Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
dec467871f6c1877a1ebb460a05d81ca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dec467871f6c1877a1ebb460a05d81ca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dec467871f6c1877a1ebb460a05d81ca_JaffaCakes118.html
-
Size
118KB
-
MD5
dec467871f6c1877a1ebb460a05d81ca
-
SHA1
e6949361486228d04570761a4a06da679b578560
-
SHA256
a34dd7afed7508f082c725bbddd582ed0d2e7e107b550d2ca260462d4bd5fef4
-
SHA512
475d5334e6be54513afc6948d08c5ef20e9c470f72b78ffc25b36206628f9ae35df730ff7c17bd31585d8ce744911bc39bb3dbbef38b7e5fe26a353631e0cb9f
-
SSDEEP
1536:SSP2JPbLJO6lqSZyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SP1yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000008d8c8b0cf39664ce238b4aeb4a081892e4dc4c344b36c568bac6dbe8f0f6bfb3000000000e800000000200002000000083e35cfbc8bf3634ee5ac402fa9946fab0c0f4ce8aa654850381a6fd442708fe2000000009a2ceaa373f880ae89799fae7a3d1d69e70aaf98e41718e3c3abd912a48695d4000000096f5678a536e6e3b739e2dfe2cb8fc33d952ac5d797fea39b7d8860026c3aa8c0a4cc0510ef0e82e6660ec19618d268b0fe79843812098627ef635a1ccd55c13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432417980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e2f3231406db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B305151-7207-11EF-BEB7-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2512 1860 iexplore.exe 30 PID 1860 wrote to memory of 2512 1860 iexplore.exe 30 PID 1860 wrote to memory of 2512 1860 iexplore.exe 30 PID 1860 wrote to memory of 2512 1860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dec467871f6c1877a1ebb460a05d81ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9179d7aed6c131457367d3fdd7b926
SHA11fc5aef2b9fda8825d55369eabb814e6b489154e
SHA2560f25c7e0d590e990508eef2b561a215652e1c02e0369bdf274f91a4480594510
SHA5127a7578563dce90b169b45ecd42cafd346bf7c5c9c42a21603d7f2e97f04f6307bea077d82be03537bdadafd88dc34d943033d703157fb1a25315384129938f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92e6ebba5af42efdf81a6382c9345e4
SHA1dd07053580430ae6c8e2e3ab73a9f2a7539f1b13
SHA256ea0265c815f3d46282788e355175ae6e9f93fce2550fb35194b2d5a0adf13b66
SHA512ce691057eb741efcb1f8db5d08a3ce41cfdd9473260d24c502911e8c2e8af051cd1a19309e11efaf6af750440c0d57ff085de6e88fda68dcf6747553caecb35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f516950f4a83bfa8229bf0ac91c45ca0
SHA1cc94f3370cd819c2e5abd696db62e3dc5786a770
SHA256d85eae678c6666bb0746724031055580633216c703c3c594a950da9a6250759c
SHA5125245f94abdabd84f6210003297cad6999c44d0521fdaf176821f6632653a86d3c6a8816d89c71a0aced2daeb3996376156aa14a6b1df193821af3eb61b563e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38c3de77065a83d985d64422261d57c
SHA10ac2f9ba10f4e27d2cdd8a4620a30703f6e8c205
SHA256d98d9df25169f28e2b3fa0ff6026fb10cee479623bc13d79c379e453ce85f7a6
SHA512c5e41751f0d4446b02ed2eac550dd4f4aea3a80d4811f6084bd03a6b72960ab19c6ac6d6f926d479aa6eb9dc688754250197940544f402e7d95b5198bb14e789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b21409dc6c8f260d8243579d71b4f81
SHA13fb32502e5e70854003e82bb0b2c28dc5fb4eec6
SHA25615e0eb7357f16104baa85606d051886b885ccbedf9e2842a623443fc8ef72344
SHA512ab7aefe386d4a3b6793fa6978a4ef01d599e7a4badb8fccd76c9bd9e303b985a3dfb2c71b25ecbbba971d8fdf92eda5c4349df97c17514abd65b01a8221d58f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527994909b1efea0504c2ed2cc085e226
SHA16a4f0a2fb4de3f0d311b7abe9501789fdfa6d74e
SHA256c0d5cb320dcd24ed185b456a4a339b86f296c913f10600974e38dfc30f76a4bb
SHA512821c91637795cb8a0a64c97957cddcbb9d6e358f0dc4c50da6b8ccfebce1a47df63668d536431a5cdb75259c5ecb601ef490e2c79fc6f08a43790c7a4268daf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcb331e987809fe137d344f9705deb6
SHA1f3779cc600844d8f1539d8eccb5d9edf41988deb
SHA256ce197bf223851e4f9389208a9d80022dbecebc66cdc2c2e3fc1834d5d42e6c8a
SHA5125b7a2d71da7e541db7561770a1ad1b3e83a8460950ac48a28d611d3d2ddcc589745cfe96bb0f8c26071e960e4f41934cbaaa916d064eb0b099f9573fe40bff6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524738ae51512050c74001ad2dd87272
