Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
d2f5366984599f8d50fa0462c18ce3b2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2f5366984599f8d50fa0462c18ce3b2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2f5366984599f8d50fa0462c18ce3b2_JaffaCakes118.html
-
Size
30KB
-
MD5
d2f5366984599f8d50fa0462c18ce3b2
-
SHA1
84da7b8bd9658420c58f5f2c721562645249b76e
-
SHA256
7ca20d03471f984f84ad099f45217489f2ceae940bee8d8336785a7e3478b26b
-
SHA512
d7a6b356e9727eb624ef55baf520f20749e97ea8b8ea7c7662b0f36c9dfbadfe5ede1548f7369d904a780cecc53044f5b0763cfaa1a4f47ae2663b78ebccc386
-
SSDEEP
384:dAyBxPEF5FtzE2fWriy4mgEVyRouzlEmkSHTp:dbxPMzEp4LRouzlE+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006a2f4e51a21705cdbc149e2c5ef3411240d0e09aeb55ca6df214130290857ed2000000000e800000000200002000000053e9352c5f18ec830c5fb09652026da7e5e8b9b3b1f7b67cad2e508f8309aa99200000006bdcd59c24a814d839dbcb1ed253f42d0c9d96abc00ffc16a7388dc8f682312540000000c40eec2fcb1afacd33d6e77b3e791cfdb036cb68df25f6df2496903058f4eb07b34097e418ef2eb0a3347b0028ba9a8f3c69f87437e5d4656d679b46f217ada7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431909771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5052c0db7401db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{055391E1-6D68-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2388 1952 iexplore.exe 30 PID 1952 wrote to memory of 2388 1952 iexplore.exe 30 PID 1952 wrote to memory of 2388 1952 iexplore.exe 30 PID 1952 wrote to memory of 2388 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2f5366984599f8d50fa0462c18ce3b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682d6927a6150767368c1289fc9b6592
SHA1ff6f310a7dd0b957003b79c8b030fef5f6597d04
SHA25608d765d6108516bda6b458c0d703c2d00159d1c527205604d69cfdcbc94930ac
SHA512f94775d20f9064887287fcf657176c271e632dec890023ed9f02c3497202e29817ddc572e6a648838100b4f9520ff571e59dfb3b9fe22fd12134f4636a39f3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51434478ccc864092384a37daf3f5a7
SHA1d68f63616d5fb1bef279730193d94de79e7f75ee
SHA256c8f212ca66c10b47e7d8fa3e2003dcd5df4183b1f319865f3d95017c10b2d2b6
SHA512375a551cc5501beb8e36c19966c0942ddf0fc824fc65a5b72d8c7abeb013bc4752f6fdc4be082b5e08e6a4e7dd14ab20192b701b296374224d46ef0e61759134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51900f500bdfeec6cbd034b9c4746a1a3
SHA19d24dc4c6720df896bfa9f3d6e02024e4224111b
SHA256639f4b93cd04cd6a4f3fa8cff0091c0e22c26c11169bbb9b09e5759c440a9e5e
SHA5124b1825f59e3b72c71a924752f3c00ba33025d948a3bcbd17874e41e110a8f02047458394397e971527e701fbf93ef73e2e4ef0485a2036563aee08e1e0e179d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c956891c15bca08c65154eecb33f86a6
SHA19db60d2f8213a6b88447475cef41ec7189680700
SHA2564a4c3b79e5188761daec10e7d331e8f9bd9673fef853d8614eff4a152a208fa0
SHA512bacd7d12a5a8ab7691a8be39ba2ecea01cfa749cbb1080216216a8a70781d17205e977a6971748f528fd4f6df726f295e53f8958c00573c53969e8a573816a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b8cdbc5205e87827cc6e10c52b8ba1
SHA1b64858531d23c935192c5fdff750f9012dceaeda
SHA2566e00604e0368470851224bf819d0e7fc2fe9078b89bc6d34dd5910aaff086334
SHA512c80de87562bddf215c62191b5409017d5ca8cd9b1180e772899ffa1f5f04af6f23cb5495ad59715ea5af734a6eb7e9a10ad745467243f5e8d4e72bc7679a6275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e53450c5701e90a897ab9b1554fdc21
SHA1d43a61ed000b98cc4599711dfa680ac87535cde7
SHA2562bb5a5cce91f2725ed944934403eaf838e7bb84b610abba98e4e12baef4df6ac
SHA512df018e4b2a34c7f00abae791135361f0bc6890213435a112e036808ce421674a690ecc05f814baa9e4b3992036d34e6c8b5a815c8280e7ed9d252db1f0def2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42587017051964b338ee5ae7646d43d
