Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
df7eaee291f43258503fe94af009e85f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
df7eaee291f43258503fe94af009e85f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df7eaee291f43258503fe94af009e85f_JaffaCakes118.html
-
Size
46KB
-
MD5
df7eaee291f43258503fe94af009e85f
-
SHA1
4336c6558a6b22cd2f1f774e0bdc8319d5b45906
-
SHA256
7cde2f3b2046e4cbaf0f95427e4bf4b2b3d2a2bceb59656f27293b983130723b
-
SHA512
7801fb842bbbc2a98b4703796f3ae208491a2c5aa90223096c81ae8b81ae106a093da4c152293d68c4104b230377a63b5fbb060019e4b200a4e5756a8d8aa635
-
SSDEEP
768:tT7u96k6FXT0yIizgDSr6tXTc6FfI9iipOL1C:tTC96k6FXIyIwgS0L1I9iipOBC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07A9C511-7252-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000054deacf2bf724a77ac14b2ebc12e1d7a1a5ab91e26e2e052e4e695e75c74815b000000000e8000000002000020000000aaf966d416b1a4edfdc300f61610b27c80308274f9f0b5636c09cb2b85af03e9200000005ab4f884a85f270c83d81ea3ab4d353f69c8bfd8d908f34fe9c1d0c84acec7c14000000068e85dbdf400881d0fd88479ea6921a5af5ac1321049c6bbc929747883eb08589c3c858baa3a42a2003bba7ccf2f0f13422e07508a9008970e534fa9b4e189f9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0bd09dc5e06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432450078" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df7eaee291f43258503fe94af009e85f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d922f030c4bd91dd004333db8d1932b
SHA1d3e58de81043582afa44975db8bfe495ef1414c0
SHA25639fb1f3f7334d4cf6ddc27e180af2d54104bb0e00774eb65b06006829059fc6b
SHA512f1c9cd083e13f024a13a811e80c38377b0a9f54d5608e0f7d629755588dfa2556ee33f30cb4a71f2ef6c7eff0a07a380af085e6bf028de3965dffec0c7e0f507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ff7e5f3db9758d9fbf580ca1753679
SHA101da16428f41e3ddb61de98372a263c4408bfec6
SHA256561ec7515c49b73c58eeab00b5d4812d7949977ebae875bde4dad37cdda4b68d
SHA512909ab026bf68cbc8d970cea2c4973f79b2357a25661d53029e83a38e0c5460653817bec0b9df774741c6f25ecbf68a5b2653db6110f1f48721aeb0e1092f5bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efbd01072f798d4e431d9a117ec5716d
SHA1b76993f1a21cde274e87fb2f66aea26892a48c7a
SHA256f4410ce14c073cc5f22265dcd75c5151e366640b6e18c66bd8dcb43418e7f693
SHA512f66e46f901ec95ee527eb9ba249af300dc5cfd3796e3ed4d10392aeb3962b4c633b8ce2424faebd5b1a86eb8230368ef7d05c80dad7a6fc6fcf358d0aa24d594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fdcdc43464de0a826e89a9f3ca136cd
SHA14812515dc8de914850ea1a78f1f718b971f5488b
SHA256e498264bfdb39591f52c3b20c50beb6473675bee199c8b59b9ca5b111f2ef9c1
SHA512780a41a1f69ed3fe8abb662482483bc363f4e2d12e1e851ece6bb86957da02884cf229fca2a5757f671d4ed297c2efac8aa7272adb2d2902543cff35813fcd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be60a6def4ea0f467407327964c22307
SHA167b34f2049cc8e7ff38ac9b60feca487a82e33ac
SHA25615d3c8e203c259938c006c5bb6a0f358be826ebfb6fda307942cdab641dce373
SHA512b92182c7adf25e278d9b0b3e86f78f039e8b03a819e6300bce1ec1fbb2f686860fa6e9935668436e5591ddd9b69b3a3e9ca54379efd5e6db614ca3e03ad7d865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c08cce6289fcef237dfc780bab7df1
SHA1d18269efaabc753800283ae4e3c50b478188cd75
SHA25620f32163ec885ba7364066566ae5f43e88a1950185dd67282b2dd55fadfb44cb
SHA512e7e1bff4880065aa540a117f1bdfac9a24f50b9f603cfe38cccdb660089a4fcd5f0e6ba6914a03c1c224bda93bceb24a83791f3153e1215ffa6b8a16a67770b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab45e4ac001030ac364b10091d00f552
SHA11073d4ca005c3a460a79a26393d5a57473c00d14
SHA2563223bf684497d17cf7c0eec8ffbd7e370535bcc26a7715adfd14000a72a8e83a
SHA512f3d77ea0db8df10ddd3f61705481c91141a20453405a1cdfef2c553aa2f3425d6750350ec734a0efbd26fab1505be2c702814f982f94b89ac046d42da8ac5f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d57531b2a26437678352acfbef79b7e
SHA1852d243aba1b1de63431dbd013d2f7b159b0548c
SHA256c1085437ca37427d7e239b7bedb3f8f75e536993ea5971dbb06e30dd0f51cb48
