Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
de486acc3cb906e078b9d36acea50938_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de486acc3cb906e078b9d36acea50938_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de486acc3cb906e078b9d36acea50938_JaffaCakes118.html
-
Size
17KB
-
MD5
de486acc3cb906e078b9d36acea50938
-
SHA1
8b6ffcce993a7fbc3e5d8eb4041571c4404eee54
-
SHA256
323bace7e496ab94aacb868bb91103bf1e82a06add989aa76c3f070079030c64
-
SHA512
6fe05fcd3094ac23adce6592489d590b6f682c91d14688852390fd21787b2c23b09af4dd019e5f83073e16815e84e6b47645a929eb4d972f732b13503b736c39
-
SSDEEP
384:SwdKUy2ZfzG6MnaeyjyWXh4+rb+lO+rU+JG+6c74EJ:Siy2hOaeyGWXmp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432391134" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9AC39C1-71C8-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b8cf86900415cd8b5aef67918f2f6e705b16b0440f235955fae9cb8cbcb62e91000000000e8000000002000020000000bfe746b332502970b4027a1ab15fd6b16fe159df094fc9af2c0ce49d7a2734682000000050bcfd3e7b8ddb2615b0d00374d45779ed83f71e1809052e0f398ef2cfa0e2dd40000000eb6b56fe22259a64b5d45e12b0502c438b83bedae44d421cfaa753a9b72977a4910e638f41983ee7f8fa6d56f8994372bcd72069a2bf6d82f0a5481b759f1f10 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d90aa0d505db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2400 2524 iexplore.exe 31 PID 2524 wrote to memory of 2400 2524 iexplore.exe 31 PID 2524 wrote to memory of 2400 2524 iexplore.exe 31 PID 2524 wrote to memory of 2400 2524 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de486acc3cb906e078b9d36acea50938_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59460e9ac013b2722be20e55aff53db3f
SHA126d5aa87000f6262da7e96087a501a6db4487cc5
SHA256da5e6d41c3ef858e8bdc18f6c963eee94ef85e1e80108403283a639a6a0b04e4
SHA512e47f2c9fa3006d072c57c725696e792106d22410d036020c32dd4c8a0086fdd2a0eadf6de794c96323a7b5b4f9302f097057c6a3fc4676a99dd4e4769b685128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5367027f183c6c8c12a1e4e4012c02
SHA119194aa09638724499b92a04e54f22f0847679fd
SHA2566de97b5fc04b5e4d9d61499a3dfa4f1024fab76b3fd6e5e48e04d72071bde261
SHA512fe027d434f6f93d0b67ba59d1d2d23ab64cc0e8b217a51e52892740daf08eb0a153b020ee6a77638a237503a5e2e3b4e4b4a7ac531dec82f1b94354ff682fa48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51865eca5f05c0cd10155e5bc62d6d047
SHA138ee0643bc5bbe7f7784850e928a65cadcb678e8
SHA25669ca7637e58cf44f28db5decde6b854865bf966021fd42f086301ff344554119
SHA5121e883698ccbc54b280a72260bc9afa03d3035ba8fc43e28fcbc83038a53c8fd56be87a6d261f1b2b335bca43fb1bd2ae8238529f4aa83a6267224fdc40b46000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5364075c4bb56a7bf3fa42ba045b1c54c
SHA197fddc1051111992b18efbd9fb9ce674cb4c20ef
SHA256f0a8750f351a26b833b1026f472d3b7e5fbef2f28cd381fdd637bad10c9a7419
SHA51258e8bcd135e5cc3ae53b5b179488910fcf964b76d1d600b12d854960cfc09aebb73f30824b4e46768cf5ba189cb1bc9d9ea1d3d15f61c56a0b2e610e80d643a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5925dbe809e77be0e6c2a25337950e832
SHA1021c9c1e041bfa33c4e45c29f82e21e6f2833b4d
SHA256b65cdd7cd0cd36573a20ddd5021d63fdd75c75d7bc84b134471d366f92a19631
SHA512a5a4a4157d9a3552cac80edcf4726c0bfe21405744131909e565e68c6a2a90c9ae214bda5b388cea32456e3f8b99ed11b77fce1801388e49eee3ffa109a8fb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb0f828471f721760a869475f06cffc
SHA13053989482e48b865fe2911192ba4a251c318660
SHA256bd3bb1f54fcb49b705eb793232bedf94c3b72fb8fb24f9ea4a382ae55af5d696