SHA1cfff921c0d9502df5d98291022723c548fcc6aa1
SHA2563d10f6e974dca299dac45d6d32dfd10f30a364757088bf6d96fba6ab1d007d27
SHA5127a956d1346ce078992d6fc96ff9a1b3de58c9e98ee42752d082bad7d645f7e6b46be55ee1e590cc455fb5a9141becc4096ad78e441152cbc13f8d622ca722233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89bfb17303eb52e1efdaf8cb483df08
SHA170752c682c6eff379a3fef48bf3fb59142b47ef6
SHA256094236c02aa150eac660c5ac062f178743d6dbcd6547c14b6572ab5c83c3c4e4
SHA5127623d9fa98e6a602174d60ea989e89032e56439ec5a5e91452843c5f19472f29be56833b50e499c252498738956f6ee97e38650fc611957ea81692b734faad5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa39efd79e09d2abe5aa220c32ca5be2
SHA1e275ff9e15cb10123a44306a0263bae7c69bfdd5
SHA256e3219e13c12d55b855fbb083bce30311fce4ea941198aadcf1c302805891802f
SHA5128a5074c2efed6a69d85f8c775e5c553b2d66c052182c68a869e94bcc4aa35656bb3f8c49db2526b7f6261cfac172baaa799be8658f3322672aaa539cf384690b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57732c9b4c2b0023850d90eb118466009
SHA15a0185dcefcb285be6e388efa842723dc80464d4
SHA256c4fb926789778c9724f4818ef8dedc8bae3f985fb4530c030746b8d65e1c14fc
SHA512fa8465c2bc7d173ae535dadaa4ee397f0f5a33b5042924d02706c8bc3b5858b2075a81e6b76ae4ad385181932d28660fbe61b71129be1448b2b4ed5690b70064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a57392eab35998332e95ced687e32cc
SHA187b88e1ce2dcd82bef843d65672baad9730d636b
SHA2565dd7eb659b27922d2a53d32ef8594a383dd96ceabffade35ef6ad6904c417c3d
SHA51253a0da4148bd902d2de8474232ddbcdcd22994e9cb2bcf7a4a9c36c2c6fe06ecac929248f33e7fe049fd6a3ba37d665648db589722a8332d213976ea7b232256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4275e3cda6329fd18ba2162c62e37af
SHA1bd2cbb15bfaed146afc85a0080f5f3833c8202be
SHA2560916c5cfbbbf8d1438d522519b79099105fc13a86ccecf0899ea41e36669fd73
SHA512bf88383f1732ee28ace8349a34ca17df91a2dbaf490b65d47f22c87f0268c2625fed6c197da1580027aec846c6badec9d125a882f4bcd50201be3595e46c42f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d0f9bd747e725f672e6f39da77e516
SHA19b8dac5bf9f666772974008e0dc814b8d3cc1410
SHA256f47f4206eba03838395ca2f06a23916fe5ef4720791dfb97e4725f4290551b1a
SHA512d4ae4058d0fd4e3d0a7bc86ef24a386057bc3574c6dfd1eb6a95210def8b24d516c7d963fea31e43cbd3c4eb4f066c095d11875401fb35b4f0cdfb76e896ba08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a7cfe755d144526e3362ff28eeede9
SHA13aa0604b236b2ea84970e93bf71fce1c045c1850
SHA25692ff534cf2bd1cafe5eea290298ab279871092f7ce726f3cb58aea6be5576d7e
SHA512473af069130bcbc4ff174940a1b5d8ea39616311bf79f9a52019806a79218a70e290a80c33e73abb4c174c65a1916cbfb15813f2772a65b7cda4a71ef9030f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff45694397ba3579e06dc8f7970a8027
SHA177ed53cf360a40e65485543f9f2893f431bd4fef
SHA25693d4610782d4f44352b6793fafa48dc9f24e4b5036aa836539994f551d62bafb
SHA512f85ede8721c91609f23e65bde42bf9bccabef9d389045bf0e8a02c8a5a259b733fc2cbdaf117b0bd2b1efa8b66aec3ce00760e63e71975da33b2d4d426c18d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc99ea38f82655b2fed5014c4d8ec7d3
SHA1da55d4949c1ce686980c698b3941bbc0d2763e21
SHA2560dfc2023946a4985fffb9585eb08b4143442ebf01ad29221781820da5576c36a
SHA512bc3e9645882b68e50012f2b2cf5f75a63973b196159ce87bb54f31afaaf14c0b56b99edcc729398b2a1d671e685dd6ad2396b9cbaaa07eb35a82d97e11f8db45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3458266149344f92211c1ef63d1a97a
SHA1e8b55f5ee140a45bbce2cf196908a02512c7e6cd
SHA2565780f1551f8418b64b425f8ad7d72168fcb9d3d37b2cd9b1c2b7a255866f5be4
SHA512a5ba2fdde2a33ac6e2c725ada6f55bc80013fc4916b355c6e460e69c5a5fc7df54a77aea6231741dbef367a8d19db42c0b72b4cdadc042e17aa614dc44caa7bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b