Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
d066cd2919770fa629009b73cd574f6b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d066cd2919770fa629009b73cd574f6b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d066cd2919770fa629009b73cd574f6b_JaffaCakes118.html
-
Size
28KB
-
MD5
d066cd2919770fa629009b73cd574f6b
-
SHA1
f089da077dd97960aa3e6b9f0081f213e517c9da
-
SHA256
c9d3708b0493e75ba9efb153efb9cb876fad542819ff7991e327b1ea9ebcda6a
-
SHA512
3a4a36b98e7853d13b7d339e44da4ebe61c48ed64cdef3f7fdf4da2030937198762f35e50b6c2f8aa364c72aa19487317b9c0ecb331980ae9b74a20ea40f2f1b
-
SSDEEP
192:uwjYb5njgdAnQjxn5Q/bnQieCNn2VInQOkEnt1hnQTbntnQ9eYWm6sdgqVTQl7Mm:bQ/UU1+wgqUS4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD556A61-6C8E-11EF-97BF-72D30ED4C808} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431816555" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000003696385b1b90e99fab2182298ef4f2b4859f5f308549096203f319d73ba37a98000000000e800000000200002000000007405be338aa8ba38d2caad1609908dbc36908e365a1939ef136b4bda7c0cf1e20000000fb362cac3d312d80a4277fc0936dc71edc64b49e79f4e95553b383358c14e14040000000712e066974f04f1c3076daa2176f38b991dca75ec0e1fce8f08699daa1e0d2d4bf88feb5f01cde498f11d99eebe79d0fea6c1c8d7fd52a35b2157bfa70f1360e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b356d29b00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2892 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2900 iexplore.exe 2900 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2892 2900 iexplore.exe 30 PID 2900 wrote to memory of 2892 2900 iexplore.exe 30 PID 2900 wrote to memory of 2892 2900 iexplore.exe 30 PID 2900 wrote to memory of 2892 2900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d066cd2919770fa629009b73cd574f6b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513226f7bedfb52ce1df33dfcd3984672
SHA14dd6d58a0560324240a2d37eba53af110d3c16a9
SHA2567c41b3ed9e1b381bf8921c6e686f5e0a499803e8b8fed99fac0485082fd91b99
SHA51272f2c06541ca9dd81d4ccc7cf232987d62881c58c12d75ff5a921d3593027f9384386b3c044265970a44c981e1b4aeedbc5ccd96603057fc0ae8e70b8e46f9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f1f2f05abfe05ee58e5ba69f48369b
SHA1cd955cf262fc8d06b9c770c61246f664b0830aa1
SHA2569483d965c16acc306706e29fa08354dbe122766f7870af17316aa4435086174f
SHA512d2dbffd9d44625eb643c8ace66ad4df0bbecc3af5aaf33fd12e46e340c3316459c3f202dae5d6690a0a402768725738c85487c9e372083c89af33ccbe750b984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec339fd6c42f2b87eb6a8061238f825
SHA18a2f42b8d8a5656b7233562eb06c3e837a735e91
SHA256107ab68471b0036ccdbfbff24adc17fdb2717d84e183a692322cd4d4b8898650
SHA5121230cfb014e586c1b4dd95ea4f0e82206530d77bb682c86a232c903c6e0115959f8d66f1e9ebefaeb23a449ae249a1ffb91b3f801165c90592baf51ce97f44c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5becda97c5845b563134a6e4fe0a71150
SHA13cad5f50acd93a296ddecdbca25ed7312c51587b
SHA256e2a9c0e2200cfb66511968dcebb423153ead4231bc5d1d462ea0dc987fd395b8
SHA5121740436d2615e9595c5a532fe220ad03f9ab8e692718dcaa782a82c4ffd49e4949071f0a495eebe83b090111195f5e23ce2aa2c3fad7b1c0e5a1367b02e11104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562869f54dbffca418b271e0296e6c6ce
SHA1cb0da7261abf15e4a733d79829e6dbad4538d8c6
SHA25691c7424f6ae456f68c4f286829ae97778a7e25bcf5bc67a5c90bab7fa93e6cd1
SHA512eefadcc9e4b67bb98a8cffacd0956c20f9bfd4723798d8faf9eb556fc97fb0fe039a64248a1128956ab5389621486d597f65e02cf73caa13e9d67aa87dd3a335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a5ed1c5fb78b6b994647d2f34838911
SHA128077df36c6e23a9a8ff4a5185416df411ab5045
SHA25626e3f0e4fa873539375136ee162080bcfebf89939fef4e0d1138497748ffaac0
SHA51268f374b489f13fcab2c09d6d0e95c18e6f918f542d298f4eb1ae2bb44f8b70c9c418842ea3b10f85eae500721c4a646be09d7f50854f5840aeef6a4330648e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887878f6441170d3b680cf01ca0390ee
