Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
de6bff6820a148ea8b7e3eb208f7e7f1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de6bff6820a148ea8b7e3eb208f7e7f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de6bff6820a148ea8b7e3eb208f7e7f1_JaffaCakes118.html
-
Size
15KB
-
MD5
de6bff6820a148ea8b7e3eb208f7e7f1
-
SHA1
a09aa111a6faff055b92fd73fda23ce871b8139f
-
SHA256
d0403b21cbf29fd99b914ea90ef2b448d833f074eb95ac8079b60219cababe0f
-
SHA512
731e8b78f08a9e81451f51e0a238e87e7c409d28e9885b256e259c25f51f3ecdd34229d48690dc2d7948d668aae5d1227ad75c3c2d3c56680d1126006e88504d
-
SSDEEP
384:SIp3CAbk1hy/V8mH3YzfY6rnvn7JS5EEAyBq1QLl:SIFNbk1hydN32fYmnvn16E/yBYQJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95490181-71E2-11EF-B57C-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432402212" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4071666bef05db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000004efe83df75468beedf0ca4454ffe543d0562a9f20682a44de141367d5ed54bdc000000000e80000000020000200000005bc1b36e5f73d77ac2498082545d04a5ca23635970e3e99e77b21f23109329e4200000002eb2c213ee85fdb25de63c25ed642093059c38934d651f4ea42f2ad76eb7c2f6400000000ebf43e88a7ecb0eb6aaf492d8f729d0cdb777a72594f01c3e6144be0f6d9307b1b3aa3e71d5b2e1bfecaa4285ab7ffc86c9d33e9a7013dc24702d384983d063 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2064 2548 iexplore.exe 30 PID 2548 wrote to memory of 2064 2548 iexplore.exe 30 PID 2548 wrote to memory of 2064 2548 iexplore.exe 30 PID 2548 wrote to memory of 2064 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de6bff6820a148ea8b7e3eb208f7e7f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe1f75637c1242288830f30a85847d2
SHA1aa90057a9ead49ea70cffa75b0ecaa6b420508c9
SHA256809cf5798c816aa25c02df9046204fdd2922771cc6c789ae902f05f2146cb6f7
SHA5120fc86ae6a280ff962f67faee5605c51b29c7eddb13eb651d172b9279292895bce310b052f4f300e7ae2fd574b1e8bd175bdb091421a48e34344637c97dca1818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd625e6ba34cb281d96b97a6d16ee07a
SHA1db8ad6205dd135b6ee6ca28a986dcf69784015f3
SHA256eb43dee90b1b2dc1691028e28987756900fad26fa38ece9da880dc1db2e3856a
SHA51290f4803846a4be6d46d04c1b6c258360727994ef0bf0a47b162ca65b9d8596cb792da7c44e274faa9d268cacd3ca2aad87666c138df62beba5c97f819768bfef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b567027870e726d36bcd759684672206
SHA105a9db3adb418eb2ca167d8126818468c98fb5c4
SHA256de3302f2c2356bfc215f18214fef7587fa2274195f0f1de4cf4913b7641fca81
SHA512ef1243a7171aa688fcd5628d4d87c0df8079e174be7605a873a6ec197a318fa6f6abadc559fbc46132dd01d5abf6c56506b6f247c923aac7058ce666ccca3c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fb513ea04e1ffbc33bce825f51389f
SHA1c5d2252b86379ca6c0d0b4b4b7795f4884423984
SHA256bfa1019a7ed59d9bdaebc18172cd3fa8e47974cff60800c0503013a977ba0669
SHA512e26a77d7a8a6b4e28956ef3deb20018c0e9f9b096ba72d49f4a5c08b3127b7e05a049ca7b049b05105e9f7ca8da97236495fbe699a4be214c2872c3fe8d390c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d3361f5e9b47fd143633292419285a1
SHA144895d70f15331fd81eaceef7ed8dca95c23e2d3
SHA2565a273f37fd283b387263a850a7c3dc52c985283b5063208c6ba2cd96d30a5d06
SHA5121fbf065d232e1267dad6267bd775ba601acaefd42223c85e5f47ae189896233d2513f80d495df8a77671d03d81378c785e79d5103c74a72049a0427d170464ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b441465a76aeed37fe08ef24efe2a62
SHA14a2807abcc30dde2fb869c64614b494607fd51b0
SHA2569f893bdd44a51affe03b85a98cf97664b9797929fcb39e3195dbddea7d2dfcb0
SHA512354d1e1996e22e362c9903b0e30fa6259c85aeb47e9444b8f2e13e83d705af92c8eebd94b10cc1f9ef113a3464275f6094188b304dcaeef9426b6fac040f2833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1af0caa0d0693ddafb0ac345b1ad06
SHA111a50668c36f76ba890478d9cde4933f7d8adcc4
SHA25646b049822fd5239085625de0c2c05f5b8e2b8d2cd36f9820024418f1b0775651
SHA512f2b4e83125446a80e46b6d5d0e9bb1dafc7dd0494fd967bb2f75d5fd39e11ec286565348cdc362ec4c2fa0af5e006e0ebc335b9dd69b8c0648c4a7fe1c1eeec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1191986772d233fb4ababe92795522e
