Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
de51ee1fdd661cfaacf7dfda40b540ca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de51ee1fdd661cfaacf7dfda40b540ca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de51ee1fdd661cfaacf7dfda40b540ca_JaffaCakes118.html
-
Size
188KB
-
MD5
de51ee1fdd661cfaacf7dfda40b540ca
-
SHA1
57c04c88c49d56d1f7f8fcdfccdd47bc51c2fae9
-
SHA256
be5ee9cef7c2e4ab0ef317cb7f103027b71566d6bbcf07e35530dda05dd740da
-
SHA512
0e37867976a3b4628da47bbfed5acbe6191d18997d01a83d53e007c623b105adbcf470000dd4f9dcf01a8bba0a949c56f0045c9650155542b72940b499129046
-
SSDEEP
3072:IsJpp0yfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:IsDsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{759969A1-71CF-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432393999" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000c8c5df2218aae0f097d19638ccf39663a354bb2d04863e8e6f321d9b91c3a2fd000000000e8000000002000020000000bef2ad5da34efc44a6ee7fd7bbb21f869a79ed45908ab170809e77e11c5d6f4420000000b037b86a867e16fca2357eb77b6d9165bf8c02ea55f5ca54a17d26613fcc30e5400000006bdfee6a9e4371704296f3da7b084982379952ce5aa6b756d083c28d552ad84cd29f493636e83264078aad2397492e07b35039ccd09956b00ecb08e47774ecc1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b7354adc05db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2376 2132 iexplore.exe 31 PID 2132 wrote to memory of 2376 2132 iexplore.exe 31 PID 2132 wrote to memory of 2376 2132 iexplore.exe 31 PID 2132 wrote to memory of 2376 2132 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de51ee1fdd661cfaacf7dfda40b540ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa3f04ff443547d5cea7a76dd833a5a
SHA13c688db1ce08b39c05ba0f4a78d4e5be881d4ee2
SHA256e1fa648817e36f205dec9807d4c96216e20f6c1a0d5015c8c38271a63b3ca8ef
SHA5125ac466a07b7959cb1510c144f91da6e12ca3496f7343956bdb5fa53e503efb098fe08519c3e016d7e7aa39159d1fb42faccb0f520d7aa0a8129bab24e711a941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58873710ba8e20506ffcb99235ec6bda8
SHA1fed11a95bcf5ad41f7591b816a872dba8721fb7d
SHA25669e088ca9dcaa72219dfe6a25f52d6e300bcd075cfcd177d7aa6fe868b4da1bc
SHA512efac9dc81b5656f045098858159bc771b8cc5cc6b0c2b6732bfefc1ac4ecc6ca5f5652f0b77c21c845df91b4a0a9ebb904b3c805754d479ac5eda24ec2d065ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873120ac60f4c6ade9c868a9065580ac
SHA1a8d990dbacc83edbf6f78476f8b92c815920aa4f
SHA2563ce82b978ff0f81bf2cef9ccdbd1c234136a4ea119909051618035810c7ef48b
SHA5122c2010948b7cd757898dc4a7515fa3638078513b1cdd790f1b2d72f74a2136887abe97e05619b9cff44ea88ffdb3d80a0f401d952c2b4b400bb064564e363975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d7c5fe742c083f9babba33482a6737
SHA113847cb715f61013e41758b0a5e20cfab45abc7f
SHA2561079f393dbcd942c99369132e4341d9e1fdb7043c047ffe0df9ed12a39dc43ed
SHA512f27096d0733c85faef339e09c911ad11199a772fe3f8623ae6dd3f339bcb6af7377950ed374d5d9534252336b56377d010a200f38a0ac5dc53416a44145d78f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bd401f3b0fef819c02c79b68ece63ce
SHA15f0c95d90f205588c0b3605497a1f1011dfa7c81
SHA2563596f8b414d9f87fd0b88e03d591e00ce2b4d2f36e5cbfea73d754c9aa6e2df8
SHA512a069aa6d8a70271ddf75e7bbcca8aa6ac9b3feafdf41d1a549d9ce420aa456b790b8d2d134d10db66009d5ca83d50fb5827b2473d89b7ce999f1f2f24ffcdc32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dfd39b7279182781961f10707dc928c
SHA1fe4e1ace7578b6a5db7d7c8aefd47800008d3893
SHA2566e7794930cc3b2996771209a64b7fc008ceadf885776a51219ee5342b53eac86
SHA51256383e56687ad42bef9350af3d84dbc7ca59b7acacd2417a0885328b2abe5531944667f9731d25b7581b8b56743aa425c26c304ca4d9b8e062d4da754a7bfa28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96e7046780a3fa2d6313ad6f8d2bf59
SHA1a814cd0a6276a311ab97e86fce43ae7078e3d45e
SHA2564ee94dcaba925cfbf4bc6119963c4d45e51b27e6d215a70bc61b4cd34e623839
SHA512d3f1d83c82aecccb75d0bec895d682f349e175463f8cde62daa1f8fb549a25e754963fc652633a4002ce2baab4f590e3832368681bb2b981f3a6baadccb3496a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c8ac4cde1f41070b0291facff45c87
