Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
dfbbc230b40e7ea1eb44b5cc7edb685a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfbbc230b40e7ea1eb44b5cc7edb685a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfbbc230b40e7ea1eb44b5cc7edb685a_JaffaCakes118.html
-
Size
23KB
-
MD5
dfbbc230b40e7ea1eb44b5cc7edb685a
-
SHA1
e6697b4afa6678eb89141857252a0642f6efe867
-
SHA256
a0604d77070f2bb8b8211a5a04591624af8d9c08da84058b19d808ce51010a8a
-
SHA512
6f252a05c3f18332e79219342a21e64734632a197ead12e1e5ba4b0260342bef24811eb0e6493248e7efdb5029b0c196761a87517944eebd73e0c05b57558e3b
-
SSDEEP
192:RiQoIhPJb5nGnQjLntQ/pnQie9nAnQOkrntn0nQTbnSnQfnnwJnQtMMjnFnQ7XnN:UQoQPZQ/cFK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000006da06b64a0b5cf0805dc9da4d0862e087c8c0fd6bc933a1cf10f254bfb55b53f000000000e8000000002000020000000de998868d7ff76663b0c9657ffed5f188b748dfc5b1a30d1c54d0f275ff5e810200000007231771cfc0e0d5940acf3a89acc3e7e809900537ffe36ab4141d410a252d357400000003c478b12885c6966daa3335431382463d37ade141e524c7f3792170918c16e5b78c52d1a8a5b2438b932de13bbf0702c66ae628a24e9f31e3f482137e16baa3a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C58B541-726A-11EF-9C5B-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432460528" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80090e317706db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2136 2224 iexplore.exe 30 PID 2224 wrote to memory of 2136 2224 iexplore.exe 30 PID 2224 wrote to memory of 2136 2224 iexplore.exe 30 PID 2224 wrote to memory of 2136 2224 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfbbc230b40e7ea1eb44b5cc7edb685a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6473a6d8d2a78ac053c1c1b89a81c23
SHA1eb9cd99dd907114ac0e4e79b6acb334618592385
SHA256cb745214b94981c8c27c89bd3209e36dcfb49e7de377db51d5457a85e86b57d1
SHA5127d1ef02c2c5bb3835a18b1bb7fe1474f1ef488f743a86d29d324846d77bfffb06c009ec72229ce218ecfef25dea41a59b2a84578fcb0f255983e865051353e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566df6521d54f5f83b6b8aebc950d8dce
SHA1b3a6d252eba068b1e2b6a7fb4e5638049fc7d6e8
SHA25645c6a644e78a6a4b741971bf31c1af180d644b292beb1ee3635e2f49f55f34c1
SHA512a08f3023f4e91b7964b357bc9828e0c98f1f52d5c5818adaf121a2a485a3a4bf8bceed2b0e4d76dc65b16692db74095ab24cb1d32d291ca1a9d88beb732439a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc35ff2bdd14a194ed168ffda4289d6
SHA106d0ccb1ea7ff0b2396d986343278ad75aaada4c
SHA256b52637ae7c308aa86c83f9bf1de7999f2965db77aed6e12769f77fa99a40f906
SHA512ca4c8b6cd849dedf48138bf4bf1a3f3a36faef0b433166ca13097910d26d5f766a1c0591ea843e999d032c97bca9372b1e23d727c6b75e8d3b66fb42ba5997bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538521262272268045a48ec7e02fa36ce
SHA1de68c99c8d4d966c44ecc0cff886900dc9be59c2
SHA2560944b5b74d6e724c0ea7db3f1b4d158f05cade3f81ec7d45fb8fc4764abe5721
SHA512307c17de84d36df722437e16f7540887e599f370712f5c57c4fa348620e0c517347ca73c158db87dd9cd5ac4de18a2382cd88c1026d8bc788e1e3a24dfdd32e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c1533a7122caef4c6c2139048d4be1
SHA1416c59b06f3e76cb43268a8b5b0a662ae478edd1
SHA256970b7a133da8b91f3c29eeb7a76053b67eaa22de768ddb583a46da5c4fd6701d
SHA512781bbc4fe4508a35672285e7b305eea2582f8447708f6acaf32c363fd46fab582ebd291891b3022385a000ec0e60a63b318d95f289848101fa00399356090bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58461238c3ee8b3c24feadd8a49daf13f
SHA1d2a2dda69a14089440fa2bf7c45aa4a4da2fc86e
SHA25660080a165a6bcdb43479e61ba5b3d3ca1bcae41f08b69f29d9b5fb83bfcc10d1
SHA51238b3e6e33c730f7b83f3adb8b81a724ecdd56c4eb1be4c941ce8701e1ca2708b35e6b6c73ed3aecd2300e59bb531f86b66ae277b0c15e8a060032f7a493e9779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b43be71094e3481ad456fbd23f75f8f
SHA19e34a5e3cd8a54ee1ec533de925a234126b48a70
SHA256b3c51ff8887d41881b7796557b92fffd4880a592038696e70266e7bceee1fde8
SHA512943b33c155fda40d1c54ff92d2283df4e6e1f7e6ec7eda6b7f04e4c67735a1a31d6ab6e32b19afed8ff332fd13e7ab4fa7b4a3ecd5208ed87fc252ca8f6a27e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a773f4b903ab56bd7214b70a8515a412
