Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
df0f31e8bcf55c997e361015aa2baba9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df0f31e8bcf55c997e361015aa2baba9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df0f31e8bcf55c997e361015aa2baba9_JaffaCakes118.html
-
Size
6KB
-
MD5
df0f31e8bcf55c997e361015aa2baba9
-
SHA1
301dddf34f015737a2a5e5a6aeeef23d25e77f6b
-
SHA256
de7bf2252e380915133f5094e129dc9702fd9c41000abbe0b4b6840d1b619dcb
-
SHA512
04385637b9201038810db1fda3af253240c55b09b2606ab5ffec7ee813c03b05e3d428df1f53f09d9ab6431edcad2064dd19ac0c2222f098e6c802c26fb4979a
-
SSDEEP
192:drw7uEMLb7l8B9gJ7raqbO1QO3q47BAl7He:FRygJ7rnOyf47BwHe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d7792fa0af522af0ecc251c87bb8b9d7d125d1f5b88579cae9cb27d91434e95b000000000e80000000020000200000001de2ec973e100ab16c4a965a2b7778957c37d751d28798ad6cbad064a735b338200000004a146ede48b3da8d128aaeef85ba1ce55faed86df6807c4c211b561e384c61c540000000986e7869bdf4890f54ab3629cb48c9c940e8e2b2b43624d6e21b344962bf112a1e75925efe5b57a222b792b2d96091a79ced881236b14c126705adffab14116c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9096c0ff3006db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432430382" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B519A21-7224-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2700 2172 iexplore.exe 31 PID 2172 wrote to memory of 2700 2172 iexplore.exe 31 PID 2172 wrote to memory of 2700 2172 iexplore.exe 31 PID 2172 wrote to memory of 2700 2172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df0f31e8bcf55c997e361015aa2baba9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a99f6edc5e222467bee9c908155adf0
SHA1e1a77af7033fcf07a36789d0ad6e9e6acc6b897e
SHA2564223f4f78abc859a70a5dcd40f2fc6c0ccc66a04fbc763ae6285b6ffb608fb32
SHA512eefcaa85e8664eb3cd65c92070fa0aff36590802c75d78ac3bae09d4bb9217a42d3198d1fb783872afd6d76a38e04d21b8e08646705fc4da4c3f078e43ba7772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bbd727e7cb4f0a0251d24d91022fa3a
SHA12f57d95ebf260918263d729f6e0644b47bbac953
SHA25635602d2df517ec9e51fa9e9cf4aca989cd9b184feec8467f21e72b205c1b64ce
SHA5122f4b0f92fb9e577ea5d6ff2d08ee160972e588bbb8a12a6c4a640e953092bcd6e15983e87bad5ac64459c9e856ef5c3cf3a613394a033fe9630c4888054becd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e4e2748eb12f0a8af6502f193bcd65
SHA121031f137a3aa29d46100ac4c76aa46462c8e56a
SHA256f6ff2f485a3f3dc7717ff5caf30fde25efed2dc83e8cf84ae0920ad91ee5a5d8
SHA5120e4ae49dd5ff7128be8e0a5d4374bd2ae1e308c6b2efa6bb585eecf502f94d11d73769508b4e86205cedf1cc6e87ed49f95a59e26054aaed31735c7376cde712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d68b678a03fa97ed5cad306975b9c79
SHA11f1f2ea97c6ef7d82a57bcacc4fe998914c319e2
SHA256ca6e3985996b2e5e53d14c0109a452ceca66e75c5b9a66d501c13faeec904dc9
SHA512b3615d9ffff725d353ad26fc10be378992c156d6644fde3ad6400d026c5d194649f3d4391a054a2c667e3d1c0a9258b0b088d3e3600534e29c0ccfa0d909ff0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c79f6d7ca946131527531d1497f078
SHA14d139299ae691dbc4a6185fa2b4e4bdde10543e0
SHA2560958212ce3033398f561846088ae7f63d9bebf0e904ef4a353d039f37e3519ec
SHA5121e60f0f129fa39c011834265003218a636a0edd087336b4fe6335e1f5804ddd5126e2c7bc3a98ea0a4e9a4f9409950afb1e12b62b332748bc1ce4feee2dab4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a477bd3a7b51bb9e1458ac13c2e067d5
SHA1aad5d4f016b90c3f1ace84e6fdc64349fee62e0b
SHA2562045041a1f2383d058753139012f3af4f17615287a8632d44f80da54c4bc7e9f
SHA51252f1b1d0af0693df2de80640ede3853548f160f4345db12eb6001200fa40c78453e1abfa79ea2e482204621894a37b651452d9fa82d5b47be9f7a5b4f1e1ff46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543a7f71b65168380fcb09221c6467808
SHA12de83e8598769410bd35590f61bc6ddbccb8e47c
SHA256ce7116215cd3fe8917d62fab800585ef4a63fe7aab7989707fc5acbefd8387a9
SHA512e3306839ca63a4f62181bbba8c8ef9c9a8f6ac73cc60c02d642413791668c4de6406ae192ecb2e9fcee8f64ca50957eabfee8c83fbb7dae540828851c3356343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972f00371c345531a9cfb120a728cacc
