Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
df9217ce9911c34d360b776f25a28011_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
df9217ce9911c34d360b776f25a28011_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df9217ce9911c34d360b776f25a28011_JaffaCakes118.html
-
Size
39KB
-
MD5
df9217ce9911c34d360b776f25a28011
-
SHA1
ea7458bf7672a8d1ec07912d0d47dbb3cda2ff9d
-
SHA256
003d8f7f0745c065a1e16b680bd07dbd3c9931fa4f517b4204074cf2098fde47
-
SHA512
5604d1b0bc42eb3f0fb01cf369d184bd5c5b21a2db6c37886daf20a5bc79072b68dfe6eb742728e37666c5ada4fd53bafce305e928af859a14f72d8a1c6cd5ec
-
SSDEEP
384:PXfxc59EyGGlzDd95fHyhlWBdIRJvy8lLpplyuyY9lvOsY5bfmyCldgIwbiiyaC2:PfG59yy95Fq2ieI7VdMGcuji
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000763459691b10def2c31b430681d29ca6ad4a6a42234eb1103c64bd6efa12d226000000000e8000000002000020000000fd427d26eb94f60c8e8b8e2db10edf255f072122e4827a175f904f45f8420040200000000341d0f35aea02f33f949f78202ad56312318603882b27d60209167be066d9c440000000cbe7cef00b314d9182870df20bd7c4fcea53332d406a555e56bb1754ed33ba82e0f56a1982a08a8bbd30726c8a4d76bf49403583b619eb08f6639eb8549ad014 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0eae97b6606db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432453353" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A720E771-7259-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2624 3032 iexplore.exe 30 PID 3032 wrote to memory of 2624 3032 iexplore.exe 30 PID 3032 wrote to memory of 2624 3032 iexplore.exe 30 PID 3032 wrote to memory of 2624 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df9217ce9911c34d360b776f25a28011_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898de9eff4beb8da3b4fb9f4ccad3940
SHA102b13afd942c7914cebd7baff7cc7ffea9ecfa6b
SHA256d7a72428a91dbac6d5c1ab51fc844f73901643d05715ed1d96d759ae5e864607
SHA512a667b2f64ecddb8de0b188cc1a60b55a2319c3c4a419fcb17f77d4bfff91fef822a51eda76f6a8a69256bcf9c9f81bacf4769abfdd4661e26d0c0eef28e2beba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd680831faf6e958f630492ec106cfbf
SHA17f97a84011b8b42039f222fa07e16bbc88f4e86d
SHA2567b70c730408a89e4f0721c3d118e563b3e87d0493f79e5ed0583a26732ccb75c
SHA51269f5507d4c921014c2f52e1866bc24e17143f14b20a381304e6f31c71cefb92d8a055003f3a3701815516ab0fcaee0563581522616f9b328b35bd3eb0c44bee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebf1cbe43c0dec92b45da8ed081f129
SHA1710adcc2e5b55c6e84098d4be8ed2cada417f82e
SHA2562393174a37f1754ec468fc387830ad2cde2b1ba43aa3ee4fd10d0b9d4b715866
SHA512bc1ce963da0efdbb7580c08db459b7af074a919e6c1f507eedb12b9f6b12deb1ffb8c5ce9983d0a776b0a43a4e8d1a480c92b349925ec61298e75e087a725027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dcbc5bad240461498b4a5a288975faf
SHA198d6dcb6a239afff968a9380def5260c8d3460ca
SHA256475eb7f3d96f72cc1f8929299b5c2e584e1f10479a1891f1930a47086d10e55a
SHA512cdc5b27362928773651e00406f82c42041a04fe54e7f67fe948c2f52cc9b16285fd7a38b452747d6e3492f79edea817ae4d8875fc00f72054e12e88bafd27a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df064bb8f5e1bd052798e05d10fbe97
SHA1156ead85c93696bc499e2f5ca716bf4207574d54
SHA256b005ba81bf5076f6a27bd15b14d3b76b7f7f6899f1a655d9e8315c73939045e8
SHA5124c14f3d479bdec4c836641ea60baca3e2e36bb356c48ddf94ef7023a2359d4d36952e90f31c77462b7c058d0f4fd1cc6d3b574c9fe711d065f977f9617f9557f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59580d802e463fc6a67710e2deb3c3cc9
SHA110661d83c2edfbaca482fec5bc81bd6e3716a45e
SHA25660efbc68effdaed942c8a32bebc5bbb42bc30640a864eb5ee8472756d59d3340
SHA51207d946c3d311a2836aa3007039c966ac2202cdb6913d7a8105d3c39da2463e325932158d19c869eac46d1258ad38488ba29b20f95ed58819e7341410faa4a385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb74a004fb3042dda7cbbf1b65e7d39
SHA197dfe4f7503341adfa3f94e4aaa160b985ee1262
SHA2568920515eeec00e35c2c7eaba2ce21e4ed534f2047c2bfbd029ec6aa7a8241fb3
SHA5128e8a197c69bbce2262f05ddb38892b4a93b287a820b71f6848a7b723d9edf77b0f92c3272abcf925dba69ee2fab260c5f6a35ed4e08c3a7764b6a16dbec46052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522cf0384d6ed657921f0bb0489220827
