a6e9c791face48e6bd32f23
SHA512d951b4292eee2869ad38b2b69526837df0c72153224aa6aea82b70ba270851bdfe263b0172eeb0f783f839c6438063bf759d6fbfb78dc19ec10667332c2ccb25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10c4f7d8368c6dc9498b45f796482ea
SHA1dfe37a746634ba5ad1c6e5f29640767f8a38db3d
SHA25649a80cdb868cff07db4a49e9caf2ea36f3a357a83b1d9bf07cec939eea607406
SHA51213f2e7bc8daa50feecac304cb954d64563a18af0707e734adfc6a602d0ba730c530fef626d394cde3b75545c3ec1a42230be061ef40b36b85b2d93effef518db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a1ef103a3b1ebc7adf92b07cb52d407
SHA1d40fce1d3f2f14eb59954260a613538d8d87914b
SHA25605d0b78cf46317ea0bad696549df3e6b6c95029fe4849241c2934a7dff5fed15
SHA512baed05f256159295a5ee3f87011d05d4e9994b007e67f6e97f1f7f01a5a8e98a2d0d5eb774e4448f1cebcae72e56db3dbfcdfd951fc668dd9610e7c106c764ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5021040398a78584da1581dde5845e9c3
SHA18d128f03021658a01492d6ae54120be0ab489748
SHA256d8ff14e3740fc450266fe2d348ab9639e05c7893a4680cae5582860aab62b321
SHA512e15e084739b2b6198ba11a84c898de318d4be8071522f43ee695345f13ec0410e44174262afdeb3be20a78d3b27dbdf5ea5571dee287cb80ea4e0f9c2da18dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c2109a8d27b6fcc706bacd0774fb481
SHA1a8f665137c0c2adee7ab405de539afd9fe9c9b88
SHA256d7d1d482a5c2caa6c499ec9d2c9d01e1299cb0685d2d8367f104d10705cbf83e
SHA51247c3cfd5cb038180dabd2d46351b18c316b072c5530e67fab00e8f834449601f3df43a743f754e5a4e5aac02b669a8e72b2340894dff37687512abc98a61b48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54414397a8ff0ad5e6eb50c7ec6c65df7
SHA1cd97b066163e1695bcfc307b07de6b0622322887
SHA256a082de8454d1ffc109d5287cbb48e090a9ee5915d317fc39c8660061aa8e0af6
SHA5121cd9930eaacc03d83edf0d28932e924efc95b519571b45dcdd2ca60881945ad8acb5710c3d0accca561e843ec4fae221f32e334722c83fb4a46b025d1538a0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591da05870f6f98bc13281e3d2c806aad
SHA1e73cbd759c903df7867920fb6f8f497bfd2e216a
SHA2569c0cc64b4ad1f3022f6cd6bd8fa76f2c6572b07a598a6d4db897a2ba8b481c04
SHA512905ef56b429a4069ac557d9291bb932e6187a241c9227e9466e1547bedd6bbef1df1c7e0b261819c7bcb4b75116a9ee4e1a11e5c2af914f384b4b037863aec66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51889e9465d213ee76fcfc479f6efe622
SHA1fbc156af3c7f9db4db5d344da8d13cd4e356041b
SHA256eec7bb8be6d6ae13fc07a227529c15571b1e07546056df1b320926b21a29bfda
SHA51213ca72e23c62162c5831934a5b68502789892fbe88b1c43f918f47d376be89f76a974312d8d24b9452bf72d96ce282b228924bdb958abfd91f94515bca97e525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb99b84ab01f7f5721e3e93d2c362c41
SHA1602ebbcf600dd3867cc1040fbb0c01da63aac5b3
SHA2563a950ed377b1038dffdf624d69e7dcfbbec661045c700e1228840129d4609d2b
SHA512b73b842cf9206c5f847be1e0644bf0e487675336e9710027e9174aba5a91d4408a81936155beb812b526e3888d2639a5394af05aea7097880e2021f5fb39c1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d85162197298c4e636e0a6ea1c81f69
SHA167af930a1641db0cb44380f13b5cabf3fc880760
SHA2568ab345f15df0ec99d86b28052d71d4b50fa98b80dc9ab8bb236947374255cc3a
SHA51247caa33dfe073f4892116a856d4f6d8ecc007cf37918f84cdf40929a2b996420a5cba32b1ab01c5d86286bb84d49783c8d604dc852986ec5ca6afbf730fdf46b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b