Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
9f0ca59ac21cb605e6239439c6e4638d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f0ca59ac21cb605e6239439c6e4638d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9f0ca59ac21cb605e6239439c6e4638d_JaffaCakes118.html
-
Size
8KB
-
MD5
9f0ca59ac21cb605e6239439c6e4638d
-
SHA1
cf1c581ac8f00c6b83101e6cb1c421f98a293b86
-
SHA256
992018f9f59f4ea68c887a65ee28e17d25c8ef9d4e9875f1f4e03b646cc5e0d5
-
SHA512
560228fe817dfc93713b3f11be3046cb9459e343c8fb8bac67947d1377df71f31795d8d70bb59f976194cfc24418470eac6aee8729720dfe17de715eb098ae57
-
SSDEEP
192:q6AFr0Su5SoSM3B0YsoiAURXHj7hc7jHhSjLlj+jlxjt3iJoaf:QFr0Su5SoSM3fBi3RT7hgHh2Ld6vfm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d051599da23fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438746390" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a2e23a3767ec4d0574c55fcc3c1211c3b9441b41f6a5fe579b2405134722a705000000000e80000000020000200000002dbba1126f80c3928d210f944178eb26b67b2a0892fe918752d41ecb292fb98a20000000ede550fece201c7399ee666150ec95ea44c397622caeff245f4bf7b1622f0ec740000000d4ffb1a5b0ab456bcf03cb4f4a04ec44eb7c1bad56c5ff7bbd4e66edac9794951c0e8668a8e251365084a45d6c49d76ec8d8acb49082f9b3227383f9515a6799 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C616B361-AB95-11EF-B439-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1740 iexplore.exe 1740 iexplore.exe 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1740 wrote to memory of 1168 1740 iexplore.exe IEXPLORE.EXE PID 1740 wrote to memory of 1168 1740 iexplore.exe IEXPLORE.EXE PID 1740 wrote to memory of 1168 1740 iexplore.exe IEXPLORE.EXE PID 1740 wrote to memory of 1168 1740 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f0ca59ac21cb605e6239439c6e4638d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53242f9abd4be029cc0d9987ffa88e1bd
SHA14c9a30f0adbf8a108cdda6d118495a9dab6d5250
SHA2565f92180069db732b6315b7c4c1e9411fd2aa09d637f540b87f56e38b5d88b41d
SHA512ff2b20ef2e99d0417637f890707610eff2d3576a06446b83472fd8cff4d102fcd829b26f32a3e482efb69dab9bac4f297ac3dae18dec7c51200a50351957adf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fcdce821d0fd564e5850b5175c1f255
SHA1c4f35f6ad11107e0dbb421f41f7f57c455fe359c
SHA256b6b1622df5a402ee117b87ad344fafd72c8334d3b91bd82e1d87f3a817486d66
SHA5122e0f2f2f3ece6a6422770059f6de5bf674a274804070259beed7c23b3b3adfea192e999c28539cccfc5cf89e43560c9b49237003fd9b429e5b829803d939811a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8149b6570f793352ea741516c527f18
SHA1e6282829fbc3652b0d5a88756b61da8c04af7471
SHA256be4a4d62ed0950b990a57c8a70bc7ca1888bbd3e4c9854b8303e92478e70e87d
SHA512d9f947e6c72776fe0089ff58c67dcaf14f681396c4b5e5c0433906b616476c024806a729db5ffd6f1d7caa3dc226156fe621173bb7476d455c085c3d58a42175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b67ff5dde343fd13a670cf1ab137cb8
SHA185439831851e16cc8c477c3b4a9a202c2459b93d
SHA256fd91d4648be176e95524096e35d75ebaa3dcacf1efe9d1935900b6a192c2e227
SHA5122bf4f861a9e69dd80c56b97321002d5762eeaa61ce0b298625871023964b437e6c9f17bfff745bbefe20c09e97fa0736dc898140cd61963ea4fa5c0d32ecfec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f4b308ecb05fe5e3d4a21da173f463d
SHA19cbf2c94235f42252802b044b28c6601b018a737
SHA25620e12d875d6bd7bbf38aefab657f0d59257b21056241fabb85030a8915a40a37
SHA5121e2c84b17d3d47f175f591a221c94672a088168479a10080d16a8ad7190015a1907d012ae71deb9cfbd0c8bf04bc7806fda9a7f565b1d8dc4d69c013a436f5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32846847b777d26b37742072ad98efb
SHA10b9557401c288bc3a45355dccd5ea4bdcc60cd89
SHA2568fe74c53201dbd3bc88b04cc0d9f9c2f89eaa613dab8193f692a34858dde44f1
SHA512951c5845397dfdc2f4b213d7dcd962ed86a6ccfb47275f4c85ea318f626a51f8ca0535e17dfce492282e7c7994553f3086f2086d187945a9aecae70f333199d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ecd8970f6cbaed42a64098baa53db5
SHA131c157fdf9c84762175998fd668ae7fd78b1d0d6
