Analysis
-
max time kernel
118s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
d0a69c7c793453b4279a00aa65248e39_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0a69c7c793453b4279a00aa65248e39_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0a69c7c793453b4279a00aa65248e39_JaffaCakes118.html
-
Size
23KB
-
MD5
d0a69c7c793453b4279a00aa65248e39
-
SHA1
2e1cb4f8ff456ea3519e76a6572291204261dc08
-
SHA256
7463c95b7ef3a46a76a744fe4ba7653e58d7c7f556d84318ebca34381ef86ed9
-
SHA512
c1deb9d3ca8e758c24a1e023717b9b6badd6f43a688b4613e098ddb7633ebb83f5d8bd53168937589b822000a0e6eac8640d7aaf158eafc9fe9e8b32d1879d0f
-
SSDEEP
192:uWbcb5nv6nQjxn5Q/mnQie1NnynQOkEntOgnQTbndnQnCnQtBwMBVqnYnQ7tncYW:qQ/mT7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A091EC31-6CA8-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431827574" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d86183b500db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000cd3aaa934d185fb3cae3458dd09a455ae42c2f05645f88182b6967e775798843000000000e8000000002000020000000c55fb91dc15c785273c7ab49349c2735ffdc3527df92dd71ba6ea0adb547b8d820000000241cd2da4b48584a5438e365796f22959be19cd7951d8fdbd7cda180ee9d12f1400000004e6c9afbda0cb1a9b5f0fd48ce42f71dbb514492efaca52525cbbe269400e753d89d1b18e5516cf7abe79647570ad90c9bc297b229cee27932706818e122a955 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2904 2200 iexplore.exe 30 PID 2200 wrote to memory of 2904 2200 iexplore.exe 30 PID 2200 wrote to memory of 2904 2200 iexplore.exe 30 PID 2200 wrote to memory of 2904 2200 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0a69c7c793453b4279a00aa65248e39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5caadb4821b67492fc6506ef31e659
SHA1a4502f83a7a3cb880e4973b38ed963262db3429d
SHA256a14afa46701d4a4ee73730159a61ecab98e9a91aa35ffa9508b9ede8c61e4b25
SHA512f940e210330d845ea08b6d20205e01dc187f0e3f746fddb5d8d2b87934136c666c0f899da00633ced1b797e809d9e531dfa9f4044b7da536cdfeb7531073070c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a9280d6b3e30e908f24628750b1817
SHA1dafae3275c3b62a2d40e06edbbd2774a8dc84e61
SHA256180a11696180ed3b91cc2e4cda076249ce6542f8294f69de81a605e43e0488df
SHA512889b4f66697138dea809c34f0e8e7c29140d27a751210c21d3f75c3a066f5174cd4d7f09cf95f8c25e4bb6bb78ccf090b3f81c19871b410c41f00e9f6f3b77cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd1173c3083039d45c7a0796fb76698
SHA19e8748c638f700eedd28a39eebe850aaabeb3e72
SHA256f3d261f9cb7928a48b934f334584e7616ab448bd8622d31d094a5ad80b7cc2ec
SHA512438982be96f79b8306e224a981c2279b47294791e86bff271f6d3f2bd146a6c4b600fc6a3c58a2f72a38b441266f7d773952ef8aec8480167b97c1cdeca21eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb6225cd590171379228c797db4572d
SHA1dc85b4c5899c9354d936fb2104bcd4f7a1f3a985
SHA25673b891119d3d0c84e962aa5defee7960982530ab29afba9c1e59cc0c9c15c8bc
SHA512ecc30e153d2c56d63db8b0214a2fea3aba198ad192fe1c0b9994fcc5fe45ba11dada20e81664622b25f28bf1a9af6b88da1e88beb2c5c22c469b721cd3df8fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e18294c1f0a49ab1b304c4319fe3b0d
SHA1cb2af63194de7d7cc2f7141d3f1d3669ae94ef00
SHA2564369ec01dd110863edc929e11b97de02c3dc00bd9b32562b0c9618646528cb97
SHA5124224fab4c310c717732d8aa5d88a7f9019e98f373dae4108a4bd161961d382918ab29858510d6c96b787fa85cc33b31ff64d6ec655c20b7b9fbfc5ad7ed4ca12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53595eaecc36e8737a6432e8e6376086a
SHA17bce60086e5e4f24c1b9a24172eba8df511653e1
SHA256f9cdf73b5ca0845ffc8065dd02d913e90c89f7623ec467daec03c1f21021b2e2
SHA5121e4f8c4d33a3ebac83e0bfa50b9a59807533536c5ff1face4a44f1b1285c692ada77a2e79c9e2a505e6430fc16624c572126713e550650d8ff62d3cfd33a1e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6ac542833f2eb2a73e631c3024d9ee
SHA1f4810561842269ded5a1d9557aa947547e979ffa
SHA256c010a919b08a6c616720958a460f977d5b78c2035fd9cc41f692e040ab7a2146
