Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
dcfe02c443035ac07646a4d6450dde7d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcfe02c443035ac07646a4d6450dde7d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcfe02c443035ac07646a4d6450dde7d_JaffaCakes118.html
-
Size
18KB
-
MD5
dcfe02c443035ac07646a4d6450dde7d
-
SHA1
56c5d07acd68de03b386c1c59e475cd33131574c
-
SHA256
2c053ca8eadef6e4d03198986d0c2f62e1ac358ae1de597c76a450b9e6b2d277
-
SHA512
6ef282696192ac51daaa1bc61564567b5f6ae75833482870bb54356954dc1b414932cedbc114c85639b1bbdad4157943d2946eeaaf83ad2619d72d7606949e8f
-
SSDEEP
192:4dcYyjEsngjU49mlRBQXlKVoO+OqNHsgXNIRSIVxTpX61XZMQQ7wVWnFUSCE9CC:422U49mlRBQXlyaO2sgdsSIvERZ68EN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432334650" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4731B201-7145-11EF-B856-666B6675A85F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400ce61b5205db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000093be2dd0a84a0216eab59c3c0a3d0ddf3c3fead3d4b68ad5cd3aaa7bef288090000000000e800000000200002000000002ff5c4eb57abc50fc35793c487bb7ef26a078e2f21dc14d5c3918fed38a364420000000b47ba062d42e0499692155168a7124b8396b1dbec55d94b66be5b0e9d2107c6e40000000fbcc3eef631a90e6f24b3932d5da4e4f584137c8bee25bfdf6c474b6b1d8c74fc4160a25cfc1fbfba1d9f7dd838c763e9d038bc8ad02da5ece54dd73c72044cd iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1376 1744 iexplore.exe 29 PID 1744 wrote to memory of 1376 1744 iexplore.exe 29 PID 1744 wrote to memory of 1376 1744 iexplore.exe 29 PID 1744 wrote to memory of 1376 1744 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcfe02c443035ac07646a4d6450dde7d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54791a646080c9da1325dbf17846535b5
SHA16f30b9e985c5626443b7cee4f43b69eb0a4c8df2
SHA256e3454799d5b7b2f16f0ea4ca13f0c70c2d262753d79281bb3af0f13f89f34a7b
SHA512d49b9aa33f8116ca7f02b6dd79ea5d48a5d356cb8ce7b068b1b24a8308e05646034e7bfcd2e50e2fe513d96be8a3b12a27c586210972743bfccae4377d5ae306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538dd1a4a95448a1178ac9eb74293fc7d
SHA116b98ca4ad11e608e89049bb3411a1e6670d8497
SHA256a0c6d2f6bd3891abb0cfdd221231ef5d076ef8c1a647282ee74bba3aa10ef98f
SHA5120a9c0f587bb07129411fddd63a3db8e689d7e87b13153f4e4ce6065597990fbade3e43360cbda286b71e76f59a4541a269683f70c01754198cd4f2a1897acedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe66b15a675d7cd0182a1328a40f517
SHA1c6365a7ef9d90e4f51504b5628761e5ef8c49a51
SHA25652dfa7a73c9d60da0a284ea686e96d37afd735ed94dc366f34b013e3dac500e3
SHA512d36f1e1d043ea92996ee3dd464f818126e93807b0d816c615a036e587dfcc51a8192a66467a4e7cfbc6ed34c9a6e6920ff02b71eb90578330d0526a1ea231d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b94aab14c633c23b03a4cb8d0df6d8c
SHA1d03e7314829e65ccdf176d3982dee55bc43461c6
SHA256a910b290722b679f7a039d1a9f845c1ea81121d614a26a57f5fd9e15160a49dc
SHA512ebf08e82c78e8dae74ad590a47552bee8588f83aa8bd43117b8f674a06e84d0cd163c8037f2b621d4b4504e31fc92ff0fd3c7f7b60cc3b2795a658e750c2636a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a690f3fc6d451a817158a8ce56045a09
SHA1f4ec1d0a912545a5487d36403b9db0881c436803
SHA2565daa4ca215134644704474aa540f57eb60336882f3fc02365ef3fe5faa588b77
SHA5126b304c4d3a36bdbb78328e0ba26d84b4fd316c8f4f04a08a8120d900ae3f26a9a73f587e797d0c49e562c32716ff2cfb17a83ae0460928e5ced12f59dfdc181c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4369519d6117a68ab09200f4dfc6145
SHA1520a6f90161fe82270b21bf5cbc9e7a3ca14ebb8
SHA2562634f1a997a1c8badaf64c8657f977a3e5c4f4c48316a9bcb26b6b6d5e44ced2
SHA512946c9245e326eea53021a1f5420615d7ccb9142c0b8f1ddaadbe3409052fc235a125d3cdbac6358d292e48794368935c7613c3848fd5999ec3ebfd653b2eff05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe4b844a863dd4b2b1265819a06fecfa
SHA1add95029a13060987969a32e361b4c4cc51fb2f4
SHA2569f2e6fc73b83060707e1f5af818f598b79d2186deca0fba03e3302d0b98ee70b
