Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
dfa791621d04fdd1e1805bfa643785ff_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dfa791621d04fdd1e1805bfa643785ff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfa791621d04fdd1e1805bfa643785ff_JaffaCakes118.html
-
Size
4KB
-
MD5
dfa791621d04fdd1e1805bfa643785ff
-
SHA1
6d3e2b41b46d018d600fd9e8d0eb0e23c019e77e
-
SHA256
7f5bef7a085682ee45886bf68131ed9d6836f00d7d6d0e722e806a2c970195fb
-
SHA512
9771bc673e08b0c8821068386c921ab6d1f95413fcc3ad257a74af25b552a9a24e5f8633e47c8c98b8b21cef0cbf5c53d48a406dccde42bb66ff7d582ed9b09c
-
SSDEEP
96:QeaslUH0casfH0cavLcaQqvhfk3CH0caQqvhfk3CHtOa54h:Qea0UUcaSUcaTcaQqtk3CUcaQqtk3CAX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30df907b6f06db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000391621dda581a4aff7f9b03c7dd29f26436ce6c6ae2d9785c3b4105f507ac791000000000e8000000002000020000000cf73630ef284d34bde23fb3e053192dfd276a3c007bcb72a4db834ba79dc627c20000000d9e065e5017bca24bed02eb230525e7acdb4186dd06196bd2d12545dcea176cd400000005934ada4cad5eda9bc4ca0ba0ccd92ba7dd5b17d90d75153948ef10e2fc2d2cd689429af4a655a251d72a34f3f9bdda993ec668b6da8302176cf03502b3a7fae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432457200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C18D001-7262-11EF-873B-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfa791621d04fdd1e1805bfa643785ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50554f4e1c617a53a4584412b25e8e86f
SHA1f09ef4ed90aaa42217c6b81f4e7f5eb4f379bfbb
SHA25691a6d642ff82b388ac97c2fa6251bb0b77cc3abe228a5f1985e7b4180fb2b1ad
SHA512c283c3ffd60929ee0fdaf5679ffcc1a407fd4dc60a56ae82c4e3545d7f71ec303f1ffdf6ae3876dc2646072a44b0c2c9e9f0d1f12962fed115b6a7c22f94733d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543cdbf71344d45ae2a1cdffd5b17a99
SHA1627a0d3613e2ae5f662f17beec9904398534f2d2
SHA2565de666361d6fcddaa0a7067e5ca1f537b2e8dc93731dbdf886a789e37cb08de1
SHA512a29436311706d63faca04dc9048440009a95b9c6f406aa6c3e47ddd1106780f7d789b365daa4fb3e8912e553351c2fe4086cf6df3a3d233fc2ccb4084a120e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a10ee56cb0c5845d373c9e6b37bcb491
SHA1ce25f6536e6d613e50c10706de6a79acce1f8315
SHA256d047c81520c4179bfe9583dd6391c4cf72089866becee46a7c9383a513339809
SHA512c251a05463a4e67bad6a6359ee5ab83192bcbbf8aebe461589bc3b1e764b748d85633990286b2bc93159a5814393563d26d52621f59b55a8562319f7a8da6262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f5a73ac616c5808995734810ce4ea3
SHA1633266d0ab33e2f910cf8c2ae157ef6fb79ebfc1
SHA2567c58e9f68d50fc62c90bf1b394d6b7708e7715b4d8759f5bec7a4f69f938d5ef
SHA512ec7e1b27734d6f3b4cb4d010b5d3edf67ff03e34e318bb447fb9ac86a2bd1211e0ae47aa3673694d2c13387028c213c867c06a7a5ed6e4fc4fef9bcdf81238dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f5be319fd53322bac684f686532a8f
SHA10eebd5c02b7cbb16e7021c657c6cee3402203870
SHA256bf339e34f1e78dc80cdcddc4a88a54b13d3d880cec2593dfab42ecac65f98abb
SHA51295a6ee5289f2b2b762c1b052cb9208cb40438f26601c8ebe86076a528b9e588d0f4533403894f6cea0fc03da3d4e633485d2a3f2a4ddd783e18f2694b0097324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56626b69cf10c92d175302c763de5d3c0
SHA1d8abb6e984e5813ea3aa3ca22895e0c9ed3d20c6
SHA2566f7b11724771adb5e1446ca33a1f791c6b86c643db092a7457bb90dbe3a5f102
SHA51298a4eb567da5a367e5c11037fc945312b7224f6cb1053e3d03cdd7f83ad9eab6db09a5efdb7cb0650175c6969cfacdcd7d6f25be6cac4e9a10478048408df708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2fe7d63e617ee2f2ae8920aad31152
SHA14aaabb00e5a71bc6c4d948911a1bd21c0a61ce80
SHA256483f742b0b7621e2421f29ba215c20a20f5e100ce6366a76f77da66c0e5584cc
SHA5120faf1f9b9b85eed615cde376bf55c4ed345b7422d5f03513fa172ccb82e01b56a1e13e2fea44655789cb107a6a86d60046dd40cfbc533765c1fe4d77a6e8defb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fbcade36d233f40d490ec7232cd93f3
SHA1fd51192200d79a46737e6eaf1d1d717a70a4d245
SHA25693776aa3981a8aeb794d9c3e5b5dcc0ea6aa9ebee32da521befd0639797be10d
