Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
de0f32c7f5a65aeeff1749e41e0afdd0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de0f32c7f5a65aeeff1749e41e0afdd0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de0f32c7f5a65aeeff1749e41e0afdd0_JaffaCakes118.html
-
Size
28KB
-
MD5
de0f32c7f5a65aeeff1749e41e0afdd0
-
SHA1
99957f82fda74abb1ba44cedc185937503d9f206
-
SHA256
d6e1bcbce2fbadeacb7eb49778dd54694404f769699868ca37dcf3570b62aad8
-
SHA512
85f22b451424f7d6ddf55de7861b69be1a4ca1e9e0b2fe94197cd73d8d35c163c4a3ccdd63103fef025094785fa28c96caca7116a36cb80b83cb76777c646301
-
SSDEEP
384:MNi6iiqoxop1Mduq9Ekl8dk1OQUCZqJBpOyqph3fqCjGXEujj7NoW9+/yF9JZGT3:p4VxosWMJ9UCvCbN7A/yF9JZGTSq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{918EA371-71AA-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108aa067b705db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432378155" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000047a1e7f2f537eb4254d59e348775d65235352b81b46dd33114d6c2cffc7e5687000000000e80000000020000200000000a129b78bc6957276d81c7bac98612bcc5f4ff9805c9e233e7f3729c3f34d5f420000000a75f9f8aac1b974d247e2bfa4f9212b580f2301ef14f9872aa8cc16fe0b79b0440000000967c077acea50cbff9d4a5960d592a6d008388609429a8f635bbd11a07e59a88f60379b2801e99b71bad8f6beecf6a7b86a95debdc256722dd33ff82ac9301f9 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2852 2068 iexplore.exe 29 PID 2068 wrote to memory of 2852 2068 iexplore.exe 29 PID 2068 wrote to memory of 2852 2068 iexplore.exe 29 PID 2068 wrote to memory of 2852 2068 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de0f32c7f5a65aeeff1749e41e0afdd0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e810ed74937f28c0b05d0dbd7b405ac
SHA1e0b06cfcee1355657020fffbc58eb280623d2dfb
SHA2560cfd5a11ed08aa6fb048d984aa4d62145fd1ebf7f4afa08024ad249485ac72df
SHA512389ede913108ab0588cdea34b0a1108b5e224b79368faa0c05bb3b7bc9bac4b406801323a600dc85c998523e78024c0e987767621157b571551eb41d84d254e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac9d0b921b27021af267a035d835fae8
SHA11df2525fd3d2877f60292585dc5ca6547e467724
SHA256df47a3b8888aae5cd9d2eece8e0d1f6616b4f808e3b34f25d71f02ab9130e03e
SHA512cdd3a8ddcf1a3b7fbdaf4eb53f51c1801125a3ff07b08a273aa4968362624b067c49ace194d5fc2ba05b1e341609494e430d2f9fcf88a4210195c97056c6df65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5962d27d150126627f8ddd8b89b1bd
SHA1b9d8b152ae6f50a391618ac14db0b9f05385563c
SHA2563a91ee6d02281695f89b1b75fe5b153c3abf612eb715e9aaaa3a082374651dcf
SHA5128778ea722b447fbacc76ce6ee672272cb7fe6dc2cba005acb225bf2ad3ba48d8db7c61f37d4cab0a3c2d32614212c9dfc8785c87da924232848e2a45c01bacd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175071f0b49f7efd727d88d0e1f84d42
SHA1ad989f411b3c81db33a20bd2336ca9304f9ef1be
SHA256087770ce694bf806202a1b1d82a053c2eea1f44b1d0a172f5f3b2fa02648b076
SHA512eabc34d9296cb95ca1d35b46eab2f393cb386d446726583657420baada6eabf8b95f762426fde94460e2882aadd471ef89727793e8d85ab56982d0cb3afc7b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62d2243cc6e7ebe4f35199858fea9cf
SHA1768b59f3bd70746153cf6ce9da59cdb65ab0ec0d
SHA256f58bc89744c6dfec3c82e0cd3a3fc0b156231c3642b37fd2938ae26777ce8a80
SHA512720a670bfe9107d69b9e71d5b7190d7168b0fcfddc418e2ce16a17f45aa97b6a915ffcbfe88d18e5ffabd6d79e19bd0a362123a9a6aee624ba0e6563772056b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c59e717326a528e21f52dd909d2dfb
SHA1e3d6dd10af057cc733e5a70c861f91569eab95be
SHA2568781bab148b82460faa3c98f98beda4c33521d2a8e2acbda6ed79db1d256ef7c
SHA512201b6f34422e4c97eea9a253127ca235fa0d569d9b93eae8be676db2b71b296cfbfa36964eb63810c59b505a59fbd4ad7831b1bb92c33aea383bc0300df26a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a30b49bb46ba6c19aedaeed61bdd16
SHA14fe47da3c2cb1f0c84f1eda2f5f6a55ad6b861a0
SHA2562768da0860653689e59a8ecb0740011f6aaeff50df20b209bda052d4c9572b97
