Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
dced5ea4bd42e534f95b202c6123bc9e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dced5ea4bd42e534f95b202c6123bc9e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dced5ea4bd42e534f95b202c6123bc9e_JaffaCakes118.html
-
Size
32KB
-
MD5
dced5ea4bd42e534f95b202c6123bc9e
-
SHA1
eaf42d06526bd116c6129faf4cbfabd2751aba8b
-
SHA256
3353efcaffd10a2dd68aba71924d1a9b6c68a1dab78905226192fc2fb4a6761f
-
SHA512
2b5c6e4a1ba9cabaff7912452dd83a44d887f17bf26d155170649b1a173d4ee92cda0ef9d9f9dff22dc62c75ae88d6f1154deefc755d95e6de97ed749d8f0dbe
-
SSDEEP
768:SvABSjrEp/eb+V5aUidh/dhsdhFzdhldhOgoo:S4BSjrEp/eb+V56dh/dhsdhJdhldhOgp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fa000e4c05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{371AEAE1-713F-11EF-9EA5-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003d9900c21cbb763510fddeabae467ca47e835ddb1333bf4a1d4231263e75f0e6000000000e80000000020000200000001d63891f1d0811a9bbffcc91e0c0d11355b3fa866a18280b36fa3f37686efb71200000001351948db7afded222193e3f781590a34a8f900163d55c70d984f0668d826b9d40000000761d8c45cc7314976b47eace509a9b58aeab342c2e3c91f3fe2bf0a911386bef0c094e4721eb211e2137f28e3fb23fc96fa9921a50320a8f8447b0296ab7024d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432332047" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2332 2364 iexplore.exe 30 PID 2364 wrote to memory of 2332 2364 iexplore.exe 30 PID 2364 wrote to memory of 2332 2364 iexplore.exe 30 PID 2364 wrote to memory of 2332 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dced5ea4bd42e534f95b202c6123bc9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89b9cfe62880e701cd7c8dda47839cd
SHA1817284af9d9a5c0bb8e2f64a1c8371e719048e27
SHA256968f1bfacb6d74af89ba2318d2c13b670c9cc3246ed4b87cb50b7cdcd860f6f6
SHA512cdfa94958ceb4bca9e569788d7516b4489c07c0a4d78dc0acf365ccb4f41ea90fe3cc65b649de85b88824cc00f53345a8aa80837604efed8283f08832f59042e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de1580ccdcfc2d916d0c304c51010f4
SHA14221567456ea34bf8b3402ec583242595b0f4bb3
SHA25691e74885d0c986ead82f7664599afd8129ae1740c347a9d1459b4fe7f978e2f0
SHA512c7c0ff93231611f52a83ff3396662ef9ac3bdac2c349434929b562e9d1172f2de498e316723b3394e79b34deb294da137668fe232f6eea465c360f836a40eb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51967c2e3b5435d34bdab235fd6339e11
SHA130a8905c3f71cdcf882fd5a21be62a67b57b0991
SHA2560e3d6cd1552dedb49d77862a431c260c9c8a4c4381f91c68f672a9987f46d7f1
SHA5124a278e161274074be3c24a045847c0d30910beb72e1af9874d8c4393ae675bcfb7a10684d4070e3f65ca4515c482ed83bcaf2aee7bfcb6d340c7cd70a90a4915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe01fc612fb45e7139b8984b784201be
SHA19d66d22711531380f716b8737094ebd228350350
SHA256cf787508e42e35a8421794eec6f8915c9643da0df64c5a160aeb857abd48c800
SHA512304788db37a39a41e3ab69d6ec3e2a87a543420eab6b0f709a042409504cc895d789d988828385d7b54c37be0f59fe29731db525c4b098617905c06abd288c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829bbe176cd067228c9c1f27d214156e
SHA122a1a28b1e60e34caeb0dfdd5d3060a0338b194e
SHA256830f3e34375cb6a9fb24df0f65f83a9704ef1ade802c0c0a22f6dd89b237b4c3
SHA512c775ad9a3212f19717f80f494bc1cea2188d9edafec8224ccb58469fe527b7b205abaecd2e755dd714e11663e553a09e6158c5aebd8bf54cdd22978df6ec94f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e9e12c369bf986c35ef890875ca32f
SHA1097921cf9c50a4ec9998117d6364998724cb2510
SHA25698117dd01a14749b1472a55c34738070221d46115e7fea4e6903f753ee3bc516
SHA512a685ba1bcd9a8a04e9fcb34e21e63414f9d28761fbe39dd55dfb564875bdb2e78a78035f0acccb55008f34ea9d83a7ec87b0db4a6916e22ca177a9ae26b87dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be241d6935ce2f05a550118648ea933
SHA137cdda14e28b3c18222d88229214cb76ce8444bd
SHA2566886ff6d27288ea30bd10cc42ac0f68a9f53318b7e9d1de7225a8cff3aaf5a90
SHA5124f853ce3e7e439e6e9edd0c87b8b7fe3b8d4355540a1e858ee3372f138d83f547a96c798d4e4d5d45b5b3c18b4613cbdfd9845f62bc118fc333d5f5aaa0a13af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748915bd5d9f950c43873473547e7ad3
