Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
dee48dc249ecd0684958331e4ec8f044_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dee48dc249ecd0684958331e4ec8f044_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dee48dc249ecd0684958331e4ec8f044_JaffaCakes118.html
-
Size
12KB
-
MD5
dee48dc249ecd0684958331e4ec8f044
-
SHA1
8cb6d8f97e4eb0729de250c8279b21337ff5f796
-
SHA256
a15b47ad2743f22ea0c8825b595b307806ba472a0ebd6cba58d349356672e092
-
SHA512
5b92fa29e7c9ca704989eff4a14ad241e7e50038a31539050921fd8c3c44ee26b68796a9a2316fa2cc71118133dae8e70b735766f91c1d3c7ed3c1786d5a88ce
-
SSDEEP
384:dhwIARZiLNuyP0YACPdZ0UCk2/t6zetvYy:dDARZiLNuyP0YD1uDozeN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432423074" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d46b31b265b81f6d1326020574c29936d9f8fe5eec0cebd18c84dbcd00297a96000000000e8000000002000020000000ad38c2fae104e5713b5dd473176e9b46b3cf86fa0001e3be21bca877cc7cc266200000007fda27fd99c0b01501f8fba05b8c6e2143ba23735bffd30ff666f79ebf418f48400000002a60f892710f7bf46ede6dd4f41e745a1b2eb36b3facdb426b2ae1bb8f728bb9856522db5d0b695466162903f97147d183ebee1d068a0195f883ba3845872d9c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27642BA1-7213-11EF-84E7-C278C12D1CB0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d002af162006db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 3060 2004 iexplore.exe 31 PID 2004 wrote to memory of 3060 2004 iexplore.exe 31 PID 2004 wrote to memory of 3060 2004 iexplore.exe 31 PID 2004 wrote to memory of 3060 2004 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dee48dc249ecd0684958331e4ec8f044_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565bef968c5d9f35f34208fc431e6cd28
SHA1022e82ad0a84c03e78b9733a4d742d4eb9e73914
SHA256e19b64ce81ab5bf7008c0e2ae285fc4e11067117e3a985bb72bbf1d5a3068b96
SHA512e4ba4c706a3467724f037ff4e0e3f15615adc72f9d338b3668c20d98167f3a3e36ec67b9bbd978b5faf25ff8ae841aee163c7cfcc1d990de37db87a26d20ed01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6d8af26996496ec7cee1200b671dc3
SHA15b30f7cec1d241d960f9416f65d7f2c144833cbb
SHA2567bee24084cd883070101ebe7ced9665b2ba40a23b20f7315854fbadc78e82a46
SHA51253b2a14e55386aadc43a1e32e6c1d0ae4cbefaeae91bb6a883ef7b205fd5dfb146368447e46ce0b29c4af9af6ad07c4ded03c7fd8026de7c9804760f1bf063f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53370e7fe52c45e366b4bc876ee734ec2
SHA1c0e34189a048550a21747ec280279e409efce70d
SHA256874a716189ab8b5b23bb4262f442712f8d34804ec125fa6d92e40de2ee72408b
SHA512df266ef6d732d8a533b14dcaca2d59cbf1f69f69a250cdf1a9f72229c2d3082c0e0593e16ef9f5dbada24b38a9a32e536eb80b6358788a9552220f36c43a90d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c8a34eddcad9f429f8437ec4b8a62c
SHA1de4af82ecc550db0fe325cd7f0fe3d8aed049563
SHA256ade080d7b0a17710b9c687619d04f293371c50f83cabd3b883465a79c6dad872
SHA5127dc96e0f75cefb32a75cc71b13bb7bdb421f8127783a34bce09b177555f9d48e4635da312dfe70da1ca17c02c6a50168c75c91998f35539b0569966a0c700b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56332a30fff62e0bd28166b0ecebc406e
SHA161d4ec313a6f3131d2f80e4ae86b1bed6907ecab
SHA256297dfb313b4df4e1e43e9ee22d1bcb8bc49c418f097984671372e1e2f8cb7f21
SHA512d0672053b3e8351c30d6c9c6fab6b6e70dd9a1ee788a0f034af98fa6041d4add8dd70bbb4e930470f1f6341e590df9cb7e108b74f41543b43ea46a464a07c4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1839c5ff70fb014f8b42af9f9a619b9
SHA1fdc0a9fe0e5800363566ad340f788a7367cef8e8
SHA2567695e9770feefee8f6d050b048d28d40a44e2143b3c6c2606b4e49136c68b96f
SHA512359a5c5ae9a62e5f3bc2b3db6f7a871353e5f76298176a3ab39bcca942205c37e1784168e42b0ef282280e4e44f3fbafc4564677987a823e983e77e46b3bb9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a65f03b3fac7196420bf9a0cb37168
SHA19c3a04d4b3cc01b573c5716980d52fe6a2c18427
SHA256a1504f9b66928f166861613f7116f51a445957ef8c2e366f554eece68d922727
SHA51250935759a6d654fd5941161f22effa464d73b6a46e40c8931d4f911b1c11299be78dc08dfa4e29ae5503f207cf6b83f440960c3e82b811d090d0f59ec26a75fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f138cc5714301f69d063bbad516115cc
