Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
d091197bf8e72b28365de080fffa3c15_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d091197bf8e72b28365de080fffa3c15_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d091197bf8e72b28365de080fffa3c15_JaffaCakes118.html
-
Size
44KB
-
MD5
d091197bf8e72b28365de080fffa3c15
-
SHA1
a8f79b57e2968298004402380b2ceb941dad1f45
-
SHA256
4850a23a7aa88a4f8204f42798b3915414cf5bcd33dfa15761ba8e5ec4495a16
-
SHA512
8d146fdb0e04538fd7ba0f26e5c4e0de832213fe9c9aa90158dd0a652e96294575a02a55f4abb7b972773ca07804158cbd5429da83ee0660ca5c27f0fff3e484
-
SSDEEP
768:Zcd9QZBC7mOdMwVpC5I9nC4sUA3Gj96QPd:gQZBCCOd50IxCxUA3dQPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f0e77aab00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000093d6bc9ec63692d4b807fad240952592b20860d09aaa5bdfed989e9b8b0408eb000000000e8000000002000020000000985715f55dccbc578fc650828c91b32dcedd8afe0317fe9bfa447f25ff3b93f320000000f5648ba5ac201be72196a83a921ce97cd02a80b260a51eab81dd73ec5a386f9f40000000aaee371e398878d6ee57607b255f4a014dc369e7ad25a520a392a020dc823481288cb437bddc1d935455fe4352bf2ff5dfca45135f3bf2bc8cc802b20ad512e7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431823278" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A484F441-6C9E-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2756 1900 iexplore.exe 30 PID 1900 wrote to memory of 2756 1900 iexplore.exe 30 PID 1900 wrote to memory of 2756 1900 iexplore.exe 30 PID 1900 wrote to memory of 2756 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d091197bf8e72b28365de080fffa3c15_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c30e11b4edce0316db127c1723d97f
SHA1008c2702511faf9e264ed5f3c0ff6205677cd5bf
SHA2569a027e4b8d1244ef3a968d56420a68e3c430c9b8b88207ad5ac431ab4090cd11
SHA512b6203e4b0612938b5cb841e015d4529114c0e0493cd1cde67dcab2ed866acdca9f47c6b87d1c275f3241d62c0a55dc6cf6af1febcd354331a271402960ce9850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f241d3e119ec156effe442efc851f9b6
SHA198b39c9cbb666eafdd4f600a1bc8d2297900fc52
SHA256ad9d5ccc1bb1646b4554ac7c5991986a175b4d8ec56618a044951e4a15011c11
SHA51280e0f3cfcda79591e5646bdd561af1c5d8ed60e0a173a321a7c2cbfb26e9aa5773395e04670a9c2675edc7a5d99b68dac05e5450297f0ffff8c693c680d816c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7f2784d57a1b582576727e513edb7b
SHA13ff6e2ed018da62b64119fc77bee1e0b50a4f726
SHA256f49b2ef75fa71c35a58a2e1fd750f25cbc7b84a4690a12f3c11c9cadcd347dc8
SHA512135d918e0b2b88750b533fb7343bfbc50497599fae89ab5137d2947c7cdf3f27be0eec5e79de2bd14e976a0bd8f08b78a6055e2e9dc0236fdf61755d178280a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5750b432a85c5e2e4fb3a26a89b8172
SHA155148d1fcaaf33847831f36ed7426dccd122c76a
SHA25606b6ce4cce02ba7b3c7c1a6314ae6032cfeab9f4a0d59a3d3b06e289196cdc3d
SHA5121b0f5ad3fe0b05f329742e39107a8cbd62a4380b05829ddc66a5a0a89753fa7280efb5a1b7c684a258d56526f4ad3707c59e5b451f4e13059b24d3a6ea9d310f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d08f9d379d025f0dcfb83c889871524
SHA15a8f4f0027789ccc6a517b20233069ff298d73ba
SHA256640a99bbba897ce93f443057985461cc8d75dc1ffc1ea6aa2ce50d4d65643320
SHA5123c5f9f79ba52f9c3b33efd09b3e3518c4a3b6848e7046543c02e7ac0466625346d8da0e5f5d6ad31958fa2885e54f7035b83d58f5744264cac53d1a21204e225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cba93a7f034ec148964bba0bbb2eb96
SHA1d9a1a5872f7772ec41fe8ea7232c823ab03afc43
SHA2569e54a4ddd6b1cd8eb2504c5be92683241e0b65d2d3930d29964a99ea0018a508
SHA5126378930eea4819cbff840dad4e91fd56dde1b01300f3f913e41da7dfaf7680357dba4a02c594fffd0b1cc4b705d50e1627d987cd568841578fb772194965e3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d5b04f91c1c1748062e82a3e8933aa
SHA1896f36b2b533f87f9a6e51106865492e98470375
SHA2563f2b3754e1218a128d16d1e9925e4b9178fc4fb689e879eab3bd6f3a4691e848
SHA512c0a2ed7bfdae3f7268a4fb11130be05a190e8a5b0e92266df17401234ac4363f8adb3cced8bc09230c9ea34f04cd8a78bf398cd310004d23375795cb33748ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560aacfbb4013a6881ce5b9b5c7f06828
