Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
d08960d26f0b118e1446eb584025bd98_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d08960d26f0b118e1446eb584025bd98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d08960d26f0b118e1446eb584025bd98_JaffaCakes118.html
-
Size
20KB
-
MD5
d08960d26f0b118e1446eb584025bd98
-
SHA1
974b3dec7332b3d13841faa45e29deab9dc9f60e
-
SHA256
38f0a57df01a77217daf5b21c29926a21eef08b3f19a18d69e951e7c866ef75c
-
SHA512
93b3aeffde7b4b563b058f5504f2f8c986a2a786ca8e24e753fd4ee8d95e7c3ffe2508e1d338b8a2a98d48f62ff81b0cb3c95b9df5024356c334337d5e73dd95
-
SSDEEP
192:kVaQUcsRB/pdewqrWji4tuaqzZ/qLcaKuEC4P3vrLOGtTwHUM6trf5hn41mMB+2:X3pdTF9dWxfMoLT411T
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603b388da800db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6BEE061-6C9B-11EF-A76B-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000297d1144a027b8ce7671a50e0e476e7ea08380ceddfc43ff484401a21ae382ad000000000e80000000020000200000002ee83c96ff723c9e209cbb2e236c7898cc039425469b8ea1cfb23d5e9b188645200000004dd271ca61b1b72208d5cfbf102813616b5222ba022797597b24dd2da7b7883d40000000a847f731e49d4c22843eb67680e2d7cc519d036045a608057e6928315cef45c140f51e5da5d0387f502ce5504abde71de2d05990660d9d29a9c28304d08388b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000c479e14a37875b221e077c525aa886779a48e4f8bdf9093ee8f25e1ed6b6db71000000000e80000000020000200000008d232757a51085e36aa15007c6c2e691610b05aa490ba2f8af7bc7db46f0d74c90000000cf0958a01272f724cca72843e4613e107c89b4b0319a3a854e878864e6e246f7b3a3c1e8a9c8c566ef7f5d93368891d90c08474269a6993fcabb81ec15ce7f22cbdce6679195bb41c86e6a06e098cf5f852fd4cb703313736573dc799e0ba95e312868ec835e81302ea9c4fef1ec5381f56f753cd30fb4f1c9b41e396dbc4db7af8312b4985e6313e4bb112803399370400000008697ac90419d24ca5be1e93d8a1e86e0d3a6162023538c1dfa76dbf17f8fad951b99ca4fd97ed69caf9f0634f9b57e63fbd18396732dca435d701fb0cc4548dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431822020" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2320 1708 iexplore.exe 31 PID 1708 wrote to memory of 2320 1708 iexplore.exe 31 PID 1708 wrote to memory of 2320 1708 iexplore.exe 31 PID 1708 wrote to memory of 2320 1708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d08960d26f0b118e1446eb584025bd98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa531e02500efcf8eb7ecaf7bd71940d
SHA1627e9bd89ea4d7158f76bb7e6d1b36e2edc59bde
SHA256d865a569def5633c9fe77e531d72c628d29c752eee98333087fa5a9cd55d3092
SHA5124b8acfd1206477b3e45bab169863ab1909eda9b6d1a69b384cbbf469533fd5db8530bb6c8a49faef9ed614401dc9fe48bbabfcee7770fb5b98825f6e4593da4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581be4161829d5274fb3b38b2aa72daa6
SHA1890e45a4de2330a650d007374b5f4ab9962b4c8a
SHA2568f144b0115edacb020ecd7ea52f41d2a22efb7b258756c2acda58c301b498aa9
SHA51288b979e802007814ed513a290d346678d6004cf222144a919d821cf907d7b215584b9cafcb0345dff3a0e9419c86633fd9bd2d108d6534427bf9c6a204b4c3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a4267934c6e96e0bd8e44f8bc9d203
SHA1286d5962a461cfb0210cfe5323b5686cd85c9fa5
SHA256c4874c2c0e67973fb07d9350eb470bad9df2749c68b1eec3dddaf51ab6e59a8c
SHA512f6168b04d7dcd880198b69adfe1f109272a8c062e70c66b2705f72359b3d1e0cccd94eb560688d78210813eebc610457343588769d6e899e21da0dba1868755d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521003d8cc1c7e84912471935eb5aca41
SHA16bdf8b8cdc1ac9ab150fb62681c0b872671552e9
SHA2564f9c608dd921ff5440dc65fa06f64d57775f70b265279a70f115786338121aaa
SHA51243b3414db8438bfd067e0c1fe0db3d26f643d963794bd25cb837bec83c0e406d6f543e64d7f3b648b0d64bc5ed8f14af67e42d106724d54fafdfcd72e3963d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d691d8c2a688291e0492a02fbd24e5
SHA16b4551749af0ab7be9ebd2e184ddd48e0f440418
SHA256f91f8d63401321014eb873e3df46ae3e0ce30cdc6a24ebbc716c4602f5e9286d
SHA512a3bb5c72afea48f8628d3115112fa3c14a918bf030021387545c29847cb65509b688b4ffb85b647183f8b619206c144b43a2d222687c6c1915b1d8474e420428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532847908a53ee8a944ecd234f5dfaa6
SHA1bb7701ade7c4f2d39a9140b122280376889d44e9
SHA256ca6760a7cb0fb31f906f245694eb9147c84e13dfaf595d932af626ae277205f3
