Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
dfabe146d2c0004ecf09c9ef2f0bdb45_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dfabe146d2c0004ecf09c9ef2f0bdb45_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfabe146d2c0004ecf09c9ef2f0bdb45_JaffaCakes118.html
-
Size
4KB
-
MD5
dfabe146d2c0004ecf09c9ef2f0bdb45
-
SHA1
1eb9cdafab4f7d2abb1095738478aac57f0238e8
-
SHA256
1bb70cbe94e98915f54227952b9bb9f5cd4752ee090c4bf88c24c469b62e48fd
-
SHA512
2374741973170c56720e8784fbdda287be45481be497d04a1fcb92bc487145130f020b1133b6eefb3c3d96696ec14eee78b3de2ea6f41016ef9e68676a63663e
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oaIFIFpb:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000770db1439dfcffca3d5a7fcbc867a21a0838bbc4774a5c7d27e976de58d0482c000000000e8000000002000020000000df001436ad2018623dc37876854388d7a68f8aebb75520589fdd3de39aa941eb200000006537a4750f45aecca43184bd2a8ceae7dc560aa67e3bb513bffadc7e49b5a6254000000010589be8a339f477071602bea6d1fd386ef4aafddbe4290d0c38d15595628243541162fc591471bc9a48c483471e9ae109dc34704043971bf98a4aaf2378081e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707c4ed07006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBCBC151-7263-11EF-8920-7AF2B84EB3D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432457790" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2384 2692 iexplore.exe 30 PID 2692 wrote to memory of 2384 2692 iexplore.exe 30 PID 2692 wrote to memory of 2384 2692 iexplore.exe 30 PID 2692 wrote to memory of 2384 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfabe146d2c0004ecf09c9ef2f0bdb45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384b9622d09596042299803bcc710b64
SHA19d94a1e9ae776a6cdaf137767f70b49593bd6765
SHA256ab96071a1afe7d0000f59dea2caf1e6f1f8c22b151a1b48bcfdb34bfdd80c69c
SHA512a34652ebdb0ad48f7efffab1b11ee2a71b23c738edc197c66c6728e94b002fb39ebcd790e566031a439c4cfc1fed1fc92f111f7e37ade773ab731b62c50adb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b401c2435ee6cc7865b23e37882114d
SHA15d45e8df54047972c1f4dd64154c522768b74f48
SHA2566ade865ca5567ecb5fa0d839c54db76301cd93e64be883f63d5806d9805eb952
SHA512b5c4504bf67c104b808543e1df67beca41bf9610470a8bfc9f1c0aa6ff853edbedead2f168afe742637f01ff1906d2c2f777804b9753da25e3836b6c41b4a120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d7ae6caf778d0c78cc5103fc689f18
SHA1b766dba8a655acb089f594b1a09ac2d03bf0c4dd
SHA256a643ba89db0a168cebdea1c29c5e818f250338efb2394789935bd765cc79ef50
SHA512a3f34b8e8827b8dcc4e899122e98290df108b69157bb685c355a9dc497db3b2e7d967a8c201748889643ba488a67025d1c5957bb3350dfbd795378f9f127b276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7296f206c3b2d7273c89c21e5ee96b7
SHA1983ea9e040652fc010283c018cf61e12a8d87cef
SHA2564f264b2d2c05a07e9666ea7a7b483f97cd9bacbc8a97ef26b3cc47aec7059313
SHA512574f0316006538f60d0d8f88ac543799e699d5293cc42a7fdf028d8ad8aa1dd125cb9cc68a07890f537fd71663ed1f4c0df1a1a91eab33b2198584a9ea63208a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507812599ae365620b3c254b56c7c2e3f
SHA155ae862a15634a413af512220a2c000dcdeb4594
SHA2564488fdaf05e899e63442f02277575cec0f9bc3bfef0c9a45227a6b8e18f45587
SHA512feaf155b68b209c1e27079a5a11fa6ac95eda34922e19fee7474dc825df83fe8f532b281c19fc3aa9d2c171750d09318606317e8832f7f53d3ca485bc8f4dd72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62d968a3993094f9f1a60e27d783f0f
SHA1a4c03b5a44051a4c477a242364f0b8922e5d3a78
SHA256f81d53818acf14a11d501e0589153e2b07a6ebb106aad353d6c9b256298fb8af
SHA5121e3e577a68784c70e3eb23a17e1e4d2ed5aa5d769e6249928fa638eaa4c167d899eb9b9bb9c46ef1eda3b9912e77ea2ba04f83045b586a9764a677cdc0b3c9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb58d68609ed5f0ef18a0dd6ff0b60de
SHA1e41a3790c75964f7abbf082cd20192840ab5882a
SHA25676fb042ece50c600b4fe9f1027e61631f87e0991f0b7dc5cc5e73bd00ad0140a
SHA512e8901678687cb917dd8fda89936961e11fcc24b71cefea7a1bdd06f39958a1751de480bb3b91a107f371a2b2f2c1a52396cdc0e15cadf99863799a31467768dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fbcef6c0df5a55ccd24b5003071596b