SHA51206419df92f1a982d3c7dcff2316061531ac3d173a0ff0123822e7d4f3c9bd7ca35086ca45f3dde4c453729d39d269b1ce088cb34ae93ae9c8fb5ecea974bd8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57acdc379a91cdc97e282e4355bca7cb7
SHA1d6734511f61d62299edbe89b2071767303f35224
SHA25601c1a9c1a6b514e7d6adf0e0e1b20174c596f6e4bc2981dc3241d75c9b0eb2d9
SHA512f9cfbe17b298434db2594ca476a1fbc606e5863ad9f9ccfa9afdeadf8ae070c3a72bcd2afc7139a8d4ab9e0d89a1e588420284506b403088294478838fc6216a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59179cb9035e0621e4e5681a0ea685730
SHA1f9a78c8f68e94520f4b8a31e4fba3da872019f99
SHA2567f541785dee8a5366fdb0be50a41dbc84841f09d72005b55e73606bdb08c309f
SHA512bd9ab14b814ad7281580cb77a16acdc3f95004e0733e7dd201714ab2dd17e6fc66def36b8b6117ede30959bfd56041eab3b0f2137c77f21cb610ee1c1a2db858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d8b7888737d3b42721b7099e6c70f6
SHA15c3c4617179ba92324f62faa698a2bc6f03bac4a
SHA256b25c290f24243323cc2eff3283c08e6261dd4534b2815e5e9a36c73f6c8e074a
SHA51262095aabfa1acb0b35fc4b4c8857d822c1b78f64ab6033854bbc0d945543551e3b35a36430966f19a15ef8e9c094a76b7b50124de89724008d8543ab811f4810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a0f981a1098582056fcf68e96f851e
SHA1ba18e4dcd72d83c10a219161b9b2cef306d3ccb0
SHA256b1d09df444b462293cfc20790bb7971a90389975c22297da2f35b8b3dd1fece9
SHA5126bbf422a61361fe6df8f85b0bfdb05265c428ab1b2fbbf4063b21ea11d13716d981c7ffb8b61850cbc7a16620ff9b9b73b7eb0f73afc61c71bc45bba0e44b479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7740b2d075fef1db5daf84d922a9506
SHA14439983927304ea236a2a3160204199190fc7a40
SHA25620ec953f35de0c48766cbee27faee284931a172012d3288b695e3dd47ccb2550
SHA512f2995231e913bb2efc53d5180a5259f631f1b8890acf46e604b4af68d80d62a252e0ede57c173f8b237cf548afd2db10ebc30f3f1782c44c6ff882b73dba28b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6239a0429bef13b4118417265001110
SHA186adacca902a4859f67f8cf3d8f783a8109baa5b
SHA2568ee91e2b4fffb95a4a7341bfa9c12fa2673c6f87ab1fd343ec7bc34fb27b86c6
SHA5121d23665ba51ccdd75ada6edaa292b2f4f723933535b364f1410d2f53a82a69c061589e1f01143ddf21220429060ee486e8b03d303d390cc33daf3689d7e6e538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a329bd996c6dcf35ca25e57d5404a1a5
SHA14ef5210aeb7fa038bfe200fa830bbbaf3237fcf9
SHA256345e92a5577d22b9a00df894dcaf03dbc2ce075eb3d270850f2399496df74afe
SHA51231c388ef96f62d2d89cb1eae5649dae448f3aff5eafb96cbabebe20ac57aac2786c15502f0b72dc4e9770378df1bc0312b07fa60feef5aeaa9bc84fdf0adecd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec860f0238f3723285c8f8d5e7fc8da3
SHA1e6989dbf8cc191db00ad3aade95e033cbe0e9293
SHA2567c2adb24b77d80e7d54a8996b6c2b4ba5d141f8bb6b1e6e47cec9aa3504f0075
SHA512bb66e963b2efd2db1fc0b3dc5df631c8a7996f7f0c09d2a2951d0e887ba33782057f8d1e7f28693240f65e5cc3a471fa3c0cb88c6fc65a977937081d6e86b54e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a191cb7ff02c4dd5e68d450bfc1b0dc
SHA1c51ac399d2ed85e187685d03d87fff266e9fb001
SHA2569fefa4bebd26bb3934f093b57634477e2d87e9a72584bcc9e30e06315edad048
SHA512d616b70103579cd66dfe1d1ba51e2723c88357333e28288686aa09bd4e0fb1ec1675aa29c95fc308f9e8834d0df3a2ba0cbd9d20dbd732f4bcf02e39b892a7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78ff8d144fd0589f30caa6cad63063e
SHA16a6f37b7d95841e31b0eaa0b282559b32f9b3de2
SHA256d4f159303e4644090f9fc5d121ea6ce296aff97f9669c3ef0a2fb9c607abd953
SHA512e465f4c9ecbb2e60cd4300604f4f1fac362261a513c85fdc466f3d98980489acec48743838782b570433d2a4372b7adb5f22ed8cfca91b0526740fcdc137dcaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fcb858b653d3547e7c3d6998a4cd0d
SHA1cea6e53f382fdf162b84df963d78cdef6e2e54c6
SHA256387402585ec1fa8b05364b21ecc6cb367bf8e99d89258f9e1fa19cf0e831f959
SHA5122f332a3c651cbfcd2b9bd0104cb683fe9b2bba56d2ece910cdc0008f23a372f3fd96000e247b4794211433c606e358e7103a1d88ded310a2e1b9453e6fc919a7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b