SHA5128315757b79696283ce181ffe19285830259267b7925e4d58ea59cc6a02c10725dd233ab50db0411488f241bee86ecf94fd8ea84bbda1edb03851110eec1f9979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63166663ef3e739907fc10a1ef88a67
SHA1629e3800183303af2a92dd96da479461bf59d4d6
SHA2561aae83803610c7d9ab35bfe45791720290825102507e136602cc8101c52e28fe
SHA5122a92d3c7a4e699c7c5349d88d5ba4b7fa15bd730976c7848e92346b6dc49507a44559f845295ddda7383b3987e32fec2c9e556a2662ae5d8fc7387d225f6d7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a260434ce93b9f1767f81717b423b60d
SHA113514f71249af539e3a9ee6e5817a0748c028765
SHA25643264adbc8c909b33a4fe3d1ebe685017a03b3be6957118afc89151f15303962
SHA5122eeaf5d3875d61b6d1c4438eb82bbdaa8601b05e267e9c0ecf5131b7569d5e49f8aa29bc0f28d54876518b8fce41bb5e33ead23c3ba7e013e781f869a363f313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e8727b0891830c9168b938866af75c
SHA18efb35aeb985a9a77831dfc398c37ebf6c85b8a8
SHA2566aa29dc601392308672c885b282b6402b89b8a504ec2cb4e8063202faeee881f
SHA5124dca20825aaf1bc99152a72678efab36ff021c77a99de2977f53927f22a4c7c57a0fde90d6af4c11d6eb57f300e2489e1f5605a31135219a7b502ef7ad080e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52242c1e689df8ff42f2e1c8aee5c0cf1
SHA161d50a210b65c6d283090c7186f7292c37835b80
SHA2563c9e63f9c8ac2be3cbc49ac4052bde12f19a03b1825245cda10eae4cd892a3c3
SHA512a3ec7fa3963cb3f70531c3adaa8b56d02f7b80dd107a2021cfa448b2f931b7f1df8795d3c9b2339f84da493921956c634e13b678b942cddf4fe1582060da0e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c1d4a9c209cd74e5cb52ca4828b3f2
SHA13d0fea1739b9b56a8913d18a9e4a5ba00157ec43
SHA256657646450f04b428327828a131cc661b7b1578d523ae95eb8f1ecbf6612ecfbf
SHA512ac01b80d8aba9bf70d7c6aca3a483fa1dada91d3285444d3081bf206517f2cd281c2e41712c9945142ce483c55e3a276a596f0a590676e8ca0a566904e5cf591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5a830a3615d1ea18b099d9870e41be
SHA16a8ebddc445c8cd2e495f84e185add30f97c93ff
SHA256f6f08112a3d6b8d4c8d9ee184d0d79f80057c82dcb6e3c5681f364e98f524fec
SHA51215e6707c86ae8193de79d047b57ea7eab44b97bda3609bd00f3fe6296672ba3200b5b8921c7640c2a634791db3834d4846e0b7378ec40da9120984f8ec73989d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ae966eb140cace569e27949dbaf184
SHA177ce01afa1af2716f8081c0ce79158418f6a78a1
SHA256881a003cdeb4b4a66efa0a21f6c21498eb4344d4d196f19177f9e6adc4fcfe19
SHA512e151d0f48e809a18ee666e0854bf8d690aa646a5d8cf296be74f9754c6b3756c32e5c73da070f6e650399fe90d756adc3bf43003523193ad3a26b031b8dfa8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4d09a0159958137407bb112fc077a4
SHA1b098bec5c4196158b2e083162000f5c8ce9fd01a
SHA2564d1d41e2d5cc959f3e3cacc47ebe63d82ffc72930b5f3166d238bb92c58d917b
SHA512c4aeae381f39f52e4bd1fe3b33263e3fadac09cf1ca4a5daa2dbf0b4d62279f8d0bc1800280a6d2e10adeec9c5473ae85ae92ebf2625fae4eda03c33b861d89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526482223ee8d67e04f321b1cad5bae66
SHA1a75a052638bcda571ca3b89da31b2a3e57c2cc71
SHA256c4dc31f10ef9da760a59826be58b320060841decf557c3f5596b0bbb80219769
SHA5126cdce76192599612d9e505735c1537253b55fe6a361daa65dd84dde578b5d69a1c892beb57d0518c865ec6923135a8f555d5cbb8c327b5d76b61db14b81b0608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f794174bfac0adf84de9d0e030976e21
SHA14d832206f8ce4499ad39f848d3963b98ce324c8f
SHA2567b09744719225a39598c4d9c9d3950a5be02ecf4ffd44e79b8828ba4cbd3ebec
SHA512bd5e06d55e28f7d64c76ed480fd7031fb09e895c8fbd4beced024cf30eabf9cb596d7ef5c1a3931c5da88144a5e2c06ff8d593e495eec4cea1702406c43de7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a15c3e1f3724ee0c0d91a18b8daac7b
SHA17047ed1aeff77e8715a21489d1113062f64cc045
SHA2565c161c1c58dbb8d9223e9f0aa3b05ead2d2531057b04a2cf91893ac8c17c45b4
SHA5128f8f7e900ecbb8dbbf6d68a2b4beaacd32e854145377bfc0dad86403bc0861dba3def3a46a54d0da9a7c1ad014935bb4870f0dd3b8eb10093e9f4525be0467de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b