SHA512e96f51b8cd185ac90fa46bb370364ad064142e3c8a98dc0653a54789424944e14677f013053451090e4910f1cd657335a34f31274bfda5b327bb74f347d71711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d636212f5783219d8886d37eca6fd715
SHA14bedf90f4dbb27aeaf3724eb6f8ae6a4d5966ffa
SHA256da2e6573ce4debe5c9c3bc34098d5bfa130e76171f99efbe83bf75a8208c6329
SHA5124958f8a63f2b8cd189fab478a595eeda9c5e3fcfffe4cd5e73ee069cec0024da303799febb39c72d1d9bb34fa58200290c16f3f39ff984ba23cc4a90732c774c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c5d790c5892faed2bd548c7960e115
SHA15b452387ce165dc65fe70d2707e95640c09460fa
SHA2569ed1f51a073c3226ee3008635163250728f01aa127003812fe8e30cd08c27d9e
SHA51257befa8c9176b2bc715049bc91dd4513d3bc9698fb7ed0ae79c9ecf4ed505ab29d07a73f3a5a319e6cdacbbbc016721815f10137b6e740b4b3c75991608d8d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545310c5ed14023e12ef1c7e798a4286c
SHA1f9e92bbd544b459bbed7e573462e595ea2fc4d5d
SHA25604f44c5dda8348a9c138cadf7fb66317ab704b851d6950553f94bf7fc82893f1
SHA512e6e6964f1470cd4316727c834c5f1d1260c87b3493be491b476d7fcf68fa6ab34cf5e6e51fac7a2fc4234a1790009f4861cbabdfadc299a6c660259248d60482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52316bd734ff2724da4892807c980c87a
SHA1a7c39f10dcaaa64c11cfc4dbee0e0728d7593417
SHA25676b6ab3aba62406bf47f83c5c9e10c86945ecb7ad82c464c8b37dffdf0187c1b
SHA5129156fa5a09a3aad2eee8c7ad4e515904683a1da74ba9b352e08e6288616b4cd10f488918c9a9e8dd778a5984dc7b8bd577bebd674f07b0fc26f165594fa3f8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53639c700deafdf767a60c3583c54c9a3
SHA19488865642e80c8c0e533ed2e7e70f5bc7f548ea
SHA256c9abad2b0bc47369de1d98fcec322d0673dc9522933a11a84847e15684cca237
SHA5127c80bdfd1b79c3c2968d5756e5b3ac587878ff2ba6aa81eb8575cec696e77b7371d785724cc24bcedb42f48e4485ba708293c27af983b96cc52174e4ec25f35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d25b61717c1cfc3c437e97973f5c546
SHA1b5caf05b2081225895903de70e35b7a2c3efba0c
SHA2564358609e397d6d5431ac09e97ddc23388c22bb2295d9afa58678660fef9f0c7b
SHA51240a1c0320748dee54f512836f0f1d4c3264e74e27c35fb23ad26194f02423a2bfd9706908e7b1bc1d85ce625a5bd0c72908ca78d60add74253bb3d5e90584a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b3163fbb2570f622d40084c609c43ef
SHA1bb96f7207afee1384b9776931d9f3b0770a24a18
SHA2568a2db05ad79ea428a078ee8782a3a6ecf80b11d4d687ddbc364cb4007b987071
SHA5124d268b5e927e8d0cadaaf32337645bf90ad5e3d84681d288619c1f9c0bddf92cd4099af2c1ccd0e7cc69e3a7091cdc7a3a113190b6d654e7d3ffad8e58a27576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50333e21c440b0e398f32fda459c9c672
SHA13da30221da8fe53c250313e99fc38e4a8bb8793b
SHA256e800c699ecdf39c7ad0b75233de8b2fdbbd733a42519552c098d814b0be7fe15
SHA5123c573e91477b16e47ba92e4d481798ae916a9a355b9979784756c092193220840231c4faf6d8e56c70a18f6c1fb245ab3dc7a82f221935489250312ddfff3aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf825ba0c0b4543f1e637dec8111926
SHA1f24c2015b8f80b0c076fa168dead83d033e69f4d
SHA2568c4ee13f1ea3d3b438567e47ee0599cf5cb60ea0e46eb1dd11123acda3b2f9ee
SHA5123d6222646aa3ee29e172545eabd1402a0e329720251b04c67bb2eec24e60de28cdec26c359d4cb36d59db1567295626b560fb78bd80ad172a4841c6a18e0be25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53239e5cf6f660d2a9384261a606466dd
SHA1a544e0e343acda24b95411c8ba10b410a19f6abc
SHA25625a6c435b5891c641ae351a6302783528ec52029cc567a448653f9783051b4b6
SHA5123094821d6fdf2df672fa0e0c6e34a37e81b8363491a8b2b337c2590a7812ca8b7954718a110ea53df09c063b63428b4b384db02ea8ef13e16408ea0283f27e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b328054fefde7cd625a3f43657793bfe
SHA1a3ea740dc38b7c2dcaf2e9850470a62348156f39
SHA25634adf7e62cd59fade098262cb9b3cd1dd866705337d64de7a6292a93b19204e5
SHA5121335bc8b43ae1e3ef5fa44e181b4f43716b1a90362fe6c605709d02e14f4184653d47c6b8a36e647fc6c69f48a1ed8fe3ffc2eda630ec701043f78a859639a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a7726cbe4262cb38411df2f5fd71478
SHA15ab08593a036b0d68d8035a5bf27fc2798ed31ca
SHA2560907147211d79df591b7f7f7e8d489436b202579966f048d3f8cf697db4af904
SHA5129cc86f78faf9b22d49d4e9641fd19fb391b6dcd272a3bf7ed89dd9fcdf9aedb8111eab504cf10445d628d15d43050a21eb1fb20e8625252aa26839e8a83e9df2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b