Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
dfcd3ed5d430c2a6519463a4fc16edf4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfcd3ed5d430c2a6519463a4fc16edf4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfcd3ed5d430c2a6519463a4fc16edf4_JaffaCakes118.html
-
Size
53KB
-
MD5
dfcd3ed5d430c2a6519463a4fc16edf4
-
SHA1
3dcea2bdba9dc4294321b2d9841388d6ec4675ca
-
SHA256
4840a634ae014b0a84bd8f9461402cf9a6670bc0fa12a6c831b633834d2ffbf0
-
SHA512
2fcc6b410f6b6272b38c88566def98b03f9c332db55511623dfc0349f159028273a6c3aa9465bced945366a43dea6261c96f1264c7684f33cd41d9fb059c2f16
-
SSDEEP
1536:CkgUiIakTqGivi+PyUqrunlYh63Nj+q5VyvR0w2AzTICbb8oC/t9M/dNwIUTDmDp:CkgUiIakTqGivi+PyUqrunlYh63Nj+qg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{780F4401-7271-11EF-B8EC-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c47c4d7e06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432463581" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000003bdcf8d49513cafba1971d4b666507a0c1f24fe2c0cfad06bf5e151b0d95653b000000000e8000000002000020000000b00d80383ce40229291c2ff3e30861fc6517049634e6052f6be3f94ba1a2e758200000006b02898e12a19dca30f6b754d3014668c6c783d336fb07fc16019d74eb08ed0140000000e2cefacb46efb3cd2a337058bd0f68fb0f8f80df287bf49c55d08021925135094d16b6d154f1bcdc2770b10f1b3a15878e0eb568fc1d74664f4a70414e611de3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2652 2364 iexplore.exe 30 PID 2364 wrote to memory of 2652 2364 iexplore.exe 30 PID 2364 wrote to memory of 2652 2364 iexplore.exe 30 PID 2364 wrote to memory of 2652 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfcd3ed5d430c2a6519463a4fc16edf4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba54cee7a0cf35750d415d259d51f01
SHA139079c27644117c99d2d3b73f0a5bacef95aa012
SHA2562ec12ae94e97548c82319465f676895faa1063c6ea3d78d8e7f2d68e05cf0c05
SHA512ccb29196c7d6f4cb7e027c3323f37a68439def642f14386b70ddb5b6479d57b2421ab4b64c4b53c9a80e7348d398f90b0b12a91d2d389a4d6cdf729cdf3cb097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5821fb11daa09201ae78b1b3915a33a60
SHA120846719d34363f58ebb85e5a3b0af848c6e6ab3
SHA256a0bea83bd181b225777033e06516d467296324d69400b3788697d5c738eda899
SHA5124c412ed9da2f423dd4cfe97dbaebcdd0214504d2f6791c284dbc7d776e847ec58ad92a512089f04257d66f1f31b98ad67ef32024732b26a9b892784e461a089e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350d8bed5140215f5c039dcadef93793
SHA143421d9279ea734769d19b62481b6cb9d2f2bb75
SHA256f6d9c889fd68e02d910a4599ec1e302bdb46cbe72ad7a48b0e0cc618a346a37b
SHA5129b52c051d0e0b0813f47caa15c843ff8942cb030f7098aa82ab042743a830151417e6a4095839c5576997fd0424758b0736d0d3374003a19d19ec81e3e02e0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2bdea9252ad360c1177cddd87d68f2f
SHA140445f6bf7d2bec1a86f30ac8c505929d1d846d3
SHA2565b1f4f68095c2249407e5d85dbfc172ba2c971228e0e73bc9ae654ee0c8307bc
SHA512650d4f3727f02a4945fd9896211e12a455394b56e49c44199072bfda5adf0a875b06824dd4ae2ffd60901b811ac8ade0535f3ae6380c31ce592e73557a60c66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab016a237ecae2062cc56e436f7a4967
SHA1ee5f8cd970e8a7e6a8ee55f54244dbbb9c33a9d8
SHA2560ead1372cc692e2e5d904ba1242c72f19bb24ec993279f89952ef76f4dffba03
SHA512ba7a1dc74fdc63856710cff9dc1fd9db13f38518259dd2cfd320a64eebb4677ea3673c078cf469973144a04d416ae2cdfaa2356cf8b41902760bbfcab7177d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578dcd35862722b0dcd9a91d0de43b126
SHA164999f7af5534c76de478a111d216743346fb517
SHA256560039747230719db3d614b3798f84931a48e19c97a58fa7233dc3b22117ecf3
SHA512a5d316bef23fabfb3117c6668990871c7c0e01cf0c13c90ba21bb5bebf9db4c493f323c5a560627227714d5f07263ff212003000807d0b9e3ba38a4b082b3ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533854788f09c894dd34b803e4b408068
SHA1a480b1e1ee6dcfe31b60a612ecf937136b873962
SHA256e7acb5d760d63b640d29ec659d47570abd7ad1615a9beddbd620101c8bb43335
