Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
df269bbc2178cdbaeca8b452f7ee5371_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df269bbc2178cdbaeca8b452f7ee5371_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df269bbc2178cdbaeca8b452f7ee5371_JaffaCakes118.html
-
Size
25KB
-
MD5
df269bbc2178cdbaeca8b452f7ee5371
-
SHA1
a07f24d1200a0143688dfc29e1a910921057d350
-
SHA256
27b51e1b303ab518a6b1c851fa1c74961635f5c5fb9b5c88da6fc4f1017d3c38
-
SHA512
4c680bc2a38687f7a1a50dd5f669fe997160c50d95c8e38d84a68366ce7c402a3ed87b35c2396ece80b106b0d46fbf7a567a65a9471b9a4fb91571e8411ff214
-
SSDEEP
192:uWjXob5nq67nQjxn5Q/FnQiegNnsnQOkEnt/bnQTbnxnQtYqCuAFpdEv4cwqHXMy:CwQ/byKMOU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA9913F1-722E-11EF-90A9-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 904b65af3b06db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000026599565b2b6c1e53ab927ca4d4feba19a3c2b9d32591156379d248f378d0eb8000000000e8000000002000020000000a5c732b42f649a1e1a3cb7c28eb08aa2c5bdaa4d9040e01e3649443224947c1d2000000098e63f64b3c86030a18173a2ed6acc9582460ca3bcce87da775f83af7fb3390e40000000a7fbba7683bd6603bec07612bff8903883d19e092e766d629278d49a36dbbc020ac6af4bf6e24f22f3dca48714676f0d8452c8de2a5ab12368901a5350e1f68e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432434970" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2012 2228 iexplore.exe 30 PID 2228 wrote to memory of 2012 2228 iexplore.exe 30 PID 2228 wrote to memory of 2012 2228 iexplore.exe 30 PID 2228 wrote to memory of 2012 2228 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df269bbc2178cdbaeca8b452f7ee5371_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6339e06c300842ff1fae1c575eeb3bc
SHA1fa5a11844be1053ce7201670e29036282cefaf90
SHA256013cf60a200e76c03e49603d27b2850cfdd8718f4e0601da0dd5a56933b6eeea
SHA512055d97a9ce4e055d6755aa92ea41de94031550fe974781e0fb76bb63037a46f9592ea48682bf8dadde6a6f2dcafde0178d785fa0e3824166cee37d21b47a1266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7c3ab31757c1c6c010f03065ffa7fc
SHA1dfe6fc84d3e25d7d599ffecaa12e76a883978762
SHA256f7303c2dd50aa1bab4d4438d57db607c4dac19ba5b9db8877ceaa8372c5ff31d
SHA512aeda32510334d69795365078fef95556d8cf763acfc15913a84542b243cf0f5d1b90e00597628bcdafd5bdf07448a33c93569b3e9fe30f745fd8f87eca4fa874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abaeeb6f05740bcd2f4028b60da5210
SHA1714946ad5f334c5df83c2dadcc4a0104bf500156
SHA256397144a1592ba0566dcefd9b5bf290229c64acd858bdb51fd6c48789b04ee3c0
SHA512c79d32bf5d14b85a201f592590342db9585157451244a9e93034ce84c7d7b72b17d68e53b83cb36621c17cc783476ebb5badec4ca204059d4c395639129373ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6a24e62be29124df774355b8be058a
SHA16266d41d8fa4b4c2fbe934baddcac8231958ab7c
SHA256b3c946b1100a8c9f1d3e42efd065b83c2659f0438421b71e1874ce81ea222b98
SHA512e2eced8a31ecb3cbcc30d29caae3d23ceb03b1c08dbc9198419657523192c8b4b80e6d0257a2aab7203529bf7cd0b7a12e956d3bda2c1e1eae8cd43fd2f03369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8ad53e3fce500423ef902c252ad9de
SHA15fc156d56874138368d891f670b31df807a152ee
SHA2568339d21f9f74b9590e04fe332d81f2cd27434710ce6c648a9211f726d6a013be
SHA51256c4d1d545e07079e5b73c0417adf0fcd7b6e47401d76c568c97d2e1186b8e4cc9a98f4d1671b243c7a991e5cf3c421c02a833cc37531a1b8e4f6808a5c1c02e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d922c7419597f755be4565f9d745cb78
SHA155131e88596cd3dfddfaa616dcd51b150a2f3f21
SHA256e97b331750a8d0358fa8374bc5f8e7946727a354754521649f181d34f7b83475
SHA5125762a861981bbcd33799646f3161457e5edbbcf989522598c57b712345ec1da23307dc5f0df89a92d769e0b5809112605b36c4d8a11abb4cf8687d811c2329fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e469357f9cac716eb879763982531d2
SHA18245a4ca57d08f7bcbb6cbd97779b243634db65f
SHA2563691d6d1d32153c464aaca52b6be552e6e7d5c1b8fb4ac7fa1facbb2c1acbc83
