Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
dcf33079c82226bf44b6bbe44b375f0b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dcf33079c82226bf44b6bbe44b375f0b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcf33079c82226bf44b6bbe44b375f0b_JaffaCakes118.html
-
Size
10KB
-
MD5
dcf33079c82226bf44b6bbe44b375f0b
-
SHA1
8f62045c7dda09d296ef35657dbec0e348b416dc
-
SHA256
1c7c5205c918dc306da5bfee8a23ab6a7b580d2d67d89bc1295cf9728538a829
-
SHA512
d8f65948a198977909a5af0e481ec6f65075de910bb0b9d59e2bd37509097305ee291019a308b84d48890ba5dc33686a477b3ef9e8083a8c87bd67e8c0d639a5
-
SSDEEP
96:uzVs+ux7W5LLY1k9o84d12ef7CSTUOzfym/Hl5mX1mtTBR8BqYEBV1BBBoB1aZBl:csz7W5AYS/mgaFlYqDlWN9okYBb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3427FEC1-7141-11EF-9257-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b096ba0a4e05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432332904" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000db41b83e2a9c160946f8f99822267212ac67f714922dd9e14223ed1c492420f1000000000e80000000020000200000007031cead07da5eb259a040710372c4db01feb6772b6c493eac1d3b6afec31ad2200000000a09d0b639168e8fc06987bb1cff29cdba35f5c8d598163cb70c3901768ac7dd40000000a10ecddd34221bc7666a0989b75f788cfedad1b7943f32b1390a78178236eb5d3d2157567f7142d2bc209898ef06ca6e4ec7418c8262b1c2c96e2f5120748c24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 iexplore.exe 1600 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2396 1600 iexplore.exe 30 PID 1600 wrote to memory of 2396 1600 iexplore.exe 30 PID 1600 wrote to memory of 2396 1600 iexplore.exe 30 PID 1600 wrote to memory of 2396 1600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcf33079c82226bf44b6bbe44b375f0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e6fe98210167b9b08458eefffbb6d4
SHA1dee8d0c6305bc700f91a071b56df2e9b524a2c30
SHA256b8c7dcffe8586e453e5ba98d1c1e2c8092f2e752ac667369dc5776756c06cd67
SHA5127b13f14426aa991fff404e47da860f2a88672aa057b5299f0e66d3837ee125d97f233e2138f89c4620ab2431ac2f73afd757bd1d14550d1f5640d143b254540f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58520a153edb9ff848ff616433248ea50
SHA1741390a6410629a8cd9095c3e0b3345bab9087d5
SHA256d43036fb46dc9fb29f46fb690df1ea5018fc23c5c6328bf1d36145be6fa37855
SHA512c6a20d269bc517a46c89d71841f01994e388a9b7a0461f13b03f03139184c2fd027762353565dad18a72c22d2974eef8cc6f97539fdba551c17cd9d2ab33aa37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a7ba64b86c5cccc05256d0ad3051bb
SHA17e8e276ba839db7dde5e33c30b83a77773af9c09
SHA25670eff1ae7f2d037ce460604c07b6c4efe955b17509036da2888c00c67af716a4
SHA512dbe76adc7433692aa975eea676efa1399bbc7b4fa69b01ac708a572f7ccc62e2128e3bd3da4838780596adfb3eb5f9e4442b8d55fcccb3b6cbb9cace4d21cbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ed0999fa5f6b678c900971cae48c4d
SHA18398a0d0327d5af249093d30fd87249c2a45826f
SHA256943ca2e67496a08649414293c7394383d5636bcb63599f73ffe39bd951ea29ff
SHA512f972d2f3f8427bb8248479f5052b17a8713ebf0c07209f1a504a4de0453a5eb4c626adf185a4c4e523c852ec57299b20c0473eada48ba7aeea443240805e6f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b074d0b3e58466308d01dd476a61b9
SHA1334646e417b865f4b5dfd2e539bec6de9a38c79b
SHA25685d9a76609c38383112568c59974271029ab321382d13eeca315b81d9e9ada07
SHA5129cf608f365a9f8f6e82a475fe05d8167976379c79490b50c59a53e2c2c2bc50ae309ebf1a52f7ef37a461c874007d846c3f607f37ed8e784603ac03cde5cf822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56618883bf4a609b1622f25059db7b8
SHA1fd2dcfa76b58491ee180939c8dc0eb36d00200ac
SHA2566b6a6676854ceb2877145d930daf61e0e7fc4c672138f38e561f52d2a9ecc396
SHA5129fde1570b96036c5207d179ae0543aa4c6fab6b10a19fd02f655adba20e852d4ed0ef2d1de83106f02067f2d4f825b5d06e136afbf919d0e89f23cd9fbf499aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ecd698d93a9ddbbf02ccfff1cb1c73
SHA1a0db9ef912a6725d8bc34fe542f3019d24aeea98
SHA25666d426a930f62a4e541075648d274e10ee1470cd2e714c0b1a66359f7f625c2b
