Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
dce2edd1a4e82f3436b447bf96241e23_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dce2edd1a4e82f3436b447bf96241e23_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dce2edd1a4e82f3436b447bf96241e23_JaffaCakes118.html
-
Size
14KB
-
MD5
dce2edd1a4e82f3436b447bf96241e23
-
SHA1
cbd1c8f605d6605c6bff09e6367c7921115f22fd
-
SHA256
a885e8f3e77d514377fa95dbad2ef57e8ba0ba1a5670ca83cbc39d9ff721f30b
-
SHA512
ceca29e4c0c6f6a05d1fd14adfc501efc0600b530427318261278287e78c32cf75361a735db6fe92f120ef5f64859caf6f9ff4080309321416be97d193cd8ffb
-
SSDEEP
192:SICaepCrvvcs3LL9AOT0mghtef0NS0+8737SaL1Z:SICx8N3LZqhYa73771Z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007db3a581d7487e513abf1e45d51b8c2f8d764f05f1c8c5d22cf91bebfca8875a000000000e80000000020000200000003bd7def2cd0979ddf90ad22d72f64bc2f6325c1fb14d5fda1336b723289c57ce2000000093c951b0c8a6659472bec3cd81b701cd9338c90de14e23db524850b9c43f0cfc400000003f9ba4215db2170b75cec60ad4dd1fd00fa12ac7ab5191815747c8e9921936cf322f0604866006d0b2d7b635c0fa1ccf7a4fb938aae73dade4bac58b251cd5d2 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f0d9394805db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432330403" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61E576E1-713B-11EF-A7B5-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 588 iexplore.exe 588 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 2092 588 iexplore.exe 30 PID 588 wrote to memory of 2092 588 iexplore.exe 30 PID 588 wrote to memory of 2092 588 iexplore.exe 30 PID 588 wrote to memory of 2092 588 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dce2edd1a4e82f3436b447bf96241e23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c9978f3bea9e84ba15a62ffdb88c40
SHA1e1ba57fd4c35df1d06c2088af81884127f4a120b
SHA25670c204cc559c1987dec3529e0506a55d5891dc85e088c2ea0258648d75d69383
SHA512b3027b3948bb472dd9b21257a07eb28b50d034895448de9964eab99f86296ba2caf37e91ed0245c2b131893bffe5cfd347c6b29a3a666711475385f0e5d2cc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8763cd6d202c8f346601b1bb149a9a7
SHA1e8eee539cfd1753fea1799e0d447946e700cfebb
SHA2563817f8d0edd318a55e615b1baa7070d4b59f814bd46d118eda22ebea2e078665
SHA51234eb55378d55b4898ce1e82387604084d54cf64e792b6f0dcfa0c36f7f672a46730c4d4a32eaa4e679e722e4dcf9ad712b16207f22e73e12d4969e32fc0ae44c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2ec69d7f4eb530278a7313c5cfc4c5
SHA11cb9105d7cf5f2c010ede6a6561bcf77c767c8bd
SHA25633fca2819c067f51bf86e6e42aaf9fcb1046da7d4fc905345ae624df3439a0ae
SHA512819038e4a5dfb74bf808ef7ef936c93cde121da7b77f74e24b59ca0f0ff99f5938c129b389e6533df6bc57e3d7f3f911bbab885dd8ba846c3535de9ce2a798c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595160132c27843d6e5d19f698523537b
SHA1a916adc6643e08229df552004a386df48564ddf6
SHA256f4c3ba88bb6f97776353f71eb14024a69625ff2b32e6d9a013de708645ca719a
SHA512ec985f813cda8d73d7f4a5d0bd71298f867a8baff9e7f5b0a8f8649e4e720019674d88c7b97318f9177b2e129736d922028ced0fc3d2aae68758666f39a2d3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b823daf52a224cac3a581b6af1ee859
SHA1d062bd03138a471257980da1baf6a3a9bd33132f
SHA256b77e177b882ce15f8cf2fca9c5f43e302e476fc8d13e96449e3d5fe3792dd73d
SHA512eed0de60f07c338ce42ca0500e5a99baf9280e3e30c711ac45a64b8044a0b02d1ed7cb8137d76b1b569f5ef2b7c8fca38b2696621625715cbe8320c51f760011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db014be6fe6cf2333b831406a34e254
SHA15941f8d3a91865aeb1b18bd372c23ea53300b77c
SHA2560b5f106b86784f6d1b7810d06c98d2d7421d37c3118980fd566290aab3446e38
SHA512170fa5497a8f9acbd8f46d6b27f245f41c3b5d64c15281d5ee1e38dea0ddd3f6e097bcf062781d78dfbdef7ecf7d449e11f313a15e9c9db8373cd6b04588ea8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58beb01ec327a7f3e0a4dbd08f0e7316d