SHA512dd19eb8e57edf265a018b772797d0e38e947b776c52a4ca0774e658bf3ca362791473931ffe4f0d992608929c39b7777d0f7645f66b75faede621c4cd35be9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285ed0a75a324f43dff3ce02111513d4
SHA15b6262edfd43dcbf7ee71a9e37c45bd3442f90cc
SHA256935ae88df72938175fe4a07095f00a94599d865c164173077056ea6338644e51
SHA5125444ebe29e53417cb63628a1ea726993431425bbb91a67298e03a42990069bb0ac338c2dbaef01c71e0e872abd00159fdc062441381a79d93b2f97895004479e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22b212f9ba5bc244739457f9dd94557
SHA1968e42acba40753d8fc9558b0bd1cb315a154b88
SHA25626f57c15349bae9cf0312b599f60f539dba4fd2e809bac004bdf184d661722bc
SHA512818eb6f0324ebfd10c7b1cc8d9556a5c4c069f3ccd953da71158d51a1ec653a9c0074b3f6662296bf90fca0286f148445b3cf782f63cdc15f2853ecc6e8d008e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505555afc47faa78f4cec9f9a9ffbb076
SHA16efc6a5dcd95553ac94eb9e0599875934c8dc00a
SHA2567aaf5911acf740fa4e1ae5dea1e7e91654a98495396cee9bc7a84cea86893c14
SHA512f30c48ccab5b74b1ae09988a43c4024cb3f0e1d648d3670e0ac9d3e7af5d8e8bf0000492e1360a954d6f7255f3c5a7f9b2b50851a34fdd5dde78fb61439c966f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f7833d697c9c7a235ab567fdb99614
SHA14dd3bce5bf0c6585f675f82274b1b422b42d5a0d
SHA25639907649339686d838f117091bd65018bf4d4e91a3dc52498f01d0c93672cf48
SHA51282c24816c93dea1547591071688eab5ab0bba3aa839c16b5d5a173f54a3b2276c832629ff755ec75451d87344854fa68d76cf1489c06116d9a0a05d0d61e5e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5814d1f5e127f03e3507da00100a51
SHA13bb8a93915bcbf67b8a4161c8bcb9aced1455bf9
SHA256debce9947bb6966f5a2072c160d3f96f899d46b78fa5a06d9e097b3e1e7ed030
SHA512dafb103e3522f1e0d8079ab6a6c9b777c6dab9026f3e60de8a9d5d4ddd1066c5b9d195f12290348ddb3e635e6f0a5fb3f3b3ff2460c6c75798b7ecbf2f52f081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edfd5b4bd02fb19b705214b90825ca74
SHA1f978e997593504cc23b5a1c3cce493b120978042
SHA256aff34dc77496e8a2307f957cf6067e3a04ff6858dae0bddf2da9793eeae0f3c4
SHA512a144f0f93246a72cf7c41fc5233a6c56c37d231270a11a055945e2529487d31fdf5eb7c848bb67a8dc0c16560bacd470a642c3622157c40c50dbe74e211806e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f51c51636d1457a4ee2f2b9b544595
SHA1a8d1b7a6dd26204f2311508d5ac16c6e2d019fa5
SHA256ceca019950e91c60b1fdde332002396eba2392d903295db4142b4da39f769a1e
SHA5120a65cf5bad469a2ceafad0b77287c5644cf40a1bbe975b67f8813abc4464f0c31af849878d35a9667cd3867869b2f016afab01c04c1b146352d59ea4080f92f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c2089b8b8777e7ff09b00a8a6220605
SHA16073b85a7de1c96a92e6ee19303f1a9b20f16e3d
SHA256127907ae510d736a8ddb165f7a3c1181e13d5186ab581387c8a54e9bd2b6bd3b
SHA512c78d849b9ced77940e3e16c0d9839bc3f58d279eeeca027255f87bdb862240072fdaeea6b01865b04515e77392749ed8a912978a43f07270b94793748ce262f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498228c3e81f91421375abc5b513726d
SHA1a92b8d41065b5e4d7dff5b4393040c3e54ac0d1a
SHA2562516fd2c7bf72abefa0ec1b2c443b569ee9dae4c27d77ea0e14b61247c9dea44
SHA51256aea5725770b67e3820422ba458b8a716801b0d4f133974bcec0dfdc35a78c364cae377ee12b66438a0f7956ac1d7c350f68d83322ccfcf520ed6cd7d47328d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9adc040b80f1460782df47e34ccf5ae
SHA1d70629a0c9615463b69cab09a2379a5fecc3e1ab
SHA256ddf3067b3f2f07d280f7718b175b60e451c496477c4dec599ae4c1b92e41f4d3
SHA512103e39d50772b0a6c4c743dab3d20f3d14c6a749259374cd68126efb72a3cefaf2c0bf722f35f64a403b65aed0a20899c0dfb54c2d313af7a888baf3ff2381ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52978335755b40176a69eb34b2ac639b3
SHA147b5e25a78c82524b8cebfa99d9268bb9efe5ae2
SHA2566ef8a505c7bd3d23ed0257a6b92ee10c21c35c3cbf557cc354003b4cf375203a
SHA512f0fa004c1b49048225b08d731e6e44da09efe4c94b020af0b475066f829278041947f5458f53db4cb0585f3ab079a709d92e104205c5bf994982dc84b7df5eef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b