SHA5128f1354062b632360840b7242a8ebfc56e6d2411bfd4f98bfa0060214514a11c084646728a9635a45b14c87d3e0d81d915dbd64fa8528312807019efa26d6050a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a17dc67be4ba06d4095ddc488d68432
SHA124ac2520cbc9d83e74a5ad92d644565305f93fd7
SHA256f8a514aa3ee20878092aac71b366a19cd7f7acf5e715aeab5f6f0f623e45f347
SHA512fe87ce6b61027566ec748038d559e31b4d73ca91df11867926917350751e4b07bba0387428439e363946e4b211d3c68f96dac185b67445c4c698b1a8caeeaf22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55203bd3bab7a0c4adb68c9f1208e0401
SHA1b47ffd65a929186e432eb6121e1832937b599188
SHA25688cb05e6b8c54cf687e2552133ea5ba49b3d1f4d1b6ca193e589407222319f07
SHA51223eccfa00bedc5a527388c54baaf7b0068f0d669d28c447f5f7069a52ef4dc50cdbe890e1a84364deec1dc3e88a267347eb6bf203680f9744f53b271212aefe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626ff5a3f6473bff370b47aba2a3ec89
SHA109928e4621a8664546eb003eb1aea0156c26feb0
SHA25686e1e35091e2677e4e8022c9fba84e371875d72b685f1cfd69837cae9ccd6e12
SHA512a2ca462aedc9358af7a7a12acdf910986ef7f414d8d7567ccfa5ef69b2360eae04a767a9e1ed2e9290a11c4611138d05948efac04cb60cd8e9fa3a974abf0395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f1f429a5160df82e0b8f6ffcd3b48c
SHA161da88eee1537822cce7c35d39c46b5447dbf0fd
SHA2566bf81d4ca40ad9f397a6e0a3700088cd47861bfe5abb817356c93a4511b8dea4
SHA512a2821f1a6dd3c0853ec909c3371d274dfb9350578f2a18d0b44e2d01629d3372e900ed9d23469fad41d8b5f6cd00588bc0cb1fddd2b1c6e601c6f109dd4eda7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187cae1be31f0dc1cb6088f47372dcbc
SHA1b9d6c247cb9a512c55244fece36f24df93ea74d3
SHA2561ef0e01599f4d3e36eef5698f75671728acbbc685467ef02c37093a40942cc73
SHA5127390fc77416e8023e7e8ca5e2a92465278ab74bcbd8072bf7796acdeb0243cc1db6400b696661acde4f655bdcffc61cd6b0fcc1188bb4874dde983ebc3bc0e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a9ff8498873ae21a3f598c9fdec6d0
SHA1035bdf5359b55ebf7fd987e26fd9c9f05e605a76
SHA2561bff2cd65668f7d9176018975444c3292b5872f5aed3d305ac759d2415eba00b
SHA5125070fd857c2be9f4ef44bf52414f941b468254409bb0c94981476891ee9c27af2307786e6c6991dbf3334b75eaa3a8c12e7d4c80478f3820387b22c8ac349ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27c188eac1d32a54ef2da80b6221c94
SHA18e634cb29fca685c0d89c37a65e8c45ed700ec57
SHA2561bf00b7023c33b0054cfb31103e8d1122424b9d9129fe7cfdaffa081388b932c
SHA512c29381cce244406b76b4a0df3d7fb7d2d2db64404e28d6ba0d27794cc231a49e5fb6c3143f1ae65486343889cd5bdbf5f8e3ce3bed25ccc1f6a8bd4dbf24f808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66dfe73b2d3e794b8581d08ed30d55c
SHA15c1f7bfd3c93e21af6311b41300adc4b4ba372de
SHA256c5c0db26fe9b320b1c43dbb49a13b9ddc4ee3322c40aaa08e903651d38016b6b
SHA51294e1983725bdddd02b8fb2bf1735684415ebd1c0f1c3e1700906554ee11ec21f61818258614d60b9664227e69371b00a7e8f011a784dce2e3ea48a4d00f3bb74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479233d7be4f005defd0151fcdcd95de
SHA1616d2becf63ca7a848be7bfab93f7b62559f8653
SHA2561a34b2a27e015c25b03557ea1697610fb4cc8862452c6ad1ecc718a8ec73568b
SHA5123bb8b84d19b019ab707e1f685f6c228cf48617f773908e16ee25f4c0b0523f5d2c76db4b0f57186bb480aac3858aad6b4141ed03176b5c9665a4ded56ea85c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c8e009d336e8accafd0b64705700c8
SHA1af6b4752b34aa3d473ff8498aaa36c265f64f344
SHA25662cb421c8ff73bb83eb72bb8ebdecaf4b1ea5d4c9aae171fb337b693e48459ca
SHA512f8fd6fd0fd1737adaf5f209f40b7465ff6121019b55ef071180eed154b8a82e937e376a02dc32d9c7b0c3d9c74d559db04b6604691a4eec1c794b145b2edd4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c08b4b59195eb3d823df64c522f4ca0
SHA10a79bdbf10fd689a7eea9b1b6a21df235b3f9461
SHA256a938bada051a95616fd64daa8837258272e9c2080146c9544a36e125b4ce6524
SHA5121e0b10f315bb037ea3b19eb34dfc2dbc10934df31f3feff89c3ae8bd4e5106b1bd2d307e69b9bdd7b790a9d9a8c46a848168976f38161f8ffd3682b95b83b8d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b