Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
deac154de3f24b5e74c4badbaf543df7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deac154de3f24b5e74c4badbaf543df7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
deac154de3f24b5e74c4badbaf543df7_JaffaCakes118.html
-
Size
8KB
-
MD5
deac154de3f24b5e74c4badbaf543df7
-
SHA1
e1b0f7e78bb0161f4d84266f05415d8c858567f7
-
SHA256
e613e554a0dc6fad96f9d937a8359647036ee5bb35333890834d1d9e1c935aaa
-
SHA512
b6751237d523595a1bbda4ca139f2d4ea640a101b867ff82e7e24430f1d30ad068acef66a6ac3cab984218370694ce20640c28ca0b0f7ab423712087277332a2
-
SSDEEP
192:S7yrax7TR+Z29H6b5KRkGVyiQuwC+XFOS:S+aLKKRkGsitwCjS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000cf1c4e84463b9db6172113530daca753aeac4f1242a8f965b40c482d74f6eb84000000000e8000000002000020000000b674e6cacfd098100cfc166473af1693688720e34a6875e7e7aaa40c668dc17b2000000009a5cdf6138eb86734a83aadb0e71c0a90bd96aea0e6869866033a0de283daf7400000001cc201f1bbcc595087f978dd48721887917bc60844813fa126ba80533bb78bae338ddb3ad90a5621b33184b5cabcd75713d10cea44cb9ca6a030f34c72402f5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a007ec3b0c06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35178621-71FF-11EF-93CA-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432414507" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2692 1884 iexplore.exe 28 PID 1884 wrote to memory of 2692 1884 iexplore.exe 28 PID 1884 wrote to memory of 2692 1884 iexplore.exe 28 PID 1884 wrote to memory of 2692 1884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\deac154de3f24b5e74c4badbaf543df7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5260d7444cbb8d4608d57ad6a818ea39d
SHA107d3a626ad6ad7ad5774e16cc71c89b5fae2513f
SHA25681c42f325227b1f340e2cbce4d3b26283fa9ac34865ad145973a61c39ca048b6
SHA512d30d443e8476078ae0881d0ed8dcd7aeb7355d185cad98477d0866a16345b885913156baf4a70fb672f7dee3e6e1a046feeefc4e2a7dd2e40535d8329436327e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91953475f4d234aa8dae483e6cec312
SHA1378421953338fb572a1f7307377ac2e503c90015
SHA2569ddc7490b68de5a10159d0935a196382826677fc450401e77ab555c1c6296562
SHA5125faf9f6128cea2c979059c0a7ab37e09c632e313ad2dfc2e2400aa3bc6171bbd1a0e38ff22291678c62914e60b31e8d15ef21979452b7ccc8448c3ad2a631e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c93adb86cb840f4d57bcd1455d49ed8c
SHA1b315d484d617194a55beba3a4b392003ebd64b82
SHA2563a0bb63a02a1e33ae2563dfe5a7405d73f1ca326575ed81f79cc539ba2b8c6d0
SHA51255515ad2464277c5643e20f7e27b2fd4fbfae20871c12e356b05eab38379e3e0f1821732605df1476c715892bac08c1f8d26d3e0531205f372a3c3a59a5c1d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2c3c03d49669a3a27a9379999049d1
SHA1ff4203322295d545c14d98323db68b46fc20ee09
SHA2566fe988705f062b836f5ca08f0f89dca5149e6f3a188ecc50cb1d65552db461fa
SHA512828ca8ffe50f0de9064a115a804d8002f101c90c87b5bdbaeb5a8fc9c58fb7fd76ab37deef660316e6cf4f79d64b273f84264328ed1fd2a927ced6963f02837a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e918f230ce4001a87b64f7c67e232d
SHA111eb235b7e75fb3bba535ac051a3e255d051ec11
SHA25682eb2c75e57993584c0cf07e2692541905622513fa2f2a772ee88e9ac87d4597
SHA512d66d8441d8fcd071160388cd92b4351dfd3ac5382c6abaef04eb35e25cf24aac6ef7001645a4258c60b3437ebd45d9b9a129c459bfe6852ff7b0f8deed5bef19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259f64e3a155b9696ab5e7067ab3999b
SHA19af7b9ca4e9f3115ececa330ec325f1551d9b2c8
SHA256814e9cc74991ebccd47bce48815ed0f0f5a565fd4655569924481d3029ac194f
SHA5128d06d41b53f169ee0fd47576d944aa2e67b79422c2df30be5f1520f9cd2d1a2e99b6500f6aa3250b0a7e94587d41a47502a21ac36e05190987d7221cabd1c48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040a7f74d39d6f35a053f0b5d4c8554a
SHA11abe12a859a7f8ae25b2428f0925e4465afb6612
SHA256126f1879269e2a4eb065ef635329ee43cc6eb756e99b754ae4daa52e36e3d992
SHA5129f2135fe6c9f7a3609ceff97b5b9ae7e83de7db2178d98f71a4c2c1718d7993f7d846b1bf62ddbc75e785e583a226770e6131736215b12ebea76bd67592cdbb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54edc136f8710a59c4b9f545f39c0eacc