SHA512f5e11646f18237e2616bd8f74fb2e08aeb5aef301760b8dd8ff20d063db2ca00c41f92566973d3e5f78938edb8bf7b49e2dded3449b91f914215076cf5c36fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323502d8c708d87b0995487b9a71f290
SHA142330aa0b9a90ce35cd213fdc07a4a04d33d0903
SHA25666c4f437593835a1827125f8bbd749b71f6e22eb8d787c1f984c91ce6b4eb6cc
SHA512335181f541ad83da037f30c9089211d8f89d70bf348881aab15005d8e4b7abf0868e363b9a2618732c3979be8ff72d3cda7f1f4c1e1c908b077b522978e52260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c742ef8be56f8c9d3837a50fc122ac
SHA1f9c05ba7729346785c933f2beaa34477961c9372
SHA25699f87d2d5f93c8f950d8799441f213a6b1cadf315c0a8468090ac984067869a8
SHA51201d90fe100acbd90b7b4fe1e65a978bb8ea50080e612f3cf185dba08f58e7c7a3c75f0bab181235bbffa92b94272c796d7c6f8aab9958a57632ca242bff70e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc883856cca6383af773f24a23db0d93
SHA1497a8a9467f5470c8b5faf35b79ebcca05e677b8
SHA256e6ba1b1db6669796b71660b4b07ced915a199b366577afc6481753313ba6de8d
SHA512a598f563e7a47a5a0b36efe464bed8c6e01ed31bf63a9668a76948b6a18bf37f6224b0038e0815e6bc39864e20fb7a8e588ff4a0358006a0d9cc543087eaa3c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a717da3825f8660f61ed632c0d0a478
SHA110ba98c6d7e013a4015b9b7f2f500684e31a2306
SHA2568138db83cd0e8e2e02076e1dcd7f534bff3057cf4764824b7399a333b33283aa
SHA5125e13a65dd2b57e7fefe5ff181be709f02b7a9c3d0946c758524af176ce63c0411f92faff70f0e6a2cd0fec14aeffddd0632e2dfd78cd14ad930e935c30647b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebe236c831f297b902b50451e44a752
SHA1e5a27d90479742111477cadf803c9f8b165b57bf
SHA2561749e124d39dc9af1f588ddeacde2a44d4ff1e4f56c36fa9d62a75e4f815a539
SHA5126bc46071d00229dd428b66db32a297a93c733e2547823185c424d43695514b971f2848110f9284de9bcb6977e710ae5db3940af6a1ef72931d3db17b92bb3e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541270cc00ae5c8049f093f9056e809e2
SHA16458431433fff28ce22e2d89d26b84e5a2050eeb
SHA25659271e85c91a599c11e1c47cd9f7b6b88396ca4d58b965e09d8d69a0bdfa8551
SHA5128bc7c3b6be95ddb703b332f27e4f10eab6569c1bbab131b54dea36608a22eda53b812a64de794c3130ec8f98e93d5c38a7b460fe215f6b37e2d3c27d5f484f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522eb80ad4261edd5ca6a6240222516c
SHA1953da3a799a72ba9fd06484d3204f1e9c59cf838
SHA2562be561ee8ed4577392e9980f32a8cf98bd737cec210eae836b04149d5b32cc92
SHA512679e0ba95a664e54d2c9592e500bc4bda8b49474e3617bca39bc1a04099d8ec85bca951e519f405f4356977ce44d7847b18c3b90d3b03d07c8392daa36bac173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ed9e354d43d7a1c3c01f283c7e2cc0
SHA14a506c64b2623441711b4a2f5fbd4ab3e1848587
SHA256de2da12c5c5f0f84f37fc1004d4f14a3f7091c0d44ca1d48976f8d57d0bcd77a
SHA5129cfa4e8c39da9ab4d7964651463e8a9974cfc6cedad455f5cf5a89c7dcbd6c3b595381e7fe60ef4150ffd6725fe9a02d3293cd527a740d3a1ed1cd61518b621e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e72e63c5e64c586f8cea2404a7569e0
SHA1d93783ce052e4eeb8dc9d03664d71a2d2dd4b098
SHA256ff06858a32839816e89e7509705605ec63a8130dc1a1b57055053c869bf50f3a
SHA51232e4f9fd68edb2a5db148aa7f26ca73a3e00bfcb6b6259251ba3752402761c57399bbff9e0b5132d6856e3ea8023045c2b7ffadda73d88342e57b92220d1b9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50d4c27a3c40f7577c63e1b7e1f7a70
SHA1e2f5ab1aec3d226be7eec7d72e03dc2e07d94268
SHA2566d49aeb8d4483c7fc2c62bbaeca8e581dee99cb0cb0c9c234b5098a7b86e8c04
SHA512bf8b0c424e7f0e398650d2629a1e28aa4e9534b4fc7da7a35bd482a6ee145857293d558e97eb76d64bfaa1b94c12d9584864553ed2a8cd235b636668c15dd86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c4863228d06eb813578c125418b539
SHA1d65e9a1fc91e91640b9b069afb4a7187c49499e5
SHA256581c32c1c6329d35116b7027cff0d3eedf347004ccbf5e383cd7daefa3755d53
SHA51291d82ec202cae1a3ecd525e2f66b6b0d517a360bb52db3f01c295c82d0a01544bdfa25d6ddff777a10d7deffbf4502a60c941957bd3ee1357847bd5705f793ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b