SHA1c49b09f49336eaed7a42ce47794cbb2f3f42c239
SHA2560d4e09141b0008e5a637bd49b85eb9018b0456ab2ffe38bbc7e9df8270b954eb
SHA512f7a9576a2f5b605f3e48d683bd4b6e921ba320e1656bb1540a684572e42b6fd8495dbef5028cd3da2d7532e07b4815c23f5fbc27eba5f072cd8243028e8e18a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e99a3e84a17e5419ebf81f2718e0f6f
SHA1f149212ea5b5c89ea23062acff70d466c1a20c24
SHA25646245e723176d49584701c9a332c7c2aa22760c39d3fc3413c12c7a450258bee
SHA51218d6bec7b802c34df0f6e6e471ab540da6d8a2f1b94eca805aaf732403cc8223bada509ca90de2488dad8be47478ad27949afa3f962411f66221161a151fcf8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52947593a186a1b85c9a9f963ee81fc
SHA1bbc8bb9d094bc4781fe126818d6b8e18f2025c75
SHA256a7c50fd981d06eca3eb48186826e753e7b0cc03b3d14408fd7af28383dff37be
SHA5124f78708d8a40d65d2969d1b0133f80c9d86136853b1a2359c26bfaec8594dee198cde0832c184975a175fd1e74ad81a4abed50fdccead9b6fa91af690499ddf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cecbea228b29957f85ce8d0ae235f1a9
SHA19feb3d04098c1cd8c1bd980ebd87e36da07309e5
SHA25659999a8b34660ccfb0ca1adb500253eab03de961b3302797b00388c88fa43a6f
SHA5120f9c5599e3c4a25116802cbe801191dec84b609966af53863155d93137c8ae95672fe0a2d43e5efc6aa3d23e9e45decc83940f1e075f6ad6cd28b7c7b6bc14df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fcd397be85aca008e7e8ad73dfa1173
SHA1f40cd20bb8f48dac2c7b1bcebb3de0bc98112e00
SHA256c0d2d490a4a3dc789d53ee7b7afa04ed781e8f93ac4c72c42c401c1b5a6f23e8
SHA5129e4097940e9bb48b0dd5c7e87566167e6feb2b3ca12c84fdb40dc01d7646254d23ac399c83ef81c5254731416699f918fa9713417fe6d408a4b9e0a96fe87c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586db50ba21668566abf45d35efef3274
SHA18bc36c6fea7c8cf74633b3cefbfbe88d03560304
SHA256c0e93bdf5ccef50bfa7915ce712f0eac3675775f2a3d1a9405a87fc53203387e
SHA51203b8d6f0ade0e8becd06663743128b0c71721579c34077a8f26912058d282a18d26a90dcd4d55d055844b6d57a56e1dc2750e611f515b45fb780b046f3cfb6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f6df220961e1ec4edf71de25aae4e4a
SHA1cf3ed4f78d404112f25f18cce2c5066e6e34b2b3
SHA2564ed2959574a59e52dba6d3df380feb1ea1e90af64d9538e7d69e3242a095c897
SHA512ad813aa90f374ceb148c929a7e4a56daa6b9b93f661b0619c2d2c2f3c14fdb6795fe3fcb557afe47a356cfc1e963e78f9738efffb2c73652df467cf0035a6044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56697c75b162c65b4e1c2e6420c4b1b3d
SHA165f766fd1994784c67f14d3121adc38dd443d450
SHA256e7cbfff923fe42e6737806d6b8b57e98ee3fca6a48c4997a78b8e552d5f18821
SHA5124ed0d27f98d41d6b3db09ec6beb1de06840c3b70dfbcb703bbfc9d45b94fdd58e9bf2f6c6228e2b85f9b6b9aceaf7cdb11831c8ceaa34c08304831fa3ba20dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3083bd6ada4330446b0ceebd12d502
SHA18ee17bdcbfbc3c258327c38de9743a0cb426731a
SHA256cff79cef4e92c89c580f3e3e7836e587f71bc2a5251e78a0cbdca8d2d5228a0f
SHA512580f77242edd4cc6ad27abebc3cb375ce0ab7490b32fb0d253c3c5602356d4295abc3bf416ff51e58165879eb66b1ea1c32e7d19261f437f630ddfbdef4db874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f6849d47b6c042fa5125caa04e49d3
SHA1ebcc73a3de8eb9172624c44bd3453fe9a49afa79
SHA256ab6ecf584d5c33c0ac89ec5c0509d9364cb134947e66f17a880e86210682cbb4
SHA5129950de6575015ae64135c78bf47b18a9c39d2561e68117c4d1f9a7e8c950da2a7bb8cf743e63d54b086c0522628b9cb4c0156848334e73a4321a799f3f93b289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b45625bf8b8a910d1d15ef5f087fd1bc
SHA15c82ab63c6468fd002222a36d3eb3d2978f78348
SHA256de309b87cac7c66887ef2209554407a3450bc1e5153ec98290bdd3fe69ac59a0
SHA5121515ad4bd0c6342542250419f79d536a1147e25c691d6da16274bf5357f27ecb1eae3bb7223f3a745ee9d16fcbc956900c0c41829cbfd81c058545c3577b31ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ea52b228f4588030cf01198b57ee08
SHA128990ba173aaadd9c250dfed17c3ee4a59fec552
SHA25667306f45b0131b615e7306ac7599f85c70a53daf7a2431e01a804da42f56fb15
SHA5120f4d1b556540368c093434eb637a3d90f943385da532a602d583188f0d967264ff78b05cfd5b32ff05972224cf0cfc224544da54096dfe51280d2b0596b495d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b