Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
df487a03b164f3e527ac30bd5d6d0a62_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df487a03b164f3e527ac30bd5d6d0a62_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df487a03b164f3e527ac30bd5d6d0a62_JaffaCakes118.html
-
Size
2.7MB
-
MD5
df487a03b164f3e527ac30bd5d6d0a62
-
SHA1
51cb6b1cd892b9a5cda290905bd546c1f638d2ac
-
SHA256
1f384260faa757965f989b21cf939ab6dbdf64b8a7708d49cfd675ea2e3f9712
-
SHA512
49e67f0643aadd21d89054a08037101ed702c02228c255c4b0f48b347bc65e57d38cfe682f2704050d1aa5dfd8b456c11ff30e0f992ec6e9b2d88715e91e9d08
-
SSDEEP
24576:8+aDHsY+aDHsY+aDHso+aDHsl+aDHs6+aDHs1:0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432440862" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a076c9664906db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{913328A1-723C-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000fb86817552113a0afd61a6931e6e0183302d6ed3bec33d4006461b0ca8145c7c000000000e8000000002000020000000348f1480a6c3d5c0e51ee0906d3f6955992f8cc2e8fdb1ce54c962da092d628b200000007a17459ee2d4764ea32add323b14c9b5f72db8232aab9df86da95217ceb642a8400000001a0b4a53e0c03caba638cb0764569dc3f94a6f2af8d6a2cb61f973864f221ef3f86a616940ad873c25f74b42441994336481482478a449d343bceeaae0265c5e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1140 iexplore.exe 1140 iexplore.exe 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1324 1140 iexplore.exe 29 PID 1140 wrote to memory of 1324 1140 iexplore.exe 29 PID 1140 wrote to memory of 1324 1140 iexplore.exe 29 PID 1140 wrote to memory of 1324 1140 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df487a03b164f3e527ac30bd5d6d0a62_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d20382e5b81b9c3badad30e2dc0e0d1
SHA11691d9ff935cf35921a602c744c619bdf8d09bce
SHA256988e5f1a88a18ecc7c5c3f7ebb39067b85641ef7ca2a3a77501c5643de68c5b1
SHA5123471f48d0d1cb7fa16bd1c00d49ffd542157ea7341783494e5477816f1d2f1cf5909c3415564959a4eef3665278d519fe3fa03adce37b843b3acd589114afe81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9725eace0355ff7bf7f9c1bd07485e7
SHA1e5fdc4ef178472d5debb8a96ab932e63f455232d
SHA2562e1b2663f801f999ba9d673e295afda5d9c9c5cee67a7afc61e6bc05bfd1e3fa
SHA5127df6346d109ce4451da82ef57822965d930f1ec46c4845dd9c6dd6c336fdab1d5aa3849b87fe5fca15e2e862fbd4193bfe8b8388d8efc8955a11a512acc5c0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59739fa8dc415faca145f9685b5a6f81f
SHA1952c252ac02b93b24c6a5a5ca6f446a6f50dac02
SHA256ec24a997da3e84315a6ecb6d389214012cd48d817693a5bde7d7cc7fcb0367e2
SHA512de76cf8119ffcc0a8abaeb71d3b231c89005bcb34c58e3377ecdc1ea2f7ff1e0481fd3b0792f3a20ccffee3af736df306aab4fdf9d00fbc419d31fe8d4504112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd13a2002a6a882aadd3e6118b88b887
SHA1cea182f14f0196da917bc32080d52fce8c2457bd
SHA256da0be20a7bb49b62776720e316ede7a874c5ad84b521e3744953282dd3245939
SHA51204b02ea49dcb9aa9f916c4b7db01d7ad56175c90f93bcd195919acd35d544a7bcf5f3d96c0087f0fb1bf67415b07259faeaf33974ad047d7fcdd09fbb3db0f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1040d1c5c48d49f2b463505ded20071
SHA16b94d0073e74633f28930af0a4c2d09ef1d91c2d
SHA2561c4b8f602716a2f7deceab46e109678ef75884663edcc12690d0f7e4d9043e63
SHA512e0073d1d284c319f449e63527af11cb1a7f28b936dc142997e1c927c2a6d849d107436298a975608f044ede56555edaa5db4150dac72ce2252bc9afb153e6f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d7116f4d09542abfcae9fe5103a531
SHA1c2292006f22138ce542839a96cd9db32bad8db77
SHA25688f44181c25b2001310f4bd82ef83431eca8f89d164b84518ac9931c0adc00db
SHA5128f671925058dfe62f114c8fa42a4d5a02f07ba5705295ea5d4d6ca43e35b39d17edc3e6382bb703833724b830b48cf69784a8f3f20985a1cd58bde321cbcb0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a622dc86ac5cbe6cedc8596a272379
SHA1d5f8d9e9cd3483d90c59515fae2d615417a93af0
SHA2565dcd85fe9d8c21fda7af13c62b64359372f0c26efd5f2af3736020ededd4fef4
