Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
d083a0f15ae0293294e4570b1b7aa9d1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d083a0f15ae0293294e4570b1b7aa9d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d083a0f15ae0293294e4570b1b7aa9d1_JaffaCakes118.html
-
Size
102KB
-
MD5
d083a0f15ae0293294e4570b1b7aa9d1
-
SHA1
897c4d6ed2aac50647686f2c230070e34921a08d
-
SHA256
68a9c98d1bbec24b7df77067e97a73e1a3086472d80bfc7a6668132703624c23
-
SHA512
2a6709ac8811e6ca047d48e920a71b08197c4f0ab986c34240ce37fc757e8480b554a3d713b893f8fdbfdd73083692eaf6f090734f842bb4974266ab04120242
-
SSDEEP
1536:/ggPqpp0jBVdUVVVVVVzzSSOOyyy66IIKKGG8B8BxxxxxxxGGddttGaa22hhjjZ4:/ggMpD6VxH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431821203" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D056CBC1-6C99-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a0aaa7a600db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000009702cce81df7ea5576be09491e5cfe56c3f4db09e0d4064c814d4b8fcfd885c2000000000e80000000020000200000009b0d6d9dab12ae274e7212050ded508df9a6c70739dab47eb86a83d3c07bc31c20000000b855fcdfbe42dddf83e6435ed0a0875f012983d3aebb41b3e048fec7adb8e75340000000ff0f73ecbddcbd37b85431ee638196fedf03192d3671ea43c0e35ae0aee06330e12dd074d51cb34f9b69c4da3d0557a8d809462adf90d279c5fbd49c4d8a7cf0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1064 2080 iexplore.exe 30 PID 2080 wrote to memory of 1064 2080 iexplore.exe 30 PID 2080 wrote to memory of 1064 2080 iexplore.exe 30 PID 2080 wrote to memory of 1064 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d083a0f15ae0293294e4570b1b7aa9d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ced50ff991bf595f61e71d39de9ec5
SHA1e4b6eeffb6aff55092970d997179e2238e901ae4
SHA25611c4bfe71eee3c66808cc2da44b725f89f446c5221a72eeb954d55624c5a63da
SHA512b03d4446435d39b06633b1212a16ef3405c8b5aef385f91902b34b32d381c278388e87bb7a6004355b288716e379874a718c5ddb2f48add16f24b0abfe296aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef130a9914374a38ba40b67cf4061230
SHA15c061f2ae078048ceba43c8edd3bcb8e9909d741
SHA25676c4e7db7d6b875d2c87747a159a9d966a2186305e18ec1968fa30bbb109f1f8
SHA51256aa355b03f94077f93b7a7d3fdb916057603f8189703a7545524c5c1341f825916c4fc0d56954389cf0e12b13c5942bb226b0c58b056686247f0683b94a1df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c05ffd71e7f24dee4d102557d306b536
SHA1c3bf1a8bf2c554d74ecc1b95807407476de06e60
SHA25672e0fae7c8742dc7936ddcd3afec6c404ae452f6cd9141ac0f0d29d0eb750c01
SHA512d446e8c492323ad52174441324d128b020011fd8bb9552c8ffed32fcc4c9f11ec0516b8ce3aa063e2dec2e17e4b2a950c779a91b319ba2a7555791454718d978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51984de3a41178db1e65261b997b240be
SHA1cdb4a208d1ab67e19060d868a770887107b297ea
SHA2561710876692aa62b1cc25412446f6e076a4374b1ee379fa6f8d81a1052df56557
SHA51205918f0ad4de3ae31a139d8b96c2114413c68f3d6a9bfffad29b7040d2f894308f50d23243c8f541159a836b291c25f50023b372a79f741d01b5a2938bbfd6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228287572a0a11d86eeb213fc338275d
SHA1f4ca981fe6af3b1365833a6c46107a002155c887
SHA25687d161a6f2a9cc3d744a30cbc851de339414c6459a2896d615fcb9fb085b6025
SHA512bbe9e850d13d5105edcdec14200409444470a8dd0e728f2d420344e789b267e41f2bca5109f09cf0fde6d6cf1124b29de205229f6fe8b739f4c12b5f80721e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503af843e5a3493f891e6918c92ccb2aa
SHA118b6d829e6b9da85823b4625a81204b6f93904cd
SHA256d70e4e943ad6f28bb50e9a4739dc412b8b55ebc38a86a314d060cce8a3c061d5
SHA512bc3ebaa5b70488f44383fecfa020d880558f75d9414c942a4c72f0405d61d8cfc1b15186d05634384d0f94d115a9a5c0c5d7e1fa3b4152b7e1c0f29552160f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e563e837d0888e0e6ce7377463c2af6
SHA1bd6da0434a086e09fa20aec94012111047416a45
SHA256a3f704939c49f594dfdf82a5e36a1f2f5e5cc46b8cbe2df684c3cf4807248304
