Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
d0170f08187aed73dffe67e2ff49e354_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0170f08187aed73dffe67e2ff49e354_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0170f08187aed73dffe67e2ff49e354_JaffaCakes118.html
-
Size
29KB
-
MD5
d0170f08187aed73dffe67e2ff49e354
-
SHA1
58ea658fdaf36b8e6d4a20d3782fc5e8652400f1
-
SHA256
3ec4501e3974bd18392d36cdc63d8959e14104decb1c05b29856e13c066b0f66
-
SHA512
6cdcd5e33291a0927c1639d72897a150ead2e582fdb856d15dec9cb8c4f52b4a5109004abf9b97b943b7b370e2dbe2178877f73f1adc0444e73ad4ecc6de2d1b
-
SSDEEP
192:RIxojfib5nGnQjLntQ/unQiewn2nQOkrntInnQTbnonQ2Z6yh9HM8nFnQ5AnYnQA:KxoziQ/5f6yxCP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000003e5502d4e773f8a0039031018719ae2d2c41a60edc56502e7a153ca600f42311000000000e8000000002000020000000af9873b9ac746c6ad0c391e38d8e26da831387281bf6d79c18366c0318ce24ea20000000ef0787e64d2e1db65c9cd6aee08071b85084db6964c16aab7da05cec6b50d1ce40000000004edb2ba4fe14b1f05347891091de5f7b47dd9d191141ddf7b24c28d9b23c63b9e37b551ac6d389b69bc43368c69d8842b25da62add1100959738c82c8340c1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431806044" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83163C61-6C76-11EF-9C13-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907d92598300db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 812 iexplore.exe 812 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 812 wrote to memory of 2500 812 iexplore.exe 30 PID 812 wrote to memory of 2500 812 iexplore.exe 30 PID 812 wrote to memory of 2500 812 iexplore.exe 30 PID 812 wrote to memory of 2500 812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0170f08187aed73dffe67e2ff49e354_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a577d2b8b580699280a1408ab8b449
SHA1c8e5976bb8421c129401721261731b509f948b83
SHA2563b6e50edcd5918e175ef02bc34357d1c1b4e81d7e26d60040451157463eb2ccd
SHA512252481ef4aa58f42b645ba8b53e85ab525054ddd03e64af05ec83cac8a6d6d829dc3a941dc3fc689ed59c165e658646255e3e0a8482d35dcf2bce11cc5e1376f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998cf11016d441af610f3022f0c04093
SHA112a2981c45581c9b1c5c1a827e5bab1f2e8e0243
SHA2563b87356eca9169c739fa09fae417b8f33dbf3df3f352566633f25cd2821bc356
SHA512db922cccee7da7e5382712c73f78a9ec1438d88bfb0f4c5137fc4df97da251f9312842f4a45578d2d93f6279a4da886e2209d79783272a1848de19be6d0ff6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ff4f9fd9d3882f6d0ed2585c63127e
SHA1814d0349aeb28aca24f320a32afaca0c16e7c029
SHA256407e83d039194b462ddb64b277cad652b4619910c967c54ac355f5e703f4e3b5
SHA5127058b302ab28bdd4d3c87ac82e2bc235fff8c7068896667af1e43d7f0b76f6a03b5f97ca51a979adc1ec1ad05e21c98cdb3e63492de7a286e503abbe37ff71d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112e36a278feda82079e2f21435305bc
SHA110cc1767476df0dba9543f6f4368322bea4046fa
SHA2564e73dc9f57d14de6b9c18356804e7c106511ece4dd8081d923c308d165b6301e
SHA5128bed70029d440f3ab170bbca35d0ba59b0d14b97b21b3bc7a8f9a3f3f58af90b04a35ea00ea463689352cb348318480cd7561cef085749d7f58b870e48f7e129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6fa959e0b0d9fd0d050757e52efa82
SHA142d6c7e48edacf2985165a3b3452063f6a40c712
SHA2565059a26ac7d9bef2141549614bb571624075493d58599f6e6a5e59955617e385
SHA512279fb6e276b16179ad41f1325612204925136a976860aa0833ec1e3e34128f0f0ec30991e095b331583d5c5c02ff571660f9c1ba60e3ac47ff001f69d43573b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55961f88106a0a3645a3998f286f34171
SHA1e5561a5a5e735d917855981bc4a82e8d7a226cb3
SHA25653e4b14c826c323249253c638023b08ff155b7724a149b947fdc0ddab032aede
SHA5124797b545c9de7cf4b406e6639322f8ba2d32c8ee6f48f30097f3cec409167ff36c3535a7c3f51d7137c6f5d5077a4292da9b6b8eff9ed4d7f8ef5862d566d51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9cca11660602fafc29d0ca7b859e1d
SHA19cf8af7a5d8aa5dd5eb59d57303342ea2ccdc263
SHA25649f6d1acca788a60be851867b12b92312916a9d6ff2dab346e001de38cc0e31b
SHA51216f486d5eab3c366457a5639339adc9784ec73d48a44e53f4c399584a067ed5af3870d526e6db4b73bdc837b76486f5f4662d9ebf70d54634d1809d38739dffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc0ef4c3d4f55d036a6d3292d9fa9f1