SHA5121c0d96fc12b6c6e56411bc0d219e44653f11d6bfebf723b5f2b8df66b1ce99c954ac99d591263ad4820008f662bdce24db711f37cda609740f508277afc3b5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee9835d58f53640ca8e84012435542d
SHA13801c5da5914fe3c29b66255d1d32d49ba231af9
SHA2568bb59d8257af138a8dfa6546ef7087995c3ff6a42d1ca8cbc8293a6a583efe3e
SHA512bc7e2ebb2182c60a482954dbed9b6673c2ebe421d0c074dd2c4bd7fcd5ef8c82ac21f1211e6df419b98b1f0035ba180795c130a4784f77ee044e3198e119d335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd84bc93542774e3dda736da27d59310
SHA143241e52c02ef3eb094727d24a09b75417d20b53
SHA25615e1a0248fd6461055e0824bcec0fc7c9537823024296935dbbf0b215da7c2ea
SHA5129701395858832b9918528594015582ba85a74d9786b45ce99e529e65d59de7db47067921b11bce035d07598585938220c36a614e7848712ba5f785ae3180f2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322054b13a8231feb9f4a2ba16054c25
SHA1dc65d0b088793f212fe11a3c72d25708de1df6d6
SHA2569109bf33f3d413cc23079d078c18bccafa46bd82239b061938df98d4fd3cef6a
SHA512aa70c8a5d507ee77882b40444908958351afcbd161301c506b7403717e42b111e3985930d8e7b60713983f4fa8a31d3c0e75189103a964ecb076cadc21fe82c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1cc58b2fdf43fc08656ec5aa735ca05
SHA1335b4a1b60a429845ca0e0daa4cc02fad3fff475
SHA256534585db7c57156c8cc5936d10325838ecf8976ead59dac0a6882e289e43fa43
SHA51247b2360ac91d518aacd792b690e6ae8316e6724969d920dab7ab16352790d23b9624fa70e387d4756e18915dc51ffcaa64dfbed7bfe55353d22ade9074ac2de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a1a9a845be47335a667f4fb5a505b8
SHA1bb25dd672670c04d2b886b441f608c958cad850b
SHA256f66e314ab38e7570e2d68e76a430523735013667cfe9b6b843541196e7bdf368
SHA51292e93217cb9dcb89400c901b6429b6f0f19260a511c98485c26572c74391f43d32b6375bb59aff89b4859fc19ad1939dbe0ffaf81e7ceb04f517db8e058e26b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff93c6409578545313572997e70996cf
SHA1fcd435c3a4102c3bedeb1a536d2e12858e95a436
SHA2569b457ecfee20ae2432b5c28a843b1f722d34509b8b7c0efe974c39dfe98dcc20
SHA512e22ef926c7a147174bf4f68aece5ed1a811412acc9e6588dacdc4205f39456048053d86d0e54ab0a970a1f817f742ddb55defa2c47807bda74c727ffcad8d299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44a9b8c25e86dd1e5cd093b0b87546c
SHA1f29acccea90454c8839f2cb0c0416f2b45d96da5
SHA2567a858db3efa4c9335e8628027bed3417c34598ea50d9c6eea1ce03040a160e2d
SHA512afacf27825652753da87e824bac01d66f0b9174103d555499b9a75a2b17f01311438107d37564977d6370e1e25192412e534a533f0b4813fbfe3c63c540355e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a679b1ac28da119c26c6f70f4d363348
SHA1090956a973101e4680afa5963972134197dab491
SHA2561a2039d3715b1197227d614afe7c945ef3d7a6a3dd57cb873d1489b232abe3a9
SHA51204545867ed08aa9b419c741d31320053de3d852ef66370e1d7d5f367fbdbc0a60e7dd95c908682d3a86fe4662466074965dbb931d1ca9fb72b8a6134528dc227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59735a8fbecffba8fd297170c45518eb0
SHA1899356a5d7fcf1b9da549e46e80d9594cc732036
SHA256fd8fc992a1503c67e33b8b49043ca124891e2ba8b4374b2f1db1e1cca70a30e8
SHA51276e06a06bfa4ceb5aefc7deec1575546117249e3dcaedd61b76a156c0c38819150891833a366e7e84e8472bc6813239bada24b80c47cea9f298a57e6c8aa5eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591d6618c9697ed60140268fc4ace5af
SHA1720807a06bc58066affd28d6fcb34d0f3c578437
SHA25672e697a6c03ec8dcb8f6313fe3e4c00177a6c54144b1aefd0781ccc8702c55e8
SHA51227073e524b22096d63ed52ab0132dbca372b475afec61eeaa0eb8e1484bff459f01ef747c2d4609f844f61067aa26f574c0cddd5ee4f10b602dee71f35fb7bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50575b9e1828867889e35649cad9079eb
SHA113f721568e5b1b0f0de861b402f491e4778503c6
SHA25607ab6fcb690e689cd46e9492762a3aa0522a48df112e24457879c964580e448a
SHA51269fd736e06bf15592022c57ca4814f46c4895b82109fc90f75f16269a1e4ecb67169130d03f6f903a95cabf4990d243989bd5b888831c66b9d3860087c8aa67f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b