SHA129b81f53ed4e3d1e9aa74f56271a8daa3629408a
SHA25662c1e743d1214e046a385678deaad80288e5ade9f44caf399ff213384a3fea12
SHA512d7c4f101f50a5b380494d8ac0d070dabc232eb5ef2e06c4ae4af1885f95fca39bd19a5b19fe4c1f22e577dbe8f2f799f6d2980a7d8a9ba95adbc3e8a2d594245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c575e9218fadba63d16b8947b4f35eb5
SHA1ddec99efdee71d88d19eb86ff08cf9467c0738c2
SHA25699c5787414967075405733d20379b32a8f680cb60c804981e51652bb19b481c4
SHA512a3e5b410929e3354c58faf85518b0e6c63248c9ebd822fe8502f45dff7a575bde3f4a535ebc9b73664a7897a30c4354c0b7cd4539ff8d39991261a333d9f66a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63c9fd60a12c3abbdbe0620f6ab6a5b
SHA14c8c9ad1eaa291cc1fc3683776e05ce996aad3c8
SHA256d49f53c64ebe6af1e0bcfcb1c98ba699d591d504fd176959a558308087d20dd3
SHA512e9a1c1569160202c942aacd4379c0353aa1ebe44be9b918946314198522727f2719a6728dd231588c53b2074fbe959a97954639c0068392a5929d5b8e7d08073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce277e0e4df1da86e38bd5b95aea984
SHA1091fa36fa0cb1867efd94813e7837969a1e22623
SHA2567feeedb9c169dd3837c768a4dfe588a7647a9ef6038231abe3572989b62a0371
SHA5129e269030840e768a3370d92747b982185a979262272ee0757e7f263b71dfd2d1d8dc378b1c0bd2b9e59c591d85b7dfcb506f23fcd0ecb2d30e6e26ad51ab9778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adce0a60a8a2dace85ef932a3809fe95
SHA1451b39b7cf11fc899afdbad5996d9eed3e8430a0
SHA25628c15c5fec1b098665c5a24226061ea29cf1242cedb13017079480a12239574f
SHA512203ce2900824a6b1bdcc648709f7936571e88667bf62b67d672b30572c46e4848fbdb55518b1b7fc2710c2c608b6300bb6913fc8c24db4046cfd091f61c8936b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edca742892d0e2d27141e281be032525
SHA15b86b088062e4c94a9c40f5f3482ccf889bb206f
SHA2561f37bf1722af207fdcbd0864260adf04095b5b71e4fbb41f5662795b097762df
SHA512e163cf3876b9c59cdf7b29b09cdc53cce1dba93f177121dd17cac3ff11cbadc3fd5490ab6466cb83f20aa673b786a924dbd7f51ab33c445427d5ca4cc9177ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dda6b0f491acff8419a9f2b0ca17a41
SHA1864c96637217a4d62a6c15c1e42ad55c041e1e0c
SHA2569aabff3008bf995f1a38d6e1cf6fa914648baa3728521c1da625bbf5909deab0
SHA51208244ebb9ad3f3a006279bed78c7d1f7debe9476b4623aad1878810db621de889e58d481b198befb0d75a4987754236d53baf9d9a1aa1dee3ad6e443d691e780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f83d0a0d3db78e90539f959d20cc7b
SHA1e7e598188decd1448d25afd1f44336afbb0f3d1a
SHA256d3c0adeb645d67d23080ad8730fe28226c771ed85ac7de944e124eadff0da314
SHA5123c05ebf669025538999a42222fecce30dd279bde7b272f9414d72a494ab3d04dc9f19f230023467aed633e4e6d5a8cd59ce89e118431086c7083f9fd8fcdf1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5493e3058072ea0c93f9dec03d12470d5
SHA1c7ecd10d6d4a43ab436496f3ed8d31498ec34f9d
SHA2566ce2a95db0f7f44065bd76b08e108b69a3b1de343fd251e51256bbea59e73248
SHA51285d1f4ca33cab71b0e000013b0f4dba938657d754ff2b94202b0fc2cd66d55611280071d354e8ad1c4a25c60558c5076e3523ebf9718487da8a986c68002b24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc9ebb547aa3b4da81a37ca827faba2
SHA1b49f30da3ce2232f0716ce44f1a667af7819057c
SHA25613517fe895137c482d1a51a5a37693558b379c71969944386bd81f94f8072be6
SHA5123e34137cf14b22df56ee48a20e9e37b0b994935877b38bb04b5621ac70dffe4ff3358b8a91d95cc560b5e26722bead9f9be89fbf4d76f0cada8bd9c4bbf34708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439f2eb56541de3a115ca6c52d0c93d4
SHA116cfb51417952372e9c4804b04392d80dacf895c
SHA2567851a875049ead83480710b0f9cc1ff94d3b69c5f19ba21827f9965dc297e561
SHA5123daadf85033478fc7979a518e423031b8ae35c08246125633ebf036730427f4bb22e3dc87cd5ec1c7c35431b60cebace4e7d97a015c1e1b3609839528a0b8797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d912d1aa854b7bd8190d596ed50fa85
SHA1298e90f2484004cc9ad37079e066b9ef0c22ef69
SHA256477d278cf249590acbf1d4f94ed5adefeaf90d2250965fad4fd613babffd870e
SHA512212bcc7fe84619fb57edde50b4f6ffdfa86525473a82029282b5c042c3841961400c234e7dd49c057a80a0f117a9265d9e8fa8804c4afb6e22c9db667dcb075f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b