Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
de8a94d9ee18b8dcaa1c198a1a1d1603_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de8a94d9ee18b8dcaa1c198a1a1d1603_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de8a94d9ee18b8dcaa1c198a1a1d1603_JaffaCakes118.html
-
Size
4KB
-
MD5
de8a94d9ee18b8dcaa1c198a1a1d1603
-
SHA1
4e7685dc2b963c11f30ea2b40a69e87ee678ffcb
-
SHA256
47a05f6fe863897486f044a0e023668a2ad595f83a23db6a95f22550741f12d2
-
SHA512
715d77f2b1a0513564c5d74ca1bffabed55114d406254e9df8781b9091374b21b679d81a73e151bfd9b981c34761494b5dcada816ca7cdb908ba7c31a3740c7f
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oY2fd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70443dbdff05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432409225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f91953dfaca0a60c1aece51d88af9a3bae07226bb1de0c0ddf23a7bc2edcb3b0000000000e8000000002000020000000f5fbbde71937fd38078c2e2c0007f79849fbc8bbd8c582f2d1ab26ed62b85ab3200000005679573d46104fd21a7cab5b37ba3e9b765d7f83c2c5b6d77cb7b041da0e66f840000000c8a9e8e86a5e6bcc06c94d6d4a5832571da83d8aeaa7a9b417de0bcee58a05af323662e3dd2322a6e745735efe753cdb867750f3c5a405dbde17613e19c928a0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8C10191-71F2-11EF-8CC8-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2748 3024 iexplore.exe 30 PID 3024 wrote to memory of 2748 3024 iexplore.exe 30 PID 3024 wrote to memory of 2748 3024 iexplore.exe 30 PID 3024 wrote to memory of 2748 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de8a94d9ee18b8dcaa1c198a1a1d1603_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59409233aa43903bbbfa6315930637fd3
SHA1ee1083290e001da2025a495750d2ac5a242c07ca
SHA256d8f19ba0f9eb668a6d577b70bf5e3cc7ff118ed42ee2603a115a09e2e2d88927
SHA512809369d65b0612568b5ab6b7b011f84e3060d54189a59bcefe4ab4567dae762c2d16376d8330dc1d10195c093e3a9e382db4efeb8ba03b49859175ab9f57cdaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd365a5f3b3e9e6d9d373b00c8161a2e
SHA121cb138499e7ffa917cb3fa30ee9f9e9812c1b25
SHA256e6a898f5c72bc8a496aba88e4cdd5501c3c1cdf189ae1db731abb9168bd77bac
SHA5122d2302abf9e42c7d90277e050fe1cb9e91eed6c476078387cace520ae96e7dd0c657f80dba4f788610517dce8835158dd2be1d9e0945a38f1902a97681f08847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c6689e983b564eb8ca0dbedffc3714
SHA1fa8778a3f90bf24b5553b098ed7fe22be6bc4811
SHA256f4bd2072428e0395d60a21f7d5df28c2509fe8682ddf397efd1951f5162c534e
SHA5121ccbff8f90cd1e655cdf266ee947d3b5782ba32cb5de16c54623481e6d4c9d3c51bc0ed4d0fc10ff07d12d4d0dba1e9b6a6314ee21a20ce891e27508fb6db5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a31d1dee1f1c82bc0d8f73b8c69e96d
SHA1fa52e15b076081bbd570fb06e583a2c57be0a677
SHA256f69cde20e1e634c1a1fdd3d4db6fa59f24ec76830eb248db95c57b7cd397e30a
SHA51266b7045f1e45d1242098e85a65a0718e3ee97e9739ee9e5b4c8f8aa79ea68107252fff525a9e97a83158c8178581f527bfa6ca1b2a8e855ad46bb5042a8e86da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f515913a7a28654d3b6ae365839d9cd8
SHA132f775c5a33ce09697218ef7575a9cfa8c7c5033
SHA2567fa352f5b5353c01eaa96a83e9327864c6acfc67dfe0de0b36871c5187803472
SHA512ae96127860486d6b7d5a3a85e9ed6ef0bc62dc9f06d08a38bfd54dc29b57440f98310ef87191b75da16ef5941fba12423de95a10cd3d849150688075069a4584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7b47d77e1c5741c605af513103b952
SHA188741bfc3ce54c014c5a44e943b30c8ebd998dfe
SHA2568b9a12496fe2db5743b69360d0f237d740a5ecf2b4640ff040468eb3a7c2d316
SHA512b3fbcc7f8e20d3d251bcbc673e86f8d0c7651c7b421449d4d6f92c7e626110b67560c61f900b9cb1b1e9608a4f7e641f25d7a85d1e43119a8e1fb3e28c5ce7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525cb248dd2a2a1f53a346879cb03daf5
SHA13558e6a1c52a0e4f0f85bff9de763f708815ceea
SHA25651ad43c92525546fa5b6260a85de7b4ef76e58951f09a8043d353d471a052944
SHA512ecd500d4fd36043c9745e7ed2b207265bf7c88b65b9af1e1f7a07f75a4a1da2c2ffc923e754ab9141975723474aecb4da884b004f02e0054ccb79f5f0c5ca996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e641f22be1e538454f4abb87dbddaf9
