Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
de871083a0420dba24efa8bff35a0b25_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de871083a0420dba24efa8bff35a0b25_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de871083a0420dba24efa8bff35a0b25_JaffaCakes118.html
-
Size
122KB
-
MD5
de871083a0420dba24efa8bff35a0b25
-
SHA1
635f6a4503743b240983b8f5dd6788fe3b81f9da
-
SHA256
f656710859234f5fe96b85d2228a143056ef31500d23134682695ed8a3d7d5a9
-
SHA512
80f703f4aa653bc2aa35e5a7041d34b202e3fb3f704bc02aa36b38f2676d1f13ae2d93c8dc436ac58d1ad36006e206c73ef90cf8dfcabe9a91e41e4d59684159
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcfLaHA0JbLWC0DcZds8aEp:sNBxLeo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7D446B1-71F1-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432408717" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000004e20568c5f027fd5e1a6e9e32ae6046b97f41503b318c23ffa0828c3ba4d2654000000000e8000000002000020000000371577bac940edcfe83dafaa194199ec4dd27a4239633c83ed385cbcbf185523200000001300c9377fc75f4dd3527ac6a187c518f0e2fe4f0c765f4002a48313328c105d40000000d595b8e5718c9a3685edbc06b1bb7698a815c0d75de1aefe47db27946117892e354a7b025619121ae53dfc51c872dadd0cabecdfc041980fe5feede47a9a04c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309c69a7fe05db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2408 1804 iexplore.exe 30 PID 1804 wrote to memory of 2408 1804 iexplore.exe 30 PID 1804 wrote to memory of 2408 1804 iexplore.exe 30 PID 1804 wrote to memory of 2408 1804 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de871083a0420dba24efa8bff35a0b25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9704e51ede848ccca43c8a486c2dbf
SHA13e2f142c598f4521867367e4c3450d147122b504
SHA256bf011853deaa8af7480763fafbd7a3ee713309f2f7d5a8cb0c6c635559606c4c
SHA51288a7b3162e4f2c3391c5f2cef89d3334910427fa336a1562c38d0639837f00276dd06b274403fa9945f6f758c1786ceedaf5eb04eb4d6ad1bc946443c2b5b9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb1a810915740ea66336e1768c79bfa
SHA13e083eb76596c65bd5be3be060ac9e80bc38f3dc
SHA256242cc4f9333dd2d90786da53ac9c54707a3c2af5c64fafd2ff6ca2d862a0b376
SHA5120057885e0d16537005dfd3e8cdc806be985c9213b5bdba40e81f058152a1864108e1a9934f25e4fecb7ec515ea333e76223519cd8cde3594780db3e8c2f44be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a7e3d1409f584460942871636068cc0
SHA1eda04b99ef4b41ce01c1ef04e6adf9f53901f891
SHA256431d1c274b8eb49c2b8210dc128f6921a646e3f574864ed1aacf66887bdfc50e
SHA512a6e2a4abf8ae80dddcf8ea4e21a1a35b9decb453f03cc972eaefc2b12cae0bf230fc473d2153ee2abf4e94f2cfdd1bbf1d79db6df367c9a96a79763d05cf0ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbfab9f6a4be6f200b28e389947057ab
SHA19e45b8e655684248db46de926e80f91fd4a59f4a
SHA2563ec1bcab0633a9c50b0326f6e8ba77e0601f56a07cb761f390f443889ae5b64f
SHA51234a441be71293892fa215354ccc2ef5396955927c50281fd887f6f2aced692241a8a5ee12499ed491d6aef5f94e1424bff3ba6d052daad8b204941cab724f44c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff9fd4c68e43779009101429886b2fc
SHA176ec24520eb31887332114f32a711a9d870d5adc
SHA256f7cf0abc31722aa4eb0db4654438428c2a34b3c00a1290e8b8012b2da919e5b4
SHA5120c486f58bc7fb797e1fdf4b45dd60e169d6eaffbb39eb4939a1fbd85116de7640cceeeb6d1ef5a2ec68eaa28a2399d2c423826cd64705c8c982f34633304400a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801670bf2b12596b9b4e3419771be455
SHA12cb70cf4b91c9d8f1269a8d02f2a919682f82440
SHA2568bd843bff87611bc8c96a719ccc46cf3b9692e1abf582648deab094d28a4219a
SHA5128051730c2c9ccf6b410f1d3c24da33af3d881b0294dc0537a4b658b0cb43577fcd6f459dadfc1d45909e12c82b9bad26024180b9b3c3371b612587a52781cb05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e9f115cd8c3478ef0a3f3d2b85b4d9
SHA1300aa4049ed4638ec4cc737c75ead5fdad98a3ba
SHA2569c42225bb48a082e5578b9c699d63f81118d2dfd0dbe313c91b8dc577b0ac3db
SHA5129585c75a1b1753aa5c8ada945a4d8837727fde0d0b3e78056d7b1cf116a9f7688e0c9e1128d3b65321468a8a466c1443a66ace5fdd0c17b88dcebf32a4c1470b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51227c587687cd0071eb08d7cfaf4fc73
