Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
df34b4495f04e1dbadd7b67e0ed857d3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df34b4495f04e1dbadd7b67e0ed857d3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df34b4495f04e1dbadd7b67e0ed857d3_JaffaCakes118.html
-
Size
5KB
-
MD5
df34b4495f04e1dbadd7b67e0ed857d3
-
SHA1
a25ae2e319bf5b66c6f740f3e2e95ca34a79d448
-
SHA256
ef39f77b6b40d35dc705faea43e796cc8dfd8386f01fcb6f028ca63277cac531
-
SHA512
ac9ff16b61a2759bcb1ebe0e3a6ec04b2e0aeb736a29c830e0662485fa2233f057cd7d09893e8c7e808342ea66e7503f9bbe718bc081182a74a63514371783ee
-
SSDEEP
96:IQya4vehB/QyaxeOQ0QyaBr0007D140000SVrVKVX:tyaUyax3ayat000/11000N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b74b224106db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432437312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000cf562d95d79a64d300e267b9c95210af7a7b8be918080f4d863f6b2afa37d2ed000000000e8000000002000020000000d8fc809041506da684068e4e8af1804f1e9074a518caa0a7d6b222d322cd98bf200000008efc65e981c406dd38be7ae0d3ccd95ec88a93a83aa6e8a774707231088149a340000000bcb18ee0601dc4d935a80abbe69d09fc6c1c223ee181a278cd4dc64167b7dcf5a4e96659f2964ecad98b9231365b4fccb2832461a00becb12c52b8c87462a3ff iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D3EE4C1-7234-11EF-B6DF-4A174794FC88} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2720 2908 iexplore.exe 30 PID 2908 wrote to memory of 2720 2908 iexplore.exe 30 PID 2908 wrote to memory of 2720 2908 iexplore.exe 30 PID 2908 wrote to memory of 2720 2908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df34b4495f04e1dbadd7b67e0ed857d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d358a92fb7b8157b1fcd33aa7b48d108
SHA18dda954495d0a4cbe3ea8c037a275f964d6dc6ed
SHA2563b5f5ffad38da0a391b22d172ce836e83168fd242544cdfcf80d22d9d7ace6a2
SHA512fd0d8e6719332a00ab1749ec558a30daead7ff498ee542a24d2b9de0c2721d6f6f919c602dc8af41f3e30accc59855860aa312401c3c385d91cb4ef7529b5046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a39c1585c28691108617fc0bde5ab8
SHA19fa761dadff9f8b0d9e771b31039400abd1e74b9
SHA256e1ece21ca5b8ed10a2133dd525957a2331b3de31b8a23267d39870ccbcd29b2c
SHA512ec4bc18ca28c61c28d5013b73ef066a6f2369b578571a76f09d3e304d4cf8ba47845d3c614d0a24bc78298bac462cfe5ded4cdab156bb523796c989ce65eb1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5978b4c59e86c04a4c982e151d48d9ec2
SHA1c202485803c269fd5d5bc21c8d9fc08db11935ab
SHA2566a1a051be668f4528843639e246b003520ef6363582e1f03e12a9523d9345293
SHA5126802da4ebbf76363574e35b200f524fa1ae019b8ab8d4297964a1ba6e6fb574ceda4886433df21e818ba02e5e39753f14ff42411b151e063a8c14bc19b5f93a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4edaa8fa6717e29d43107e055549c80
SHA1576839a307d7ea35bcec4a98caf8ea1dbda2a945
SHA2564dc5c2f8e7c552009bad183bf70f50e412c8a0915a777b7d04a5712f407d501e
SHA5121b8ff19a1623d8f4b7e6151c59749b3f026ab5bd1cac1f6ff54ca5fc9fe65dc151878a3da4ba434015ec9c22ebf037b039114e833af09735869c6148d13af537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc49a0ef453f41d1e7cb544ff7921d12
SHA1dccdfe25f7db16ce65ae2984513fe7b18bf5662f
SHA256cfd860dd174ebfc1e3309f27bc8214c90cf0532ac7e8786fb553dce99ff72c06
SHA512ededaae976b20f8887998c92d89973c3422cc8177c7c63ee73793ffad2efe126ab3af51cf159ad454aa3d4c6e0a82dade1f5b4cac59ce0b23dc4b569d39f16e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9a000b7859d76bd8272a1beae7eb2c
SHA15640a93d7c069e558ac339148b156981d1b60b36
SHA256bab8842e022ca91f98fa7ea156ba0d277d57e6b2410e7d0f6474abd9421287da
SHA51270d7f132d2b3836b71f0803744eee262be7eb94813a921424ca35935059b97eb8db6a3cc0e4c5ce431ab25ee0bb65b90c5c86dac939de9bea2ac834385ecb7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe8d78e305a01b7883a0590b8f1469d
SHA1f2ebbd70ac341e169d08f0c0db0e724ee281cf44
SHA25677e133478a79fef0e50530de00f074d6c33bd2c335aeae5a0524b4cb00cc7d65
SHA5127a5639342a4bb650c75649ceffd0245e932213343100aa10ed9d622fe1d9cc9e0e0e49f449990e97059690b709b309a1263a7d820b71c27ec84242f35ae220e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b98de21f3b579b497097f6ca1ca7b2
