Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
dcf1b190a58a5d1b82d891602e83ce98_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dcf1b190a58a5d1b82d891602e83ce98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcf1b190a58a5d1b82d891602e83ce98_JaffaCakes118.html
-
Size
32KB
-
MD5
dcf1b190a58a5d1b82d891602e83ce98
-
SHA1
34cd39d59ad5b68f1fcf0d747b48ff25e164e304
-
SHA256
25701427314ff58db7c40885e53db7b974f9b1e22d6fba6b3b126cbdf0f5259b
-
SHA512
024fd3f2f07ce875483c10b0214232b07ea0b7e6574a66851e6625fc45c15d010cbe6a06b5d0d1c6cd22278636eb00f4324c7388bc8d32d4b5e505aa4043e875
-
SSDEEP
192:uWbtb5n1XnQjxn5Q/wnQierNnBnQOkEnt0mnQTbnRnQAMCxAqbLU/IfyINcsitOj:eQ/4TVLuxVP2ZIAlkEOSx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432332672" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABAA67E1-7140-11EF-916E-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b07cdc6dd99a6f5e7b1a368346f004bab0dea2e7d81bc4470039225f84f788ac000000000e8000000002000020000000e91631dde660593ad6d6feb6a282ab10aa213edf50552205465a855dbaf4e58520000000aead092886ce91ffb6aeb03256e0126f7d42b5365b1e144c567fe458a508d1c540000000b914f78114e0396314f253107e6851d0bd60d21bfabae1a2827e9fb0925ac3662509d7d95797c91a457c6d3116edf723eec34f21359e48c5bdf71900f2e1b571 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b86a804d05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2868 2220 iexplore.exe 30 PID 2220 wrote to memory of 2868 2220 iexplore.exe 30 PID 2220 wrote to memory of 2868 2220 iexplore.exe 30 PID 2220 wrote to memory of 2868 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcf1b190a58a5d1b82d891602e83ce98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938c53f9d26856c47ae455093a92f288
SHA1136162481b0104874a36c7055820b7d87f60f384
SHA256df055495c6f4d01f1c6ea20db5c25637988d62673373661e4043fa44b73a7441
SHA512984d091f39deff2b29a8ae96d08a41754c04ec7a7e20af78109b643a345a1a0dbade3028fd7f2dc4fd4b8aff0e56edadbe8d3ae5e49c6f3140c536f0ae936a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8c93dd7ea73f3954ae82214912c09c
SHA17d6db8598bfd8436cae85338af89157e263873ac
SHA256a195ae69bc66ec9de775ee3bfe083ef80df213bb235ff47db7559f26c2e26ecb
SHA5121e5845408f2cd02a9c699f9e80d32f7907d9448290e4f7d9357a3e5614ad6d25f49cbababa24c7d776f5b607d0257b05898a9e8df3c923fc34e50f7066274513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d998516d1a36ace19ca6bada88061ae
SHA1b86245f65b3358ad055e0c55b42da021156fb266
SHA256e09691248ffafdcd41813f63d754ff53647e02b3ba0fb233e76fc6a0ebb23074
SHA5125c274e85191fd5e0f5794034335ea9f4494dba99bf8c69cf4f6bdcf6ff06ed62fe336ba17111d8d21b9bb531482bd1bc043082c28ec518045c0f4daeedd1bba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f676c614a4c380944556ec7e9f357b7e
SHA1e374eaf731c26d80beb21b4bec52ddd0d21c6bbc
SHA256f2388990ba3c069a471d2b9ced405a8ec565d55380bb9949692d449acfcf2342
SHA5126fd726fb00c82161ec5f3084b5ded6dd8c918853ecab490557ece97eef1f0238726b88407ac447fb9072b5887a70ddaea5d94d06c5f89da870d76a61a9c00b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570666303b4058df476907799090d1938
SHA1385b7351bfabfc98200c482519a3ababfd3f5341
SHA25614bb104246fa3bfad1054fcca280c69afe5ff74f4090ec3b84aa761eaa350f1b
SHA5129e1d7ec94686dbe155f5df5d7c612c3dfcf350178d3441781009c66deda55a30cac5b5513fb5d4722e49afe23a1d18659fd0e1a50c9369abe022a136c52237ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587749ce3ab5ae5f426de4e04a2924dcd
SHA18d4acf9ca127b8523a7831d517a2d6892f9c74c7
SHA25600954de4e25601b3433700cdbe50169026b4a59fe4bf79401d4f7940c584e7f6
SHA512f82eab47aacbd04cbe92c1dc9cd8dfccd5c0d00aa2cc0066bdb75616a68f0c546ad9a1a2eb0ecaed434dc888616cd29f0f19b8f2150a7760dadf4ef0167c0766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addb4d870b4c0320396b7c1298ff248f
SHA1f1d2384f8e9942f924262eab910b5e854d70256d
SHA2562277276739e9200e8df694cae2ce3dfac4871b7ac3ea741fed516e1c776d08a0