SHA1a9a2807e10fd29c391eecef6466deac30e0a270d
SHA256bb7586e0dfa69e2aa8c0e003a7a6861d38621c08d65fb7ecbfe45e4240f162d8
SHA5128934baa356cbba06fe3fa7b82e66dff36465aeafbe66d3a0ba22cbff89f8bfb2f89c9fe55040c32ae1e0a71a148aa1078517d6727946a8bb264232325b0804ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1592379ae44aacd004aa810cc4c0111
SHA18b1d79d00e209624c273538d449f43862b8b8aa5
SHA25698f68ab258baf2dd57ef5fde1e40613cd2e456d1217cf823b244535333ff7fbc
SHA512eeacbf20cbed936101ecc38973c86905545af16bd8f0730923714726f830cfaeea1a4d9d08bdfc5233dfc1399f5ecbf30badb045524f94470e94c9a513049a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6744d588a54d823a9fc2ed2765bffe
SHA182cf0223d75b97db82d980364758dc02b2961103
SHA2560b0d6c9ba76db25a28a340c0dedc1159c97427370cc0b5a51249a102de94b8b4
SHA512acc5599b50c39c16883fbaa374fcf045b7a4437ddff81407f63281516cc7a127db59c5f17e2ebc86a65460735e7b4123a09665f814954df5b38f9585f4d080fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5571e2a5a28b3d9fa4e5d33fdd01939bc
SHA1931c208795dde93aec4f8047c865b845519fd8ba
SHA256821940fe5f3b8b23d84b8bdf460f3bee28c0f0f60acb521c8b8f072204f99d9b
SHA5128856b4c84ca72cbeb550c32cc436e5eebdaecacc075a887c4fc99616c09594b2bd4b56986f13bf46a956ff697bd2bc0ab106963f834dc1e0d8d1129d117f764c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e002ac37e80a1c1dd250fdf10b3720
SHA1567cfbaa20d4350d4861f13f178525b83055ef72
SHA2561e4b931df4ee66a47f57f30eb6c634ee714dec72a392e62d9b506ed4e1998c08
SHA51226be48eedd69f547a564be2ef8f327e04a4e82ac3118277d820286e4afefa9ccfe716f19de046ac7740c16194caa0880ae62015fe435d8d4b79da9e38a30062e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e4d60c114d82661256ec2d3f33977f
SHA14d211a14cb4fadab86668ea629b92458f74e1c08
SHA2563481430e284a5efbabe585dd0623a8544e3a6b0455fd82beced52d401ab5e693
SHA512d73be79f074cc421b9a653e5067add493c5fd028b87348fd78c449f6db6854f78360362b5c23fcd0d3f1ca1f3ce1b07a7907e0f6d5e9b0a5f08c3b804ab51bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3172da7443c6607069e9c0c7a5a70a8
SHA10f273e26d4db4e24202f8465d94758e8a450d108
SHA256e5e0df4996f90ad0b67d17a756504a5f21ea256a4a01fa82d306e903d51fe321
SHA5123c0a204498faec19482e9210fdddd48e816828eddf1e3787d982e02c476c5298dfd17c73a1ac1fc4242b42b91a7f4b4740ddf598329927a80e5156b3306291ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc238f4df2a0305a6117c831a24b91a
SHA13d515a6aeac4859c6aa614b120681cc89d9a21dd
SHA2564ada3baf175c8ba0d5e1f2ff7a66c586c98123243055579615a0e0b62b4c5ed0
SHA51235894aa1d585d403686e452b3768646fb78bef3bc21da143969fbf8451d34885182cfbc4cffd954cb0eeb8175231522cc38892943618d9ed7886513e7047b16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183ab3c4e4994ee77137e10699888868
SHA14d794f5c4ac5535a3507c5e221e55e0a7b8c07b5
SHA25661e4141d735170e9526c813768ee6d5f45803d5491a54533dabf2fc51809a9ee
SHA512aace7c64a7663feee44726f15cf26ee8640b883fb2f733f1c8ed29f7757edc790236aa7a1b65c924dcb071d69b94ba302decc834e64e701547f5558f33778007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3787ede1cf0ce3721ec98caab61fd8c
SHA16a44818650c98be7cea9940deea9a3e91068c810
SHA256144acb08eedd4c10d32601978a412ae094581e64efef13f530f75b0d00f5017e
SHA512eef1ca932b34c26cc6aa555229cd734afd5f93f4f3de921a98e286cc0108c4bee1c4b7e4a974de237cad96260ea198d5db61234311b2c8feb449bb82aaf8e4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550135bd212e2c5b3585a6b6109b1a415
SHA14038da448477ad4933a755b9ed19891da2d4c535
SHA256d2edbca31e9b042b3b13050c0cdabe4fc912f8670c3ad294711e2c27cfac25f3
SHA512de4800daf3300dc0c2814bb11761ad70ca4ef6a36ed85fc1a963d804f059807067c4aca84598d18b66c802f1767e9a29a95ba127b296025112e666e573ec6d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5826386b91406b9d5bddbd78e11f97c13
SHA11f33c38e09fe83f9a94e297b182948280530c3c5
SHA256ece9a62f26a8183b941fa7fc84cdcda36f871d555573457e8dda92953f4851ea
SHA5125971555b8429c8866b23f5c5cc4a8667b64b916c661d89f19c289de9c7ba4d44eb29f36bdf620c89e4de05677347bf2ab5abd9f7adc4bc3e3aa3393e15729b70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b