Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
de02efd7ff3f58dce3ad96ecfcae9809_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de02efd7ff3f58dce3ad96ecfcae9809_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de02efd7ff3f58dce3ad96ecfcae9809_JaffaCakes118.html
-
Size
19KB
-
MD5
de02efd7ff3f58dce3ad96ecfcae9809
-
SHA1
09705d5290adb8fc228f66ceb2d3d1232fed4dea
-
SHA256
8d1cec8b65b932ce6f6bf7082782b0a547e5b2eaf069250536874a5bc8012bcc
-
SHA512
9ad9e7245fac991c1f29e45c10ec5d5723f352ea9963e54efbfb770825dfe7a5abcbad63da2a6234dab13e71ca9ee6ee69b8f51a22b7331ccd21c44df4b87378
-
SSDEEP
384:mQijFg/8bUXB8ioENBW/ijDbXC5lC+aAM7N:mQqu/8bUXB8DENBT2WXR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305cc860b305db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C3D1D61-71A6-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000de4592b050999434075565f86619814c5ebcc4dcce3d5e9bd126c0069d77d5a3000000000e8000000002000020000000c0ec87ed61b06477bec05e78dde552ac52df95b9f4f71886d942aca2aa45c5102000000078c466ec992ccb28c1d2e97611500a7d7b2dfd439afc4f7c6fcff877a493879040000000dd2ea977ebae0e7614df861fbf3de8c6c22c88f670d23d745cf551dc2a758ecaf28afde7fc7c43588460b51afdbad805c0db5495a3927129a48a49b130ab8e30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432376427" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2940 1900 iexplore.exe 30 PID 1900 wrote to memory of 2940 1900 iexplore.exe 30 PID 1900 wrote to memory of 2940 1900 iexplore.exe 30 PID 1900 wrote to memory of 2940 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de02efd7ff3f58dce3ad96ecfcae9809_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07657ae83b94ab369ce6d580c4db480
SHA133e4a339ff7b1e151cc614d1be3c2cb45b7f1c00
SHA2562396720cba9f89022f07d0c11fe20a246d19a2f85426dc7f56e43946bb26e921
SHA5127e2d0956c3ff73efafb2f1daba92a195109a5fc818543b191614ba6d5120c2fb677032ba30bd3211af2c3fb04071e9e3470c1aa51dd10108b384c61283580ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c4292578103319c9a84ca3941e5203e
SHA1b3baecec275d861e00313ddc9fd6f62f1054b5ac
SHA256c75065a03d98a73c76752ac39f8bc87cae9416a855db448da4990a3d57d9db32
SHA5126e434109ec7016855e6605a3bb41843f1dd7b6a584210f36f91f0c5d2f4ace60d4706dca4eb7418300e208e0105e3129efcc65139035480f90a4b44ab7940a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4ec04ed5cd648a1214daaa6c470240
SHA1c63054345a7860b839e257e32109ac35a5829279
SHA2565285d82a05255ea54900e29246793e525f72c1837bb39955bc3deddffeb67523
SHA512b924ed5094d5c456d88da28332fe3ac421d1a5d7e1c3a7af377adff1836bbfc0f16349e1f436f15614607614dbfa252231b87ca3b148a027e6755fd61781f679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526003c27e494aee813cc686dbe743a74
SHA17baf41ed129ca64134fd509d09d76741c4fbc03b
SHA256fc7101875a77e0292af3a5d8f6355baec1d175488429610d72dfbba459490e71
SHA5126b0c3646653b8e1527031e8760d2c0e1ffcbc67c128b10af44d156555705701ec501f4bf03e0ee6f265e3cf6731efb6c1338111666ef0e056bd506737c57e203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b212e1083c7b8730c19d1b908ecebf3f
SHA1ae0b471bedeadb8dec86442dcfd22368640057b9
SHA256103c70b2f338edf67678253a0c0b660604daeaf293ceece741d64154d18ba3b8
SHA512ca2f07e547762c201d186f8b85432ddec2ba965e5f5fda55b43e31d0925651110779541709d3351449cda70c1da878723abb7daf190376bbedc193c3afe30522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb28cfb11dd6c986e5d36ecdc73f7f8b
SHA12e213a6186c163c70bf3634f9c61b7f754869467
SHA256ad77d8f55abcbf9c3cd5f6f92ba7286b6dc6e8c99380a0d2836ed64214de1d07
SHA51249926b596cbf84ff05e10ad37f88b87c4692f25cd6393adcd056641131d947de7072836151cbaa94dd79263038f91dd1680ba9ec0a9dc804d884a08dacbc7ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eefe5ccaef3c96940abe2ce3533cc67
SHA132f1bd9a871098e5945b7e046e65d4f1df9b3b4a
SHA2568f710db1f9f78d2491333d89e254b75a9b200ffc132e9e0ddc74be75534cae8f
