Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
dfa0e81f336afb071fc1f5aead85a768_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfa0e81f336afb071fc1f5aead85a768_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfa0e81f336afb071fc1f5aead85a768_JaffaCakes118.html
-
Size
4KB
-
MD5
dfa0e81f336afb071fc1f5aead85a768
-
SHA1
b9aad8a2956a1fa4c095e09300a447b86a911180
-
SHA256
2f1c345d973b4335a9aa444e103ab37a329eb18185371ffad5b828d8d1a4ead7
-
SHA512
2e6a7e85bdb4dc9450054c7e878c482ff4df8754f30d23441da00c238eff0f9c169497aa33d36ca5b5234385f0f2492d7b38052bc2a91b348958bfa1cd582d45
-
SSDEEP
96:0iJL1gX9uZZ3F4NnQBqsm8T4utunvIKMWLRfmbN9r90d3tnCuKklaYQhh:NvQKJF4NQBqsaCunDgbNp90dtnCuKCih
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80afe3ba6c06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b06b23e19adf54e3db4e3b61319f39edaa7eb8be3c9360e9b9919510a8f86d76000000000e80000000020000200000002d2f150e31bad80e1f3a6450ff888de55f8c61bb9e0cc81482521e33449196d520000000cdc366fc7180bc07eaf767726ae2c5a7bbc529aa9d7c4d40669a7fe1e3c4e67740000000f93bec1f64bcc3160b271fa8861c73f7d60da2cf895c4b24d128099854811be59a2f8f3ea9e3659c3b1bc5b2f4b4b437b7275fa4b5959d9159f11689b1a48a2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432456037" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E551CE51-725F-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2748 2792 iexplore.exe 30 PID 2792 wrote to memory of 2748 2792 iexplore.exe 30 PID 2792 wrote to memory of 2748 2792 iexplore.exe 30 PID 2792 wrote to memory of 2748 2792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfa0e81f336afb071fc1f5aead85a768_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570eded13fedc71dbc96c750a5cba39ea
SHA1eaa779b09962d2855dbfc90bb7f6d8362d5d0b61
SHA256f400cc08eb0c5953db9d9ff09945c1744f852c45b0147ca06e6fde6ad61c8132
SHA512d65b85ac5d7b9d30ea097a912df4476c306bdf6560ca8e94579189cf81aafcfec22493522c9682b3389940b849302e756b9310d91d4df323459f62bb82076a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f14f34173bd2edb6191e4063cbd055e
SHA1fa89f62dd2fc7ca74e22031433ac96c1345ce25e
SHA25662515f7cde996ff20b96c196730ba80ec1515d607e77121a984d47d14a72465f
SHA512812f3d5d28a0dcf13b8a1c500ec8b3ad624e7cc559cdc0c12fbcf469b77422464e6c27e22cb4d6c0fa86d36dd03f0e109e4cfcfdb4dd0bfba6b59d5c34259b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52851c51986bf2a13b130fde49b02ea81
SHA155c5a6803c27f5a7e04940deff2364e8d6d540e9
SHA256bebe7f2dec1e3ce5f9d75f39d7e5049ac1a52165bde39707c76c4208bc21eacf
SHA51204fb54d9da69ab637858add3d6835c4bcf5d27a3e41f0560f7d8d185aa89a757947e0325470130e8467a2e76752b2c496f9baaf1e5004a065919af66998120aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ea188b4abff195f3928a327b33fdd1
SHA183b33e43737bdc4aeee1971c47dd6dc14af46105
SHA256ee15d36607195a058eb39f6ce8ce572283623886b1d83af3258fdf9f86417a56
SHA512b64dd868ffa0a5ba6e34f625d7abe3bdc56e4e4c6067c16360301836fd4a775a42a2fcff08bd37a22b3c17007fa8f7309232eb9fdef7644d50fbb10775b0e4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c81f7182a1be2384d3aaf1a2128d8d
SHA12ca2fd397a51531d032c81422319bc33cacc425e
SHA256b5c6678a2577a911e55fb493a3c03f9ebde5640b9472ee6d14666690160d39a3
SHA512e2830d2f06cd5f84d00cd4b752a74ab28af36ca1f671f6af21d1d4e033bcda17e42e52624b634d31095bd7ef0fe13b81b57639250a67741e11b723be867027d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a4747b1848d0b025cf128636cfcfcf
SHA1dfe9c6bac414094e03df50d8862b9c9b158c8b73
SHA2560f3080749989489a76c9a8819e5bb0bdefe2aec4afa639b88ee163fd6d9ddfaa
SHA5123e17d3944045ec51cba0edff5d848b968aba963371815f0fc6ea7bb38f851a6b983895f4971e8fb716a7fd831a8192b085a4bb5277c53b33f0728a97125de685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df95a8efa85557872013e7ad3c081d6c
SHA14c1f40aef53d1c1c56886ca2eb8d0fb1d8af1f53
SHA256ea68a67ae0bf684daae0e1acdff6f153dca14013c93b366febd4a0db81dc3310
SHA5121ed412e287fa3d04d276be45e6ec573e329d8fb8c267266e7cb4312b0b62c22c151790c61630cfc3539b0760e86c806a6ec0db577ae19912f88c48d80dd640fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56468469f681b6089017d6b33304d280e
