Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
dfdeeb44bd3173dbac1bd8bce6ec4d7e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfdeeb44bd3173dbac1bd8bce6ec4d7e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfdeeb44bd3173dbac1bd8bce6ec4d7e_JaffaCakes118.html
-
Size
72KB
-
MD5
dfdeeb44bd3173dbac1bd8bce6ec4d7e
-
SHA1
dbe368627613027a7908cc3641fa920507db8ad1
-
SHA256
cae1035e202151d1ba152d3767a1a21d856d99599bef5a60810aa149380f8d18
-
SHA512
a34c0295e5546a5578e63221ced4c4e7fc36dac1716521bdc8e283c9c15d9f3fb7bef22a36ad65cfeb1e7dcd8bbec52714e8fbde7cd98e3f25dba062a5a9aef7
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sL6bhO2B4oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J3ITzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000837bc6f7fff0ea16e975211207dd6795427d510f1b905c56ac46927c57492abd000000000e800000000200002000000070f6e02b7e4f7fec0125456252ce493dfe79f3043c9b8db838309e15593a456e200000008b79cadd2eaaa53c542a83853dde0b02e73af956d7a74c8259f584814370737240000000d7d2fe03ec1345a2170b4d4ac966b5055d027a00804295f1472306ab2f5bfffc0e3b2d882e69a8da660fb48beed4e8b8f65740fced96afa2beac62d023031964 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09872321-7278-11EF-B59A-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0efd3df8406db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432466403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1336 3016 iexplore.exe 31 PID 3016 wrote to memory of 1336 3016 iexplore.exe 31 PID 3016 wrote to memory of 1336 3016 iexplore.exe 31 PID 3016 wrote to memory of 1336 3016 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfdeeb44bd3173dbac1bd8bce6ec4d7e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867589a03b31b74f2314c6ac8f3597da
SHA18094e156ca87612ab9d72491cab3f88d32f571b6
SHA25658c63cbc07b80c5234dee7d5453d4dbed3c4c1837a248c269da252b9da347f51
SHA5126ee18985ddd80f16a7e14780a1f3d977c0d9e839a19aa6fba0c3f7900fe656f696b33d19a5ee4e2cfc6387782efc133e431c41766396d85f1db73a25aa28b4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcf5cf2cbbe3c0f32eb1caa36e8a746
SHA1b947ec0391c56f3a5184c5ddcca55dc9464a01a7
SHA256d24d5b862e34ab11babf3737c796c5a9ebce531e84b83bb53e9315276d81d0be
SHA5121eb8474692998294d21b6f5a8ac06f91d445105810186d9d37782de1ab5971c8eef1026c7927ca673e4efa9dc29c620f9778a183419e3fc2b7ac6592a5f3db19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adacbb991173e558ce52c3dcf32fc564
SHA1fb162d81c876d1a7e949b20ae6050e226ff8f2fa
SHA256b0aa98c2fef75b9173e6be36c977d63052b187cf5fdead6b5e8faee828a96be0
SHA512e4a46f2d6aa20e6768118ed72e314893caa29639a77a5eb499081155490ef36e0f51d0932a3cf13e8157975f3db64f5dc7d74ae41e367f59ea3c0506623ff199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e853ec9a5706f917788e87badf1ac3ee
SHA19d1b5bc5aaddeec6ea3d606ed0eb068e21026e0f
SHA256e12af406198fc3792053d9f854f7f6cb62272cc1f0c3036aa8d2799202456df9
SHA5124c10aea9f09c78a93432e8ca4d0856efc96d7eb74223cec5477d51d022ec9ebbef5322906c350958748395fd2696095736512b64f44179ad5fef899d5308ceb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccaa03ec89804d55bea92db30ca2036c
SHA1add42f070012b27b8f8c029597446d5e1e43ac86
SHA2569b919dcc44e76ba2da5fa7c3c2d9b52f9cab7d8efbac140ea2431615fc53160c
SHA512d3f6f4a5357125c4d612a6b8f9e19700541b57a9e143defb07abcc3ed3f9cc16b1982749d37799c29dbe53d92e7af67228d7e4fe79a5ba6297fd098038e4643a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d830ebe8f71cc198200d234d2fb4e39
SHA1698f33ab6f16c774dbbabf6e54923d0d49ee88af
SHA256aef95dd14e9439f97834d83eb8cb8417535bf4052ba259b2dbdcbac0fefe552e
SHA512d10e8457a44a43c720facef7877adf78a46b33f871c15fc3e54c2857da240d4b594225cdf1e25f4c50697c522ea9f46266cca99d3df9bf89c1bd22a9870b73ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dbf271a0a67b4cdbe8762a18afec30d
SHA1ba683f2d1734494ef7ba812dd1eafffbffbc495c
SHA256629e699df109c063601f5218172f18ed2fdf3bf3b893a3aa0a61704a3160cad5
SHA512bf1b1ac5f2be118ac5b107a87aa5f6a65fb211dd9b33fade26ea686beb9dbdd665f1a383ad53f5d3697e75506e1f2f78f695a92714658552d6ad0ad3a5806af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9de3abc141ddfa5162432417871f9a