SHA153d742b99eacd447953eaa7fcbbd3e361396fdca
SHA256d3875a95f7678c50a2f512a95ce32c500f913d7d455153d199a1c9c8d18c8809
SHA51221d98c0a13c8fc5ec046bd00caf445f9bac32e492606650b96bd3164a639f23f6cdcb9f6dc5bf49ed2ee4d8ebebb9d6d080edbb40ea87eafeb7038bf7e1065ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f243818d47b39b565c8cb70d6f46cae
SHA15e292a3d69300d7c21e24912009bf9052ead468e
SHA2569d22ccc943110c57865b00165d6d87987ab9bd5bb89d70b4462b882b367cdb8d
SHA512112a8462e7ed9a26d9220c370921391e68ac2e1db0eaeea5c17baf7b04162c9927b26aa0fb96c1396eb9c0f00aed47d596690da2d859789081b018b6525a5590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d924c59fb6cee2599b3a4d636b369a
SHA19ead0016ce43f826da1e0db2609754d81a701de1
SHA256472df4a8baf0ff52889bfdf53dc27806c93c09f06c1e1f3f1d7f9e082fa719c9
SHA5124699d1074f4129c407da42afd227189c446e2e502af46b691fbd635fbcc05c724b58ebe324c232192b8ff4973dd10893818b6e9453ec033a091948a9b16d95eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f91b7a47fa464d4fda8cae11889098
SHA1608d6722abb1fd0002e5865ea6462c94262a0481
SHA256f15ce0721f002dff3acb330ab671b3dfdf06e06bbb50f99e8563b0f8c5d62d79
SHA512e79652066a773883cbbb276f06af5c08e68eabe8d9c3ebc705acfee90afa779604965d205c0e774fc1b8cd95230f1dd49a826b105d330df857c1a0ac4d370b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a422dbcdfbc0667f540f778c06c02f4
SHA162ddb59a9e2a1998bc67574f80585c45a9d85500
SHA256ed17230e06537a0012dc8548db0b08a80e850a8df2266ea32d94612756a9bb3a
SHA512711496d881e16957790aeeea1cfc467f62c0bdb846277f284832c9565264569eafec7afebc12493f12b1b0093ec929c762289ef91f8dd437639afa9ae90c4c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c93cde7c31b7c4ba6fe19777ced66bb
SHA119ce241ba7119a9113e28c69d94e5a0a34fd1cbd
SHA256eb0bcdfc2ed8a7b284ec2e807602eb3942a280817c0d88bf489e48c6e10de504
SHA5127ab64ea0cff064a78409ea07c481ea6c13bbb1c5f421aada4dcaf1a4bb2feb7273f5e6288b71cea29020f585eedd0665dca87504a5ae3bc2c23a7b8988c8f4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dd5d7601250dd5f81a532375205e5b6
SHA12b84819bfe999e11914b1ba03c3c0d4a0d18b7ee
SHA256d189808ce450308483246f1195678d28437162f3c8cdf9aa9d0167d6909045b4
SHA512520145c5ee075616de21bc40940a6b9b10d2b882777837ea37393f010d438ba0622d7626c0fdaeeb0dbef822e47bd145083ac0b58693dd67cd2bf55beb11a493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56889dcd061f597dec517bd2bd9bceed2
SHA1e42410573f2e0ed4a6ad5246f34e990aec7cf6cd
SHA2562da9a3e07edf1814ec7b803e3178f08139bfb7cf8f9969fa55b9818d27437f33
SHA512ba380a456d118aae058626805fa4cf8990d798f2a376dc69dc4be912e94c1d3027954d0e372bc3b4a72b27572b0b6786348387d3edc2774a2984d43602a03209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ecf8bcf4b978a700545f4cec6d40eb9
SHA1a82acb06d9c004f83abe4c13bba8cc5278324657
SHA25694d4a0e32c4ea24039508db25a173d97a3940b2c316af2d5f6920711c535f629
SHA5123775d4cf31116d4a3bf09d4300961125cb0f7d719633a297f97c302ecee4f876ebbd8d277f2355bf9255bbb54f0f05befe24b5b89a96c9ffda87ff703050a725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19635d8fb690119c0fa3ee56f7d27b5
SHA1a0a0edd98b132a906239af4793c5c264570d9caa
SHA2567803d049c7b1844e9a4f701df0b558437f8a34c2dd8d531ac98bb8696f47c3e6
SHA512ebaf128ecb02ee617cb486a9bfd88a498e5119c51fbc80725946d8aa551c1d2f9f6226f081a9ae2dfd30700e3bc8ec9401e96bd96ce5bfc60db2a1d52747509f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483e7ead82ed1bd51bfc2ab45bd34380
SHA153fad0b9d34853b6a0ef286948706f3f11a89710
SHA2561fd2e59bc7db3590cad1da6f1959be4834f203cfa2012ac921b20fcef5c050f8
SHA512c01bd43af344cb73192659b960384d97e05407dd2d64f2d8d8beac1e84184de830de120cc896b175cb2d520c04c7cff2196aeb28d887bfc5b0bf52c39bcc9da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4bf9707be5713943f36d24112bb059c
SHA1b7050990944d1e8ed8538d5a42a36c06bab8e9a2
SHA2568f75998d40fca5666c32cb7a1a7b2236088c10f9206c097ff9b7ceff8ae628e5
SHA512ff8a56cdc9412642878db89c91d5e612ffb5fdb129cf1df8a3955b511b22da6ccf3b1230a00ce758ad7c6625c749cb1f4afd556423ae3f31375d72e1ca378d98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b