SHA1650b66b90d2b97675921c23e767878047a0b7fd5
SHA256d1bddcaa4978c9b2fab42f6bec23d555f4bc075ff1195102a2460ccffd9b72c0
SHA5122737dbe0086f531cec9acd15dae30eacf130fc82e99b772d60dc18fac44144b85acc6c60ef791a8f3214a5a0428976e33003997493272d5d7c8faeefee4ab6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565bd807e443b4efc2ec246ccd0bd67ef
SHA1082b40bf241b0e642f206643e1878658c1d1bbb2
SHA25638d0a8047dc83d495280e54a7be1031c956b7a0c2da18db7a7b8dc14327b7c63
SHA512c4e8dc05662a92f87af4e46c375b5ea890fd9178356deffdfb6a0dae13d4334798f1c68857babb36e80deeefe4008affbf5703d1fa2c9d5e3fcad1670c5781f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58642a2ad6f86d9097db2b2f6aaf8e289
SHA128a27a2479e29203c916afc720173bf4110ba5ad
SHA256f9cc7b85b35daac0d2f8f68d9b022165d683700e398c55ee8828d23f7d26201e
SHA5124a1f22caa656591123b414362271324d53a8e5e09f7e24a43c9d6794675dc7c57fa627d75d92cbff6e3903a007e09680e9d1b752e3f712da91acd77a0f4a5d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272498c3b5158620a131b53b62648afe
SHA138d37215006554a159bdc4fb126a0dcf2b658f3d
SHA2561ea540ec97c592b23f67f2763f3914144e8b6949e1d17544898f14223f53e58e
SHA51276de52fe55b5049f4566b411e0a861fe28cbfb942814bf9bca0964761e32199f76d89420405e4b2c8a3f247e9e97e1a828f7b0cd2dded5c786970f251e8a0737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f760b29ad5da9da8fe0656ef00bc122
SHA1419c2b7beeaed63b046d12167d70af9e876e31e7
SHA2569ad588262fbb864e28acd75ea1c4d91cf747d4eb8c5bab7f8a3e6f0fcbaf00c9
SHA5125516d5cb687a8e4634760f5449b0e06c151fb067e90ec9da1c04a1cd6846eab0b910384e9396b2765a5b10a7bf9898724026dcfee2bd56c70f22d476a23ef3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd833aee3e5651b80cd59820130cfacd
SHA15ef69bf5c2f4ee8431ebaa8509a9a4f967d3feec
SHA25678c2c028cec8f94592c66fe71ab0b28e1372864014fffc1c716b8e3778430e13
SHA5127fb778c905efdfb44d1c6803b0c15714b6e29bed8ad9b58433a4c01ea022e31ec1eb3c736c13ced47232f4a040774bb18727b0dd28b41ef6b346bd8b780e150f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae7b065c5830bc826d6a954c6239280
SHA19968fcf483b706e7a24262545b4d51fde1d3a3ef
SHA25630f5d58e22edbd516b77425e842e19c993fd602bb227e7c42efbacbcad8ceb2e
SHA51209e6ef8a7dc4243cc4fb13fe5b71f178088e29f6f5ccfbb1dd64ed37dfaec688101df7036f3a158e70112956c27d317e3d6f19b38cbd90b02eb0704af4b82731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e9c06339914fb9f58e51626cb38437
SHA1a439085aaa9bc812a2ad536a0b2225ac607ec5a3
SHA256e1c9852acd249eb4f0be32eebe2a8637e1485d8ca3c2fd013f03a02b4299437c
SHA512ee06a0c80dc48ee2bc6394958e5136b8de30defef344cfc027d52069382a964f95f56cb06909d4d4c47acd340dc17a8df6e5f5a6766f15efd50ce91d565c71c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898321ada5648994d43a0f6941b3153b
SHA1b8a6005cd504480c05fefa4746cbf813daced944
SHA25659595a58f7d724b1411446bcbe18f621f88b3d2d593eefb67ff52e5598c60bfe
SHA51219161f9277838e39a69378de4a6260b570fe473604104c3e5260d000341e1873afd49adede298d951495b0649e4f8a25fa67eb25e9d690086c18ffc76b6f0f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49281da8ab007f09a1a52ef357b308f
SHA15a73ef042ba7f3bb72c2c0a00eb044b7facf1e73
SHA256514dc555e63c566d1c0f95036885e5c78ef916519ae75bf56eb55248623465dc
SHA51205fd454c0930364f115d4fdf135a03264dad1a03644da7970838c8f174a8c713a03a889e60873ff1cf126ca0efd4f71dd76b7ea8193ebf00ef32e9f674212574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23798c956d9af1b39b10218f3a9ae27
SHA1c19b9a359a1868a791787c3bb54037686aa1c85d
SHA25620119b71288948ca3394237ade880337949eb12f3f6328472b1536b77ff4cfa6
SHA512c130ae6e3ccffe1a15a67102dfd304f2b15e3f229f47e9af8172abf4bb7efe2b827ca30813c4bbc3814b3fda265bf6178ad77cab9ab571fda3d1d5cf741c17bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8aa084f371f4596cf437227d56bd16
SHA16b87f3993caca1b9b6c10adfc4bcb267847b1d5d
SHA256c56b1ffbef866bb2e018708ff43cfc307c00086ab42ea09eda31450cb79ffd42
SHA512289b17948dd711ce6a78143d82dc8964a644c018b2c7ec142dd4936ac556d517771454a8f84dd5335424467d48d3287f8f95e91fbc23f27ef3be985bceb4bffd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b