Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
de00afc13d50d42cdf7807ca4c3dc47c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de00afc13d50d42cdf7807ca4c3dc47c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de00afc13d50d42cdf7807ca4c3dc47c_JaffaCakes118.html
-
Size
6KB
-
MD5
de00afc13d50d42cdf7807ca4c3dc47c
-
SHA1
cdb30849a0c30a06247416cb4a35837f33e3674d
-
SHA256
40ed57b08eab09b1b0c21b0d7d742251bc36f7a61e38d198d9e0deda46a2ff11
-
SHA512
ec35951f4554738338f57dc22dc445fc8783decf8952a3e5cde5962b9463336010754018b23cfabdbb5c6d18490204a16a1f6789d04a79f8df52827498a3d131
-
SSDEEP
96:uzVs+ux7YSfLLY1k9o84d12ef7CSTUBZcEZ7ru7f:csz7YSfAYS/8b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D40D0BB1-71A5-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432376119" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002d4fe9df074251545412314c7958ab38972b6612637b7408bf2a2b2c9e5b83f4000000000e8000000002000020000000871466770ee15cd5fe4cf77803aa205d4c212b3860cdbca69c879ba7fcd917c2200000004a5d8b87439f92caea11478ec194e095a6eb961cf93195dd53b0a36e479d87de40000000f80398a0d759630bb48ccc1cc82e4255fe4ea37ca1e0e4f548de04f292ab165de7bb2a5808b2e5481e2334bd2c520d5856c79cafda48735c039deb2365b2798f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3044abaab205db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2404 2504 iexplore.exe 30 PID 2504 wrote to memory of 2404 2504 iexplore.exe 30 PID 2504 wrote to memory of 2404 2504 iexplore.exe 30 PID 2504 wrote to memory of 2404 2504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de00afc13d50d42cdf7807ca4c3dc47c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aebf804aac3bcfffe2e6b2481a15ad4
SHA1a8ecbeaa11298800d09c6da6c11cdde8162701ab
SHA2567fb519a69702c21925cc3f063a274700eb00bd3520c663f2f54fc0bc50dbdc62
SHA51220a3c7dbaa160ccb53438d1101f73d490a6d8f5923a76011b7ed0cc8ad3a7572d04fb09ba48f45c08fe7c7115f49beb4ed07f92d25d7364a2293671dbf95ac13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb362ba2b74ec85ee3d9b9b00b60d4f
SHA1591b4a866dacd1df730f77a60eecabbe15a913fe
SHA256ef544f9f5ea073b15985f5b99f1433a2b7ffa412519dc26b2d0f3365e5df595e
SHA512a1da9573fc467c850c9f5c6dba8881343cb9f2cecbd95455bc07cfb5a82c1999bf3e4117e1c83b114c1b8f67b77124ec16124683061589fda07f563b93a63377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d65dbbd1e748cec7242d296c2855e7f
SHA106033bb700517bfc60004304efb953e17e73d3d3
SHA25679b10aa86db21fbe53b018ea794aa80fbc6bcbc139791b44bbfbdfff3f5fc8eb
SHA512726d94edbb10cdfaf7edc23d4a1ed86a0ee2324c9995836bf79010715bfcd3c1a12c36989807828423623b30bfda66b3a0110825b62028526960c0df2827ffbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f4a092ba40439227e3688920e3cea51
SHA10bff936249ccf247fc60e01ed4104b2873d35af9
SHA2569421e50e2fe26c7d7dfcbba2fa7d720d2609bb30b72faa33f1fc4954e1416424
SHA512ad4e4aee4a853559df0e681093025c403dd530c96c128d3da9db1d308f9b15f62d5f471f7cd642b6e1eb271adc00e054203c8695efa1aaf54e3c199af30df41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd5e18190162bac49a88448903bf78a
SHA1ba2f34393a05f60e30f3a850653c93f3ba54172b
SHA25697b0c1c25c84a0b87061862699471c1c1dc1e3500f3bd099710a9f5fdb121e94
SHA5128b34a7cc675979e3f4f28eb8311d4be41a75df87d4fa04f27ba3c48949380869f02226e559e954355a46a864c7576329837a37ab7f38352718fd6125a4988443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd651f9fdff5099b29b02f514c655235
SHA15cb01f7a145a00d12cdc7ff685c9c79d66f6816c
SHA256519c92c5782c57d96d2f6c433b1a6f49d7a55affc3a353a0b90e881fa91a8791
SHA512175871b6b7a6884f1a447ec4be2c056f4bbb93994c3b9d71cbfa242f0f389cd7fc8defd0b082c71a26dd0fb8511d958975158ef0c80165fbf9c9259e9709e166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a357537b2711514814ded818a1f2836
SHA1d4cd208b52a1a6f06210c4e22839b76b6f93ab47
SHA256b2b04b96394d8d59e903000f29a2046a61cb3de9ff05c81dc4bc4f955f52309d
SHA512339ae4327c922808bc9aa3787873da94d591d59484666215e41f988733620fd63554e30ba62b80b0f413f46eb8d62bcc62d91e10580f02d01cc165f047ca77a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559733203c613fffb0a212c17324d6c43
