Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
d03a311bb2b8523297fa7c7c0169cf90_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d03a311bb2b8523297fa7c7c0169cf90_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d03a311bb2b8523297fa7c7c0169cf90_JaffaCakes118.html
-
Size
3KB
-
MD5
d03a311bb2b8523297fa7c7c0169cf90
-
SHA1
712c4108630b1fe431ae12a2b21d081be78a49fb
-
SHA256
0b960b9b42306a974f6f87df67cf32c3ada6eed2213180592f73a0e7a6d6d60b
-
SHA512
526e9f61c6012147f48a8c59fce4e7c71e4b094f0a2b7c515c9c981641fb4216de1418c1e201a6b4c19a27a4e6b20352dc4aeab86e0bec57ecc53ec8d921627f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C441A41-6C80-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302ef2218d00db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000358309eb3bb12ba538f9ab6494895f6ecdf862175c5b03ed03a25fe2a5696aef000000000e8000000002000020000000e821e2f60a99f4848cda22f83d0fdf1db74f54a2b550d12fee5c9c3d33a7a01120000000bfd9b214629f7e8afb709ae6565b13a4f28027a8176f2ab1d557d17b7949d41e4000000070bc14c23a94d022fa593c043ced4576231ff1c5d31d65b4ac30cf5272ba8943d5d7b75ff383049cc2a1419cea1140caf3576f1bab6416c8fb686da304b10f1d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431810245" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2704 2756 iexplore.exe 30 PID 2756 wrote to memory of 2704 2756 iexplore.exe 30 PID 2756 wrote to memory of 2704 2756 iexplore.exe 30 PID 2756 wrote to memory of 2704 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d03a311bb2b8523297fa7c7c0169cf90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7a5b9a3db831ae51d83ef503f4c8f7
SHA107ac86c0786bc59e795cf77b0ba8b4e9c84e1c9d
SHA2562b9bafdf264072e47e44a08fcb3ad039d32804c450097f76faf63afc7664490c
SHA512cf47ae2bb14be650b46ee9e4cb4bec4d795cd05287efc9fb7b9cae0fcdc135f5893fe3386c93bbb8785a7d0e5c961f3dc19b3c6f233fe5113f58d0072d1b7bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b439a009d13d00210d08daaabbf5876a
SHA12968baad75786fd2a1f72c4d237f4e61aa024d6b
SHA256020474e90d12b05bcf12c40c80b1f40664d7ad76d785a062b22dedb04194f94f
SHA512c6e42ca248ad30990c08312c6fd399e32d03dd31cc0c8a32715d5d7004e3638b07e674ae9e357abaa559d14290bfa408decbe669a58d0eae7b7077f90f0ff2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55695045e517cf012ae242017d75971eb
SHA16b916b00c704e742dc7767d828da562e6275dee4
SHA2562e7981e0ef1acf7981fe3b0f7a5f398b16be5873a0f34e84b0287db1776a5abe
SHA51209261525233c4b2e67148e12a7105315edf896133dadbc8a2459985ddbe2db56442f77015aec7b30ce76c4bb59b0e8b548280b332e067be2ba570e51cd0f357d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159ad58db28d200ee4c98c91ee91556b
SHA10e6b59fbd7261e8db16a134d3945664bf3262e15
SHA25661577f81dd3f0de27eb254fa8ee64caae87807ae43e45f04579b9e3b1ef1ef67
SHA512d7a8087b11fc68f872db06367089602f240e9e78235d0bf3ddafef7de2639b5987ca54b081b2bd2cf10b597cdd3918406be077cae8e723ed5099433532639d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f52a897e905fceed3692341c005518f
SHA1374738c033af7cb5941ee9925f0db93cda5b4fc0
SHA2566e8262516a47cbd758875728831a11c549e0d0eb19925291bbf5003a0cf3d63c
SHA51284b9932504664b01329acbfa4b8a065481e604abfcdfd328a2650f40aa751c3e9a2b6c0ae3ddca3e7173fd8fa6d6c0b3f87ba5e6952be4eecc00b9f42e6e6dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550652f7a1ada62474a97ddf917dda7a3
SHA140c2aff9ddd5215c1b4c8808d902494a297bd089
SHA256a9b810e2452b71838a2564d46dd7a16c85c4f9cdc051128470cdcb725f5442cb
SHA512857b81d7590daacba9ba9a0e7bd150457b21631e3c2fe2d9845f05053aee2471d9360e4aa9171f1af2d5085c055ea9d86206633148a98902903678bdda355cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba303f2a25e01ab661020dcb9dc5c6d
SHA1ae69be3b5d26705604338224783e6d8f786e3958
SHA256269d33a0c694671bf7919dc15b73cebbff6d0fbabaf71bafedca231860984009
SHA512af445adc8d137f2f5a59840f786b500d47e447884dc6817881d63698fff691c4f0ba02f89181363d591f5f2ed623c2f150a6602dc7f0771168af847d451a0841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567527b8b173ad3cfde77a23dc8083233