SHA51209836709e05e95f754861d51a3bba59e455cea4d1aa345dabd3584e4e31a25d7408533e2b9944485170dfc72739d2e89d0154275fae554dc11ffdc8642eb4c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9d053e90b2cca1607bf063b845a0e65
SHA1a62852b88030e73575b4c4de6a21c0d3c58d97c4
SHA25605e6380d4922d5f241a385f03d4ae586702bc0b01631e6450f0dc7b71444a408
SHA5126d14dd6d54a237cc37ef01243fc7802046cbbf1a0504d59877bf8d8793715905ddccdde63964481d083f8de9898e432313ded7cf56d280afc2718b3a7066455c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2624aed5db2f6cfe6ba42d951247d25
SHA1256b5c33d10db90723211d57244265168c063cc9
SHA2566e70664e0a427d243dc83640bfbe1b54a1097255926de0e5326f9611651227e0
SHA5122de45b744514d7de6ad133958494c1f1216fd05a22088a7f396180514e44df663e61f7f9b91bd088749e4641a166fe68a43b7d72f2061d66797b4214cad82c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f90bfa74eb9f9be421cff56f94a5fb78
SHA13fc74274ce5600089ddbb3faef35cf1fc9f3df08
SHA2562eacfa5711a71f675afde08e4a03f4f0d9c8f458548c2ad2fbfbb4d7b3a22973
SHA51296454c8f1814874407d47b5caf890ef6a688aaebc6759c7122a15ce1292b3620a7e63367aa1bc6cacaaec877581e103319a988aa3c5b88c084f0bedde6e818cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83da48fd5c7f30efce9f01bca3fe196
SHA1e6b4e03d53fa5aa63155cf2a7f0f0515ba61eb92
SHA256cde188e6949d184c401d7474e4d222d79fa948eb924df3f2f85a8203ac0d8ab5
SHA512584fb2fd82b36dc6930de0e6cd818301f38bb40a173680e8ff612190014e81931c5809c53af1fb382449e2b16b9546c1f8a9ac196b8638e58c4901e3fb316e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5c607a4a98e21e19c4218db39bd6aa
SHA1e7bde4944961ed24f7819b39e3f40da4c88f5e94
SHA25658afc846ee5a54350d5f9258c62591c7355486d30c8770317fc2c689fdca26ce
SHA512f938e9d10a42ec110c7decabe7f07499e94c12fc8fbbf8fdfd2d451997b8c11cf08534ef9f7b8c82fbcffea5abf7f2b8fbe7066ca21ca1f05e26fa219fc989d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c67d0ea2bb5c20bc2cf612b8f7863562
SHA1f27ce048a75224f5a1143b835d76ca5893e8c8d0
SHA2564797c6d5ec65d29047b4fc5fe4616fa92260448af1c48914e1ab4bdb406db495
SHA512d5970fba0d6869af3a771927dabc3fa10b069ad03fbd277d7479061482f06f83d17395c64bb9c3403eafc6b670c50590dec1c9650e6f0dd7ed22e9019bcd80d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c7db12408afa4ccce0f6705e09573b
SHA16ddaa7cd08bd8a900ed3ae40c2c9f9f089ffe256
SHA256b987c7afe0cd0424bd690d289c4ad8f21a2a1b0b5ec3fed61206dc1897a0716b
SHA512106f149eb02cf6ffe1e9abe76ab80edc383f66404326d00669c7967f973fc1f5bdc25cffe3911f8d2096502aa5a5d596d71ea73e23e4a54a3f74022bb8c91d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae23b45049d3b6469bbe7611a9ef4b4
SHA1371e97baf0f7bb8e9bf3e9db4dd63cecf0548296
SHA256e86a7458cc7a1b2f3fd8c3a65088a6411f87d7ff89553f7abdba9e469b00b670
SHA512e62b61331a407f637a8f973e8685780e03b136e493cc4feaf0074870deec6eeaafd8dcd820709ed921e2ff2b87d91151e3d53218e471484a56d85f232167c2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573230cbb9bcb5a5a50c6629e58787692
SHA1762485dc96ede0d0e3656a7060049b2495998ca2
SHA2563160eb681b3100c0ebacc2f6f91e39e58e19f69ae3424db9322533ae22d317cd
SHA51259cdb91d35255a8e98769543b323623d60bde4f22d92fb350b329d02dc1469f5a46bfe35327936a9eee9b65a023d9280af5bc1da302b1b0d014e505720b7bf53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e2f4ccfb397ba052696c0998700c7624
SHA170e9a69503ef611ec9d73c8c31491cd260f9496f
SHA256019b8cdf5f9fa9f159652aa6994572736def9b3832cff2d647d6ef1a021cee32
SHA512e39285f1b5a1dce227c442fe8cfe73a1249d3eed0a8c4cdbebd2828288d153f990770e90eacd088cb969c8479438655e02584275fd5b9a2dba92cbf3f432b9d5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b