SHA1e46f938f357d029f610257430028eac60dddf7f8
SHA2568b6cb229a7fd2037cbc771c89a1402f5b641c3b20b7732b64a5d8b37780fe0c5
SHA512c7578396cdfb325dc8322789ddaa4a6ee4a26d083dd6978fe7ba8e5b49818998448bf1515070187553dc1c341241df17d7462994301de1882de94921df34430c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56abd40e95ef79ad1f9dd59c52fe85210
SHA199a394524f6d4cce689e9b964d99deeefca66027
SHA2568df0a5bfcefd16020a3b5d645e9fd3db2345a0b3d4f1a4e3606d6f4635fc213d
SHA512ed9b8520f94ad60cefd2f1110c9c687a4716bcdde34c9aafb3d6c901e4a1a0dee0e5eaea66907d310ae3373bbb6fc431473014e748d1e0319b8b2cf1d93d5ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ae95629294a0dffa5843f7cd7ecaa2
SHA15844b3c56eda1849b3eb47664818f87aae902531
SHA25638a2e42ff982976ebf511a2fd33916e37ac4bbf61a2c7e222666870ff6c6ccbb
SHA512b3429ea4f621899a8d939de8858e4396113f7f088c25703d0a97d39cf20df6050a77b5f2c4a18fe877a60667ee7410bd6220df7f5f57562f91e2e3fc7ca16de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5369625140b8aa32a9ea3a16edc697623
SHA15bf6bc5fec68c77ceedf6af6ae9fbfa57ba8d6a8
SHA25684818e47b0b592c8486e0814802e3c5b799297cd7eb6dfb3506dcbda739f5584
SHA512d1bd014b65572db22e6768463fb3f0132e05a2a71497cda8f4d474557f084c0e1b2bb20823272354207964ca3689cf719c48c5aa9f39fab072cc27e735285919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7219b5086f62a1019368cd660a408ae
SHA10d28f3aaa2e65b8a3e36f89dddb3894e1021ae45
SHA256862b42f76430b14cb33b625bc28e080897766eb2951da9deae23ca2e47b7c465
SHA51265020c4449961c06abb8466c6cfe36a6efa528234d1e6037bec96ffadf3d05380fff1c92ad4f7fed62a3b40f1a4850a8d4558d6788cd5c91940caa87a96ff7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533dcf58fcfa73ec5dd86c272782bf407
SHA1082181710d1641f4247450226e505ae04d3c7617
SHA256f3756276be8af32c72158213e7634cadd1e48e0dbd28e1484954c9441824740c
SHA512314b9e5549c94ecf75ddbc70db28b66fc904d6dcf2a3e1a23e656c0c9f9129b15eaaeed463328a32bf085fcace8f2950217f22da2983ec456786ff37c3ed1f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73943f3b3870101f9b0f7df83e3f00a
SHA1a5fe206eafe966c5f998ff324f07e9d3a6eb67a5
SHA256ff905340aea516fe06cae379e41dde9a75f8e86b4ac88bc8597fd0ad7d22b19d
SHA512234d3eb850ead8bd500134c762e093496ed5779463b1c1c103107f4fda52b8b6b84d55328ab46229e38ad24526cbf4fd575849cba13b65a5caad9e2428cbb1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534930f1238fa3dc96553e848bfd83674
SHA10465f704ddbd59e0d2b5c9b84015644e27617b94
SHA256ddd5a302ab8e4ac89120b8c0f12980abac94745694848084a3ab1c7b9c20f954
SHA51231a3afad75acf3f7aa21a179ac54e67fccd589e918683fa221cf2ac3207b1c503ceaa882ebe81b4b755459fecdbd7a38b2fbe3a36b83604ad2727ad39b70385e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599299c511cc34ee2fd06438e0924e89c
SHA1d9bf7ea63d1361f282f1f7157ca4cabe7b19b01e
SHA256e655e4b623be8d14ec6220cc4591fc074fde88d297848fb0ec87a9cec6a548a2
SHA512d2f657aab9b18168671997c877183312470a167642d365d5e39870a0b77e186c2eda17bd0e35a7ce6c0c05d43b8050b34f50edacbcb6181f621e6da6815c6600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d015f667aedc07101f4f0b88118e8b2
SHA16980b2ce5da83622d11ba6ea477bbe4636fad59c
SHA25691793b6a5ce2ffe355957d0c67fa990d083c0bb38166bcd0802f05e94810a3be
SHA51210f142198ae0f84d17a1e24df98cf667654accf7f9703add0239bbd4d2e87e5598bec76e0290cc1828e781c01244f01cc52b4a4538a97683cb8cd7944d2beacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3388ffedfc25de6c3cd1cd209004918
SHA15c15c13a277e51737eacba3bef30ee30d67cf618
SHA2562d7cf6706ed587294f3e307cb6f0c038e52d27767078b6bb2912d2aca626edbd
SHA51222eba95d5206b7b19a13875655d087f07544ec775d891453eca8e4a4774e1894a61b4ed5b652604a6e8b2785c21a00b5fe51a91105c81208d8600024da1ec4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e7653c5b369a8e0f59c02f9b8633a21
SHA1a1313dca5836b6f43873068d4be141939b20a2d6
SHA2569bfbd44cf3f8b0ba9de10ffe0294be5af847bcd9ae0b194b04a9cde417472622
SHA512c5a0281a09a7d0fc024d59b27336da6f66d0ce6dd32634c05409d322e56239c0085c27a941213601b961bb3c0ea4d6aeaa1793ef23451757132e3e3cda85e780
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b