SHA1de0591e9f5bf3bc1a88d4a6854ad8d3d16a69e31
SHA25630637796d53a1b0c377a509e60b9887858ffad6ec104ed0f23cb4a7b6448720c
SHA5122d96c3fccc4d8facf4470914c51acaadf4d5e67d64a9de6f44d09699dc17143b4375d199cc155f5651d8e3c41f7af49d48701f0180c2ace591e1438b4daaf79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5946b80ef3493383511c0cca19e0743c1
SHA173fc6c2be56aad668b915deefdcc23fc634c9c08
SHA256a20ab35c196d19af2d671f0ab896f032d248653bfe6aaa5fe64a2e83be9dcec0
SHA512e91b2d0bc20a33ca76ca31add7fbb3bfe09f60ac5b4c56522edce5cf4c926b1724c869841dd88769d624445496e398a9bce9a11af0e07badcfecf008b53b48cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5925fb67d99d3a8637525b31f161c84b3
SHA1e40b848ad14543927a0c2498e77f9cd9a2a31a38
SHA2566885d08ab20d062553b0bf6bf7db4a03e20f66a44a85eb67be0b94479ffb6edb
SHA512ba8221d5bb2d436fbd078e40eefc2d116e2fc6127264987c5ca4489c27258f232769b23ab717319035f0d204d053d2e6cd400e5ffddc245d656ded8bb0444e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a310d8935d2625f881a5fd8a0ee1001a
SHA15ae92b21595392d0b2b9bd38b94eeab39269a64a
SHA25677707106e84b0665b3c0a569ba6e80c753f4b515970fa4f4fc64bffda0709c56
SHA5124a4bd369490a25a1560ab25de0b4482063b7eae7998349c7d3fe1fdf87cf6d96476d9fac86eb2a7953dd8a0208006b1f5a04561946e1e82311ed488ee7c79fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fa52beacea0c4c7711386fc8ff76da
SHA1f996b51c125123524c39039622fbeec7ad527c37
SHA256623908e95eb271fc59df74c552a48f1edc6be8220b38a0c5624baafbe0a23a04
SHA512a716beb1abd0f2e3187ddf62f723d3bec7e69572b0b2cb47d427174b678d58249a436f748852dd043e0d37fdb62d820984022eee853732529a6653419a3cf500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9577e12863670d38559ee90ce84e356
SHA1cea691814f66d63ed7804091901f382f14c62da8
SHA25663d5d42eae46dca77de117d915c682fedfece0fef2a72dd0af3e916c31c76e88
SHA51235b83094871b44fbe6c7cbfa60344698127d47d867f301e4cc234d5e0cc7d96c25efa6b732e91f649c44c3585adef4991b73bbd5a844436e98088a52bef29471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d803b370bc08c6b31d913f2ee17a50bd
SHA1870d42e09256a853b2015eec4c6a269218ccb1f6
SHA2564bc6c74e1e506f8b1c9dca2aa654fd4b1974fae68e1d8ca942a0229860e65fc5
SHA512ea2034df217d8366b3eb48ced14a000f5a578600554b205a53864b53dca0526dcc59965b58308afcc803f804107795364232fa6dce903b34c266954df29f6fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af3389177d496c350033d3b196ddc31
SHA1db4dedfbedc8d375dc5fa364e3b6fdb98387ab1b
SHA2567d019ee58c8e9d77e0f8a01e0f2a4ca0d9e0c55f557af4739a2129d4e4caf537
SHA512a740268d0a88aeb2c085bb8c3862008da2dc5dc92f9201b8dbf9bd47c0651f9858aef792c84d9be26449f2540fe6b414064db28f370f1d59a7b9692538eaec34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417e6fde5b93e0767181f8c7382e33fc
SHA142957834c45b3c430d3417251d171c484306cd90
SHA2566cc10b80ed039e00368fea08a7de62923dcd0e0c0b0de0b7ef5ebb84934e2e97
SHA512592505679a9aef280316f112fa5aac3bf652e6e4a64feef7b46fd3f8a7156858a257ae06e5112248083c36cada66b92062a9129a7b5ef6f24e95a082b94ff2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ed9df16cf6ed6570b8b72a95e710c3
SHA142b54d2e0b564296b5bc4127ab7f700709bea502
SHA256340d4bfe1019ebdf7e8c3c436ed0a6d1bf2da05873f56a5a03f45c7de13581a1
SHA512f49495cdbeddd7bb36bde68047ddc2b26326f391d1d1c1a4544da63502bfd088113d3799c2b337722e8d53e11645e31b19dfcb0f45a7261b266b16a25e25db77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05cf2a87fa2eaed13fe2f8f7627d687
SHA1c7a58a9fe66be7cd3e03054c2b06e54514224967
SHA2563f28101714a5bbc0a524ed27293517d5674db1e06145fdd1cecc52b9e37e2099
SHA51221cf85a757b18218ac7e52e7b37f1377559d2b0bdc472de3161a9786e07667ac9264764bf92317e6197ad0bbb10f7515d93aededac15811e3a4fca9a18a7c28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f558250f91499c528e5ac6259281d6
SHA1312c34546f6394369ae1d7720401b1defa11d939
SHA256cca857757c34dc228d0f7e5be268566231fa48f03dfcd7eaee2ae56e0c06deea
SHA51222ff9f68cca5c0f6d1eeb93319b549c5d8951c26244b80aaaf59e7f628399146ba0d14190f922b692982f7f540cf5cedbaad3b659a1256b45d2d8d1ecccb5b9b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b