Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
df383a3d9f8f09bcc605160f897efee7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df383a3d9f8f09bcc605160f897efee7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df383a3d9f8f09bcc605160f897efee7_JaffaCakes118.html
-
Size
125KB
-
MD5
df383a3d9f8f09bcc605160f897efee7
-
SHA1
7e1423176e4c57ef0f88e6a0dfd524eefd059c8c
-
SHA256
fc881ff5077d1a371247c4da20e81ceb798de659f26710eebbedba15307c4f20
-
SHA512
f82246d905603abf6cefe91cdf658fad20026a629790aa4219a2182e7bdda80e69bbb25406223f78b7648abf310c2fc427b5a4cd23ca543caa17bce338592f3e
-
SSDEEP
1536:StlfX+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dg:Sv+yfkMY+BES09JXAnyrZalI+YV+d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2F3EC11-7235-11EF-9CBD-4625F4E6DDF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05f08884206db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000000b0f99c06885d967d412860c74f95db67929ed4b719f27586845ca2cd84fa460000000000e8000000002000020000000347453ff272d77807cf9e8b85ae64bb1a2516195b7c235134f4616ec93950656200000008d56931109ee73cc9180d1e44355f776d32a56d6a754fe9ef373b063391b9972400000007d3499b9b6b207672ffe33301637965d3bb8fcef4a270adc5091e10b82cf4899f6898fe96e695c6868f112f6ae8723942a368c9f9f043bec4661670b8c204a0c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432437911" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2708 2116 iexplore.exe 30 PID 2116 wrote to memory of 2708 2116 iexplore.exe 30 PID 2116 wrote to memory of 2708 2116 iexplore.exe 30 PID 2116 wrote to memory of 2708 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df383a3d9f8f09bcc605160f897efee7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fd46044fdea63e7de9274118e20432
SHA1af0bdbaec3a7b83d420c41f248057e7eb0558388
SHA256dd7adb1fdc90e5ac4d0df993a891cb212b8a667871b8dfc18c61e6467e35de63
SHA51273fb68b1bc987bf524a640676e1e0227d68c803d7f9d9b6548a48d669d79671ca9feda0a43448ec35fe2fb7e430c346cdde2f0573a0f0c3ffe9ccb63609e3271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f90fa2ae983d0d3e846cf117825d344
SHA1cb91478c3ecf26f48475fc94e95f7972a3eb26c2
SHA256e45b83d1aa50868a714c2ef2a86f364fc60d3b2e90404095bb2b0a0e9cb2ffde
SHA512271550efed4538ce6e766e25d7b8a9134bb6ecdb2a16fd5ebc0315dc2cd4fc08c48138bec4687dfebd5a354eabdd9573e3684b859360af7714391687d9181344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7dc6dc487ff99f4296a38cc3e65e00
SHA188a650171d6b7e18db26da4689e15507656d1d5a
SHA2560c05e37392a5240548befda53acdda74586781ab74c56bd1027931d1fc02cde3
SHA5123f8a6e7fad4302a6f74723e3b5a880e6dc22354243ef9f7f570d98ada400022432a8de3a3c0fb28ca3b0d76ab61cbe0a2458a1cbc450cdcfe369646d370ec446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba359bea8604833512d51c7c1dd4de4b
SHA19aa446ee6aa4beb1e33f6c413dfdc33ba2113fba
SHA256f181120f1319d0475a90bed3c83740b2447ea233d58c5fc65d9f4e46bfc5f9e6
SHA512f2f3bb189a92dcd6f7575f97cd6ac830b0f0f60b6935eb937630e24985237ec1ca67cb84b8be81b5bcd47c23dd0909679cff1c50577f3bc0f1783d807350f957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01e8e9aad14e6dfb9b9c25f5e329a3b
SHA16665b5ec923882d015af3ba7f4a64077c19738fc
SHA256af38a82d93a8221517bf88c218859faebe5055a690eaf8fff4677f2efd8c36eb
SHA512bbcdd6b4ae6d9ab32e3b3bb5fd4e120df9477e693d1083310dd1dbe89a34d8a11bba183742b9db86cabbf930b1b7f9ff131c2712a0e37a8dd3a22a043230ae24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5802cdf7715e944c1415af59d32ca4b66
SHA1ada8bd2e526cbf6b985cb4289fb7dc3e940f0721
SHA256dbe4a168dfd1156ba4566dc523fc2b621b25a9362e396b03842e177780617c19
SHA512309afa70cbe66ed2e7fb9cf503df434713508858389f2a921cf2af56313d01b59e820a29c9b44bf4189b365b1f4523f98b307b51364b8ec8996c73da779dfc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55290b0ce87457b1693f59be6e13b1ee0
SHA1719c24bd25dbc221870be076c13bdc7d880f091a
SHA25630036a1aab8e0e2702c15b445f5a0eb80221c1a7d2d729be2fc653f16bb58ed1
SHA5120893eada0b5339e75765c0f3f80ae7d00f2f7e2f019800e31170e4a49016a43d1e88b344945d6fe1039d6a352afe7af5b7aef1610046ab5d0630e160b404b06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1567fa7ac093cd254c88b7269a7a410