SHA512931b0dcd22af556038a0c19c2d85cf46232b023523345a76903550d2e9b38c3e30ff321ee0636d8f4ef9ea9751d8804a61343ccb20b12fe3a79ed9e0fa2eb2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df1ed9d9db6da0ad93f6d9d49d281ed
SHA15368ea026e6f3da9be765cba89f8269493465870
SHA256c6496307bbcd42920b1d6fa91506e74540f0fe27fc686aef5afba57127ee10b6
SHA5120d45131b8215c694d2ae4b37fbd12df5debd873e3f192ad3a666aa0e01d02fad1a1dc3abd0334c0f26855c4f94900a0e29344965ec91f6fb4b5a15c7d2b459ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b2af748554e894d15b11e7b1c3de6a
SHA126906c6d81261a8a88d281c4f8e63741a795504c
SHA256695be3c76c5f8dfb8667d63c8d630ef4c8279dfea5c96e6864f3bd6be377d154
SHA5120dbde6bf7ad05948b76b62b80fe5b50a5a766888c49766bd763300198ad2a259564bc10cbc78fce840140a1292de50656870baec3e2e172bc9d683ffa7a6a741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a75092a6ba7fde4c990fa7bccbcd29
SHA1be003c547cbce945ab314a8e47ba239f55f97d15
SHA25623d7cdc6ee7b81935d472667381ff2af5f572a3936dd5ffb1ce4369c8a0de560
SHA512fb2552c1a6d8e97f3588bc25cf72218a4d8a94499489df34761f262deb63496e71a36a09f7541d379b791a1fffd2de5ad8bf85a5fd8cb5b395e6c88808acbede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb0bb298c08498bc9ddf195d65014b2
SHA1af138bc5d6d99674f4b5de51a9147fb12d1a5200
SHA256f0ba1879d73d63c6826533923aac0ab2d66ff470180fbe8f8b8ce885449d171b
SHA512ea01881e808b751da6f0c9a0c37aaa3b0a37103d62353ee003820e8029848c0c33ebb17f8ba4bbcf42611df5ce327f3f522af6225d4487b356b3868a933a86c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57f66f8ceb43801a8b01ecd43ed819a
SHA141fc0c6feabb07de02da9aa66c5ae6b756c28524
SHA256f3e393d4827894828b7af05a13b432df3d2231359da389849aec35db1c7cab0c
SHA5128e19eeaadc92e825db50137b3c068ee9c6374336daae10e72c6d07f90b1eef94138bae4eb9bf4b7637f2851128596ef1d2c3cb10c6dfeefd3594556760eaa6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5697a51cfa0b185d91e2931ee3a7cf7f3
SHA1fac37cc8247367dbdc523e9927d9316b32ec4390
SHA25666e4d5280a12baaec89096f0399aa363f5e18f1ebc72fc13d7841725c0c59c9b
SHA5122715af61708696361c8492d5c631df6d1e72c6b1074af7c3cff77db570b4c91853edcebb1c2a963b4341f5990e95f2b3c382297fe779b41005003119c8fffe69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a32e6fe37ed61d55710dbdc7281f75
SHA137fc571173d96b9889c737ea077515ee08affe86
SHA256b5c3a17c0b3a2feacbfa9a487b62ea6825854dd902aec7f64f7c8caf6caed8b6
SHA5127e922ecb03d5d0ab67281bb4c6eabfc0c25b47ba2893292b18ad040aef44f7762ac9926911f6abf047f1a9f1939f07bc78a4739085406929e361c2133bdf06cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5bfc90c986a2ab25bf5414125c6452
SHA1d9444c857200af2aa8f137bacda1265b9dae17b5
SHA256803ab0dda68feaa04eac60cb866ec5882742c2f18fb1c406b8f5cc36fa8c23a3
SHA51266d2457001871bc490b21b0265acbffc420ffd59974aef365dc0c892485de6532dfd14050b9e05ddd46347d45fa93b67e678f03767ddafefb570d872433c743a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44dac5726ef99510537b51eb56b34dd
SHA13aa7fa235101e2de75082d3bc6e02186cdf36016
SHA256679bbcba34dde9a85e86174f7686bf63ae885d42be41c8f3728fb107e93e161c
SHA51271cb4f83d234285e30ccf2ef258f79f7b8cab9c8c3e641243233b2a14d31b549cccb9a79cc3cc3f0042849ab92ee5b3369a762552956a1bf6c136c49a5d47579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dfc4d9096b037df2be6d55a2d7a4daa
SHA1e5abfaca342dbced0bdeb1b6df920a454cc92b04
SHA256fe9874f712e1dfbeacf45146eeec5224a55031b1feb9a5679da6a5b544231ea5
SHA512ed2f811202a74eb39eea9d57256c749871f933209d08a9a0036850c72bf75b7e6d0fe4c8d71667921a44a36120a08d5aa02f5ebe2ee2c67afd117b974cd902df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf11a905701b82e82f7cc2a9cc3d1d2
SHA179738bac6c442f30d1d81c0f94a747db7b2467e0
SHA2562052e2ff78f2490b7e1926a17fc00fa78fd72cf046267aeacc836ee65edf864f
SHA512b547dd4019ae24f9a8ff177e0a93204e8e2b95b6e61b6f8286cf90298e41fde8ec7d00e1d716c812f510a82995558a3b6d5d3ae10997a1342a3672437906a076
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b