Analysis
-
max time kernel
117s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
d022be08633b0321e7dda6281a82c578_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d022be08633b0321e7dda6281a82c578_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d022be08633b0321e7dda6281a82c578_JaffaCakes118.html
-
Size
45KB
-
MD5
d022be08633b0321e7dda6281a82c578
-
SHA1
57c0c17f1ffa806540c0c5cfc86231af008a6c60
-
SHA256
f058edacdd7910f0ccffc9e51eed68efcc2d1b56c075e6616870e9501995f124
-
SHA512
6b610a556beb8fc4ff8606a73bdc9a1a15be9c7c39854acedb93d33391a55ec73b24bced4e84bfa0208731183fef931100667db2bf683438a7ed54489d543715
-
SSDEEP
768:C4JTqI2l6ebZ/AKcdMEbsncfq4CsyTZZfk:C4JWI2l6ebZIKcdMEHfr7yTU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431807450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000209dd04209204a1347c9e096841a4bac036c8d1c7a0a9ac84d083ca833bce991000000000e8000000002000020000000ffc3563e4dac8120579339d3e76b415b81daf17c3f58a0c7a357dd535d2c299120000000c796bca35d9fc60aa6444a9840347fddcd82adda84baa84d581c5a10d18c9ca340000000bae2791d736227d9413903c46974096cef497eb885bc080cc45f8eca43e497cf9b30e16b8ec2f06d86109e30c8220064375fb85001acd752a1c874902f90e953 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e812b38600db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6A80511-6C79-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2784 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2784 2424 iexplore.exe 30 PID 2424 wrote to memory of 2784 2424 iexplore.exe 30 PID 2424 wrote to memory of 2784 2424 iexplore.exe 30 PID 2424 wrote to memory of 2784 2424 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d022be08633b0321e7dda6281a82c578_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52915d8777a5da00ed80756ae93167526
SHA13775063363c6de190686a1efecf2f3407bbbc7f3
SHA25680ecaf9b65d7dcd9f67692ed923a31ae85306aa3661f1a90475f985ea7b4f777
SHA512bba9acadd6db2a8039248adaf01c21cd2bbee715a6d8244bab86cfe2f2feb6d5f0cc35c21fddb0ec93941708d59249ba3f6f90fd7e204b21a37696ba5ccf946f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52737573f3a72376b5b09a8e4d6ed27ac
SHA19b6c169c3ded767cb6574621a56c3f37e4220247
SHA256c72e218e382c5bc238f62978d85b4ed8c1a315a3d78ec22c21ce0389765ffcb4
SHA5126225d10276838e8bb2ab3db8d0c5e3aff4d37604c4712590eb4dbe7dde9dd0f9ab774b6728ea0c46312e5640726b8e510ace8b076b96576dd7c0a21bda20acf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b38f0c035a60281f03f82bdc7d791ca
SHA1cf1237d62e50e90de165a400377b455f21358d3c
SHA256a55e4db890b9c1a61ba0f7dcdd3aef7e301066bf1b1084413fa6246ce9733575
SHA512bfe69a270808c73be266664134238b849f7072cc0d11e2f43249f8d2ce563ab43c6b9da2fd4a18be038cf4b306bdcb1a36d3b35281d502efefbc85e878360f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759cb9f5e1d3ba6079594c2642ebeef2
SHA147c08ecc79c34ea59f53324d0ca6e55e35695e0c
SHA2567ff51b4263bc068611b3e90c03ce41e83dfba7a54ea039a99e4401b49cf1c356
SHA512ebeaac9d030ef5090326db1dfceb8ed9c86f445860056b399f636d642defc8a549f15466aa910d730fb309860d3c4e08b252ff55cde6ff53f214ca8cf437f2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84651f8da7e003bfdc48aca4708644a
SHA1b896fba7252c6ca5d174c8a47f9ff3ba50522466
SHA2569ef1ac6aa8ab6ee3cfee8a1239b1ac55e25767c82d6c10503e30f74139095f16
SHA512039163e93d983aebe134ead1d94e6742b2432e3a3bd3ed0d1b876e2b1bac8a82abab6f3bff20ef48e554b9425b69fa7d11bb36b9616617afe5d591d399f40c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5f589725b48f70755c0046d5f9190c
SHA1d57ecd62182663faabee114eba7cc0555192f5d8
SHA256965bd34cc995582f94b8b6fdaa452090e767cf9c5ee52fa264b6e0dc7bb39e95
SHA512ae4dea024e0f0d86c46b2696c868ee954856e67ff0ae2c88584ec44f544bc525659a59dc69f90430993c050867fffce3f6d56e3dfa3e00c178c11046841f7586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554d5c3439ed8c0be25ab0b9e30926bcc
SHA1904605a41a8a41f2b2a93103a0892ffaa4d7a2aa
SHA2564fc078f1a62715502d38024ddc2735fef9a71ffacf67777a7d2981d5542a6aef
SHA512140435f174970799caf61eae79d16a72c22ce1087da17663fb5a324d1b0ee0a3dfa5b01bf7753c1dcdcd7f0d2ec303ec2f47f7e427b3c0947962340c369790d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52637d555a4cd0883e4e806f813af34d1
SHA1289143c3753750b872880880c773f3cb534cfc49
SHA2562761ed3dff27227e26f77673cf0110790931c16eb98c682aca52caa8ec7560b0
SHA51243683d33060d2536575bcfc2212acd2fed9fe23c4f222ba8fa76483d5768f77a6af77c5ab918600176b4f378ed17b6a6205cb05f529c58fe1e48771e6b03e420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f666ef21fe782a3b526f7cfe41057c
SHA126ba77b118ae7b59f466b79f1a94a6b09ce4f7ef
SHA25609b3b9e5a41427da395b81ea1ef534649259348aa14acce93483abcb4a87acf7
SHA512fd98807d4e6a4647e56a73d12e3e362151f7a39ec75c90b7bfc61d6815bf6e8e28859c040f8668babb06b19a9267f5782c35c719421357368b30eff955e9299e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b