Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
dcf908d33cc01aaf3c803a5ac87b7f00_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcf908d33cc01aaf3c803a5ac87b7f00_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcf908d33cc01aaf3c803a5ac87b7f00_JaffaCakes118.html
-
Size
14KB
-
MD5
dcf908d33cc01aaf3c803a5ac87b7f00
-
SHA1
4f48223d74baec85c131c4500ba2317efc45683c
-
SHA256
2aaf94fc1cb4ac58fc54410fb8515342369c91f74b73915c8e753d4270e0d49e
-
SHA512
00d70c3c74680bb7b86d9851c66e1d7d609731a01663b5a45b4b7405a72884e9b1a377262bc84584930598d455a2f4e56f86f2c116bfbd3d0cef19cd7fcc902f
-
SSDEEP
384:Hl86nKFzKuqChZD6B+guZBrHlW6yf2hFI+wUQi:HnKFmLC2BDCrjlwUQi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ac6a1b5005db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000066a0063dc13489c915fee4ccab3c11e0b2ba24c036e8222ce35c4f9c2fbe3b20000000000e80000000020000200000005ce11339a35b1c0a4a8b21ba91410cde7ac0106d8ad525b6c4afa46317e33b50200000007b7925ffbdf481eeebd105174b5332152cd6182856c4696bd465edeb17f7f958400000003ce7c610d12a1007f70c5929b9cd4bfa620b3378783220fd1ffa0774ee422c90cde865396d3e16456ffd21ce2f070eb38e7b35b9796cfbb5a1d6f8039dad48fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BCA81B1-7143-11EF-BF61-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432333745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2304 1992 iexplore.exe 31 PID 1992 wrote to memory of 2304 1992 iexplore.exe 31 PID 1992 wrote to memory of 2304 1992 iexplore.exe 31 PID 1992 wrote to memory of 2304 1992 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcf908d33cc01aaf3c803a5ac87b7f00_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58519507f8c4f68b80e23d13c9f47e6ee
SHA1805a3f61e458576d56b866c9e0d3e38870033771
SHA25614ea8e602d331ade0e2c093911981cd1cd62f0f39f1fab4ef9e7a6bb7454f65b
SHA512b9d28ed75e4243052b2ef90c37e4d694f4c39a19ab007b2cc4024fe5bd2796d6bf8c9b2523d380685417042181ffc8e8055051ddd3b1e1878810a9966ce3a8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c57294eeb78a441d603c84385bef066
SHA13f85f0e4f7be96807eb9a1b90b8fe7976706a41c
SHA256fdc55c391c1566e1d46128c59d4bf080648eaa8395667db56af6ebcf031f8d79
SHA512b63b584532d454bbc9a0d504bf27c7f7ba19c86133979b17a8cc3dfee532bea4f89b916945cab5599afb75f3460d8cce3194d0fc8bb17335c2dac8f02198620a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1afb04409b0babfb12e05c5d0d9b26
SHA109e7ed583f634f6187c0da3aeb0dd8ab79ff5d28
SHA256606aeb112fd145994476d58435d20b23f2174ccaebb6665b916aee10c30d8da6
SHA512ac327bbf6fbe6a2fcd294135663a038825279ad353d6124cb3719d81d055e7f45a58249242747a44a313658bf82edd8967e1c135f855b77f742708ece1c6c794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a627ae69d31a4c5854956bf6c99050d6
SHA12f877e4e75b8e3f6d0cef93223fd9c72df66d39b
SHA2561c268d605a306b86953528ddab20e4ff6c529ae2d348455c0a70c453a6e7b4c9
SHA512af3fa3ad603996722390fcc3af82df35cc7a9852a85fdefd019a77e168c01a79ae0ce5ce6118adb2c9e404be05fffb9ef5f20c17fcba164dc57e1b5621b71470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541de2c2f59b687830ba83ab61330e087
SHA199e08448a8fa259040eef53e9eeaa0933cba7fef
SHA25608ee720e5737adc7650071facfda35a7a5cf5b708d90f481f0181a6dd418cf3d
SHA512bbe1024ceff4c910d168b3c1137340673bd003594ffbed46953d2cf327cafed6e4e48edb461959dc6cd920027e3a2b6cef3e1b3140634cb3bf9ebf751e3600d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbd3d9d27e3957875ca36b4ae3624d9
SHA1de769054cf1abffaad90cff11cd408e141cf5221
SHA2566143c54b73a70127339a1d1c5d1da1be256787525b718f53938a55d2adbf51c3
SHA512205dcff19e434d77d5e7ab06cfe5e233448a1341f714007cbfe06bb0933e8671c1c4c05ff88f8b524e0d12eb737676f180b1b65e2adf8c408696577d14d111d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b22453c0b0dba6fe5958a226aaaf8eb
SHA1fb6b34d9e184fdb88e140cf21f218bb5c2fe3b59
SHA256d960be01abfc1edb72479767a695dfb6d8d6199835f436f16add87553d4a8f3a
SHA51236300d7bceda5720bf466727aff16166a85d69b5f43263410cf13941bf1f0ae426f25007ccc01f873b96013b586891a537a47a6037e7995480c7be4850cc784a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8951f5ff07d0a51b7eb17626711a89d
