Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
dee040eeb680ea2be4ed7c1974b533eb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dee040eeb680ea2be4ed7c1974b533eb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dee040eeb680ea2be4ed7c1974b533eb_JaffaCakes118.html
-
Size
53KB
-
MD5
dee040eeb680ea2be4ed7c1974b533eb
-
SHA1
1da7a1f1f73ebc15bc072910545e02d83783ea07
-
SHA256
17d08465308fca2803a5c0b619a5f49bca65985535b0e8d3c56977c0b7ddbdf4
-
SHA512
68a2ff04469cafe61b451c6aaf3479ecf8085c2a00d3e036362eafef07e7be1325a936919f8af9f90a82f00c4d48f6720941c168dfcd4521c8ab9c7dc2861de2
-
SSDEEP
1536:CkgUiIakTqGivi+PyUJrunlYK63Nj+q5VyvR0w2AzTICbbgoL/t9M/dNwIUTDmDE:CkgUiIakTqGivi+PyUJrunlYK63Nj+qG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5064137d1e06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6F55851-7211-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000f8461c73dc78dbb2256317244666d161d58424f8d0eb6498482850ffebe1cab4000000000e8000000002000020000000df984f99f4799115f4b23780a568cdd962e077d9ca17f8743def66ff1d8b25e420000000ba15d05b1eb6e6980362468249fb362c2907ef8bd60e993129224500ffa10c38400000002e3df506c2f1c2688ac5373acd0b1005becf8fbb5958fb9bf7464e019e2a11f1689b0c1acbc78598bc617d7e55e882740f5206f239bb81f5da1748d319e916bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000013ea5535eb1902ac7e8f98a0156d2856aafd3888280dca396444b9d72f1a96e1000000000e80000000020000200000008714ab8e7f42736e723b2672a5116e53896b12e123ed4589419b9125cf546a3290000000c5dfd5878154a35c9ac68cb5e9dc1cca4ccfe9b02ae35f64ef61db1f3f93a1c31d0b412b0a71d320b2de04a70595c2d6385752da18b3e7384641c9766938ca87b30aebf3a41fd4a180e295303ac13aec449107f3e76dfa973caccad4f160089f8bec4b80394b84d5bddf7b3b952047505705f9a4be9f912a01e498f149b6ae720b4aaa44c4d9d07be4e74a6f0d0fecf340000000f0f8bc365be914076fc44b4be753f9b7ddf54df2572f00c2f3089326ba9d84814f8a3606ada845bd94c119ba6862b92f688423c045a28b57da0c8181e884ec87 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432422429" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2824 2708 iexplore.exe 31 PID 2708 wrote to memory of 2824 2708 iexplore.exe 31 PID 2708 wrote to memory of 2824 2708 iexplore.exe 31 PID 2708 wrote to memory of 2824 2708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dee040eeb680ea2be4ed7c1974b533eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58815c9cb3cce09458c3bd1278f63bfc4
SHA13f7897c14462a015eeb0502fffb4f6cf42d452bf
SHA256e99b3ec9d7b6083897699c3920d6057aff187f2df11919a56eb4a6331a330159
SHA512b98d183498246b8f3132f70cd7b2421a3cff22826673d0b9cd88bda01d514cdde10733ff77ec0a8f14cf1ac91108ec27b7726ea69b2b3762946dead5c52ff7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c8e090790d633544a59e6f9ef91781
SHA1f5b3ee53d546ab534cd2df0fd03737831ddf09fb
SHA256fac714e9f360cae0ffe7efd61859e78821724f06abf074554c34f04d8ee98d7b
SHA512273f8d905e57005de8840217e3d653dc66365234e7649e88b4b1b870d4898714d17a3c43087c034a6b9f7ef3c3c0b2f4d001028e30f647913dd541e90a30b0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d37fbb1966babb4c2fc0193b3a41fb8
SHA11c4c07d734a7b96fdd39b1d50914871f3d5c44cb
SHA2560cbf867ecceae367b5270e19404930e18742855bf3222402430a34f72048a5f9
SHA512c5105c5debce8625f300ec46ce6839e8aea40527e76c71c1088f3fd3abc8e856d28b31e92f7793cf86a6a3ed6134c09403ca329c1a0b6cf24dacba3170317c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ad8ce0878372bb66e4d1b55bb54678
SHA160efe7d9d6c643bef6d1208348ff5933a88f3f24
SHA256032315778c83276f8ae5d5d072d98ca7d3adc63f7bd0c37bb06a9d5bc582b65d
SHA512051f32dbbb5e722ed35168236be2d03d974aa67438178e905bcd4feaed5905d2d8256c67b3c757792984a91383be799dc3462e60a343f37e462cb8981f4124ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff18c23c8347ee7d867c47b55b923e0a
SHA16080834cd1ac191368c13a99cbfc127bcefa6163
SHA256f462ba08b58856d81d19f7e3e46cc739c4d4758fee076d5ce207d4c08b6a1aea