SHA1a98e3b8379552849900de1b9c10f86f4135d4323
SHA256d6d579586349993df5870fe54faea187d884472c50ea6ee26e8b13f82eed44b1
SHA512bec77fae85f4e10b246f12deb8469242bdda75ce1d274f25504090375c79e5b6e8a5368ae537a41de1de88d187c245a0db31fc50f0bcfe0f5b1c6cc34ad65fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1bf7a8361410360338dfc7ccbcae92
SHA13ebef1aeb1bf2122ffd7e083ef4f1a0afc4e391c
SHA256e9b9387f396af14e94b7e1cec081323f0e304b890bd7729dc32a60f40638b0b1
SHA5128f0d479d235466293511d7872f61de004c8c5d4acb7fedd2da7b49e8b6cf48752a69ce307332a845abab971f79315b20b317b14e679b51615c42e5c874318c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711cda5295677646881ed02e5f71c9f5
SHA1444bfadbb24c38fb2c47678451840753f1a89956
SHA2565518da806f180e2278131d235256196bcecc7b22a03214177177dec48afc19d7
SHA5120a83f203f107594e48eb7b159258b30b32f60197e5189478d2781696e5be47968a28e5cc59ed3d51ffee101ff1ef63d74d52b1375c0f6dc3289d9ea87f6adf5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ac477b0cf0b1cd8dee2c7fb3b4b3cc
SHA1275c2b808d79b78ceccb71425b61890e7b6556c2
SHA25622f6174138c1e59b9195c2e89f8ef6f1b42cab40db2f412a7f41ac119c6cb84a
SHA5125895f2d582ad51369c9b3cf674493a7d476da7e421132cbcf34672b0da49b9a5516bf25a8cd89c7799236ccc9e73a7e1f041ea815314aade2437144afb7de19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa950c5ab7702d28392229f9a5b8fadb
SHA18651282d3d7aa5a37af46e10007d10a12c894221
SHA25614ea6369847ea5ff7119a864053aaf1eb572fa0155ac5f0f1ca07741de6ace4d
SHA512aef46c40d651b9ca578271927b1e16ad2490e162e03565f8b32889ed69df705eeb6a2db9b4094e8abaf8ba3ae9988a83287349c90959c3b709b7291c22911075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b94d278213384a97e12dcec9ce7c47f6
SHA1bcf36f5b33d920bc775467b6014579689682ba12
SHA2561ee20d8feed08adf8dbc053815314abc6cef4f6b686b03cfa2cfe07b910fedc7
SHA5127862d2b2f26257e0ada3b67c226b13fc55d934153c84ac1b97131a1277349ab0624c8f99dbc2c7e819be17b3354011948d2f19189e5339f306901bf4b5c29d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c862fb4658319434bfe53db34fa70c67
SHA11578590a0b4ec34f4b866513cfdf4840b5279ae0
SHA256cbfa24ea0b3b4922caf7a73ccc391745fabfcc3d91b244564be7bfc50fddeda6
SHA512f06b5b2de5a1672905bc4655c206efad53447b93f606240fe99899d7f0aa61a3f31324eccaf54a40998bf96594e0251f3f2bbd129ec4ff15701af2daed68ad85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a85bce93e9b1ea49433e5ccd03019d
SHA14237c530234f5874a229aacfb961d9ec577e1453
SHA2565aca051bf7c2f3194f65af3a123784e06fe3ae7f148b6b3841947e4e69e6b22a
SHA5125fdbce51cfd9019844cf2fe443fe86ef86e3a684b2c741be6af465b18e59c91c5bef897b72f5b77d519d5ec71d140ba15e0bfcecdbcf84932199bd19c3aeaf51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f37873df93f49cdcd12f7a513b2542
SHA15ca02dfc53876853e734f91a7582e0174eb7cbf0
SHA256680486c73f893bc0f8b4a9d04683f9a0c0dc04167b8113c45d295a5773183abf
SHA512e487526a8aa22f202fee7d74fce83896a55e968122709890f6493c9de74f9268d3bca5cd62795965a78ce114f727af2e4d7bdf63692297e6af85e57e98db5c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b640c8ca231f0db3af7ad5a63130232f
SHA131fdd43266d8b06a9a697d674714ad27286a22aa
SHA25600bdbb8b6545f09dcdf78e03a54b07effdcbcb6bf784bdac6373e63e1d412721
SHA5124c571c24da740a10ac231c8a8249bcef4be590d8dfd602b6a776651d59ea73a4b75da7ccaadeeb9d88617991edf6f61507e56992df85a61596b2a8794df080a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31049106c1cebb25a09c46debc3674f
SHA11054eaeac082401fa589dadef8e69b880509ff89
SHA256eb957d1da34f0131e97da8fba53b4b23b65edc41984c3c42a0b7a77179be1e58
SHA51288597f0abc97df18ed481332a2a6e5d1922a423b30a82eda93d3c83ead996cbed736f59c746562a83dde599027fb3f2b9cca5b28fe2bf91f062f213498870bed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b