SHA13e8dfa3f424f7af42dd538f437ee02ff0da15561
SHA2562a1b265f217fb396a55eb86b88a18c23dcd535dea6f90137b0182f7b6f7d9de4
SHA512581cefcfc6df7801f7c8610a834f12b385593cd0b8e7626400cbf2fa74a9d3a2f98c212069e79672ab89896a4af8d009bbdaee67555cc7777c51618149b30667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b729e0062fa1afd9ebeab6a0a0c03a7
SHA1c385e24433a7644130ab9d88edc851e7a5661857
SHA25640d7995fd4b5159bab4a01b8103c4318d0a545015eb0fe66e5363c41c15291d9
SHA5120c532922d2739da01f5df8b7f40feedb1c67f1c21c3cbe287741d10514def173640c6f151d57dae91a8d6a38b5266791d83fd24b6eb8cdcdb9cada6b2b80d19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590772c5fb4b60d704e95c4f5ddc58278
SHA10deddb2c4db73bf1ef7efb5345a13eae411df8b9
SHA25620aa667fb4cc970e1fe77becf73e742acc304ab71d71e024934eb55ac8047cf1
SHA51246f62078b44af18779656e1d36be26cff806d958de1d36d976d55ef09356fb28869d3ba60d9155694cd91f53c5890a1929adb43a36593dd1c66fe19790f27637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a50c4d2590e5566d6ba654a705406b2
SHA1b88e297e4d42db6443fbe9fe95f9da774d43669f
SHA2563aac70ea6b19719356f15b1503475f338cc4f00ddae8bb2cdc66c65367d22fba
SHA512a57758ea4dd5874d373631e83996f994f74b5188493d4de8167794fc8f4d05ad3166be387252f855ec7e9cbae921d4d6213e9ac02c4ffdd457e540374f43e471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50240f8949985c056d88216ca991f6e28
SHA1b570dfaf29e2b79c2a6a285be8b70b7101b12b66
SHA256ff8f573aa3cf8d095caba98d3ebff86fae184daa392d3bb5ff9fac497b02f2ed
SHA512140290bf8f3263a7d20aeb2a6e2d436f74f65a42186d0d627ebc5feee7101b5c085027a94d3e35babbc5c2b841844b9d62d3215494385bb2a0aeffe5da43298d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d3074e316e8f5fdb610c827e113250d
SHA10f09d42b3e75539191d825bc3138185d8cc5b969
SHA256a38a56636f8c74bca1912df7acf912bb2801af89befd88f66cca5f8a99797904
SHA512ebedf5943c8f5db2fe96063323dfffc68cca2a2553f20aa72b94e9769da9bce0f18a115c2e86063aef1943f3899464fd063a25d7b901becf939178692eafd116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4598e2031612da2e0c6bbc249a96be9
SHA15afc8729d60efd9107981c21d5d2d4b8125d1d1e
SHA25631ee491bfc76c70f554a165d4ff623127d6272a0539a7da9891c34013e2f212c
SHA5128f774173ce06b0ad77e9b341561a402e11df0389973b969492ba05f3037e59b061616bf65b8d234b2bb0802b229e4b7a63c6c5c08626eb1877fbbee0edad8aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d020138737579abba2f5b58aa3da59
SHA1e9c3fdae116901d23c1b6bba09c3cae9517fc14d
SHA256b4518799fdcd7258249804470565030c100f7e0b5e09c9817f1efd9a5d4bccd6
SHA5121578bc3851db314641820a38e93bfea6eb1cca3143853cdd19c6939a4e4287bb49dd4bc2d1d9c3caeb4fbc7a21625d4b0db12b932b91e2a3c88c160e962e6fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbf62a626ecebc8319aeea16ff26ec3c
SHA11587bb6bf714a8d896fa5e21aa478595c2f47c32
SHA256683d10cbdf3375a210c89a3279cda75784d578174000b2a8b38e6420aaa6b804
SHA512798268c801db2701f3bf076aaa1ceff2131a31d41821a088519cafecd8e60117e5afa54e7936613003cef3bc541942e67cbfbc0ade405a8093614c4224384bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f349d40a004b15fd09fdc38bebd83983
SHA1f4510c3c3a032f14717b5ed5f83ec6bf6a590794
SHA256b963c0b33c83bf0ede84b35afe320ceba2664ca2354bd912a27d4ae9d518916f
SHA512666a97135d43cce4682db365a1c22956289959e6f7eca2c08a3fc13bb7fd33bbb5480403e2f6d34faad6eb14684a2ffa316011e9ae3bb3198004975fc9293f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f308aa90d01ea2b1fcf4380bdf6620
SHA10c2689bb33bf9660674466e8b134305f60700ae7
SHA256ffa61fb38d5d24291177b6156eaf18070e90b2575db7b718090c58db6bee34b0
SHA512007d3140a65a6897fa189dbe204bdbc693bab5a7d693a7ab1de6a9c2465699b11f5fb2cc2388c6a108ccb143581b64dd5ed7a7654980a92f9b7a33c7b5277a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060676008234abda2925ac3377bd3f3f
SHA1466e119994ef5950ea2334786e5ccf4fead6e9d5
SHA256feb3b7b7589daa63c95ffe8fab0b2c9fc8512c9c871e0fc86c2ef361b4945664
SHA5125da433af70021ac1739433456d106fc118ab42fe7a7cc9b778820877cc06b278fe2243511944c5def855a8903a5cee080409557daf9cb4ac6f41d21c1eb7010e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b