SHA5124218ce8a6729482b54574944ec59efbc41d7b92d889bf733d7a92e05db17191c2a1fb4d4c56cb302359e3a8adb71b16e6d71eeb84e9bfd2538624ce3f60c6d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1942f7c3781e3ca29be4dc1f371e306
SHA104c52714ede72f93aa37b90941663cef98c988ce
SHA256be90b9e0c2d33ba41c3868478f1b62cf0dd8e45fbfe5b60c0abef906f2d2f029
SHA51286f4e566f7979360ab611a0c2a046ab6885e0f76c948c514069323c721f5d97800cd1e61a0ee7f2ba647d18384e7cb441f338218796d98e3dd9a6363f982414e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c66e742efc2ab5e82e495d22fc11950
SHA1f3c06defb288885e01bfd394342a3da2161671a6
SHA2568f0ccd4c76a65ea72d11f49258ee73e4fbe33f011da6a6caa801990478daf0b3
SHA51252c3f08be8101deeec28df7ca9041a03b0e38c88bdc4f256bd352a14245edd03c898bdfe33c47001e0c2233db601f9cff5874a3acb3937e42eba4bb7d9ac5e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55138c5c74fe44df2236e2fdb5d24c6cb
SHA156af316d651ca90d87d20082254efcb108cfd2df
SHA2562ca8889d66951d4e0d2cdb322a739e1324d9406d93dbbaed35d2b83f7d20a982
SHA512bc8b5cd19b272b4184fe0c77e7dcac29d2b9b47b82cecd4b3903c436bf6ff4d65349bc50b6bd9ffbbc99f800b89f6ef9b18fd781ab247a6644e57c2da67ca720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da081d00b635ac56a3e9cb30bcff6f7
SHA19346f596d2a2e1f6f6bd57f0d7d99513969ca5dc
SHA2564ab1afd9a5225bdad7dd3c2cab62fa9a76a368f1cfa83c82329b0a5f037cc6c2
SHA51249e3f8ee4a85ef57d48ff7d0a942ee908aeaa4e8630e5a151043612b64e3ffdf88bff574c9103d39be85deed05b130b57f03a1190b8d41a2c2152eea3c2961c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598983ef303ddac143b39b0f56dc2b077
SHA1bf3ba12ec95c0fd98af4a2a6c622175d8fd0ddfe
SHA256bf44cb1ff4937411a736734f75d75b047a641fdf85ddd5ede6f9e8ae1f9c8e53
SHA5122d4f94d86605fc512c6587afd313957d3baaf566c154b157b86b29a72a0f8408c3104a35a8a57f000d98ac35b99b67e2a4341001d5a059e0612de76279d0b5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f4d7023af4a85c25bd06ea2e550d5d
SHA1f71d89940b92121d9a6d7d6b52274962371ce0b9
SHA256f0ab8d26df8098b5acf6f716346aba3f1e2d022f73ed57caca6fd3a707324137
SHA51213b10af3cae5eeae3e9c790b6cd547290179580424543d63d4a9faec067863ae08af9bee8d2957b286c1239d04b799a45c1c072b1a2e0659f646235a45736d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3f241d2229715f3bd538c9b91329ad0
SHA1e28198c8ada1cd04c114210a2d09ea9399997509
SHA2568c8c04e3001adf3d7fc116ce596d3655c11d7c95e7a9d5ac5b6c24cfab16a7d0
SHA5123a9391b32353b4833f6cab4fd6871195ab51df51be4a97609a60a326851309cc6fc2639a7cab85481e16296f07c2f179c35284636b5ee6ab92340050691c4104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576db71a207a37de3182838dc86e97b2b
SHA124f492a07aa5bb7226220092631ba6f98b044921
SHA25645ee3e5e22c180cdd6464a7ba50aebaf1f63c1a1b8f3ab7615f3c7cc2dd0f22c
SHA5126bfaf689a1f8bbf2d8b82f09b16680f153d8bf1012289e18863fb246f007503e6b1a219bac567e44e41cc54d81a8704a75642d53d457a84d8ca6d7d30a8f448d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50295ec41e14e688fc4c75b371e99f77b
SHA11faffa0582833f198d0c98f9716690602aaa5c69
SHA256d7e6bad538c7a2ed8139eb7b3de78a40cd7f412221d689a976d462ba17194f16
SHA5125887351b9132ab9f31efefc14fe0389e2b570c9b22669b38622fa044864d418a727aba6f2bc2e606a86832540e87548bd4543d8d3a80fde46876813412896c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546dd7e3342d6ef66a9f3716c45e0b3da
SHA12b0ab8953ba05e2413c4ae944791ed8347f8c5c3
SHA256ccbc25d96a471646a3b0f240c95d0fc81aba9a2f80e0f11c30924536df1b0fe4
SHA5121cad6438b15951303f9be74e32745cc0e853f87456b6cd1cada16c822f53038355d28d6de3b5a325e17b6471b791cfd10644e3205444fe50f392398bf68cd94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9beb3ec6499cc0455e570e904f90023
SHA1244642a27300897ae39b9d4a2514816aa081b541
SHA2566cd7ae9b4d17781c32d21057296f35137d8ce38c6d6e36b717d419664da0e870
SHA51200dde2187fcb94aa5587a49f199f757b4543fa608563c529bcb4a68d32c13bbce10bffc533fd920d79c463099323a496945628974470c29966697da89c3a7019
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b