Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 09:12
Static task
static1
Behavioral task
behavioral1
Sample
de1f66515c302f97c7b8504498e76a12_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de1f66515c302f97c7b8504498e76a12_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de1f66515c302f97c7b8504498e76a12_JaffaCakes118.html
-
Size
19KB
-
MD5
de1f66515c302f97c7b8504498e76a12
-
SHA1
b1e260b79b9f043192d9ec7e8c99b6068cb5961b
-
SHA256
97e2b2771c0c6ab52276f5035fe017574b13f90637f9c207ebcb0aa0d9e5f123
-
SHA512
004cadebfbe0eef3a1095048fbbac927237dd4a28fcbf132d0aa976bb5f8f011f41fdb0e213ae0f5cc44381c860978f5d26c41b05f0ab35ce1454405e155971e
-
SSDEEP
384:KdNUoZ/ArMWA/4FLZszqFCY1MsJCozr9s:a5Z/AYWA/4FL42Jfs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C746531-71B0-11EF-88C1-C26A93CEF43F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408c9422bd05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432380615" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000010cf57f8f8d07bdcd90909153dbda5c0a34a588da48116a60e1e39ae6ee8270a000000000e800000000200002000000066e323bc957de598b8a722f508e4281ecd8d295601c37717dd59da2c441115ae20000000b6520d1876ed4277d37a581838ac24447d3e7d8ab8f3c2c7f47e73243155760040000000f1c019637958008bdd36f66b6de38f2913d658877065a7cb92e8e9b46017d5ddcffa398b1c30ad5ce7381c7fe67a892cbeb4972a8dfd08ae387933449032dba8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1632 2284 iexplore.exe 30 PID 2284 wrote to memory of 1632 2284 iexplore.exe 30 PID 2284 wrote to memory of 1632 2284 iexplore.exe 30 PID 2284 wrote to memory of 1632 2284 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de1f66515c302f97c7b8504498e76a12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523dd6b1c75b07a5d8084dbde90aecc65
SHA1b732ffa2542f0dab4d1f3acc06eb4393e974f227
SHA256e4b40bfe6a0f9aa7300865cb7914430290a2326027ceef94e02c307b72294b54
SHA512a5186096a579fcd4bd91f03001c8c6fdbdda4395c0304e2530fecf8dbfa4d4b7da12f3d7bde5e41d785207d7fa16e9a62ccdce6622ed8194aa71ebf04860d099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f049d03f68e3669e02cd113c3826e24
SHA1a6d0e5cadea0e3fb34c1b8530d02e30c65deeebb
SHA256f3317ee8c02658658010a350f6ce98f440e88305ea78ffb677f28b9288f0ecfd
SHA5123b9d2bf6fe58c46cf4fb42c888f0f81e500aa27724e0dcbaf3eb3c542ac12d105853dc96cb518b98c7a46311c7ccc758179de081b5f241785cfae8cef4bca559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e08fb882d689f95fe512eeeb980967
SHA122c5c363e34deba5b19b3d631dc570b1c283fcaf
SHA256067d0984563bdea35872bbb7d7931f8ae337f8bb3a1c5349532bdf22723a23a1
SHA51222bf57d2295041cafbadd0b99ce513df7f7e1803d7987044c01351d069eee03f96a6e5acc91ea309ff01f76cce7e39270f1c17e18c37d8550a871e5e90ecbeee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54562fbd2478bff8c68b3870f0d3781e6
SHA1b0c3381c14ec84cf148e9d45a30fc2ed9ddc37dd
SHA25668cc0393bafcbf67b26354ae20e1346ec233f88857b8105f4d548a25ef01822e
SHA512c9d882c9b0288398b39120f7f8ba08157f8bd7f477e8815ae143e07bda2d002dda5fa9fd472539f5b7401394e54acfce52a92938b382c26930813012ee859bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c43c646766e3f2cd567b7d249f1ca81
SHA1a727f40b4a818f51f26d28b9a6c19cdee1283ed2
SHA256ee9e4c9985d25cd1843fc262e1cf860c66699becec3fd61afaa5b241c5446278
SHA5129ce100bfc168cceffb65f56c08579759422cc2fdf66a142b204dc73f6659ee57e2ff53282ff918bd6e68eed632b781d94e057af1d8a0ecea6f2c007d504f724c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e2f7cea8948a2b49588bc5e6083542
SHA116b8e3b8c30db86273614be1cf75ef8b01220051
SHA256af6b85144b2cf5ba110a038f4984147ade0af0f7bf8d3007b7d7cc5648b9844b
SHA5129cecb0a8c5c62c5c361c5b55749642deb044abd3ff30b9e9bcd387c9404b7f0566fd64686f71bba329a22690bb2ae9f3fed30f31d8c54027b372009560696351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e5be6a6496ece58d85a84b54fa3e24
SHA1a57bdc3e685c08e574c3d37a5acf2231cf25eb3a
SHA256579bc5ebcc2bea3812913736a2a5f04888aa176b5d54805dab52bb736386ad12
SHA51207002778d48ad18efe221d7126a6c5935bd75d46bec55e5c438769140006b0dcd8437e4ca2a1f0e4288caba8585fb6c303fd150fa5bb33260a0cfef8a9e8bf4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd75624d7d56faeda6a6b35c4d62f263