SHA158d6b6284c2b6d0587a0b5193317ecaf2629f7ed
SHA256f5f06792992a2831a08a7a40b3825259bc5f8ce4113bf166571fabbefd483ac3
SHA51240ff5578f5e45aebaf9e75ab86b4137d4191f13711fa138d5a0d1d1f4eda66d036fe4a3f79f26ce008bf00ae59fdd329c5b5e04821e930f47ff8466ad4087550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541927d7c0f03d486daff86ffa09c6e81
SHA174642895a6853a6122caf946c46d4205798d25f3
SHA256f945c8e52e66b6e4b20f1bf73a13d46ae2c925c506ef2f1dded46c54835884b1
SHA512654e9ec967f5edee012da646dfe6ee5e6ea7c7411c4bffa9a338789d91b6356fbb16ede92facd1aa26a433f8fa4fa8eb87cb06b86a69b55faa257ebc0f69b906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ee2a9b7949e510054d1c0330385840
SHA1dd0cf24c1f2e039c68b411b2be9cce67fb034f8a
SHA256e8a23fec83d759bc3a88e4276ded3c3f979f9f9b73f4bebf0aac36baaf08c7cb
SHA512d4847999a17667be18559d5ff0f32cfc84aecae43a64ce6cd5eb015dd3a21ccdfd120db5aa921262c16d608e87744c5ac288247effcae0c73d3248f3d637dd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19f97417b76c363f1a31adab4ac8708
SHA142cbcc28a011da29f2e0f17795d8c063851e4c1a
SHA2563279007b07870bcc5b7a3a8a40809995615e6ff2977da02dd12c7c15ddc19a0e
SHA512129a9a1cdd922b2800549dd5820c3fc46911cc90c1bfd5f9f285712d25812d5f980e62e10b787d98080f742d58284fe3099b0bcdaf200cc0256c00cfc88780f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57427dd1df7814140e44cde5c4d6cf418
SHA11462ae3f5caf439810bf975606f41f5ebf376b12
SHA256e9eb6843ffd940f797db5d38c26bb6b22099ef07bae0fdf50bfa678fbb4b7dad
SHA512a1d600ee7d2592b318cec2831e115c431c4bff96148abeb1a5c643f9adb9d98be220702b13c92079a3bdba35ff6a8ae60c52227e926f941c75d4d510f20ae70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52059992c1edb18035f388c56e153bcdb
SHA100b9eb196b136d98460e27b51df16f3de2440e08
SHA256b5e6ed63347e9f0f060eedc6d7da115ce7b93b328cb2c1525641f76b89608988
SHA512661d459130eddea9397345abca98d7b9a1cca399376a16b329b62b55e202a77bef8fb0f48effbbada7aa035755ac5e7d8ccec388f0ee7c45fe66e43e40873c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254f7434a570affcfe1162dc0932ebed
SHA14e12e829717259d8b785bf9bdba74bcdfad066d5
SHA2564c813bf9c16da452d5cfbadbdfbe1cc7ec28726e1d7893bfa4b4e1cff77032e6
SHA512852f373368a9f353bc975bf06dc24599357f1a405b2d976e1e323ecead1184df3289a5727ffc6c8f82ce63a13360811373c0feecfbf94c05c11d79e354ee2ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537612c16deefce87371a5cec28cc5a1b
SHA1e5a0fdfee1a9f53165d6b22056daa160b7b42045
SHA256b828e17dd8015e5320f8042787016b5fb04ba41e1d636ca92b55c347806abc84
SHA512cee28f1533d925470a6348e84344a719f9157dc5a763dd292606b05f3353894cec5972931336fc3c120bfa5207d7c28228dea34878777fcf4146fa9d9a173e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e2e2a305a54169385845ae0a08927f
SHA1814aee495e1459b3b30f2e68070e86d726e67f9a
SHA256a0282331571cdf61b85a1606cc2d520cdb5cfcde6c6741d22066542af9f899a3
SHA512eee31e15856b2b5c1ed3165df0a40a4c9fc3b777b0533c5ec1b586d373e12553d25af3577734c67c3cd4567460eb6196c059ddbfa80e2f1275969dea4871ae71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db4d364ae268d6fe45e7c9354f07fd3
SHA191f9144092a4b2f8ef27250bf8a77109af845649
SHA256409c611e8e2fbc24980942e254c14f403f5ede094adc42c2692cbbe08939c9b2
SHA512c1f17baa202f8d83c5d1463d776a0148e19e009a39c121ebb18798b028d5298916eafd7e7554b188a5726238b58ab058e35fdfd17d9332cc9cddfbe069673c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2dafaa6095b0075583310edd5680cf6
SHA13fddd39fc533309ddf1ab2e4635cae42f53216f9
SHA256e38bef5421ccf6cea992c49174c0e9ea234f1c930cf1c9efda245120c1a6b02e
SHA5123a0109cb6207b5988034901e1d53766df2bda55c05012533667e9356dee92ca6e861289439dfb1598bd5847a2bb9466008aa9dcb1f289b901215ec854d7001b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c477978c3b514edcc0070596344c3995
SHA1154b9e18bf241f45bd373374828d662e72a4da75
SHA256a93f3ac732a3d7295056be9b750a9c69d3a1e3de178078005a545e5431338581
SHA5122c600f017067e50b03ebb45eb09d74d47464dcff9a0c738eb4544b2e79cc7ae18dfc0c69dd565911fbef2adada12dad403e1b0ee8e00e8cbbd7045d9986bb842
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b