SHA1ca0f04a617222222aff4405970683be3ea07e57c
SHA256f321fab9b81d1fa395401a9f16be6f296b546804cc2814403d9c461865617017
SHA5125aab6ca04f1c19e6a4218c78481302deaa4f1da503532d16e40ae540953d3fb42474559470497129c4a2e164edc3ddca1e3806bd8db3d84684c5d1a8a1fa1c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1295088bc75cc64cb78aa2b61ee882
SHA106c624a7ba756f30ad2c7714d6c8797906a8da4d
SHA256f91a96bc67f9325f0a6716925ee65eb4fc30faa06654f01dc2f6559c9ce0750c
SHA51236f34c0f52b9bc878f62ae5acaefeb3e7ecc74e0d4235848568ec1d593d468b825cacd9303a4c16db837c68db9834da6b1431127266bdf86895742289c802255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54876498a39e84f91ece21deaa3a4006a
SHA1dc785f2cd585799dfb1704c5da6f9873cc5b0cc9
SHA256f78344d1bd25b03aeb260224ae84761ce689b115c72fed547c81853087a029a6
SHA5123cca9105db231806b0459a68c3edf71804e601991685f77b86a755fa249bbc79b1a0be5b8d4fcd073f0110568f2b3df3907fa929abefde91587d6377afa79868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521768e13c9c89df3f727bce1dab8acb1
SHA1a34facb656c56516fd2bcc566c6a8f69f9957853
SHA25690c1d22bfd2f0dcdb4a7e47a9a7228b844d462575e227923686f5923908ac5ab
SHA512219dd1a4b883b7b97712f180f0fe694fccae419f728cff90bef6cb3a978ca9731dfaea9f0a5d2aede212bfb70679a91e8a64f1ab8316a09ce3e5ee540b7fa83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53282a55b1edeb41e9200bdd7803e1174
SHA121b26a4224353fd8fcf155445e04eee5c7343ce4
SHA256acf0142cc26ce919e1075c72f0554b6a59371f2a207ee81523267c966a1938c0
SHA512d705dcf7adc8a2c9ae582c2e8a60257406a750040e74593a78dc2c4749c6e4b1ec0e516f8d98b5b3fa33db092dda83279bed38a3e453a42459edf00e2cc51699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d36fabdd705c95087c2adcbd4f34313
SHA1a935813200bdb999bed503d8b135fbf9b4037602
SHA256f542f5544299727ec0540e1c92a9c9b297a521bc2628b4df70afd0162addee92
SHA5123e1b40e945b6b8d5bf08ab8c04e432e401c2f53a4a35c5b8f1737a2c5d6187a9e9a6bf16643b067e2b5ac41a9a63a2c4c86f4f9fba28671e26e8d7c8ae263075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409dade93697a67782e8fa573834f3dc
SHA1371742b40647feec1aff76606044f8a3fad506a5
SHA256b1c54ebda85bee4ec2550309d4b0a48c4982bf7f9f831bd859c3830fced97aba
SHA5120cddb26920838a0f1c636d60a58a5b2658aa19a3e5f3cbc34a8103c7019aeddff2ca2438f1c93abefb50cd62753a8252a329a393f8500997f2996fcfdec8318f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15eb475bdc4d40a5adbe8f853884f5f
SHA13b668f2a1bb3c248ada7355fa6c04d5ec58010c2
SHA256bbb982703613119dd866cf52398f884a12a6ee18f44a9609e9cc81b23768226c
SHA512a2b13d5d0f0f881594bb9e5e8991f1e500baeca42d0a18fdcbef80876fe25646ef6c0058be53c26ef20b45e94f651e743d9be52fe58f0e32c0050fb1b6922d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5289228ab85486d51f454995344d46
SHA19bc8a3f1ec74a83f3d79be58f0bd3a3b3a10f281
SHA256a8cc5c59f3c0e2f31af516e36a231c79ad6414ab4bdf70f2fd9ab449365d4965
SHA5121825a95ca7797b8bb6a1312e09085a5c8358d8a46d7f0e029e7e236969cd375fbcbf637d82fa715783744cb6d9d753a09fb3a59872ac4701702a0915b2ec7dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5599b7f91a0d9f04fc031cbcd2b0fd13e
SHA17bf3d483774d14ee40a0a9b67cece10e85bf3841
SHA256bf96165d048b060c0b4ad5f6ca35aaf34af02db430b02af34a20c8be5b11c966
SHA51226a1e851977da1e9bfe4d76a64a5f93ba139592477bb64fa2ace47166d042a5fa6e0f8eae36032623cd76518ba8d93807201b79736ab1f5ce1a6c66580d2d5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a32f0ec89e2ac8f43b6a8fb6204acc0
SHA168095f5cb34a05310c5047e457993512de9b69ab
SHA25625c57a9e90f411d0840c0f12c6f39960b7d536d123b3504c54e4b972cb11019c
SHA5125fe099e4c01a29fd8073fc2687f838953fef7a81967b9f7f62d9a9391c619eaa91fb768918043a9e1a889f6f7948cec21ac180d4077d7d7d44592a2e74ab2b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1e143a5ca19d654820ec67f249b5b0
SHA1deb86f8ddd1bb2d5007f90d2105efbf6a0499a26
SHA25689ebd0426f36fdde10c991cfaa3f1bc99ffce8d716e52b43e0456b63753a9688
SHA512e167ae99c9baf92fb599ce978d2235c66f855c8e515fc101e5b5359003a6cc8d66d7f37e5436d7fd0ec633eb2250542bf4904a9b7eb2c9f9ef38a1cda5c85825
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b