SHA120c7cfeceeb950c3582a68f35cdf1159f2d26829
SHA256590902e442a31ff357d380f01482ec2298324faff4debd49e836249dc2df52a9
SHA512c5da7eda582bfd16f85f2a9e5b24277d1f80db46100548f799c9cee636c2b8eb99ba1533250fb854ec8cc6b48ab7a0d9f31bbf0a9728129b178e129a6419734a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580181f0ffff92c381eec54f904e6f85
SHA1b2ce5f88bb353e96d07f3e8583ca1748147b43a2
SHA2567bddd9e02c6fe6969a1ba5edfebd14edd17ca2287d7ea1fb2b31d3e703f898bb
SHA51258480ecd045e5ff439e02e9bbada0b5f6e284da9d6589a69e9e698347e0e0007a856014bce64bc72cb4f0fc66870dbdd46b2525c6f1f446e46de4cf95a8aa7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1df9d1a65acfcadb9d792483eaf92a
SHA1e91a4d608f0ed54922302d3da0ddfa2a6e867cc0
SHA2566ea5dad09fcb9d6a26c99b0579d843528c7d471f755efda585324a58adac44c5
SHA5129e63a6925bf48e68907eacf43847a27dc5b7d1ba7df9ebd343f959a74f22afdacaa24fb765cd203e689f66b099a5cbde1cf2d540e1c8a4cb53ef0d8416df13e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b04c1ed695a26386b985c86948a2a2
SHA1f65ebebc1aae6ed3cefef807805f7adddb7cc13b
SHA25628cb3081c7275505e66900e1a814d84d38fbc9e2364ec543d2b21db1717bab31
SHA512261d0e7da77e8084227ef6ff1d414f892bb227927aa5fecb7abe57cbf44d4b222b8fa467934cef3ce281a999a3f604149fa0c004a63c3e20f6073b1917bf7f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e35277a7ad1417ec710d21409a9756
SHA1dd5927a21decae77a645426c368b3ad6d3f457d3
SHA256a93dab968b729cc63eb356b52db225d3674f630a5ac55a73c1239b25fc089cdd
SHA512847bf64885753bc4825f45017950af040dfccd1259e63386cef242fd31fac5857648b242bb5224366a4dea83a9d2a8ec6ade9f3ab6f1ad0ecc173a912f4420b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af25d8797c472cfd0b671af2f636786
SHA1baafeee8baa374be45e84956b18d6807732ad411
SHA2568826354feefa3b6c2d76bef57e9951af5792338934027c61723b6661a262fa0c
SHA512ea133efa8b8171ce5e7caeba83312f78347aa3538afb7fd59ce07e5ff4008ae9c7a556fc52c44349263409325cf12b4efd672b2f29bfc275ee9a8839149cf5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588be22434c187d16414c23bf77b7e3d4
SHA117f2178f38aeb10b2d2ad550a152d607996b88c0
SHA256c390d0ef90224bbdcc6e9169d811eaa9b33232d5c946412b6f7dc11e57065227
SHA51203b88d6398872e2d503838f456d8c2907b0000474ccfeaf86ae9aeec73617af6d3c4973335c88a1416a1da83129350995f6d7add348fa2e905381e86a868b550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56597d40eec727d839e6498f8f595e2f0
SHA1394f64eb6e97762c94858718d3c2f33f5a6f0453
SHA2563d996848e96b1f9354b8fc96b81d3ec4ed2014caaf27c28331dea44910ae75f0
SHA5123b8c12fbcd569ce14fd3da97f7feb6eddb07c0ba496c623fbd792717cc868663383c95664a46d55d9addcf2c52db43e7cd025f755d261abd4d353fc41291d369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1cd5b3ab5429445c69e965093ae965
SHA195868541e6cb2b054f52e3da43dc11802f792bc9
SHA25664d58a3b63fe5c70d55a2783459ef144fe3f07ac25401268975db7f9bdfface3
SHA512170b4bfa9d0db8b6f24cad0dd8a3aca57fae2e789703c2c4c569b0ee90d37066e2b8e753739ea276b7e45c518db1fb88d26c13d66b3569fd4c731a61decb36fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabc1617b1fe280e5c32f03fd178ac62
SHA1602c7f7b781c6b25832a7d28f35f67ca1d7699dc
SHA2562ede4eff924a95f625f65e1c24677059108f67f89b996f36ee86849aa38c3f7e
SHA512c7dc98ca920a9ff7439ee8e93581d7e16f355ddb10db21e70ae844c175a8dc18bcdeb3d823e4966d03abeaa54dd606bd1c80aa1c838d2b23a79774e92c933b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502160dbad9ea64c53dc1e88f7a43d453
SHA1f49290764ef844f3ef1e057259158c1a697a8a15
SHA25679950a3c9d20dd87d306eaad0aa130024bf058e8cb832a17ebea431a5e276a3c
SHA5127fc16ba2657293a4b5a3ac2598c96a6558d81f57f89f63a9aaa34be95f6e32100e455f3504f6a09e139657631ff7ba1d9f820ef81852efb61e56dd098bee80a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4db0f6fd7910b1ad71044800ea61b04
SHA15006e18f09bbf194d4bcbf685eefbdd89de66c39
SHA256a9d74d1bf259c3f41865f8c421deaf13f566a1bc065ebfec8304c1fa44a22008
SHA51223bddb40aca32fd95419613e04d544b9e41cf8ea63e2440d87ba20ee2468a10ae702e7052605498daa2d4dfd19d1446efc5af4702167cb50e7727ebd2efd24eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b