Analysis
-
max time kernel
135s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
d2eca6db9cbcab9a03075db81284f500_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2eca6db9cbcab9a03075db81284f500_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2eca6db9cbcab9a03075db81284f500_JaffaCakes118.html
-
Size
20KB
-
MD5
d2eca6db9cbcab9a03075db81284f500
-
SHA1
117129133d8192b4b4b43a273454a1f321bf604b
-
SHA256
591ef48ef347387237ef3e40be9d53b451901de0f17b3e636ed8c024540072a6
-
SHA512
25c82a19b5d57566d1ac4044df54b25ee4d6569f6708480decae1935dc7a0741e56fc51cbe9c15d0578e1a87065423f2a00f813233da771e1c554ca026310d83
-
SSDEEP
384:CanlVBbjPqoV+zji0Ft0LOzTQTzT+TCTGmvTG8LYqnJTydoBDUj0:nlVBbjik+zxPKPg0GmrGEJTydoFU4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c3ac7fb156c2d8438254b2972ca880f35ebdec75fb61662d7b37621c6756ecf6000000000e8000000002000020000000fb1c619d5f95ba4dea9597be72fdf9100b4eeb22341cb64fb8f61393d81c3de0200000001cb9fd137a46785f6cfcb4f6739eb4c775e9d4340381b82c8599c17f70c190de40000000f7548ef9b8fd4150a900d47682c54b2c7ca2d9660496b175424984576247420817166a72607a333c423822aebe29ca45244f3387da3cc71f02fdb159e064994f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1082fab47101db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1EE1291-6D64-11EF-9917-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431908315" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2940 2192 iexplore.exe 30 PID 2192 wrote to memory of 2940 2192 iexplore.exe 30 PID 2192 wrote to memory of 2940 2192 iexplore.exe 30 PID 2192 wrote to memory of 2940 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2eca6db9cbcab9a03075db81284f500_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c45cecb4c9f9b47c77ec640cb240d024
SHA182113ccb6f5e47f28c21cae03b599188f26f39bc
SHA2566e949a77b5a77c9780b319867e63ec4190efa6f1179f59957847d7b4c52911a5
SHA5120550970823bbb5b7584323bad4bde1688861fdf9681ae5497ded10498388c4dbf14e557c3480a4fcfd2b152d71d41ee3f040f40571e520c28034d9b55032ce35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b49c43bae4ece1e965852508bd18c2
SHA1d71ed449c35f2349871e3205a4880ce3d6bc92d8
SHA256f9957c1057fd98427268b5980ac670b4abbdd8641462317704991916c485cd26
SHA51259fd90f74e048b3309c70117ffa2927be25b84ca29e7256cbc342ac0be5c4f59d710b4c3884c769f9b6a98f5c35e3b5aab0f4624090b8a2cf98372962cb3b501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df6e71ea5b1679dce523556b3d75014
SHA1889ec6efc5789aef4b1df27e303923f488ce2e03
SHA2565a697defe15d957888ce9fad795569b93d801dfd761d99fe5c332c129883ec7f
SHA512c78e26b083bdc687d652dfb6c955330ad02e4d433be8bc010ca50e6188c58bf732578faf3feaed7cf0f22ee038389cbb3053e63cd7dc11acff65320cc1687ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f28dfbec6380d4801810b29ca9adf4
SHA149753c48fe155a45e1b0f8896fbfb09314a21445
SHA256df062c5ac11a50a333182d9fa6c00fb226d7499c33364ac6261ba3d099440b93
SHA5122d05e28aa8f6e6876da54a28065e11ec5edc1ea2dd535beb6e68b4adfc467ad0e364314e851642bbd3e55ef467f3794aafe73fccc60ccad51894f8ca06a22138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59192331a38c7b11f2295f27f9d3c048c
SHA1adf6d1770fc6cfb33b85e651843d56ae477d0213
SHA2561b270a7bc03b012b8a27cd94171db4e9a9be729076c4d66eac5168abd671b9de
SHA512cc52657eda97dff0959088e71ec1de10e446343d1935b62885d8d12e38588a4f23cca4b051bde1d98beac53850c27bb5eaeaac5ece64f32ae58debce769beb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b913a390e386618606681a6112460355
SHA1bb47d85db2125ffe9999b28b7bf11448c4bd5524
SHA2565fc88d00c9976a0d4e81ca994574c39f90e2ab0784fcc9ff3d29fd105f2df67d
SHA512167464ef98b91ee350f96d865e64cba0eacaa05cf5f9555fac008984dcf3ce4fb582dbcff07ff6878ee199d6ea99559ba45dca4c12ab51e74b797916bcd53807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba68cc7179a1c902605fe84c5d6b80c
SHA1f7b030297e149d688fdf346dfb3f56a0a4129af7
SHA2560dd5d4e1eab9d46daad71e0e2cafb50fd42c966a04b6d55f15765f4378a81d33
SHA512d9afd92c6a9ce30bbc8113d7f7cea0d36647d7f8f67e66402d9fd38cd9d143155568ca7599251a298b616798cac7ec84c591a6eabd1a49977b768f2b8c4a22c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c4308ce56b97fe30a84b4cc1ef7eb7
SHA15a83791e7ca07aa675b3efccd770f4687f5db36c
SHA256f73da1216f8ce80126e0f9bd0c00f06978fbf02e9be01e2446d8cef69ac12b9c