SHA1d462f3dc60e8578d68afbf85572cd44173106a26
SHA2562d5c46c3b7bdd546892cb9430e9dd50952043311d872b1abb7ca84dd1984b562
SHA512ff56092216ccb94ecb4c8a6298d2c1fc3f866c6cc7fa6ffbbd4e87dadea9b4e2c1c09a24e8c5575bd741a1e57e3e6e923ed02578feaf544edcb2bea23d93070a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ab49705af03ec69d2bb13d20c56a5a
SHA1e6af704e3eeb71e937d4fc4e2cece9b25b186f31
SHA256b2a928f67e69067237400939f559a0ab0a200721bc3a8eec536740e0c723abb1
SHA512dc44dc88570a88b0bec4ddf67dbfb6657ad3a76e52ec3e091f96519a55e89cd6d0251048bd129ea532be36800dd4967f4c35a4d57e9852001909c3690aca65eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf43096f4582a3c11e82c345fb83a93
SHA1189fcdc44f8e21eeb4c2bb80d20b933b017dc05a
SHA256c772ad7abb97a8e9c8e3028c26a8a7dbabe48fe4b1c44b1264bf49c7eefc4233
SHA5129bb312daa3636e706eb7b7c0c7f47702c6138eb542f09ea866535b704998986044410e6cb1262b3b980f33fdb8ced0a75a4c56d0414385332cef7c0bc02aa20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d8abb9a89d81154c9d2dd1f9cd0863
SHA192d44e33ee05e5398fd245eec5c063199c1c85ce
SHA256b0efa43bfcd093c06e6ebda465241a97b6e5a2b2c1df6c97ab5a5795f839a8b2
SHA5123cace9586b82fca13c7f8cc56f09f8dcbcd795e16ceb28de3fa09b97ae5233b3d4db74c00f59d175a6c01907f2731f1acaa1ede358f61008df3afb15a17d52c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe3a7f90a133ad8727b6e3efc1af0eb
SHA1ab84d5206f39f5c495b98fca321aa480eeabaccb
SHA256b1efcf4c2d3e128eefb36a0d7f11e53f66cc7f2e5f3cca2786060e6f30c453f1
SHA51278c04726db1c9bac3d3249e8f9130ebd78ed9f4731632d8b6971dfca70b368b25255996d6ded4363eb66af24dcbac40ffcb7238b7040bb564d39ee6bfb50ea0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad4e60ec197eb7299d879342e3f0821
SHA1c5f0d7b2bf489541345841a34f1d9480e7245630
SHA256a69d023542ca5bd77becbc71e38524e1ca26d5466b5ecc48f1c32ab0208e2ac7
SHA51228d573097040f2eff2d16b17117d05a4dc3e8cffad66616b1204a2dbe6fee7cc2f71d45419f344f336462bb4ccfd41cd6691ea9d7e603657e30e130ac910b0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22631684d97899d5522c07afcac758e
SHA1d07f838966bd80109d6ba8c7e4bc0a41a2213509
SHA25651811331d9bc523c6695f4732b715f2d0153bfdf3e33cc315852ecae4c20dc4d
SHA512458f483c42eb00d91508336b764cecf1d8feeb361ae3590eb4cf7ba89161c03e065cf96af44df6fa2f6dd938576c2829f723a481bca0079d52b63980819aacd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f0bc1176d9629d1b0b0ab7faca34c8
SHA1513fe23c5df2f05c1afcc67d6dd569cbe4feb38e
SHA256dd8907a3506525103b3b9f6fdc1079daa23172a1d6effc53f2d488339014d1c4
SHA5125e29fabbf4f256f6a30158398465c38714607a23974f857e10769b44d1ce30c55772d1750bd47ba570efe1e86805fb14f8a198fd03f8b5660ba495f5c7f8fb5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f3c3d0e41c693aaea04acf6fcc7832
SHA1f808ea7afc7185971e4e7e7eb342b77303114563
SHA2569fcc5b978578eb38fd57438acc94a98697e7396b917c500da25afa62abad6e65
SHA5125dfa2992105ab1663bc387070efe3b09b29af7c8147c46d611b809936153860fcda7202f09031b9821fc25fb8839b234b9443049f65cc09d5f0cdbce050c5658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274f7cb87ceec0a3123881c42b20eb99
SHA1e8fa0cca13c6c59788f74a88e34c913320cee8ad
SHA256a14ba329d5fe8ee0c6ef67e961375a00cec2a7b11b0aa44564a3332f43ede64c
SHA512f2c3e96cdf0a0aec8c99cb20be0f6d756b0ac332a9b6fca7d45a0dc33a75f3797e7d95cd099898b9d1a840bd350a3b030357374a03fe8f9e06a83f41e3344435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43ddde3e79ac211e3040af36587c2c9
SHA11ad058c608d5e525ebdc90bc0c82ff726823cd23
SHA2564d9eece4f8495a4ff65ea0ed9ccb208f5a018b583b8f995c3b136ba9486c3ccf
SHA51213f47e2138b1f815dd69b7e6d4e84aeb42870605c092043cf868ac099a8eea371de85a71985eecde2d68cf3174e861d4c15aeccd9f753771ed049ac3a7763ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd9026e2ab733e818e7c91e64a12bf1
SHA1c3e5a280116bef221804433df59abf89e105d9ce
SHA256247b3164926d60c7b42de3e8377321d16d4e40bbeed2d858dd8b6934897c6106
SHA512a038bfc861fb3de3e83c0d61064c992e3972d00758d001f3617ab00d4815fd74a97cc2b11861cfdc83f2e1a70699aa4f61aab4232400e5ccf023109eb1d7a960
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b