SHA1d35d5a3fe6c5e4ee8643e16bafde2b8573adb42f
SHA25687e19d20eae4f34e8ffcf533b43d2bc6d2508cf3f59552973e31b5a86fcfbcb6
SHA5124fea0b5c64635fbd6e19e7e3b9b14e35013dea04b5fc9f65e334abc1da42f394e07e915431103df0bf7f637b864f44867347dbe7ec0cc9551455296704cb07dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561944c3add18cc0ef7f0357a9ed43a10
SHA10a715c39f210b5576407d3638b3c4b039478b38d
SHA256377420e9906300af48d0968f172ebe1629133fce3144723df8f2bf4a2c75ff90
SHA512668b86ac17c70db439ace502a11d19a00dc8d23228bff2db7f2a25f87357ca21ba056beae28a73bc07c27c51bbb892ce347ec1a85c359530af2be1af7ec00615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d3e35b934a381544239134a2a43daa1
SHA1f3cd76dfdc5c8149f1cac1da2a3484c609ed35c6
SHA256e879dc87f6bfc34d3dcb15c562884bda77d81c96a3aca10580dc137fc0801776
SHA512f5f8a662a68a3c1fb0692806e275825606c3a5489a1e0861ccc4c4f8d5a5aace3a855c1b7d014c20241cfc956b88c63c752a3b432fa06bbe688e39c7315e953f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b6e2f2d52f788f9d57083351e9490a
SHA13b58caa4a47e164f5e4244418e9cf4ead3a573a2
SHA256449e9d9d9acb4b551e8e243c5b04eb4a6343a16bf85cb24644fc8199fdcf3b39
SHA512bb16c73fbdad13cbb20fa06c25ff45110ce0d0ff1853e0301dc58a806ecc2fe5dd503666218edbd8c93136f5bb17c264e9aef8f5e6aad95b722c1c6c1128b662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdb92ed419be4084580e0c748ea5084d
SHA1e0217c5a4a2c28fa9cfbf60b54d4aa1f0ca1125a
SHA25643f284f0cf145bd64a5f42dc655ed63fffba50203fc1d9efc63f9a5d811a9bea
SHA5120bc3a190b3b8719d4f22c57cd48d00ac176f75b577abb4f3edf0ad736b9142e3e25e38887e1aed3f9fc11705673bd11fc99df63e11559e7bb241b3a3a5cc4ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb6ada83ed85bcac59c3c4d2fc352ae
SHA1d084774de9f337844b97a6ccf65decf1ed74d5b6
SHA2560ea9fc77271e0a1824fda31d51829578a471e73acada2cd6e858c73adee3135e
SHA512d43ac4480c9e7fb09c80ae8edbfdb6078fceb3dcccf5210523cbb03f6a22f963ca48d90e945c982e5b4e4c721f9d1f6f7de3eda1ebb1ed83d7c9d7d87ce6eb62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5facbb5e4aa584b34e27d6641badff38f
SHA1856d51a84e7036e3249c9458fb9e0ae38b6794ac
SHA256e19498431265b4149db0a75158d66fd32d7d600e709c6d26f38e5f7739273ffe
SHA512db1287ed5bde287d1360126be3169ed6542387809e01d11e8369b1226deca6303647c3885d7f849d5f360c6a5aa23d364d2bece3ee6686e6f172bc1d3e8fd574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544913f60f4f3a7ef46832160cc7a2d6a
SHA1419310a0d5112209b518539ab6fb024e70bfd310
SHA2560ff1acbd71ec25ec048a94e95632c7b2d7b030f8f4945bfde8d25be365a25c1c
SHA5129360e61a287e60b6c9ee20a1deb37ae0e6a7287689a5398335ca88d13ce45867e22bb7e24bed150ccdda2604389250261f2524a51a1799a78bf7669b8b614f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518896bd85f598f4571f5fef02b828d29
SHA17e8d54fc24917aa7e1f8d5d7f895ec3312e3f6db
SHA256ece8bfb9674272f802e91a7a425aead576e5281a30f47833ae8536f5ce3b49c6
SHA512f346135c95f0fc2fd7ffdfc7700b3e421b4f544387adbd5c3e00fbde947e200431b53d1cbd918d4aec02896d8ede35668fac854d2721157b4eb426ec7d44f537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5977780a79e0722a0a207b95414e09fc9
SHA1f505f414da9ea279b7217ed65052b04113d4b346
SHA25671614bd5da2055089e43d3704240fdd9b681d702ab030fb19b0806c7d5050900
SHA512b2b12865871bc19ed3abf1b577828e723d0e8e44a789ba0358aa909a01ff19efd8f6b058125938014212a8f6876f73bfc66704a4d5942f7f37982d0b115f66eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eebdb3cfd6d3110547bd203b95ba3d46
SHA155cb0d91ad1aec442f8c32051153529073992d28
SHA256dcda59f831045173fe90ebc8f10f251b3c96b44b542d4bc3b07feed36b1000a6
SHA51203b1ac233719d81d214f0c745d88a518a68bbe9f55733a9c2cff0bd3183c9afaad39c605fe95eb84e4fe83a2e0f1f52544f91c580c309e973ea9d4b9cf5e9799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e474e9dc17076b9558f81af4ddcf05
SHA158c1be11c0826fcbe098b2cac1a6545efe95f450
SHA256faf6da25a626920e4ddedac4fd3e09335747a9e80978bc5b7f92578ccd58eb0d
SHA512aed779432ed7219b2a83a50fbe7473fe8b547b8c65eb6d2741648203f7cb65d8a37cbbe810e493fc3a573a4bca4ba76ed0a9fadeb3b3ed4dbd5173f79b2c200a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b