SHA16f126ae9cf9e58f874d5eae478e739ef00254823
SHA25664d5b330723781b65e28376f8fc38bb1137ee745ad8c9598aca2594f7ecccaab
SHA51280029bc3fca9884256c601564069f30a7d8e0ce8b42066d15edb0550db34a1c847c3088b41c877ab17522ea889546320c3a237fe7764c9b22c4d64149ff7e866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d188a2a06a390e37524bcaf5b7abe1b8
SHA13cdbc4be92b6cdf356a0b16a70e6ab28889270c2
SHA25686121f119dec2af9d4b54f5a71a5a974ee715a2f668933ae6c0b314dd158db89
SHA51255f6ae3d1c2c64669707d0c880defe483904786d77a2c6f01e0c6975176c93d10b7b76afc059e2ac56a04b39a2315d5d8bd83905a9514eb79c9f3cd31e0b547b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb1fa8ed730f67b26e0be02c07f0621
SHA16a82ce3bdb9f29d2eb904453c074bb8c9ed042ca
SHA25696ce593cca3acffad8d3fbb8b946842ce8a64a3cff9e18d291c7437f733c397a
SHA512fcd0cc0abda8987ef7a9aa1b75cd043bf75ea483d83d0a7b4690da9cb52e53104283a2f69bd3b30f1df874c1579a13078c8e469431dc4ba9d95d0a05e9546f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b90d676d12f7f0f780b9a8525c9b209
SHA1c31d82f9cadf5ed1f9baece96f4e4918c41bc05b
SHA25624f05b3ce4628d77b244a9ea14c19b697c86a0ca5e8cdcf38e532e33546d62d8
SHA512c665091a7ce729f441e4fd1b5731bdcb26a8f06f7fdbf9221feb680df0deaf8cd3f449eb971a42640832c012d400d154479dc7d93baaffc4c5ec6a6bc7d47b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3cc63c6698d8945244f378d47b0141
SHA1f2aa70f6efa13e38a8538249b0b03b1eb9bcd0ee
SHA2569b89d505b75c4a2144cfbb319841a3fd306fc8abce05b8bde51e3ee2e4acd9aa
SHA512d51345735f6ec3fb689a7adfc9b5fd6a9d0088f913de7c09785cd49fb729cab92818163a9fc79733831ebfd6e2840d85929b3bb4080d79841abb49a6db107884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c4611975a98b0568471c3a68b09372
SHA138a7499459dcd7d6b9d02aebb45c7a16caa5b6eb
SHA2568a00a0400b09d63410a15d102d791713cafb44f50d663c93e05f47e2fc7fcf01
SHA5129b4236f82dd8a6ee123bf7132dd9777e35ddf1b089b5d97a580eb38776654ec3cfbc0c1016934dd2849ab5831be174f43165b82731de7dc2f874f4a925086d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b202f42e7c2afb40deeba558dd02d055
SHA1fcde9f6e75c8d801cd52d0b5d0e2de0c329b54b0
SHA2560cf2580b98d2058aa06e45756e6afb1b3a2127edc504423f128eeae0532832e1
SHA512ddf6ce3ccd63acf83b165ad425dbacede5d05ab57a4e3e222bde107976616a5a7010a294d57477532b8e3ffcc00391a5ab06a0bb8468fcf3e9a59040e68a5df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf1c0b4a76da760fb7c7c4d4279b8954
SHA1233db86dad6cc29b59b9c03dd193e082afb63be5
SHA256e72c76f67fea195f02d23f3299bfc67a215460ab7c28ffcc27d4c837922b5e07
SHA512aab4e1b48149957e4711db81c2f09160703268936d5da59b4b75a65d87bdef29fa8d40620cfd2683636c0d192abd4dd277d0dfdcb3f7f0a3bb6dc08b219a3b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab9b4ea906ae08e0a1d222536a55e5e
SHA104d47b9b0162ca21af3b5dffe3f6950df1778bc2
SHA25633ab8da86c5936bf5d9b94d695a6c659bcebaa4a4e44fc34a5c958c586a258e4
SHA5120fb371d7bc8c5887b3da2a5c387abfe86f57347fc4417872b35487ffca599e67f2f2ec33ae108eba80369fe1bfe321c5cab563d619838111bc77d31883441fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d296ed6747722ea980f88a9479ca8c0c
SHA10f6ce0976ce005b951e7a0ce8135b2f691323a9d
SHA256615afe1ffbd145d6b901010b29448f0b172e7d64006948c752672cf26e866086
SHA5127cf8f9849724903e734c74c81dd360fc36d84b89da3dbdad84cfeede2c73f4d1c63c577493909cdf135b964dde9b94ac7c63e193623052a3859bbdd965dca229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a8a5bccae94e7dc53d3eca15b89273
SHA1a8f5fdc7205648208388d2ad127bb338dae57465
SHA2567980bf9494bf24dd228fb7a6819b14fac2e26004a27c8d058a3aefbab9ba8b5f
SHA5122b3e65311a9742fcd745d2722446025480adeb4680a854eb66986452a4d2706e41e4c287d0bf0b149ac59fe73ee770c9fe460cc849567864e8bb237a89d40c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55535c5ff672dfce237ab46e585548f2d
SHA1fe28ee575d364d2dea4e1f2e8cc229b88dfd0c4c
SHA256a674be6e5cd3e2f56ac2f45d3a1adb476ae3ef283b509d6e41cf8be7be76624e
SHA5122047edb37ef325d61771ec474e8012c648d92ac68166dbaa3b4df6844dff6799550c52664e689e56b49b73b65abcc41751134ea8ae95e693411df7fa0200a7e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b