Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
de2ecc9d1633275286e9e0e3d7598276_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de2ecc9d1633275286e9e0e3d7598276_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de2ecc9d1633275286e9e0e3d7598276_JaffaCakes118.html
-
Size
18KB
-
MD5
de2ecc9d1633275286e9e0e3d7598276
-
SHA1
b6e7fc07c450f1ac2863b9b49490d87352d98853
-
SHA256
df0fc9c74f2f511a2aabb5f1b72cb6ddf81cbed6aca76932ec3dd382dce146f1
-
SHA512
102c96e7db46bd8085887e692e600e30f5a4d23fdd4708ac503453f47be6fd5a38aa2b58a14e60c1c0a8fd2231927ee758c804fcb3b160e79ccc36b1e10ef667
-
SSDEEP
192:sUupoHAvjwPP00TA7xSpsFsEFoEtul/jdBdXroPVJFKT9DSwZqPjFej3QQDmjmXm:94wPMxs6odShK03Ij3xgaidI+KuHQg3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38D6D051-71B8-11EF-8587-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000080429e69b114f246775ec5d37d7526fc39967d426defbad2d2f0127e6e366ec000000000e800000000200002000000057b8e78d5ce4b4887281f34eb02fa6ee99c5178dd24f0d3fc454905dca66bd27200000003459e9a08d97a3fe81649e2062efdb37832e594ec22412ae7916491c58b0010840000000ad0c87c1a71a9f22790e289ac70e4f8bd3699e18689b4900ab379f591473b44d61e9ac4cef4191c0d271b1faa53a201cd8f9ea2a8a91a130effa69cbff9eff2e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b1510fc505db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432384018" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1704 2504 iexplore.exe 31 PID 2504 wrote to memory of 1704 2504 iexplore.exe 31 PID 2504 wrote to memory of 1704 2504 iexplore.exe 31 PID 2504 wrote to memory of 1704 2504 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de2ecc9d1633275286e9e0e3d7598276_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565838ebae1621e4e8febf1078c818bf7
SHA10fe52f85baf3fcbb78463043ddcd7b80ae670827
SHA2560daf638008532619a47a93568140704357cae2d990b0bdd6c4e9ae40ef3c3882
SHA512a5e1bc3463ee56aea61c141aae1e1b216bb0b9b71e09394d02a63c6736376cf920fba364dc75e293ccefff44fcb2c8fc9bb3ed249868a24f02d198aa5f95227e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c49c4c50c93b8f97e204ea700748b9f
SHA1c5ef66fdb4b9e3763c0f683362043f4fa7677e5f
SHA256310b66ad98a07b7cdd01a4423c85bb41fff057b00e0e45d49ace901d8b9b9553
SHA51272a96fafb8864f56ffe90fd2af9ad971fa8d0dcb27228a51de99d1cbabdfbe7b9a7b89ec4d2f2622277ba1d27d606eed4b08ae2497bef2a642adae62b6d94780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53907f75ddae2ba61af5a33af1f005c80
SHA1fe2862ab40b41d008107d4a53ff43ab7516e6c7a
SHA2562dc348653c7bcf412f0720fce8260293fc84cced2f7f457e7cfc22188c81c153
SHA5120c789766470f67fddcdf73ebb4310ef494f006380653abb04a49678afc43f1b065b462037df4a551f6c5a935d9e6a7e31517d1eff796611ca5dbf9ce993c3255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563180fe4da27b955067e82b633c2ecc2
SHA14484c4b138b228e45e8ae059303404ff611745f8
SHA256102c60a9213e9b9a1a66366a6e4551f47cca01d97464e54b7a38d96adea0e415
SHA512b72221ec97831c6fc734edef91ae9989f712d4b33f43e46de2b68eb415a1b856b53eb146da04f8eb5b534c67042b38e05b9475bcb820da72637d8176afcd6dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57339180cfe195e54d07c11f1453382f0
SHA1d16f6440c081b28bc7b2f102090acfaab1d628d7
SHA256502901c36bb91e90fffa99246adf91ce3d3f9ce9cc5e4e8978bafe46c24054b7
SHA5128a2a5180b0a379b89b72258242ef77e01b0536832192d76d9185048079525b5b31cb255c7e1a55e77a3f1b112b87c642b752878d4c0808e5ba18f20d0945f92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f2d80c09aa223ac586aa8a08f1ac5e
SHA179ee6977f9db253e584bb2ebda79f6a299115078
SHA256cf1a2c23a9384221ba7903cb4dd362799e18e9c4003e63186682c8a5c5d8be78
SHA5123a848283f84b83b810bf9d78d4124f5a32a5f45a461bd68fbf3a7f5619f4391fdbe7e5343a8960ae2b5cea0d4156b0603b8db48cbe6269f609a45e8fdfec5985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9483daa4af4f6fca7f23d8ee1a381a
SHA1210adb0c46e4cd9049bf1396cb7e1b78bebaaf7d
SHA25632c9630c0e48e6c29e6569bae8747172cc1aa7696c37fc4482cb22b2ae95019d
SHA51286aff64beb8e76b3519cbd63481bb3687ca23d0ac41b7576dbf73adaa876c9fb99d531c4d8e94fc548ac43fea85bfbf963ce50dd885d38e7de66df6aa3c6c5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5074ebbcd5b6294be0caa285e7965ce