SHA512b296ca1831866240de4e3d7187af5940250e7fb75e346e268370a539a84d2610ee369c2fe4ca8939faa59f560137f93aef5030a121f2eaee4e15bf9e71e3b5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4259f89b70cb3df5bdb647c8a71214
SHA177bf628c0115626e9b50004e58b15a995e185414
SHA256403f816a278a241ddc517c4e42e181036b2185fa5e701be4709830014bc6d99d
SHA512ac9946e409301cc39b3d7f612c32167514dd3e0fa6526510faed683b10772eefe1e3ece1146ee38916db4daeb92fb2005eb8ba199f949b81e9adf3e99bf9a64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530ed4be6bcd93099b8dcc21f1443da8
SHA17314ec3b41a08de73bac6d4887c94396a9b3eb02
SHA256916c740b61f21cd62965d63f3acd109de36a2077f226143a50bb8e7d6be3a418
SHA512266a8a5dbd73747a1e2b91369091e662af699b5cd49751096fea4555d2d1cf8395b7c6b46a195136efbd8ecb45c1be801183c9970d1d88cd36fa02c61bbbda4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ff37ae016af2ea4fb95717791f1b41
SHA199cccc9f25e612b07c10bfbbe83bca5689708dcb
SHA256edbc8153abb8f1b6d1da7ad21576f348d0d19689a0616737fc9d9a1c8920cf4f
SHA5124d4971c2fe1e6da2b318ba768d1c9e6e51dbf92ae0056d7a0d0b8a1ecb7f980b1250ceaa3950941625938e5cd139e1581fb9a2636bb81c2cdc09479c74d4c6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59079a43d98db372cd1994fbe1eae8cc8
SHA11aed1fc9cda4c537327ce7695881e694eeb03a54
SHA25654838c21fb8027c2a0fee2c7d865ae2225dac216b5fabd0ceaead193b1d7e97d
SHA5122a017cfd29a03f14d1c034eec60e6d5c681e80b0a580e8536f847b1849d783d6972fb820762055036b608786564aad7d0907a72df230918db9aa2969fa17bc01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031126991b272a9c61078f6a26076b6b
SHA192447c1d2ef4180164e58c36fc913798aae92107
SHA256d7bb0e23c0ca5f113e82f6bd148596cc344557aef849fddd93ded9bc53b1f115
SHA512ace8813d3e13528ae7d52e892e5bc651a60cbb93afea7ab3a3d5719aacca0ed3b785169cd483ff967bc41ab0269447ecc17f3371425109e714de02693d86b636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53644706743b611335aed6bf6b4e6a8bc
SHA160c14c742363ace505ec8fee9f0286563c1bd8a3
SHA256b9c98d0b28da2797cfea2ca220c178a1a4bbd1ea575704505ecf3f892a325c9b
SHA5125db2d02813f83a69995c948c4339ec0a1fc6df5be08ab91a0834e17be244c8315b4dd5aa2915c22608d2243ee0f542c410036b23c521a292d4023aaa00fc8031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ef062c298d24730684556b2a60ea89
SHA15248c0914e2f0b31ece25c3cb5729a19e2acb17e
SHA256149b06559b9a0b774958ae1f5892aa0762f8255c0b7bba190b2ebced4c9d69ac
SHA512215c1475d53858a94d017c7bc8576eaa0b550732268f339c077144376d3c8c54d6b7afeef35aaaf2bca7d58e27fffbe59b211c33cb39f5e44783390bb9602f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50463d3f8e70504f6972e45c3dca38e57
SHA11e0b89c970f90bb76d09179b46cc79eac507e4b4
SHA2568719af01c15545bf18e71f5bcd6dbf6af19d5012f56bfbc5d3d2f7a1867b6f5c
SHA512dccd839ea98174d68e671a29e194bb1e071009a09d6922e739b3e305005dff2b77a8dfd1b5ce237a25a6a409657766a3a450c080a46db40feaa1a6d3ac8cf050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742025d4a94f2270092966dfea7cf9fb
SHA15fd6aef2c41083bffd80e9dfa9ef21b70f763c5c
SHA2560bb8aff37ec2e4000b1db3c85194d5b0802e0df864c3d5a721a30d13237cb903
SHA512ecbae23f9a8d02397ec9655a21ef23da91d59035631accc4c3744ca971d029608becf852381967306e6faf92ae27d3a0fde3d4a65244be581eb58a12486045dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508217366bc1bb749654ca59d4296496b
SHA156d40f18c39972c61353ad584a5e25f1c86cf894
SHA256c66c83df88df3f27e353540d5de9d9fc91f1f09a4f92d16d47ce176a65b1fc7e
SHA512278177aaf652fb7699070f2920905b143bf9cc1bacc64fbcb8f3fdf5ff40455d4418e1a6147a00f6ea9242acbe37ccf137fb2a98ea6a3f24e3daf931c5dbb3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce94cf0fa24a36687bad7d2f7b38a8f
SHA1e6a8bf5b9a37d5aa3e0671079d283ddc437748b7
SHA256efc27c4631e636cc022c9faad3b42e1c6f87f82c3dd2042ebe173451dce8f49d
SHA51247f5117c1cf77ffc08466a83040f3e7eed3e4b3d88f4f683e9288ecae60aac8955062675f2af6e264eea63f65ac8300bad95392c00e8d93eea80aeb9811232fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6145a21179a2579babb51753483bedf
SHA1cebc06c20e80b051b8bd23239861d066464a3ea8
SHA256aafb6ba444d5a3b9d0128de7e20bc9a97c3fc5676e81d6a899bab066dc6802eb
SHA51247bafa7a94a6ff2204a40e2f9b4029d108aed16c5e95516f450be998ab54d2beb64e3bf47780d3c1513855a227fa7c366feb6428f09530d81e487315925ed07e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b