SHA1bcd5808358059dfeec25015836c375cf266af1ad
SHA2565ee89ef769975d3e14cc64d9a235f22947b4615af11453442220213a46f574c9
SHA512e8bea2e5c81d30a0cdce43ba2cd78ead1d774ad8caf58dbf43a5244c868393249bd911c9ad896096ed6a2aba93e5a73757eb6b2819284cab0a7854b3db5ef7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283da29d07be46598c61392fdcd494cf
SHA1c22f1c2b78e8a99c39668a82cf9f62db69ff3e31
SHA256a975aa07f660535dba946cd650ea99dd26f02e230b9e43eba9e07ff0a65780ef
SHA512d2fd84052348ce37f652b3edc57b81ea96dce3635b37c771fcd44a2512b21c85d9161b158d2d3e1c4ef0703adff22861e8adcf73d9d720ebbe7b59e47a0b6cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ed8e9fa77ce86aec96311a19464af2
SHA169a6cacbfb3342ba6c2e190fa8f7549c344a8e27
SHA2563674d6304a7f609072e185cbe926a28e896cca057ab428891b9a2d695cfe5d10
SHA512895b726b7ad4e21fe2183dcbfd335d47c1c80f472cc8f73228d90f3dc05e3e447cb1c5628c06b5f13475e78f31b387263e08c50e4ab8f25f275c075166dada60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7f47dddbd9e038ca9e56497044cba0
SHA17731083b6966052b98f2d33ff9c7677b3a431782
SHA256099ce671cd4f532201cd0cae7c9f7a4961e9c594b4a4f9e9bb1d44d4604e3bba
SHA5128fd75c227bbbdfa638dbc21ad862e9877a011618c381b9bedc5949f8bef752edee0795a9fa7de0211d3682a856f51a32d8e28b97f125b0ecb26c994dd29d972d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd55b025f5dcc8a09622fff588ff818
SHA1878fa53526997cb521d97f4f109f68863a56ac2d
SHA256cca3199f48d43a27ba7fd12d60e466357f35754574c92fc858f95b3df087b4f3
SHA5123b6f544ba1a66e78485c48c3b034b68507dfc661b31ea1a49dd9af34fd2562688f66c94be55595cc176716c5b80d86528d32aeb2a821c064f292eed25b23698d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5c456aeae51b4491360fff1d411daf
SHA11f5feabd964da45b8b8796fe4dd3a62adf9b947a
SHA256b4f7386051ca03fd5c6f9d8afbaafd3f5631d11dfda466b53c4d6b03a00bf498
SHA512c90bf588279c2a4292a239431d4228177a4bc4090e6a4047f36dd9c2ccb0ee07cd0fd690f10ba0dad9df11a8acafad1d545528459a49bc69875d0d39c2e5e168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53971c91223643123e5c9446dd5565784
SHA1ae985e9741190e794dec5ca4fbc226de2a3b542a
SHA256b08d186f8399e224ae1167b832bc7d0903b7b261a84a954b495ab1664132f503
SHA5123090347cbbabcb72ad9374022c2f4772019d251d7c995732b862805ecd8deb68326471e572c599ca3d7b2df003d38ffe2a629a2c6e5db0736d93e8b67f3b3336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783f62b27361209dccd6fb491caa2f00
SHA1a9bcadcf8e87f45caac67117a0883344bb757654
SHA2569fa2670971576978bd04b697b02f46810029f7f7dab01c00ebbbfdbf73abd75a
SHA512f2992758b7ea1ff6e776848f38bf25b275d4ed83416bded8e19f10f1aaca166bd5e85bdc6bfea5282e11bb57d61ca03ebbfc8c7fd1fc7037f83d72f68dce1c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51335f8d758dafcd5e6e7cbc8931e69fc
SHA15790daabee40ecdf6cf458e0e81cf476446355dd
SHA2565dab0264232cc44fb7edc95f3c9344c65cf665c155143d07e2bfb394c4986944
SHA51238e7612bd56b4a0d619575d3416e5d750951b3973473c8f45b8ac784e8189d5f5d0290de50d7789cc84b1e4842206a74c07a71244748e32da48a71e2c6634bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d62b24543648552e30e88ecb89e1a3
SHA114a41e3bd38ae28939bc307ac34ed80c59ba134c
SHA256227b99007972b45e021d82575a32a0ff1a7a1c40c6a3be6775014c08935ce251
SHA5122037193bda62a9ceed05b298aa77c0bc76a7db98f80e770bb0cac4138dcdf5be6a4b963a906f491f1ad3320428f01d5c6967aa334747eda13db9347248ed1cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fea0e356f440d50267496aadc93a7b9
SHA18c7e9fb976db7622cbffbb3f048aad47ba5b6269
SHA25621ffdd054755f994efaa19e7a59ed940cdff5fbc567031becaf6b6d9b0a9eb73
SHA51245fa8495ffb8e691ec3999657d0d573662ef06985fd3e5db310af7fdc866abc0fa648ce3ec76fb16173732763bda9b05f764e66475f63c6d0e6bc157586a0523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5772867b71d106485e0029ef5c0d469
SHA101ac9bbcfaa93edfbba974282649992317ab7062
SHA2569aab844fbdccbe49bcc552027eac566393aaa7bdf8e99f845941749308200752
SHA512be7dbd6710500e51fc0392efc79817bdf490c150ce3f3788a86b278b6fb6b278ad9793fdb80b3b57baf262e91e23516cc109f0d9b6cc308777a8d741293ee5bc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b