SHA51294f17787ec3a12ebf31494611c77a55ca8dd8fd66e5837c949bf695b14590c2b76c61e1296e283b187c89ecc30f4556b0594c9c5bec2594522dea604c8660d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14bcde1e9e40078ec859488d90eb022
SHA1cf7e9db58914013e79e13e6b3ccacab6af01611f
SHA256cca454a797450b7499f7d05c9764f20e43ed72890cb2cb50e6c71d8b1c0cb7a9
SHA5124991b8c0162b26851a1b48ff99d401fa00dce533d16101b00dece07785d890cacb17c55074186347305f111bc126b46aac004298f78585cb3c29e2953bb45f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258339224529b19349d6e67496d59723
SHA1803cd1f64ff48b37fc36034af535cd9ed4bb783f
SHA2567a52d361d2fe1b73f092d2599114190af819d9a471d55c15592bd515674574a9
SHA512a9f3702372078ffba59dbc16080677475f8eff5aebe0fc66fb8d0cda50072960fe5eac5d2b07028d9ff14666ef3c134921c468dc106caabd121b11a227e4e95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592f69959eaa4d9d7acda329089db4c54
SHA14fa47b36f1f479375a90863f54dde5cef8559665
SHA2565a135139402d1457dab1034232bb45454c91023112cd9a7bf19986cb285bfc38
SHA512bb30adc310d2ad068029394d8a44fecb91bf54c35900a1a16534de4db4e3189265bec5e193ec84e7ef5df844384fd42aec53a1bba7caa135a4229a101a39e802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a639bb745e6fc89bcecb378a0cf699
SHA1a8479ac402d8a62d87be59bffc94dcfd299e36cc
SHA256b249bb7e0e27362eacd7a59b28ed2def1b08c3f564f7d126e767f55acc1bada1
SHA5122c0b9a3fabd7dc960ec6fe94a4681e7f3b3a0a6a015a193eb143b1595c6c5c4ed06ad198bd7f1b0c82b5a535c6b2686a5bf817b7e8ea8a7be318eccd046513ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9e76552a4b49798cfa10149abf2712
SHA124d52496748ae250d4a0af4c01e30d2fe194345a
SHA256548c88e99c5f066ac27c2ba493a7309341677a479d45ef9566b3ae4082177236
SHA5121b84ea7bbe085eff8cdfa87a9c209366247f60dee1b2b84e32d8cfee22e8df576c26b55b42017caf4a418dd761d8cc7020fcc9458f169ff5303f3ab321065692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f89a132642af8b8721e5bd51a537f5d3
SHA1c29b512f367041fcc15f72101f75d6f51db19436
SHA2562383e82778fe947dc62e3b2b36d3018af3fd1e7bd3eeffa7bbf0c60b02f04af7
SHA51216c8ff6a87735dc38f8094a54b533733ff26325a3418b42fa4af1ebed66c26511fa0797c5db6a0a1130f862ffa6d0200aa0674cf8aa3a0ff5066a69edf9d299d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f55d600e3e7950dadc3d88ce63d87d8
SHA18a0546271442c31b026863752638f63543ec4c12
SHA25698cb77b38ffea8e3a5d0c7eed67922ea1cb625424f9d0020a22c795daa843341
SHA51203860e59c663099081f06be7546d9f2437f14c9477295e17d33828c7c9bfac34a75329c588e6466f80e18ada16012ab9cfa9b1752af42f705f182910f7a22fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2e3700a64c0a44ee9381b7b284035b
SHA1b4f653aa74f5704c4b1e09604da6cad7fe6cc168
SHA256cda84bb4762f5b5022f8c2dcf6928b3afd6c07ffa5369351b379ab617364211f
SHA5126bbd14270a81fbd8f6bb906cd6d89abcd58e3eb2289d10bc137612a5cc4446a0d176da3f0f04a83ff952e54c2f87a1af061eefac991c1574b19ff6623c0991f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59913bbe6b0bf81c387f106450658e829
SHA10baae828cf9ec7e604b985b065d6c812514be687
SHA256ab62aadadf5713981a3b178e795e8509aadf529fe5275fa1bf34801fd2cbabfc
SHA512f7228b84be00564089b32d4c7d1cdbaebd4c575cec7d57c7017e1ad0615ba1e1d50e6844b00c4a5eb1daba92827b9b54540da7d3de845217c0405eed6eeae123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04698bdc4113144225e0bb51dfe4ebb
SHA1caf8b966eb23bbb1e188b75fb6758da3f1d75607
SHA256d8d9723ec316b3a456d78f445b46bc11758c4a162120ca4fb22559e22652a682
SHA5122461fba65aec7698148f61bb27e20fb9aa9a799b53f9fa60d1dec317028f6ed2ae095d78b85e26b6a3bd1451ecfce56cb30fcdc5b8ade2a681251169434c8d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1645a10224c46027aad6ff17d2244f6
SHA18d57beb6fc82acb722dbe1da097d958970925424
SHA256290934f20486a100b8172cbb629bfef20b5d3f98c8a5b138e849876d8515900d
SHA5127e95e6b805da827dcc88b522be486294ac0f498d8bb2fcdc63756e38a84e62255f5cf6947016ac1c8159112f7cb0aeaac0260ef9816ffc5b8e6d09cb657f5fa0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b