SHA512b6604bd2cca0a7dcba55c06907b3ec39ac9f547f14fb5588ade8f242f19c434080d490cc97777dbe46cb54ab9c121357f7bdda712d8d5ed0677c65d0292c7417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c4cf527c4f05b0467aba4e416c48aa1
SHA194ffa49a455ae97ea20122625b272a4dbbb89287
SHA2569a8207e41a928dc32950e3104abd19b9ef13aab9d911599766737efe631adbd2
SHA5120ad944d245bc917d55cafb84aeedf3b5be74ac0ec05a533903f184063e4ba01325c0e86e99b3ecba38cba7dbf5a0d4160d576f649d2f96ff33751038cbdcacff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa2716b1fa290961b1e257e0f954073
SHA1c8f3399adc6b4444237b9456a0434a42093dd25e
SHA256108c410c0dc504a74f979356c92b159d8c786656d44512bb614529e2782ecd83
SHA512930940774ed73ec4a40e5fe73dbbb68e96daee120dfb0b91853298cf616f9823d85ec231e1fde5fc027933ab7ae0f30d9dc880c8023e13ca98591a57f53594de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b63d7bf8f0a8513ec18dfc4f3fe76b
SHA15435bb1839ec1039237207249661d20b274e893b
SHA256bd9d8265e5ded0b18a1dc0239f427fdd4ae18592036ff0fd2fbd355f68f6a200
SHA512a582ada9b25f4cec421475b59833d8f043a1805f6902af488e2c4ca57daef64adaac7968b7621f453d176828dfaf7d12c0307833c40b90476163de766c757139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53591a4a4eee572c941a940bdd14acb2f
SHA115a766995ee4f889b2f7d22531c040e698ef7f4b
SHA256f506789707d0db12d03fe99a0664c8211afe7715adb507902f5fdba387c8c912
SHA5124faa20b5fb0d5f4ce869eb9b73808d935ee7aa74dcb5a655b3f0f9a6dbeb56b552894cb4113c283f11ff87115f74f1c0bcccd96a177e2c625b06b76d6dcc856f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575abc3d08bc7a53d5276f4ef9667fec3
SHA1f862b3011e83dd65eed3cf4128794de9adc81e3c
SHA256c54ef73ddbfa832e72433cffdd8bcee1861e70609a04ebf2a8ad57332d1a8217
SHA51259d8eb5248601815e3a50bb3075822647ab3e3af06a4dd11b809b295e89e2c79157b8407e059bbbf93dd56bd84a0c6dba96426af01691a486b588c1a8638e39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cdc4daed159308f2b97a176a8fb3ab3
SHA141d7ee4869ddf35e0714fbb46561422ca021d2ec
SHA256e7a7cd4b980b2a392909c19c9520e736574a7e4f3b378855a0dae323699a919e
SHA51246f97a92c2dac6ac7d88dc813cfa9b39776c8916fb98830752b366e64cae2499f7e53ae688406f618d25258a82f2c1c8c837f6c756b47d87a04b39600650b567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a0c5e2ea16ae6105d2b838017177f0
SHA17c6db6db1f39dec6ff205881a0ad45255d66a893
SHA2568594b4253a1eb79b52c6620a8c57fb7360e14cb50f7e2c5c4a9928f8e45da579
SHA5126dd7b2627f3aa5dc2f0025fb0178e1089ca54a9eaa91eca639fe9eac63c59952ce92a449c01fa0842ec39fd083d1fa35fa47f21b2ab4cf4d65e4b8eb6d811600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf22b6e7331fa291948997a9155c705
SHA1f53464bb1be7876dd1d8d16e3c0b4880583dc17a
SHA2560c9c305c0435fa28b23e88744acc46384e2e5214c080ab9508b5e6ade7048efc
SHA51284da1101a8a7351e3ccd2f9fde6182b5a92f10c26ca7444c2d75ffdb1bb0848fdcf5e75783ca99d01fe4471cbe4d4b38858faaddbe647595eb121e28b18982c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56baddbceef245e8987742b484aba2113
SHA198a29642a34fb3eee9e9ded4ca1a729fd49831f9
SHA256f312318bd69c51bb00df1ba2a7853be85929c6146c4baa78b895a0c763124a04
SHA5128efd1e6e52d3645ce20dd1581efe7d643269ef6d4fbd7c9f3aeee36592918fdec9a4497d33bd799ae82856abcd8b54fe96e7a5bf2270df53f565e2a2303828a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8e088b4ed430201f2c376aa555bff7
SHA115d9aa81594b5bfc2f5070c47444febc0041aba3
SHA256659552f0337fb58089affc6e2bbfbc6ba290ad252746665225e6cc989b7fa0c3
SHA5124843bec6d3ee98210b694207acc0f8155bbf1cb03b02d91968687553966792f7c784354f9c880a6bd64a41d524ecc82b54d2cac775ae5b936f37e925f5b87d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e946e7fa50a8342446fbaacd36d661
SHA1dc648d298bbccc9e98b25204bf4253d1a87e5ec1
SHA256a30fbb388c13778f8a083ece70550865a610fd70d47b420011fe5988d5caa7ee
SHA512966b2b3659240408e3e2b188426e8a30d12effbd1bfa41433b615ac017557adb1552af78b6b4715a2f4f6fa76b1d6629b68672c1ad52b1a39c7cad2420d79822
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b