SHA10b0ee7deb5bffe9818a6f7f8d81516eeaa3ba07f
SHA2564f51696fe35cff96ab571bee7236db13bf384c4e5c8656914b3a4da4ddb88c54
SHA512e152d0140972d46b49df0f13f55298546a62661aa06d7e7af3c9645be219071a80ef301bb12ab257638f49d513989afa7add1021cd765668a06917c397407e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a651c412bc49ec7261babdb59c8f4f2
SHA1781d8b1cd0ae7b7a83aca5792477caaff8700397
SHA2565718a9c13861bce3ebca97da6d4c8375da27d01d0cc38c40ce074ae31a2df75c
SHA51256b279157ae6f2bbb8a4c0ca7fc419a708c5180db1428edacf7a18cc8f627667f4429e356ade484a1e2ce7f875b9558cef4578ff3ef3a203eb42136a7689fb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514628faccd2284203160a493545862f1
SHA1e653efbdac83a9a4ab4b88b39cd9519e93f30d97
SHA256961d246cfa67f8d5db7cbca2f598d97d1559981d11879dfa79c89402ee5d4cb7
SHA512a6562776060acb20c5dba5a7a6951c13c53e18e0a85c6a9479a777b9d32149c27719ce82fe72bf5f222b68a05ef1de151f438b5b2db10f93f5fb48e5c41ab5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50681e194edac615a237bf26c249b2691
SHA19de0621316156e8f8aed56c33665429503f000de
SHA256bf550c3132897c56a08ba226a52d4e03774fa2b7c5449ed1ca6b4ea061f314fb
SHA512b3628e37332be6798cc1bd5046574abd847b7805bcd6b85292d98345872f471bfa2dfa6b31f73456fb6016080d8e7bbc03508eb61312a7e4e8398d9b4d9ac496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544ba107e048670c0256aa51779eecdf
SHA10226644062f9d35ba57f0aca7badbff6283954fe
SHA2568a8b05b89275cd0bd3da52bf7346047fb83dcccc8a3a6c3cb390823bb05eff84
SHA512176efeddd57f8abe3d4b2421a26c6ff374322b8b1b6e8fe66a82b6f12712810adc0f189bdfd031c2e8c8f3ce0875ced95f8f042c1d0bceadf8c29ccb22f04b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abe9801133f9f928476535f371e7bd0
SHA158477911b8662e577c52b085b064b68c85ed1ba0
SHA25641bde2f8d415af26406402980731493b786062545ee8d8a6956da9d96de1f15e
SHA512b132094fb2cf9be525a594480cc52f48bc8fc64db725cdad3fdf69ff05a7118bf471d0d1b893ad5a84a7d32245f897dd9658ad2349774298c048a46116c7e156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d209b4ee80fe0e68c1cfabe49843ff3
SHA1b3b0af82791d22050c0ccd6e33e6d3881e30e9f3
SHA2567173ad711f2049c533ab2b515188c6d79bc1d13fa4ae0f6d4649c5fd998e9fa0
SHA512a21c53d33784d3421dc975b282bc04879a8c661a275f20232b8879296ca1110c694a9c0539f826898cae499c3ba1f488b42ecf22e0a6b8dd7c25652e7ecbc324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef94dee648e12a942fe09f0e22c0cb2d
SHA1452000663b0c2b75531cb50030d6d2f508561276
SHA256c0eda9d3edb44025833057ed03ca57929b30b50c379d1474984e2ed6a751ed9f
SHA512a0391771f1738b5db1ce9f0bd77190297e7816ac1345e6c7fe3122812957c98fb5460e3a242b332568f364fb77eb20597433e89a8a9c82bc3522f6f298dc131a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cfa344e4c3dd26d8dde2178deb6631e
SHA1794b6da022a19b155eaac543a41deff3a2a51b57
SHA25619d599a8538e3a830ede2f2e21ec3ab13685d590811eb8983867ee9aaf330291
SHA51285cc1fbc564cd329e88bd9b94c377ef7c73e85fcc648be9ae37bed7030a612844d977b4fac5eac784a0027d5e1c79503fc11c44b16ac11df7ae7078ffc2665ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9608ad1542436413c805fd2e13cc2d0
SHA166855dabfc028a4b5857fc999017ea4441595fed
SHA256438ddfa9c8b0ba28876d7208acbdbbdac500224547277e6782c1d8f229f06e89
SHA512183ebb073c4318539144419aa74914bae9eed5f885760ae91107ed7164f49dcb402c390b9d3097a3440b5476ed394d4d135bed6557a7948a1018b221ed2157b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3513c6bea93b1cff2270c81629c801
SHA14eca19124459f0d6935cfe26de27ecc850482b19
SHA25603c9073062557cf30891b34c945b5ad8bc2ced9f844392e0fb23e07ca21a7de6
SHA5128379d8926159d1657c75b1651b5283cb368ab168eb21739389fefe1db8f7871f5d79a71d4e3f4f301481ed0458e66e587aec0e7c05212475826fc17fb6b4a43d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f1c36072f463dbbdc35aa34369d589
SHA1bdda20a71f2ff294368d63b9525b0850d2c20cef
SHA25631167aa5dd69837a41118be01c4de53c7a17b628c88d825a14cd11f9c3022200
SHA5120ba46b02a1a63c3a80b08352ee95a4312eb5e0192c7a698e35afad7ef93dd7d381933b25feb7745351c93364400a09365576c5468ce6da47068819fa7681f19d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b