SHA5120334b1ba391ad102c0a8e97c0bce80799de2f21d2b4c6448dab4174fe978fabfcc051ebbaf467997eafab3dd3609148abef4d3f5dd7a58fa86eb1120d5eae997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e44caa42d4193317bab5790c853f1b
SHA1a221836117cc11d27e660c081457b40287f24e58
SHA256862e432bacd42bc5edfb9aa82a151f363d98b62b52107e0b2ab2c9169abc0a6d
SHA512bc230538069f25e5e14625c9e10d58849dc04ed42427410ad1658327931ed28835cb37c47e084c8a83b21ec3d362cba49cd78a90e13373a718253d1e08177279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55934c602f3a14696987c83213ec50048
SHA1fe17d2e0edde2b08a22e8bf8143170e81a533cd5
SHA256e82f1308d84059e846035375452221dd763380b2e4fb133b445fa9ab51af87ac
SHA512825eb8488aee376312f810cf02b3dc74f06e170e13e9a59d6a1063e96c31895ff01701cbaae0fc25afef73b641e54c7d6a4b2942d6c8b91837025badafb845c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf52ab3f701cca2e0254d8ae6ac2f0d
SHA154bfc4b2cd0e45533243efbc51284afb497f59cb
SHA2566c4c36612241394a636ae9e03559870489eba32f9eb6a0fab328f56373630a51
SHA512d9e6ff10654e718e2303d0fe97ea23090a408068dec419db209a9ed007d494f3443ff3ffbb0e644ce78a846fced02fd213c3f579ed9991a3539f3101cd882620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741b0f728a9fbfd7687859048aa44868
SHA18b52e3bf3ceeac77fc219add6944f4120643e9b5
SHA256134fa9482c77802cc47a350800650e0753b5ba15dcd92720c02bba98ee8ec010
SHA51250d2b7458abac035c1b1e1c0a4dc1fae260799425c6b19f19207a9dc631dd2be2573eb989f93a0815d77a8a3f4fb58fe129b1a22e6590cecb145f4d0de0b80d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56edd2e34554cb7ddcb4dc976b74d48b6
SHA1ac5605d6896d35ee8c9ba32ca6b62efaeb8f8146
SHA256f23b54870b0d92a46a733068508c3881a586d35670aa4007fa1e819386f10547
SHA512b702c8522fa7c018553de498ab737da53a8e5e0aa8120a79f697e0b8037decf3adac11392f4fa377111f9ff1be28c478687cc55143d4c8ae1df4de0d2f7d78a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e356ff2b6206014d66720f1af2133e3b
SHA107dff423532bef2216e62566842a80cdb3ff4a28
SHA2569ffe78410b8a1cccc1f06885b31c5f0983f5c8095bbea346b61688ea583ab6bb
SHA5129a5103d0238caf245c2b44f57b4a04f9c36107887a7369e7247080e869a55bd6d71ba94f15e4032910bb21aedb1c0518780e1b391313a5cbbf469ee97f271d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ecc8194d8b7f7bf7ebc3845d04ab51
SHA1631f26dd39707008653a5f2590e39ffa009a4e2a
SHA256238f8a7d1c2bfbd2d76ae98267d44291dfd8b9b59c89dc08561ed82bd5f1bb54
SHA512517ccebbc325abfa70b850d42e80ca642ccc27b95b3ef0f7fe64aafc532f6c32baff513191a5bad4c680c80b3300313711e717621937b0f9443ec7c09e19f703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da3b39ee47493368266e01ea23cc023
SHA1df1b367acab576b373d83ca8bf16e7d0986c9590
SHA256cddaf59da90bce4a2c1a97df2a33172c11724e68abf9c0097b3026a245023346
SHA512e0aed5289a7b534cf1a36d6c6f9ad14d4e31d983c0180d9b5441b417c7348213f1238c8c41dea40fcfa707f366b786dad8c7fd5d5688320a5fdb7960a1e33559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601c628ea5c1272fc54e5bf6164e2c5e
SHA115984e74b9612137623d21912348673c8de5d159
SHA2564b67348d6a0f57dd6d63fb05bb0a10f69b70a9d1f07ac8e506d7d193b60a352f
SHA5129bc64c459f96fcf8ccb942260fd14a7ffc6fc9d2c7d90d6de618d22afc13a82b9abae6d29a6869932dc8b5c57420b7b44d456e9ae85e3a5d3449c18e6cc0f105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc9e912afeb9e25b5e3f725353cf2857
SHA13c893b4682f662a6a8151138c7ffd54411bd0a38
SHA2569946c745d135367b634dabc64ee997ed7db9d967ff033281bdc1af6222a9c4e3
SHA512c22130d6c27d7dc9e641c2f25ed4834d498dab52fafed649a209a40c097a6fd778de687a637c2ddcf23c83b34df30837860fdda6573f2f93010caff422187a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eadd84e88fc118973c9255f878c9cd1
SHA10523037119561d1a8d315c4a46bdf7d5e4a41845
SHA256b8bc88de08bab1c16cc48022e2d363497f1e0442d272674874fd77a88b14893a
SHA512fa3582bbffb2746383d376523d8be3be41d5e5a69db39b0e9d95794de107039ebce2e74ad686de858d7fb6333a0d7e9caefd9b78005b34196e4b6317b06b98d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b