SHA1a217f998484b1f1254ea635bc639a1c70b5a2e82
SHA2560a1b57b6a54729ee2d3bb27f97b2ee4a16ce8f89ae31a9ec35593f2e9e44c061
SHA512a9ab679594e1d806ef8bd3c77510617f97f035ff4621095e22a86bb7722db9f3d494054d64ffb39faf0eb1fff6959c6f40c20bbd1563032831c230baeb7e035f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d1d3c860c807bd7cd63305075b49982
SHA1362db7a031c022e4927e89f5356252dc61e6b286
SHA2568921e2b74553f8bf5fad0c757e193170e90419937b18eabc08c254115f0796c9
SHA5120ac2798d24ff67351763b3104ea26fe82fbcd461296862020107e990ad8df2ffd17ec1128b63e27886be2bd3160e964389c879d3330f63ec4a3951b65ea5c967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53108cec67d14a810293b6aa3ec30e388
SHA19abd4155f9b163fcf8915b4634dd331f0886ec89
SHA256bd284c460dcbd064944dc1f33dee1245d76b3745b5c72fa13c3342b3e2a45c7b
SHA51239b9e0d9160611efd2b98e3c0c4b0c09c2c021867aea1096786c7995e67b25696ca400ad3bc00a02e8eaf6c3d31e873e0cd3b5b9da91d952ee2dc20f71b216a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661eaefd3eaa1f21443f47da5b633f88
SHA10b1b981ee7953c7070bc56f520f0d7264d4cd698
SHA256b5d284f26fa941a6e5684e65b92527c148b033606fd9c0e661b4cf521212eead
SHA512388df48f8f17c718db1c5d410b21103bfc316c0f08905bacfaa0a65afc1c7d1a64011c0fddcd7f2900279c2243cdee6a721514df2e478163072877ab2ff7997b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298160a6f8fbfcda5db6c8ae1c6748bf
SHA157a121c3ffd4e7e03104cb29c8423008dfe5b57d
SHA256bbae673c8243099731ef81d8b24dafd7d998f22b28fdab95b1dec6281194bbba
SHA5125152eb4914c570300141ce5c67c49022dcfded449ecf34a4dc4a6e2bb4b8f52df0b1a57f10f8b31797156f9d64bcf9928269435bd1aeb3a13a88885f57d7ef01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120801f5b7275bb4b49cb63414b88035
SHA15739d94e1feede012c5e7d72b8db12e0167231f2
SHA256e025c0dbdac094995d910dae9771e2bad3588d29da51a00f6151054168c7da14
SHA512113fe175e4057863e3b9f104fd5d6bf89afa7c74c660e250a4e07788b2fd895b424e985e9bdf28d62e88b6337c813cae4c2fc7d9d72598e46c724bfc0559592d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57061681550d6ca93c59c1ca55591b2e1
SHA1c67af84a2759877c11531af27017d0706a5df2ea
SHA2561134aef7fdf6befbfc0b45a111b75f0136ec0a0613993d7bd9d576556360f38b
SHA51219c0fb91aa6a9b572991e91553f0f13cbc56a2d50e33815414d7806a5e00aa1833db39512bcf87a4af4b99aa0d4dfb43292e10721f11dd95fa2742ac191b04db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960d78b924441675c1b1c37512d30e4d
SHA1381502f1372d89869216069dc61ded57b38cdaf9
SHA256c53c8e380d7e910ca200263f45bfdea2905bc76cadf24245bbe2a47f522ef24f
SHA5124d2c6f7ad5e8ea52799c0386a4849d18edaf7b93b837bddaedaf5ec0de24e4e489203ea97bb17921b65b5940b619a9fc0da11663e4f0aeb0fee65289350d0f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b94d7140b2bb1fcf652423de2b7a7a0a
SHA14fe5601e4d3187c872965768c4a3aef7152f78d7
SHA2566bad3864e01a6e97569b78d106388b37ce256de52bd467a118f5f177a7728413
SHA512e379581ca3ac14d932f9c4b402b7a5b03f731bc8516de69754c03e50f526c17ab7bd714062f8add98ed84ac3d18a4918d77ab40808fffe8ce48df57fbc545e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052f34b7fc950713936ead55d764b837
SHA1986aad3b31bb7e6bd37e976c4649b227f1a415eb
SHA25606b79a1038f240d65746a31bcef30775d52a0d2536104b9a05adbd832ec3570a
SHA5121a331ffed13b0daef098f2b53ff03a02e7278282b4cb780b111a5454c7848f47ae2eb67f022b29b120fb27ad9b11a287426aa25bcbb8073613888311f57345db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa293e987f2d68e15487616ebda68f66
SHA1d30db06416fcad84f0e247f833499cda939ef478
SHA256a11cf21923ebdaf3020e1a82763519e00e6a4e3fcdcdc9913f0e2cfbb95637c8
SHA5126a050d35592bbce06dc22b84ab65e29619d16c0c86e034dba63e362f7a23d20c275eb59dd79b659e959d1ecd50c07e74123ae1417a7636973eb59dee41f8194b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b