Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
d2ef03a6c379c9ff21f293415e89407a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2ef03a6c379c9ff21f293415e89407a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2ef03a6c379c9ff21f293415e89407a_JaffaCakes118.html
-
Size
60KB
-
MD5
d2ef03a6c379c9ff21f293415e89407a
-
SHA1
faea205f33386f9b3de38c781edc216e800dfcf4
-
SHA256
09bfa82e08a9cebea2f8d702b3e7c4c7667c2baa2c8aaed3e6bb5020ee1faccf
-
SHA512
c9c7238e34a8df9fd649dc31cdfd736dd48d1e444943e7e4a9a0f981e406e56fed5a59276c782cac175a7c655169f23fe2f2d54a7d3f7a6b59ccef798f3ab8d3
-
SSDEEP
768:JitgcMwUc9GeCSXuhv0chR43UhoTyWhCZkoTnMdtbBnfBgN8/uQcc8QFVG8sP/IH:JTiRbKReU2TRgec0tbrgamchNnWC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0550c687201db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{935EC201-6D65-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431908718" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000007b099252e8fd49bca2bb84fbbcc9896fc7e8af9215c7bdaff9f9fac54d10a165000000000e8000000002000020000000b4c4fe086d630640bfa4df9cc75205e6e61362912f29a63c804eb474d82424be2000000043f22ebe29bec123da6e1979a9ce38e3e818a13d7a34780d98e45be680db55d940000000890a98de45acd714a0c301863baf076d1e7db6b60980882f813daf3d0e9f2fbafca3386a99bccbf1f2750758047d84d695e117027ad1cbf5d6741d33c0a8c312 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2756 2364 iexplore.exe 30 PID 2364 wrote to memory of 2756 2364 iexplore.exe 30 PID 2364 wrote to memory of 2756 2364 iexplore.exe 30 PID 2364 wrote to memory of 2756 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2ef03a6c379c9ff21f293415e89407a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc509057d4e5178fd9573b1d9bfa584
SHA1ff9ba1c827490ea3db8f6f0309c6bb0c606cab30
SHA256b36efa10c31aaf716513a08b49a80c4211a1453b4f1b5db827e76080bec1374d
SHA512430014e10e85e202218b5c3a4256a94eca8420afc7f175ca7a9d780730974d9ead5f43d4f275e3f5e2924caccee18c37803e9a1414ec1bfe3498d5d64170e6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1303c3745accc672767c0043b3f915
SHA1cebdfc07433f816cc9d73e2c58b0c867df384d80
SHA256d07bad83e762640c25a04d95316af60e1bda7d6f08e3526674d89626992b4453
SHA512dd45d05c139c245517e8482946b1fcf70a1cfd4a05a0370d07a64792ead2e0101715579c82b15290d9732731b50782e054d22a7025e8b374f6dbcb892c0b7a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6fe8e6b7080c1ac0eb1ef47c2d74f8
SHA146a021745785aca7766a9c5553ccc15cc6027741
SHA25656d7bfdc7fa61bdae81c3e81fe34a972ca11c815e9324dc5d4cb58a8c39481ae
SHA5123ce362c844e1fff52fa7e246277929caa12d752a19f5e64375e14fc4dfa1f2261bc746990f75aabadf16b5f069692a00d7be20a0e6e402ffe0e47e8301088c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fc3585921b75950373f4dfc45d7873
SHA12875ed1f49195f2e6615f01d239601ad027969a6
SHA2569386fb5442c3e84eb017f32e362850a19b0716c575c7e8283dbeef2422c559c5
SHA512e0ab44cc837ffee15ac3fb6a88d9b3d8ba6ec7f8f995dfc2d8dda8d237b3c6577f39dc8b8e1bc7026ec4f5c9dade11c03e7464e32f24aee1d5c8e378a557fb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641d945ae576ba8f2dc016c19d574a43
SHA1ffb50fe157627aa383a8b83e640f791c430919e2
SHA2569a3d844197413809b0f3e0b6ea0d3cea65f7a8fc0fa356f8a58ba85fec1c11f7
SHA512d81bfb71bdaa7e409e2220ecf63fa0e254e506509e05840805e70d57a632a321ffcee19c33d2e8aae6c3a5e9b0eb97fd9f93fee315ad663a3c4d8f0902ab07ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e95e92f7bcf87d656368c08cc063e292
SHA13856d2282fed1c24fbacbc3c250d8f936cdef9c6
SHA256c5465769065a9067f9b328e587a7ffe45c78c22db4b2726d79949ea2a1416f8b
SHA512b9317eb08b012bae5ea96020fe15a46d7695f7ee3b90eee0dda2347d32ca67cf9a057b2e3963158b4e7e2ca8e969ac30f614a3c2003d3f64e4394b4c79ed0044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04161b6d5e68c9b1cc5e8631be32484
SHA10ded7e9f18af73eeef303f07d946fb5d10301442
SHA2563a0a4b433b87286e37b78e449fdf94a3456d3c8455515e75414b28b33d1edc27
