Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
df89c6843fe8478e172da35a0c81037b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df89c6843fe8478e172da35a0c81037b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df89c6843fe8478e172da35a0c81037b_JaffaCakes118.html
-
Size
65KB
-
MD5
df89c6843fe8478e172da35a0c81037b
-
SHA1
5b75e26eeb909527dbeee18b0ff7a06292f0c697
-
SHA256
b40c687241cec1aedb77891c131557518731569f96c24a918f8fdf74073f480e
-
SHA512
9b6fa5dcce85e6ed9536c6157198c8588ddcc7965162ed1100a5db261e08e9cb5b2c6ac1ef222a14697ba805b906cb9793f03c4a67f714c7df281dbf1132548f
-
SSDEEP
1536:JwAb3u39qZq4qP3BT8ec0tbrgaUc9NnjUl:JZeHRT8R7c9ZC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000aefc15d67067d924be67d4ede29a223e11985a9738fcca0bfa62fedc8c2c6486000000000e8000000002000020000000b26422ef8c310c79101fd0496186e5afccc8cbaae60e15c255209a210c1c05f7200000001c62b8305ffbfc2290d30ffc04e2b37ef258f39d7ea6109ecdd6a4f403ab348c40000000390cce9867b253f204597df6d9bc725ca29c007ed42b0ff79a69ca96ddd6e25bf24f704eeb3119969a34cb2e2bad073c41b0e832f1ee6d48c4be8a86e8fc9ff5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801ec36b6306db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432452035" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{957F8921-7256-11EF-A073-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2280 3000 iexplore.exe 30 PID 3000 wrote to memory of 2280 3000 iexplore.exe 30 PID 3000 wrote to memory of 2280 3000 iexplore.exe 30 PID 3000 wrote to memory of 2280 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df89c6843fe8478e172da35a0c81037b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958bbd7af31bd807b4f12e366fb68d11
SHA1be18e54d526023eea1d5fe997f1fb23be962d4de
SHA2562e2231409136f222f0767c617e5d17486ec520931575976cadcd041e7eda4989
SHA512d22f7946ace064e44a7c3318068783f995ca19d83178bc5a1aac8316f746c3764d83e13806d6fa0f9b0fe28faebece70caea8fb6b3d559b37e1c393b7d63dde3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2ad249f983a3ba9ce5196558a7f5ac
SHA129ab1ea14c99a98b7d6205ad5248d23b9497e138
SHA256a41a9187d0a2c760fa505e4ff18b82c6479c9534573d1f1db226eb69002e8cec
SHA512eba5c354f3659656a0b21fba8fcb5b1b2cbba448f905bba7e94bbdc3fc915168df589e1124606db7b9843b4270afb19750348a7cb42bd4f1f3dd7829e067f3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7c42a68022d635e5f76f61571f217e
SHA1a6adea83fee678b08e73d6bb99ea69898c194171
SHA2566a8b34b47ec6c6728714d5efab8d7344ec097c9524472ffa80ab5b10344e28e7
SHA51280b6be6a35e9f0838abc2b5a55ee18efb54b5849fc776a24fba00d7e1b581ae995994e924458da68655c2e677ff0fe3eedd6014ee2b53b8d83f2ff45b4233fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a90b3b292d2e2055dbca828046d885
SHA130218da38829a76ed7bbc2fd476892f02d4a548c
SHA256fbbbf9d47914b02762b09a21b23bf6ad0137edac918c7e18d0f1c78abde560c2
SHA512c65feee522de5f691c45a62ad47541dce91a6c89da063204594285f4392723dac2f80b25974305a553080d3689fd349019c2d244a3fc83bcd9699b35b9abc9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c314ac1840e4650ec8590a1acb8c71
SHA1892994c18edc83ab5aea6f64cb71786bd40d4932
SHA2569f83f146b60a48374ba3ce9543a2a9598c35a15ca051689b6a7caa88b23057ae
SHA5128f476a80576c75cac87346ae0ffc5761becb93e9049b4efde4922fc9accd19724710dd1b116b83113ce464b19490e4903e1ca93a25eb596a66e6528eaa4b8dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8d2d481080e492a966d6f58df55a24
SHA1b81bac7aaafee619b9f904b866bd92f9ab7ee51b
SHA25673373815778f501c4a4191ed5ad2e6dbbc33ebb5d56e5071abd17309864306a1
SHA5123061ff48d74a5477bcb15cdb8521ed497888d54c45358d9c9fefbad81e05d6c1c94f44bad1426ce9b186ff321284179817a37cd8eee68baec0e1a837da5f1ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179a83fe7ca8f5c29d3e327077c8e3c2
SHA1deca72c3a3047db814eb9478c89820e919fc85bb
SHA256c291d54580ad7ad6a64162757cff75692cf3876458bfe1db50963dc6b9b19248
SHA51200f2fd25019c4587b1cc5fdd36b1abf12487b572db5ecec5a59c694f7989a3ba481a0a7fad453a3ce6994c95d89501b09556ffa0a91d6139cfa8289c2f130e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731c0dc53f518bd3a2ac30a002a31ae3