SHA133d759e240aef9f071b5fb759c53b0361be81d1e
SHA2562edaf212349fe75eb8767ba56244e8b06415bb9a6c6fc43e29cd784ab49698d8
SHA5121d5299eabaac1110c61961ffcf9947650b35c3f2cf61512f4fd5035dead4871a0d5375b0317d64dd60c3662c58759e54237bd08e9dfa7da6db75e6ae7b930812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6f1bed1b4ee966770269b8d427970c
SHA1660ad2e5d797b7359fd56557259276010842cf11
SHA2564878778a0415bdbd6fdfb8713cfc41ec69a25c55536d01c9aa28ba13011a8cb3
SHA512675dcf5840ca37ef4c67dde8c67b99087c0a099ebe496e8f787fae13e53ab705e482e9f1e69a37b58d02eb20f0cf178bdca277a66c2e8b1f62950dfb67e734e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa713e22713b161a73ee5ef19726217
SHA1f91ad053d5e8d3875ad975bb9229a119e87c765c
SHA256ba4925850b483c299d06cffb2a0f4527c8f5610294504f161c121c243af53ff9
SHA5123ddfa52d02be7c7e6f60fd273709a5da75182397a1a4aab2aec03837e2300e983a325d7e8bfe78b203c5ab0361e834f68a55b59fd861696d4013353544c5d009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de13aab4dbd23422a30c60395c9dae35
SHA120e5b141a1208ef970df1fe225852d33d4eca4f6
SHA256a34864958f27c928c3deeb05c4d2a62d9e416c5db07acbb321073a01bd135c17
SHA5129923dbfbc006a583006ddf3778ce401dab578066c07814c2cc1799e63834a2fe256b15a398587d989849f1f14bad7fe2d172bf9b4be157913911bf3867e52085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d622c319b5cd25c2b67dccb72e26f3
SHA18f46d0f46c135004653a28d2d31e77987c7f2be9
SHA256f82f26cf0ad671c0517f296b23724012e642f2d6dabb338a60be099897c5c7fb
SHA512c7dea8c446f14856d5546d378ce4abf65aa802cc38d7de6ec575837e12fe5f290c034c1549d3f32a5ce08be8ef3dcc314445080eee76ef94be084a2e636185d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e0016bd175f89cb9d4abd3016ace2a
SHA14c578ba9c4636cec23e3a3cce925af17e0c72512
SHA2565d6e76802d73937c77c123473bd7f9910639ce17f41f8837f6fc18c2f88dd0fa
SHA512b35935d8994954d67e2fbb0bc3fd0b6757b226ab8a35ddfb6b46e03ff6ad24d30a1006974ac0fcb3ae325232610c68aaf82bd0720a8d5421a87d57f14790b133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfde6de5bc7d72c8c70cd997dc459fcb
SHA1265d4d423e2253612e0b7732cf6d9617bd459307
SHA25691bf048567bf2076ce16247ab451ae59f216cfb0cea50f9dacb7e00f35998bfc
SHA5127e89fd90e85fdf472725a1f0cfb05cc8907f3829d47d6f477e4486717a9722253590c0924026fd9c396680c599c27f503d7ae04347bbf084287c0781133e53f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505bde97816eed5f254bd42c18af967d2
SHA1fb8d4404106819e224236eaef92493cad2def6c4
SHA2562fe3d1c7aedabebe10cb68860e08b197a9769b384b72705ed45bc0a3bcb45742
SHA512035168e538c3adb036bf26acf3abc04921fabebffc5a1fd6e34f20e49a153f9e8fe809e1c26d3b5467040eff26ab0f47a38862055c2092df9454c785dc74130c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc03f3d2c623fc2a4ced32bbb3daedcd
SHA13cab51dd131d483896a0ee9cc336584bf91499d6
SHA2561a3a711b32bd385c7067e043098d0e342af4aabad8c844ace46b7815d204e0ea
SHA5129d14b74e251beee69b83dcdb926e502d9b5081c805084a6d5f048e299312a902e3b539a312644b9824fc8c444824652edfa25ed62cb3166faea2dd319f7a1100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574de7600daecc41ed5cf58d3b1ce6b6c
SHA1619daccb8f5d0a4bb087b694d5f2875ab1f0a542
SHA256115bae7e11763e96f1d7de03bbc5c8391545396a7a2258b2cc31fd850a39db4d
SHA512b6747a9463a44701715f60fa36dccdba6666fbed50adf43072a585e9f94978d926305cc69ed787d5bfec08deeb2f68852af3a6050c86d3bb05901621e5d78709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d3cd972307759bb1a954b98fada962
SHA179315f236b95e2be28fab43e7ec7fdc5762d2560
SHA2561c68f46c90a84ee107542608916ac25b7bb01540ee13bf7e237988b1b53ef762
SHA51298cac2362d546e40bfaa70014e3f82b125b6d0af698243baf7ca1cc5e3bea1ce7363e1fda4dc2cefe09cb4e189cdfcd7efd7ab2181069fd8d51f245bdd5fe137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e782eaf52a6ca646404da259f212511
SHA15e6dc9d7fb4877dede3fb92d0788e1be559c7a6c
SHA2569fdabf2401bd661c7746649d48475e3582dc1fd1b4d3890992d2e338fb414378
SHA51244bf447455b218477c94d5d4461934e3bdeaa061673f1371d1ae7a7f8c73eaf9004e0645254c1fc05a898c09e3df3cc98ea36377bc7c9493d5eac021c713682d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b