SHA5120cad2623a2078085c86326d1c2b6089756c4c73488809c0189415a6d28c10ee0d1a882ba5852b059d4c80cef62ad601570a923c2c89e739a0176150bd9f1b4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6c62292789695f58ecf5134134f270
SHA15d0f6dc05621cac92dd1c1790410d919e68962a2
SHA2560ca0bb583d972c8b2d474cd507d80f629d613e81d812805346697426086b918e
SHA51294ef5cfc5064555b7400230d5e6a16bffec3bb2d77f23e500c037906b23ec2f70af030065869a0f20396b171e30b0c1dfbdf3b8e502c96bd6c8aca2f969eb088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9959f7dbff1a4d30180886af0a35aa4
SHA1541e3eb9402d7d22c9f75c378744a23d12ef78ed
SHA256ced823e518550c33b8059b7ae3b4bab8ecdf16eeb43e94ec615e0707fd376e7d
SHA51266b6fb93fcde3e36df2ca6a8556918d4729b30c13dfeefb36f88401dbf95fc340e92d7c48148ba33f437f8ef142b5335475d238e1ed173f73e21518cb932154c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d7c3e02721a70f450ca2dfe3d23fe9
SHA1640ecebf0050f86691afd88252d86e3b33d6f479
SHA256b9dc12146276978fa32bbc52a8bd72129269530983b06219d0ec836d935c3ecb
SHA5121bb203c67855bc019ad60e6d5778613fa9091284480db876a20910602b9aa20019093317ded4c88b3369a540bfd6ce09216c0dbb78c44c641ad031a192a4b6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a69bca0691bc2bdbb033208b8988b3dd
SHA12a9bd0330566c9d0f720fad3ca00335c76713bd1
SHA2566ccdff0e0f1db08103eeb9b7c6fe53a6908708bfc385629aefe345f2c097f86c
SHA512fa7829e62aa44e3b4131046fdb01971ad84e1a9f55b063be551ca11c3d1815a4d13d329921fc8031a70962ed349822d8f69b19f294df067eab22f2afce5d2dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530db0e7751729d8c2ea6b3cd9407913f
SHA10bb8e82cbd35416d716ea94eee1f22629cdab3fd
SHA256c92bef99fb2ff9edd111c8976ec0526fbb62d480ef3dfffea75bffe6be6486c8
SHA512cfa49db63b753051bb85ad6129c225b279dba9938ae900004301e078774e06bc33e51c4d9ab8992dadedc987ba6883dd9049dc192031f1f8643fede5de9d3baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552741419299b7a3b3fc7c9ef9ad078e8
SHA1bc24374397890c4b7482165dc7912f72d3b868f9
SHA2560121db15bf1cea256b9e62c1742c6335ace08ce6cd4a1c89f8d6347e7ca0f010
SHA512701ca139fa211bbd9065522bd8b9c71b6d578093809d66be7f43f2a1a035d43397a2a450eeafa78f36c5a10ecb4fbfec02620262551a7c044bf0816eb2505fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526911d4ffc71f030eb5f96e3930d2f9
SHA1ab58b05cbe066146c3f896aa1651098d36d65420
SHA256b5f0be9ee5113f4b487bd85197fe5cf22e17b49b229aa93493bb0bcfa48d0d50
SHA512b6f0ff22f7166826388395b3a8341d3ae75ec0f03b92a8bf8dea0e7485b7b7d19374866538b2ab49a7be45b2520afa78273a31125fe7536bd8473270c2493e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be0e4ac23d2400a9a346979957388f1
SHA19b136265cb5727c1537a9785d05b666e01bbe8a8
SHA2563b7d66fededef11cbc0f069c98a80e3e1a860b0922a8bc008f1f5ceb4fd6489f
SHA5123c5c05308569e82fb85db1e2e3723071cb8c44882fd558a87987ef1de6589a9e5ca0ab65af020658f8b6390006c34944e286b351809ee1dc9d34b110f312c663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e836921aacc699c6e10618daa4d5a4e
SHA10e38c4995cb9961c98ea34b5cd0e75ea5a358128
SHA2569911945596e516e96fc0324c40b3637b2648a7723495824dcdfddcb4cd968b28
SHA512f5733f5c896cab8429850dcfabb0e67f5085665d77257083a75e256f8fb623e0ac2261d375919b27eb6805a21fcb93e2d774d35c0d6a08907a9d11c44633ae98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f12d9919db404c7b06c68b04747c535
SHA12a7a27d7a054ccadaa3641a5cfb231ea7fa64769
SHA2561ecfa59f4e9049a640c2c8c6ca1a48a064e10f9fc0fed34bae97c64dd4d5b92c
SHA51209d181cfda7595301c0476f9bacc65aadbc86c3620f87fca2e9e22cb7a5cf9d972b7c587531d08deb20012328833dcf562f43fcc086e6cd2b1e3d3378cf3b0ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a6f1c680f7ab42c40b66efc5f3259d
SHA135593516e803fd432b7d0321b87c226ad4e16c13
SHA256961c167b637798334d4dbb89eb61edbd2767f69709799fdc9b54600e4d3e4256
SHA51217dae0f62d64c5b7e25e77762fc6fce143ad563e8db50d4938a26dd20dc2ea028fdbf87836233d8fd7f8ec51b77bf0b8370d641e6903c8067ada6a827b172151
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b