SHA133a7ccfc5c43f4b9079cba90749b7b065137f6a2
SHA256d911f81b86634497e407a7c2929464a16f90d17a1ca47632813e4730fa394102
SHA5123a2b7b5c6488976989225fcb9818cb2bf6f16fcf8209eeca1e0d11888a6f57cd39a0846e379dcce11b0b508608c98af8dc3011928582b5f5533307f13b8fb0ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf2d3818a2cded7f015046d3684b18e
SHA14d0f2217f532e632dde6d40c7bde251201befbc2
SHA256670542b883d645408e8af54fc1e60519b9194301cd546328087315a111eba549
SHA512171ff829919adebf8c02f1b51bb755cd4e1f886b8ebebcbf0b62379ac74ae484f7632805bcbef8540107f1d2b16d7e25147a312ffd8b9e2f497102476910ea98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e1c84a9e1bc55f38c117b9fcf854ef
SHA124ef1d7904cd9fd724793f97abd03e437df2a717
SHA256d43e450307b668140f3877f4368ce1707e6912f7a7f75e890ab356f4e98ac10b
SHA512ab2b030ce52f8ad37d55258dd32d20cff6f285ac4a35ef5c490c7c06d5707b7273dbfcc7bc04ca1ba02b4b1f126e5ae23579b3eebce3a96c443e505904d46f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808f2e4ca1d33f8dfaf5d713e50c486f
SHA1861ff862afb2d34206b91de55581030ed47b368e
SHA2562144c336969e8bdeafff33488b9c027dbbb89f9d939eee0d22d116151ce8fe01
SHA51250d9e0a7fabd35d6c07fa1c407902d9d77890b6b469f46bf273c4da495d1d5a5cb8ed685fe368b1eab30178c21afcc60da9a1ffffafb3c258ba41d014c08e835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500fa0768b902cdcd60102980f44031d4
SHA1a349c2e0f53235fed95c25707e0ef427a0aa84b7
SHA2568a2a7401c7a310654579f50d6437d9ce7e22e53a6d8086f22b0f0fb7de854369
SHA5125eaeff75d2859e4c1f7c29b2dbff511587ae79498663deed2844ef30a6d41cfcce54ae380ba53187b9e2d7695b75fb6f76b0b0ca1671afcc2bcd82a678cb4311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e28012cb6512befeff83e3a90c5e564
SHA1071a4fb1d0fb3262755b7f9995bd1dfa35fc09de
SHA2566c04f11c4702b1c4b78e0e6a07ded4ef0b406c834b0ca329052cb8db1c354dae
SHA512a8fe981067d087445ada6c2d6c80ad13b36891d649e395ac5b4672da1fc9b5a7a7bfdea601931ff666a667ee2e084ed3baf11e2505e7e898c3e351812cae7c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5198faee274de0b69e43b42deb6a0fb95
SHA1fb1c28e6403004847d7a8ea3b195eade2f9876c7
SHA25688a94a203f779f7a21fcf3e314b745bd50349131b544924cfc0d59533a542d2c
SHA512591aab857c99fe251c61105623f9c59593a20ee0477f1baa610f226ec4601fd65d913c54556958dd541b4efbb47fc028e08a89a6cb869a47ec6142bf677ecb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6fe2a03bbc4ec1f97c86a486d45df3
SHA141fd7ba9754b4f578b34212cb86b1eaf7b1e8134
SHA2569123174b8dca6b20cca0f6d37e44f41f31d5286548d1e749bfbfff7c0b875a49
SHA5123c597bad7fc639a77d1aa5926c0c01bbd9597ee04401327aa3cf818642a6861e533327df33efff16261b8ae6e26d6b1b0102100c64b23b219d2853867f51e995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1e22714b9379f8eb97f1b2703db4b8
SHA13e987ce7cee39b45fc8129ae9d7d235e3b780c39
SHA256aee2fa2c312b8c93e6154c6707ca095eea4c62489c23ce92894a473a5d39ebe5
SHA5123a9b652abe6ef4de2a4ccabdd5807b009538e47648d937dd8190c8583dedffac41d2d39ad33e23cfc7272a0522943044a4f127002b51f6458294a4804c0b8d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c4cbb05ff9ebd89ebc379346c7a3ee
SHA11e8785dcced78c9225a26145089b04e8d63c76da
SHA2561d5bbd2a152756b1a3c3f29ddc77fc51bcf174bc4603a228997bbbf3fa69c29f
SHA512e7ad4a9dfa73394ead07ce25644de2e1a4be8f848c4168508a711d0c8510126b2e709a9a64b76f4abb7aefd0bb1cc7cb84a943355278cb25b6132e7a79761830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb37d8d21879275f1d99cd9af348e3c
SHA1dfb906d0af6dcfe88ea8668918351f9acde0d28b
SHA256124ac9debb443fe09938666acca3b288b4c766f421ccdbc41eb931195dc1d0aa
SHA512da8349b4da99a97f7d8ceda5dd17e5c3b4a256ee57fa28ee17586ae04f8b6704a67f9cfd51e4d492071db23fdce9e9d76666737d49f21cf4d8bc9a2fd6963354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b51f4fda4ac1626cdd256bbbb10360b
SHA17c1d2132bf2f82bc2e4cdf4b74cdc9fb8a30fb48
SHA2564331fa27815b4f8007eab52905db56504120ecb8130704b7640fce8b994e6e50
SHA512ca457a831de41d5cd31e62016bc47c190c44316d97e09f738f16fc28292c53918fab13356291669251046c9ced9974aad1735e7c1dae802aaf9eeade0bec45db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b