SHA159e1e86fecb2677bd0a159c09da97878edd234c5
SHA256d16d3efbeda87a2552cbe604d88d3dfac07caf7d909c40daf965942466ae6df2
SHA51262968eb1107bf6246a199d0142ed555525a1270a374f0a8620e06404b3c944efc2449809bf6de3e138fdd58a6ad0bce3de8e293d903027efe237d9b770cdccf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d33ec952afc958bfcc1499129fee5d
SHA15d9c47bfaa826a62160f7ce6b3ba45c7a2710c5b
SHA256c646b77a1ca66306bbf393f91b80320ed22a579127b4fe77a1b89d33c2e74313
SHA51263d17cef5c28cd2e6dcc2b5a2906c7c365ad03561499996c4d44fd440e1406a305139b2d985fac778367bfd312637b3b0025efeab63a447d59969d9dda73fa3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450b14d82c4285259bc82e3ae3e9669d
SHA1a4d07c8a16c3f81eed2cd6ec0918c77e3ffc8544
SHA2569fe3ca244addffd284582aedbff12c4d4ae584669f9accd62124bfeb0ce06b4e
SHA512a9ec111b3d60d8cc3f6ebef561e11d14bf5ff982b2dc4b4227f199188ac2b88164a377ab5ddc965feb128bce8f703a28f26deafdfd24677db67a2cd9eb3ba3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c5dbb364ccad514778be41a899a972
SHA1a20a3c7279e3286a0cabbe2943c01bf0257f6bf3
SHA25620f8aff6bc283edc7b0bbf459ba19dd1207b523f48fc5f977580ac936c61d554
SHA512d5a6556f551c524a54e7fdfb7c504c7f02d2ea2eb5f11b8af1b7dd58106680eb1256dec6e80bfa55c838423417c860a0969d6998e89fa1c66f9a3431e8606b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96376e667e58ab983263d42a67bf1fc
SHA1c80c83e692d30270085bb2a7319fe5e447b233af
SHA256580dc737e9c116f65a56738f5a65adcc847eddd51cea3b3c5d8725582cd2b334
SHA5122f96ec1f9c923a80c0a0d868cc365f5271100a7ac73eac8b839606247d19adfffaabe4f8d3f664312674a10228fe41f8341a364654d5515465d3b91dc3be5ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56146c8c863a7acf8adcd3d1c14c7db5d
SHA1fbe3ea4ce3c6d2949101d679105f51cd542b0854
SHA256a6cb47232474a9ba93d724defec5956ec6a3c67fec55753f37eec9565235cc57
SHA512ab5d21cc87332afe657af6f89a24ec759138835321691f16d5660465ec44861ab12a15546c40b3387c2a3ebdc67e3b14c5ae01815b56a12a87f7859b934c3d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555afd82956b4ad09497477da6c8bb615
SHA11c27aaab005d36501cb10a222be3048850dfdc60
SHA256255b4dc6e3f98ed6c49cce897bf9185fc06e973c8890c12b50eade53c09b5be4
SHA512c19e416540458484a26dd68ae12b4caf0c89bb86a62328541b3abd8969a83e85c8f488d28326c9c098b5af546a1253db487c767ab19e747d7d708002b05f605d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb23fb408fcc12bfe989987f67c1891
SHA1a48336935d6a221a6d08e8aaad59512425d3ce18
SHA256e97665ed4ce223a57a5115391adac7b10b6696e486f836def3e98286d9083776
SHA512bba205065f1923fe2bc81844444e773a653a1997e8e6aa3b35e0ba4c9830140121f3f6dda7afaa3a4dfb9c924e117190e02036697b9c86d86a9cb4e4ab62af24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54578c6449999280cd06e25ddaa65f88b
SHA1798b5806ffca8b355d4d2d44388e29bdc88bfe02
SHA25667cfa8ead43cebae7e71f62824b7a69b4fc4fc4f7da78ac16bd6634b4df394dd
SHA512f6a24cebd96d0f3164fa667cf267c9499870734b975a90ff7837afcb7c919d010cd8cdd0428a0d5b4fcf1fc6cfc4b295edd0c1aa0fbc4cc405fa89a1341b945d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c48318dd4f694b080b163e6a36f30c6
SHA1e526840effe01e25b16fdda526425acfb3dabfd3
SHA2568d00c17dbd3e67a6597dba431b1cc700f8c2644c3c23ab1a9fa71cda01f67b8e
SHA5124d31d6a5d598ec84cd3c1ced00744aa5fe9ec4c32e2ba51c1c71126a1f4a594725708432abe60fede8ee1d19fe41eccb36314e6db412c41ab7fa55ccceceb267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55159368ea6a2bf4f94cbab11413ced08
SHA10fe42f3e2094f220ba6f8beb1c3c937d37327b6b
SHA2566cfb0507e224a668a12f78f063a74e6ad9f565780fc36aa6c19f86c39e658777
SHA5124317fd1bf08602ff6d1b44d81e0198d76e5c94397a5744fc1e4eb365dcea5d5e93a282ba12b60e9e8e334d2744026ccd3fcd3d244ab42ba0aeeabba3630faf59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c49c8c1d882c1d79ddd7a8c0185634e
SHA1ddee2d9b1d88db0a7ea41d602909fd861b22232c
SHA2566c146baf57e9dfef4b27a84541daa95d80eb25b0f18868bd9b30efb212471e7a
SHA512ec8bce4fd8f4e694fc7d6209d568ead985975c1eb9ac20538eeee0fdc6393a40b59c7ebcebc2037adff45aeabbeaac84a950d2ba98f98d6ca9ad3d6034367054
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b