SHA512f407a16cafa8a657e677ee8cfb1690951ae0a1c4b5a49d0f3cbf2bf0c3c5668ad07b593ee87703910f25a14fbb5b94241d46a400151149103b245976764d5437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55937d0bf83f11eea0fbf31280bdbda0f
SHA1b8edd8e914d1c922661986686333dba23e9d21b6
SHA2569ec2346e85fc16d0e0824b27d9c48b00212891490f53dc3bbcabc43b97c4a7f2
SHA51266b750e046be22ef6c0caefa79153ed887099008771342d1c187e4d485d7808412277a778236a472613089b03814d0149e39d854e80e2f904785b600a6442402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53887ac7faf41ab65fdc1c0d7d0f02c4f
SHA1c3b5422d030b96ed0ee6c33b8540b7151a11bda9
SHA2565753e7781f4be924661c3676337cf375fe1aaaab3cf059691156c6145dd836bf
SHA512c4b4cb369f85f45e410a869457e1577cad4010f29074b6af58904da76a77db1888608fbb7677efafe3aac1594ad13edf8a9a317c48bbef90c4949f425dc490f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54852a36d36e1984515786fef0ae76f7d
SHA19e0ac73a8f6ebd51c2d786d193d772f8c1bc8ba0
SHA25687b8451bafc0b7c5684d92e67228dff31c292f7fedfaba7a3287324759ace799
SHA5123720d8d3a258d50886c696ffdc60310ee7aee773d32798b18361f4ef447e67d971b2b5ccf8128b6f23ca455c2528895f03a850918b12e7bc40047cf34f3c5dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50753e44599606bdad60e6ef5eab2890a
SHA1c5a389a409afd5346055e51cdfa574d004f6b451
SHA25683846cf8ad99c0b89c102a5ebf1de22436296c30d6a95f2875175a629e2ec19c
SHA5129ae29bd62caab511f98b8c2d32f2ccae2a313e75917dfcb88be190eec80d1ec38ed831d856c2f123e3deb9845a97944ca486ae7883c0bcaa93830e045ba06aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f51145e6b94fac856924fa715ee7845
SHA1929778d341abbec37250dcebf3f746144eedee12
SHA25685ca3877f129fddf3fd34a5a8c61b8f1b1b89614d763dbbd86382158b4a94e1e
SHA51276977d130796725b32faa2837ae586fef6c5de37d2151958c416674671a1b8db0de179e089ef1be1eca43be3f61ad911839bc426093b3735bab2eb60ccec296e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b736cea2bd9226cd11530a40496f38f
SHA18cf45a90e9417d0f518885b85d7455bead8d852f
SHA2566efc8e950cf594a29b90fbce6461ed1071da445b0de4adc0754c832ac96f22ef
SHA512bf8dbb6a553761e4fa6a6b5314a108b88bec50ffef3aea39d73c2d7467b29ef1d6da6b0cb3342c287547b0d1a979b2e776c207e1ca153b82259295496bb46dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575aed2dabfbf379686f576be0d2fc51a
SHA17dedc91790ceb05dc7570e1f18ac01c24d3fa4c5
SHA2565abcb7870e5a313654574e0affcead074875113d78e3b689a61674e9e877f31f
SHA512a50f65fc75d8b2ed834483f087690bcb71ce853b7be445e18798400fc0d0ed2e02750f06f3c85938932dc73a86734112986e1226c974b7a5d7b5225a899c42e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514416812e5d9e1804545c1b2f98c103d
SHA11e173923c4bff9ae439a8a5f6a6b2f6915e8b5ca
SHA2565a2d64578602607dd942e2fc2aa9ed81af5fff39cb7d02172399d1286eb12b6b
SHA512d841bcb60d0af0a7aef25db87eab3abfafc3feeb0124f1058db584e8c387f47488db5112ad7a23d9eb7542196f97660ec189126f8a9315b44ea2bbeb58244963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263843781a1e9dc8dd9ed389eba49bf2
SHA15b0e8ec30627f6bc4a8330f7a966bbea2b873d85
SHA2564456f9860b617ce34739c1014070ffadef38a0cf7e0231e21f186cb16b5739f4
SHA51294cff329d19010da5ef0ae221fe8dd87b1c8e2ee0518975b5e67d36b09298057c5d3773858a863d388bb4507e959280dbe182b408539d52bc6d0794a77798e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306cae104aa92839c8b36eb48d970994
SHA1f4b3bd9b11263fb7ba2700aee8fcec61b9572d7b
SHA2563103788d93562745bc80a02865c9d41f5328de8afb9e1339db254f23e97cb219
SHA5126c8fd8399328ee38b8e1a9eda4eea2442242923be092e925f8b68adf5e498f24adaa04ec1a3c95b11ff12d9f1ce4201bd43a16cb19d37b6026282c2ad90597fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507374d26924f4247f476a01e3b3d0b94
SHA1f4f4e9f6d47f6828181c290d5ed6fae51e5a80f3
SHA2560d0285afa30f1bb604d174ffcafec64e1ef37b66234bdec0f7019ac8de9c15f9
SHA5129a3969f00212aa280b85418b1aa6c5fdb49b6ed4ea1462b59207c5e0378d47134d02e9983a08b20729e7ee3c0fa102580838cfc0d3127cb1cdc89deb58f683c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b