SHA174841d90404f43da79f6db546905460651f33b53
SHA256a9fc631e64f8e371c2ceca518266be9e692ef43dbc57aa81609f2f7f9ce276f2
SHA512b7c67389370bff98669223bf78623662e8f2134dfd7304670e0f8c719f83ddbd786fd84a5d7121c22c5f9b58cec6cba2f57d56dcc4ef7cc8197698d73183c526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723b9b74f4c367a9a46983973e49eeec
SHA1bfea78228cf9e9594cd07964bb061710e2b5e2f2
SHA256d6fd9d630d7747865e893041287e13ac21027a898466abc515339c2350bf106d
SHA5126e121d980220e84a3952e78a4ffa4b241c035818fc95e2a95cc984f2c5778b38c055089ab9adebc730206aa14d77e410534187ac7bdef5cadcc6c7ff46f73eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ba664f4c57fb2aa6ec843a847203e6
SHA113aed09d70fa588c52b3856035ed08429df24ca8
SHA2569b29c2e04d2f4dddf811d33a57ce5adfbe34c1cfe600a8e055ac2f60764a4eb5
SHA512ad7569f4ba9107546bf93a29dcbf52b4f260f991d1fddce4a13eb55910d5d2cd8f97870efe76ce5ef0b1510d4b9bbf1050e8d07efec6658763bfe57f76d829c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce6447a5ee2c92941f5861330311c71
SHA10be7aa68efa33409ca3b73960bfbd8810fce87ea
SHA2560e5f42b87d7f3ffb83969b17634f53826f545317b3a7559fc4b80ed4fd15c6b1
SHA51279857a0f62f2d309ab4be520cdbc7c02913394b3c09bfc1810c75370358bd39f21ac3d081eee2633a53b58d1e4dfe362b698105a068ee60c15bb644728e80629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56035633bf6029840beb01741a24c58e7
SHA1ab6d8d6b70b52b3a52c767631d6bc84aabd482fd
SHA25615f6381dda9d3e2cf4dca17569664bd79612086f7e9521e6cfe9821720827b27
SHA51285e09c195ebeaf17e3a1c29ed8aea335a28ebe8c0d2d71d356e06b9d3ba8f9a042d2a5a38a6dfcd4092b0dfe6403a2179191c9f5b5643a2878deab40280875e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc532747e3a551addf0a519bf3f6380
SHA137d7ae4488e373c4adf9de06f84d08fe8815b58c
SHA256ebfb27c37f4cd33bd5b5a098d487f571383093d81994a920298efc6605d60aa2
SHA5123ebe3bec90c3265ab69f1ca2c867f30916958ac40e9d343ae1194194c6c1bf04eb59f7f771b3fb6b472303f8722133ada0cc5924386ed8821d6296295dab03ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f1822e358e948b9fd96fbcf0ca7214
SHA1d0a5a23c1b1e9f07ba4d67a3fa291b3379c9ea78
SHA2569f0f808dc2d826f444679bfd37c86c5d57387e33839fef425dd9c12d059e7799
SHA5126cf9293afcb48769db4672ca3a50e877d222dbd1a99b1864cb6ab630d1083767083ca2d98ae5b2d1e723d05af009a90c29ae0b3b9517f8ea1466cfe261da45d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55002e68f77bdbc5d6e23cda98fb87f17
SHA121c978ef1c59ffe403c6f4777f99a1251b27e2bf
SHA25603a821860bd01166da72cb4bb22e1f1065bc8948ccf7f6f780793cf3a5e58ea0
SHA5125cb019179ac0037bf79520dee932598f7d8682d49c4012d206be9b10576385e341951b86cb9bc433eb2fb35151a0c3fcb387b71978b88b22d1aee85180d5f3a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334d1fd027bcf9145e2a456aface1b70
SHA160f2b6dc116101adaaccf5baf03d626e6efa55d1
SHA2563dba4a150a0d151e0ef376e2d4180c43323ce799388c1ca21095548c81220c19
SHA5121ad54a87229922dccec3d860e80db1eb0eaa05e354783e84a6b871a45773a6444128fe87120241fd832e5a79de306681b64fefffa6e2b6752b493a9cd6b1515f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfcf7c01300ea5504b419213f7bc61cf
SHA1f582ab8020592a34cf3a15a1929e0b7fefa97ffb
SHA25613dfd86d9b426be083f16b9c667351ef4f50c1a22aa400fefb5e3ef970762157
SHA512134ae9fc96172c709dec634f8cde6cf3305e123a3e22842233bb133a6b3bef7e451339e44b364b31c4641f3c69cd0806df24ff2683b450cd84d5b898a4a7a80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ebe5c3bd1b0e3776d456461d5d1b6c
SHA1ec1ce6f3c461a90b6dcd0cd6d3fba6dea30d82be
SHA256a50243f36f9e2fbeab9a522eeaabf13ae809c65f7f949943deb38cd3d3226556
SHA5122d9e4a7d7aa2c32071e4598bc1d1bc49cf49e8f74757c252f795ecec0b396dbb90c07f214170222b67970a191bb78297a8156c9b05c9fa2865c4aaed49bb0537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d59076243e29e80bc78868c71d8257
SHA1faf265b686405d0a0c9f23be4b35dd862a274ba5
SHA256aa15b1001489136a3858adc452f41e92a587827c44687aedb178df5fb54a1fc1
SHA512c14fe7e936acd7c1c891801e2eeee4ca3f4982c028efd77d5c60a5738d840e0aee5ecca713fd3c105139cf5784126f50a0ea18dda26a5ddd4909fde66df0e8a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b