SHA1b5863487a6b0e0e7015a08e9ace4a9ea8fdd1639
SHA25625151ffff036085ae883460e538b60254809f32b7bff1b8c43e4365f47cd57cb
SHA5127cd7f03a988df0f792dd533fc8c79e20994b2a3a3ff66a8b4bae47971148f5ffe294d735a4cf2962d9ec03d00093e381a2c1dd22a0598ce047c5478f5771499d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb02a8f46813903b4be16465b344be2
SHA1eb1bb64a297dbb8eab855dd79a87b1e4f75b1955
SHA256c06ac2c6e3229d88ed2e020f89be7f31920f859563ac02a235e6c3abbf43c714
SHA5128c6e92e4b233db65b1f0f6f0dae25b7f62cba0c96e752685867feac414d2c5ac605a1b103c4a7c9e14183166fef52fa4db543dbeb68e6435d533bc6cf2979b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c59b307ccb947fde8e5eab9f5ddf2f
SHA12d3c67ce3624caeb643bec642360e250b67ea8a1
SHA2565877b073e5686bebd4f0ca1fe883142079652a7b32a48fd12d6dcfa8297bf6fa
SHA51262807ef27ace9466f9d3d69c0f935ddcfbfe36f22b4ea239116f02942379c96c04f88c85414b2f3bd836554dd6386569f5d8719049553f3c4b235530969738cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54155b6cbd3d33797e9197164a57b0b62
SHA149a447c6312ac7c9204798e2e45a7761bae62078
SHA256bbedd6f465735356f7966393046bb1dc048b0a949382cec853ae3d966abc94ed
SHA512d9014b7179a4584377679052a93a073e1757fb37a6924e5e79516d1b18b4ff9394f8ab919ff441710e863a962902861f09a142f42cad74a457a69006bb76316d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b76b61f88cd33a2fb477e167bdeacd
SHA11a9baa7a28e902094b7e3e5c9df6ac9a907e3e66
SHA256ba42072f233a627ce53e7e7cde5cd52d8d4649c3755c81bad332a9876aa17fcb
SHA512ad8eb758066eb62136071a4e2b058cb37f060a93b883dd05aa246da1111a40c2d9a132d8d8d874cfe223b1b190514f15a31488465b0038a6e83b1db43968739b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c134144fac010e3d95f1d5293c448fe
SHA15c07fe86bb13c1d3964161abe89ff736fd97cf4e
SHA25650d6bd312a5b047a930c91bfd0bcb9339941031b5cf5fe268b59de8dbf4e0622
SHA51242ec946c6e5716ed3846523e0c2e1c6bf5d5a11483595c06c1dc09c60fc3d351229880ff3aec5e7fc92bdd5a332c37c30e8eab63e43e49abe697b32660b951e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd38d5990bf8c18089880ee69635ba70
SHA1de2fd39e8c18ef04198dadee6be1efefbf1b9af3
SHA2567f2a6b3a43a058bfe919f4f0bd85b81fe922c22cae352c722819032677b431bb
SHA512f4243c3878e930b1e28f76f439694580109c4c46ae8f49ed95f435cf4ae8f4ddb1a1d948a6224972436bcca196914d989377048027e3e22c30f3bbb82727b2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f12edc99bed1fa681ce01a89082b631
SHA133a87852bf8457e4e299f1a384ac3c0339ec7308
SHA2569cafcf7b9ab31124317499231366777d6c5808893758509acad07f4be72e2eb4
SHA5129d610559a2ef792c295861a5962d58027766a4d79c90d80e4d2c2031ffbd91f902b39eb85a12ed6492ee170afddab7baaa504adfe7aba1fbef459d2173c80ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f6afe38efde3b5a4265de9c68f7920
SHA15a93bb66ca2e5573e08c243d2f488f2e4b463ca5
SHA256a011d80aa6c126655fa4b01324bb6aef486b65564f551621b0ed9312ed791533
SHA512f8a20c41f66f80a2022594f483c8fc30ad16f932f64f19e58c6c970b7e14c8036e66a21e0786aadf56689cf859d06ae62ea469e061d7fa4eeb9346591c0c8a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf467ff2e666a4f264e32bd3abd7de3f
SHA15f878f2e2d751ebe6f54f066ee03ef26a06598f7
SHA2562548c056041e29193bef3bcc56c11987ba9b641df28169e00acd385a1e5f20c5
SHA5128729540c4da37805d0fd66ed69614787e891ae490510219f577ed6d6a86f7c774a986fdc2f36afcb58414b9c8cabb720e59e25a9075d37103e28884eba58fe9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d35668b61c7259ee9ebd22810258e4e
SHA18908a20b5f1bbb956f8be24547cee6e0153cad68
SHA256b3d54cfce3126a89c588aa7f195410e464487d6e770b2f56a591694313fb9fb6
SHA5125208300d6205746ff457749f611b8a1e54c8d1d3e98df3a7d53107808ef0d507d68c2c4d5930c4b2acef836b693919a4a68595b518836b896e0455debc5f0969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518fd52bb5f79ad6005fe57178bc0750a
SHA10d3491ef742ead10351bcda4847fd9bf293f0571
SHA2565a99e7ef0905caea2d523a96bc7a503a33664e1f2372b46814cd875f689d1034
SHA51234c3e310ee50c2c74b219609f65ab16627da82f00459aeebada8f7dc3079353bb1a6ba9e68cb4b4a980534573defc804699731e2f8383e2ac9c8f09a57b2474f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b