SHA1fb47346e141e17bc14a9fff8e5a082260af79523
SHA256a0a79f89f13e509670ac04192716a4e922bedbf4435eec9bb58b5bf2a60f9e2e
SHA512cca54b063823291c60e338e551c0a9b8d136687ea911e0ecff47a9d93bf6b6c4216958cc3d76ffe08e45615a57d948d6bfa8f9c252d0f3e5acb756a05d41ec16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25adc4ce55bd8ff92b1f05d6d9f1cbc
SHA104aadefe99b967f14e313a5bc17b5c9649c3f029
SHA256cc82306558a42d276b342bed516d46175c28aa18f0d5b5e04e3655ee85d4f444
SHA512e2df1b5ad0865fe28e998d5bac874e6f4370636238cd475ff84f866af968dc267e7344d5ef76bd24234a591bd76b71420b494a1b89c6ee1a739431a54c79c00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3fe15a8fc284676eecaec592bf2adfa
SHA1d66735a3b7007cc385dd1963e6a7671118f48a69
SHA25607df62dc6d212a20aa98b88ffd3cabe659a82ebdd402d4644708aa36ad22b8ba
SHA5123b9f475d9a3251a400e9af07cc1d2df25151874216799c3fae005aca75e37d38c8fa3428de0d01e3c0c6bd042229b3516694d3e0b0d2779cd2e76334d2f6fba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c2aac814f0caaaaf7e7dbac2924dd6
SHA1026e607ffbd6f00831ec4574de4a4378ca372d26
SHA25651d61b05b53218f2466925b00ed8b07e13e9028a60a6f3cbb231f94f27440869
SHA512c5b86776fe7a38940ba55fd7c80a6345e5b767e63dea6615dd203d7bbb7c05c9de5cea2fd70f57cc1c18006385e69222c6764d59e15e3ae9e9058db43122fdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55339a1ced0776f7fb266e5ef63d9399d
SHA150d05a612e37ee05d19eb8d237f7c6359d646538
SHA2565a83491005fd96c669c668274c75b48bd82ed377d4aa61ae87a3c869a102b0f0
SHA512a686612e6217abc2187e2ebdb7c999652cb0a3066337f35077d6c3c768af85e5db197a16ed997a654004a894f53b57955b226b17ea362569ceb103d85b787442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c63e28d0bf3858e70e911c8846724a9
SHA1f747da0b3399efa8f0e86744c8030ef3cdffe132
SHA2564623d74cc7d5a9e9eee54db35d83c214f662707777548af50a65f8b4c3b31692
SHA512bc31db48b49cfd3a6e33d181553b943855109de9bbfb9b42d27448802e3bc82b7c57bd11f7238c8a5847de034addf127739fce4df7fabcd4bd8b9c43828f94a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a57d914ee5c69453886f61dea6990fc
SHA168e965f5d8377ec17e45fa4c76a1f12793f980f6
SHA2563cf9d27e56900b91ba6b69449fbea2753f414819bc8419c34bb2b240628e6295
SHA5123fe0b5eb7e8c69972172d2a566f8613e4d7e06df30703d09d5b0a3cb2eef814c9c7f1ff39b5ac35594bd0b75da2b02712ede59a45b3f22f7bea50eb9faa2b538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e918c7ffbc4a4e9ba3e83218b32fa55
SHA18384a362b7586916c9e292ec3cb8f0457bbdb84a
SHA2564ea056cf2249878ac7c8ef9266fb85ed122803b375b2c851ebfdaf772cbee0c2
SHA5127c330db6addadbdbec145cdd1ff1d6912f6ac8a92fdcb3d71fb54964ca9d5fdc03eabc62e390c3ac03b733da12eabc32db733166d898c184caa560eba081f4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f880d5e76411088af5564ae7a920786
SHA1d6a6a13180482c341515eef687afa6c6a7a6f051
SHA2560c6321b651ef31ad45c60f99dff1f4a78623bcabc5cc34bb72d900d8abec95e3
SHA5120f44b3f5063f103074cc965221c3688a92fe0a290ca00f0a1e6c0f83605bdce6f9fb7c3db59a7d37c0280893558442f29f3ba602e666639d0f1b0773a9c2be51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b80413c5b67f715e637c4040d8a3d49
SHA1b7f69149e97bd6fc58d512d1129a5f64d0ae412c
SHA256c426f0ffa5b562c0f66dec948a09b8d10885a92b5eb84de8172bc00131a0b05c
SHA512ec1491ffab6193f3428ccc88686cbabd2ad4d302f4cab9a73d019f6e0e63a24772ce5dd3534c1199a6208969dd6b16e25a7f0b47a9dcb8f62615d176a03dddd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5316b7f55fe0f98fc336c087d5b1e9b79
SHA1f0792f7120d436cf36b3f98962d0397d8bfc29aa
SHA256e0a1ee211d7eedc0138ca950560662ce3d25f76c0ad71b463c9dc7a4886132c5
SHA512c84e80822503a16f60dc6f854f25beffffe6c6fdb2a377f5433a7b84712a98414fbae8653ee89a010e846481ae73250fc47bfa9e1b336a073f515af887ec1021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94095759bca8e4dcf675e05405515ff
SHA1d18231e1e92e8742cfbe449f43238e7398a8b7f4
SHA256e6def2c5d7624dd78060b926d310c2d9d68e5a87ee37fdd14b40efc85e240710
SHA5127809b6f8e4892f1bb39678b27c7122a55d0fcc06da4adac03ed4a655803106a94bb13bbfa6d9992cb0d025d83dda9087bf4ab162ec32b7ef39b38f69d400aca9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b