SHA1efcb80c6a5935a4ecb2563ca97ea3d72e6df1243
SHA256fa088207783ca198fceb68a45b0ad12ece03c1a5ef7aee6712d9a23e43869e8b
SHA512e8652597955db31a4e48c597ac6bf3469dfd7eb3fee2e30cda9233a3ff15c1ea13c709c97c2c2f1c01232b236ff39c6a46f48c704017852ecc645675faf29827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b10bafeea3c390a351bfad2e318115f6
SHA1ea4db62cf6393ab286c496dd443b500d346ca470
SHA256215190fd1f058552d2124e30f8a1531cb70c194372fd86fef6592cde65ee2a35
SHA512f5df13e2237d3096ffdcca39c26d0f40c868d133381328f291fb38c26a1e379fa94d86162bfee10f0adc96f81f998e4f73adec6a5d5a1233e64b2cde12067dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd32726c9b5c4672f7c1c68f6b4884c3
SHA1b3a2e815dc0e251162c99f52f187871c303cffa1
SHA256e212782289ad91c1e09e96c90e652dc9259079861f7020c9cc18c95d3f1c95de
SHA51202d0d69c3511e57e4f00f878742e3be2d97973bd7e66b650973d46cae19f9b62cfb0c9075b9c3a3534bd319aa475caa7c66ba5015bff57f1ff9a5322c09d20be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f74ea26f012fdfc7e71ca73ad8c1ceb
SHA1e661d656f8777f4babc1c5f591769bd05d2df8d3
SHA256f13e01c85cc342fba7ab1d362796baf4afebfab96252b2c698d39b394b5cc1e9
SHA512c626d41ebf26145d0bb8ce8b264755413a8364bafef1a161c60b2ff9e5b6e0d983d62e4bd886e26303329228552bc0322092e8f226ca519f171dbdb5ec472c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ede43fa3454f053ae59e68fbdf38b97
SHA16064b291b4a864d6ee81f1471f0e8a956c23cf0e
SHA256a3be4356f498a44662742bbc67b63d2df2deff5cb994ba9a94cd1398be09d367
SHA512b7c1b913fe85354568794802dd151e5257a622f0b9b628f4df14506bb34570d76df63351e39758d271c272e88fbc6a4c328e78559c4d08e7b53ffd634912559c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df642a7531d65f82a5df6c7b80b8a97d
SHA1e1692a6a41d151baf4c7e9cbc82f04f1906d84ac
SHA2563f0420fd565ce0a54d6e365569ebdd7fd90afe5b3f0212b208bccc635603c184
SHA51217894fd7fd46610af3956a7852b2bceaf99c8d08a2358cb1d6b0b36386f4049bdc6e6fd535f9cd372d857ed06fa0f16c1184eab21d0d4e6ad35a1ce08b35eec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1bc91b7187c0f5d421070afe9090091
SHA13676f48849dd7a094ed5f25640a9e8f75b5b3eaa
SHA256fda94a6dff0e922fed80543ae7f14795406c6e617fb667f82ea87c78ce7b07b5
SHA512b9ac53170d76a7b2dba28e98d35a12d1527d09725c89c2e872baa98875e0e4d02db45d7c86a3f941633f16d689a0746a5789642a5d6663b150eaeb4b081191a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63fe5f5d169f3da28b63fbb209bb0f4
SHA177bc37dd7a1b0eec7d370231964ba724f337adfb
SHA256cd257a626992a23b760f5f3864cca8c546729b4086e178754753d478d6c0351c
SHA5122bf810ab3783d34f40e920b304a9f6c293fc6ece3296d1b480b75787f58dec63c124c3b23a8f4ee25a0de3097fde9271f1423913704092ab2e6d7e03834561ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c36e2c4ba2a62284b5fc4ce3544be48
SHA1d7353fa71aa5953bcdb3e5d5a07512b4e50296f4
SHA256998c6648efae4dae76a62c8e59bbaaf1e6bb66ad63e88089a7ab613e11f47e75
SHA512e15d5f3ed273dae12b2693a1a2d6d7bf8ef18adc8b4bfa2a0a40b2a0d767a2bd495b0f87ab9cc79fbf89befe53738e53cb5cf7d81adb4c0b799f7fe17ccc8de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a5636d0d48afebd6d3fa545a9ec668
SHA1ea06333c424433d4328ac3f500ce0fafbe4e187a
SHA256976d22ea3d5a8707fb478153f1f3cefe781dc8b8728b0c928706c8a09ce0815b
SHA512b64a51ba8b5fe43011019adc8645322a2ef67f9a15ad9fd5ddcaf58180621f36f6e1ae9f9cbbce5a4f9b0a5c0c92c19c336c2db2e84cbc7bb461f7334363ad6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52224cdf49f2efd9ccb561e98dc29828e
SHA1cdf3acc236d5b2150b65a5cc45ce0213d96dd63a
SHA256c004f4a9ad6412ff362897fccad3d95ccd5cc8f29cf7bc6db962de82030521e5
SHA512d837da37696b7e49e2b1daf8326552b2658683b7d6f88cbb7752491a1e4795d5db2fa5a4b051b4996684797850c93d6556736db5c89a999b9644adccfd7fc2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea1a944851b41165b1998eaa0ce2667
SHA14fbc34ffcd8c518b0c86c3987289a8f431e57df5
SHA2562931e65983749d2f77686e8bc087ff9fb594bd2f28433d69e67feb290760666d
SHA5129d03c1c2166991e3d9d8126e0bb663fbd2e74db982793067e54506dc6eec3998fde353c8f25c4a8ca21ba314166d32e0dd7c4c7ce71f0ec766cdffb0a172ee08
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b