SHA5124e459bb0d119e3fc889e79eb7a169887bfb79b8fed4ae72f1d2d6b8060ba4de6e5524fd3c7c6ffc7c177f7aa960d27f6a2df5e8a6f69125be525a6a04b43eecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55951a4233c71b3d997205280d0490620
SHA16479aea4b37150166868752c21aeadf01d13f0d0
SHA2565ce6c9b1e3eacc119ff7796bd7299828e62b6f83e543663735d21673593920d5
SHA51234e648855c97355f90c1090cd24b29ec1437641308d1d0577409a68e3bbd6d57642fa7adf9fece6d4d421dc34618fa5d381b548d84f991a20a15355314e6a2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50259c808b83e0a5c026436a2e1ac2b67
SHA1b700f084c8ca0a83ed16f245d9f19955c07aab33
SHA25663168f3ddbee698b115532db0fab2cb4cb006d2836556a9f59ae4159296b86d7
SHA5125f2cf7ef6d412ba0ae13718636a22e6ff309552671aa783f1961ff82d5cfef0876b54bd3fe017dd25e8e64d26b5c76b33d74bfe460a355595a2770cb0318f619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1a6bdabf183eafe3eece94e724a3a2
SHA121c57c9b636b05744f88c9c3f553115e46cb6a74
SHA256e202bc73e636589e119ee242dfbb31774fd3a84a84ffd3b0706ca05879d099e2
SHA512ef8df4f150967440a8fd170ffcb2ec9b8684903507240e8eb1f9bb22903ab7fccfc6831587798de53b9d40ce9f452d0609ea1ddbb9078911e9aa34d0650b3144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599464d272762522c154e4b503015ed5b
SHA140546b8413aa77c14c4785524194d2cea8288eaf
SHA2567b35bc7b55563f56114b6d5f5750f1fdaa76d8650bf95ec40b7fd4ddc3758730
SHA512c350f0e6f81dd7503a6272e6fa04bcd0bcc0257db7ce04cac597a7c93bd018663e611018917e78065f3e9237e67bc4c3623fc1d58f9d961a7d1c0b4023de0179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f75f7f67111cce91ad4983b45494d9d6
SHA11c349f23e9d96cb0827453d7019f2c09e3226638
SHA256ca9e22f782e6601e507fb9cca3a3ba876864066a6b8ae29b0f90bf6d7e9b8031
SHA512ec1a07e28b921e5b2eeb557369c662ac434aa3cb89163f051c9f47669e6307dd9e067b6911711af3d3aba3a27c1b97dc51d08bb2708197a18baaad8486bb9245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f29f7c50e3cc0cf8402f39cb3c41ab7
SHA13dead848e97d9db394ad68a07f4b7b90240cc301
SHA256e0cafb367ca054e35b146bc7deadc2c2e0367f885cf15fcc18352700da5fe16f
SHA5125f744763e65e745dfae391e35e980f72d3591ab5f14880ac2f2df6ceaa5da4182d4b235757db4f04420a41178d4b08eadab0e93e4c37d0b9f186ec9b36631e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560cd8470f69778f8081dcbe3d335f422
SHA170e2d5558fa4555b0887da4bfee9170f7162caad
SHA2566631599fb69ea4b894878ab3cc548eae3bdc73cd83f1ef3096882ee8643c50d7
SHA512b37e4ae96140cc96b47d41c8fdd71c44b496125b20ce8edf4a7ef8509cd085df4fc494f1ba9ef3b6d0698ed9ae494a095bb2843010d8b8785de226e48841adc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c6c4ef718e7dd85a59463d5a491587
SHA1b1d8c1d70e55daa67ce35d8657ad9a6dd464b23b
SHA256fa96d385fd6167a1ea4c1615c6038e53e4ec8e1cea90a59e124db0189acefa06
SHA512f06a16347cdae24eb4dc5fdcca1de11fd21764ff06c53a5155a64d98ef3b33636e7da51c9f931c8e9ebdab2b9de67535123bb6c2d99b6adc003521e96aeab026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a1cbb9db55f6d67e743bb1be000eb36
SHA188207fedd8cb5579bfb11f8a69068eea282cbe33
SHA2569bcdc64b554b6bd47133ff487653168fc6bbf2d4a5b79332de1c56291a97b2ed
SHA512a2450d37be0086b62b6f6ee2407689966679c5e6b2030311f7e3bcaa11bd9ae3dadc022a38052b8112ef6c89644494b8a794322b57c3604201286055c2aa8a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3bed812e7ee2a742c8aa2b3ac9640e0
SHA127c578fc80aaed18572a87705a8bd45cf34aeb02
SHA2561e040be2254facf390882b8dc5d338e38953e674d65d79b29e8e40b15e49cc4c
SHA51291c785ff60508b0b246cb21d5da5085b6398fc985b90b3dbc9fe198410bf3e0e7edececb9216e272857811e722fb5a67e47930a46ceefb0d771f21b051f43116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dfb79a6f0b41a22e600eede03bbc452
SHA183d2750f94fa9849de70b866f412ac82aa24c08a
SHA2568ac68e5c81f0790800b8b816744e8373d20cf21498933f37ffb0607528efe078
SHA512e4784e48ac8683c5ff6be933e11be8818cd4d24db54eedafe99cc7ee6bf15b38767316ce9169e89e9d0effb2e40cd0fd7b1fb3bcdded0fda8e5f1e5bd45e3efd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b