SHA11f3a997ecd04700117825a8e1b16c9af6a0dec85
SHA2563bd0672c9da77d7183e7703d2eee4616571c05e79d1c3e0fb7cf48d421b5ba35
SHA5124c0ae4c21e9ae2f65827147eb852d6b6c70a9298dcc3a4e67f6b699f90f5cb2e922932b50dfb30fd75f8994807b35cdc67096d5f13bc15186202d42e2c719def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502edc60dd2e9e78835350377f49adbef
SHA137ad213b15bcb3fec8b1b0f83805ba5738f96e96
SHA256ae96d556725d81763e58e109231fd7db958e0d0d98db637bfba39e2bd4c850c5
SHA512c78b0905aef239f402f1b812ff991c03e83e1ea995a4e8e8388d98373e251cc83c15096aa96b0e40e3b36e9a647906427da68f704a583688b6d4219d4afd0524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d891037b1b5dcdfd993d5012ec67f756
SHA13f4f0883d190fb9b767fac11d892eccfa80f4dd8
SHA256bb04acb047af824670a01d2e6e597311ec501f8412b239d36473ff1286b6166f
SHA512f98a71a1f559b15b61a47db514a1a51dc3a79b588c0aaf205b91a933ddfed1d1e4ce9f76562a7ec3c6ed19cd4eb07a55c98cd8169b10a637358f8b73c984cb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599d50142cb26800c6d1f11d93d0d17fe
SHA1d45e4cba0544b8a1472caf9122c8e06c21b4d687
SHA256682a404a91cf41a84e9329885418b4c039c99972ef1657df250404cdc1ed8542
SHA512b039f03ebe0b4fe4487938d54fd538102f2e75a2b8c180173cb82b6be196dcef4669e498a0df89cc951ad85c3fba776e1904532803d9ab4eb71081938c624751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef82682bf4d9c5f5db340dd3d38e8eef
SHA19439401db378d736e8765a6a599a857a72f6edf2
SHA256b33f1a81d03925e6efc90e4668484f2c3fa87d05b35b01e21e9cbfdde31f11e1
SHA512d2883ad966d959628bd74bf7ecd50ec49707cbc11146cdd4097293885ec81e44bcc211b889785944e4493d59c4a0cf0b3059bef383714b0e309c3803eb0b9113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5112ccd3d1dc9c7fb299428b4768fa3
SHA13a2fb40647a7f898ab5a532cdcf256487c792305
SHA256e3c37d5135305799e86f8f31cf2301409f11f2dd69d553ef6218d52d1a0f2d13
SHA512e1f285278512ab4022e811e27e23d49bce7d11fa0e4dc1e322ef9ddda8921140a4a83dd329e800c1092bb292db4b40a548a98a7062616ee4fd4433d41c7d73a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926cb3628f0b69947059ad5c8b25d997
SHA196adb9fc630de286481d98ede0a1c917a9bf3ae0
SHA25688fc907ff413070a6b20115b4c510013fb7852c763960179fffd41f60563bf9b
SHA512a3799cb156688f7952decedfa8e2d73fac2ee7c3fcbb0be19da5f527e1f6f5c9bc60333d628762fb35bfcf8deb9dfc9ae6579b259c0e56c6add3552f3c573834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c65b9e1fca01e492173e282f6566b04
SHA1ce05eeff63f30ad97fae62440135ea5f5557d2fb
SHA2569c0ac0d5c6d6dd5375060efb41866973926bd9c30b12b1cb912c69459bfd61a1
SHA51233b506543d67ab499c7834285c1ed148ec00c7d43e1f3cdebfaad643a640bf4990b66fa739a647369cc45a97ed4b2e379936013bf080c5e2affe40a454f15424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383b20b61ae508d5386aac3932c92841
SHA136e85dea02bdcc2cab82983c50296f4f8bd0a2db
SHA256505070e102d4196221482c746748d9910375946e93f1f4f7b02a5ded5e3086eb
SHA5126d8496d2d3a2a8dc7665a13dcd1896e363bb187d3ab0ffeacf44b6b30b6ff6b54055e20f4258e3de51ea79cd7be11fec689556c8018ebf2ff4faba7b48b60748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99d023040c3976e042f409b5a20db1a
SHA15385412853083db97ffb840c820a6ef01568ea10
SHA25616f1b18fd5fbb5bb41dd8adf52a3c7a511ce82e61688a44412a9e0ca255b104f
SHA512b9416a0082e65b999ff6c803eaae08d40425e9929c722b530d8accfb6fdadde1c6c05d32c44b540c961b9b9afff2bb1ba4415431dd11d52d907a9a263b535812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36d9850475bad321f7c2bb3f50543c9
SHA10cebb9c841503246877f8d987e2ae5f32221b2c0
SHA2563358e2da382b17390d85e2f772b7272a2f03b47916c640556d2173a8cdbc203b
SHA5120db06bed91f51c0bb480146ca6df9e5e06c8f4f8031f9a0af24712131a241b6582a48debd3db65dbc47674fbf39f024bb3cd7b2d38ff60a6d93bb8c139034670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57351b3bb15ce40371c9b177c7500c64e
SHA1b25a863847c280344837e2f71d6584bbcc460dd0
SHA2569dc2a4e1803818fd93d03f568928c774df22651a4f38f2c4b81e109693adbfb5
SHA512ddb056aacc0f84d0f8db37982094b386921519a2e61ecd696fad3bf163e89319d5df4867492e6240af6fdeb0a45f991787f2536b492530975757b85f871a1e62
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b