SHA256d15742329dbf68790712790d3c23495bc2fdc72e691558d76c46ee445acd7528
SHA512fb475dbda94bdd1d26d78da5687ee541f7cfe63ff188b03e4a432dbf9a4f4a3f5ccbe943339b5f903e42ebaa037d88c5bc27e427611d68c8d08d9f3cfab5566e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f9e996610873c565b3a8cd586c2f553
SHA13dd0eb66379946313f9ec2cda2fc67b8844e58ff
SHA25665e76bb66822409ae26d1a569e2484c629d4ce955e6ca021c707f9770d803017
SHA5121d1012841bded8fd5aee7d4da12bd78e397e7b603c75e00514b1d1dd37e512440dc445686d28a79b6403b8b086a882c6a8fa9f4c6051e7082227f6975a5c92a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5911558c8edbb7f3f496124bec87acfc1
SHA1ccd781a326e5db78000fcc913dcc4b3bf8ed4167
SHA25631cc267ed204556e497d92428566101268222789496553831271643e02329006
SHA512785a25dc15f872f5c890afc6fbeebe6d8423ee75c5b5198b9a9c7780412d63e5876eceaf0e342b5b322df020a35c6d831826e6b135de7717a9f114441d6fe88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde8356f5fcb808a39ddffe27853288e
SHA14bd2a414731cf9b1a3c921b93036224e08058cb0
SHA256acd0a91d53bdab63b6ca674a8f93ec2faa740471701961817b5b4178515a375e
SHA512969dcfcf20208e9b988a8481531d155553bd6c03e6b66d6300cad8681415914bb96701424576643e3d2678e021cfae851ad91942ad9e5ab54b23e6c29427bb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96abd2b23964047d9ba6b4d6cdc5714
SHA1ce10a8c0ac9cc51f55a1b5234a802554041c23d6
SHA256cf04616e8071e3e244403745a6a76cb1a2fd4bd3c7d5de03af007feaea1bd04d
SHA512f66fa95c77ea56b4417d8117f0a50d09ca2cb9e26138249716ed91175a5ad425895b67f99d7c2729f50714f3d9c0cfb5eb14b96b8ffcb4dca30d3ccb076fb49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3c433316e1fef5353e18f362ebbf4a
SHA1d0fc6cf999d109795436d6a0933f4b434d828441
SHA25656a980e54e9efc453e14c9f4b4819a9687c3176ac2ad2d17fa9528bea4905c42
SHA5126413052d5772a0d8a2de1bad446df1b1b28a9c5a22106a0ae0c41ee7f1d2d710f5f2ad3e1cc991a44bb0cde2817cdd86837accb28e92108b11539552886da279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e3cdd89818652b16bbddec923be2bd
SHA1c8bb08d57a83bd5d556ff74e3e8c5f532430adb0
SHA256f17e610e2276384e6a3838f61fdcb49a40bc620886ba1f0089e208a27d0faaac
SHA512f37ab8284d62a309bb77f6991540d960e35418c19710eaa7992ea197c6e8343df82e04f18f856e8c38f3e68b084090abed5c4c5556ae9d77878f0c14b6c0fa47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c94ab6c3314f76fb6a2cd93c7d58e4
SHA14227f513c6b4f0950e28097bf83abeab81ae4ccd
SHA256b83946461c53985ba31d161f625d1c68105dcde1001fbf6197b898cb77b5ad4b
SHA512b1b63f187a9526741e3054d02707c3c25a1649f69d08cc4492b87aaf20cefc1cf577c0c5fd6dac30c47141d4cb89a50375f57ef9d8f23100800e49c44eb4b278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf03a42fc3b138583c37a10dfd3177c
SHA1d3dd5ffeb03bc9c659e3012795d5f2490fefcd4c
SHA2563426d314777fe6204d06c48f3ac42d63172b341451dfc35d82afde8f2438d827
SHA512ae8deba4418e6764acd254bafd8969b0b99ef180ba3a5f3469b83e345e2ce58dfd77bbe3d4ee584aa38859895820eb8e093cec512bff6dbd1a458bc89e2b1344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9b8ed68a139955dfb90c94838c64fe
SHA1f2ae73c1f583d418f60d45e4417cdc30e854dfb5
SHA25619d1885d2d6d3adc2821f9b56c92e0f243bc9ca9fd423b8d8dde4c9266047464
SHA5125b69ff91660d0bcf6dc5a92ef2142936d0f86106f8416167a44ce5dec50bcf62bebdb37fc4a7f3bc2073ab27144c0de887c0365c224ca968b8c253a694cba668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd5b91a27022161234a3ff81ca7e476
SHA1a5b9542d2aa6032a6d90e05d32490535dbad1301
SHA2565493698c848edd98c7312fe4e36888140b66c82e04cca0fc450e52d8775a0778
SHA512331ae689363b8c7a0fdd17aec441fe1d894e673751d089324985975f66d961ab9c636b1b930de9a83363629027949033cfa5fac6369202a00a960896834076ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b31f678ccdde01a8645a3539f617b69
SHA1a2df60f4925a6655ff59766ab719ed1defd77a8a
SHA256815525787cc34e2bc9f88434fc4bdf06f256687e4a55e716de39323bbfcb10ae
SHA512492bef37071885680a85007eba070848fb1ff97cfa6304a78cd80bdbb3b336299b11f3d6acbb0ef49693ebeaadfb2d81f9492fb87b7d098de576ed3c2cdd5af6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b