Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
d2fd31db31f80c110424ccbb9e67d863_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2fd31db31f80c110424ccbb9e67d863_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2fd31db31f80c110424ccbb9e67d863_JaffaCakes118.html
-
Size
148KB
-
MD5
d2fd31db31f80c110424ccbb9e67d863
-
SHA1
b1445c220b1eb4801b506275c6d14b68d31c09f7
-
SHA256
425ad9d81ca7b237531e74da1aa9e96a3a4e0e9cec6d1e5f948c88f6c264f9be
-
SHA512
e5b44a79db3ab56785f97fd2dcc7cf6240b63ec85935b3978cf6ee1b0a0175f51cccdeee9dc9c1f8ed3a8a746351ddbadd7fdcc794d97bb79525df3e6bdbb90f
-
SSDEEP
1536:1h6mYMqoP5kxmgqEwnuMOv58yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP9:rzM8yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d006a2bd7701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8E56F31-6D6A-11EF-94A4-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008187e8e4cca541a4b671bbd622ed5953281ea3aee1324957d8bf415706307b95000000000e8000000002000020000000aa097ca11bf2ebe6b3fa55f44735d0bf54beb843b0db2b78db05065e321b4c9020000000a46f2967fb82688f65b22af233dc11290560e9d651cb753a22591244d32db5ad400000007c913606f9d3d405295a11a5e950939e64c7d77793fbf721e1c9f95f14a17625b5d8157fc92dcf99688f6e30c027fb555d6773b4ad5bead944b1ee926382cda3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431911010" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1880 iexplore.exe 1880 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1528 1880 iexplore.exe 30 PID 1880 wrote to memory of 1528 1880 iexplore.exe 30 PID 1880 wrote to memory of 1528 1880 iexplore.exe 30 PID 1880 wrote to memory of 1528 1880 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2fd31db31f80c110424ccbb9e67d863_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85749a1caf04d354f24a4d4dce7f38b
SHA1e97152c1bb05cebde3b9d4c46e692efe93e114ac
SHA256092a8b061fa6f4c7f1dff28454d3054b61f0652a3cf5d5dbe9a4439fc131ceb9
SHA5121166e652bc10bb418334ca8fb328ddb1648f8deffcef1a224f5f76d5c8afe9943c0d2b358a0b49301231c0458e920c08ffce73e67f49d7dab055e10c59e96efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d612c43d28519152c0eb193d32b174
SHA14702708e17d5047f580abbb91ecb176b187d7077
SHA256eff445eabf76939e75d8c9f12947025e3c9b6e5356862f887827edb8322be912
SHA512070ff89d48660f29360a1e42d129eb50d2659dd5eff22195295bcc7c184f9c4160c5dbe85681a93ddb3f54a9676036bafbe2d47c95680daf83f33a8a75ce952a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59939311405081435a1c8e5efeb3a1a52
SHA1bb91db3d4935a2f883682e5688841d680337a615
SHA25663cea1e171a32bb445a1763fa69617c6199ec248cc631c98afecc6d04d897b1d
SHA5122c3c83b8e9bfdbfbc77bd2f578ca49b5830b30f46a4fe0ea304ac44d1cdac8915ca497b7e4fdc0aca946da7fe3186285338fa88e56d184106eb3b9f370549f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632c6ec25fb219b54062965bf73aeaf6
SHA13ef7a74b45bd47d90e2679a89c5ae9026ec0515d
SHA256228b4b114823cdacb69da3362575268940efeecaa3b3ed14d6b5b0a9d55e839b
SHA512371da43266265049e7a475d5249ce699c806bc03dc42069d002e8281c7544170ae9a67dc71ac3b004208df58679e7d97b3863162d1401ececaf3aa22426a4271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d6c5ca14e960a49dc2a1d19e8b0a4b
SHA1d8ae850d6b846d215f5b0793e3750424d74744f3
SHA256b1f14d5e66379e6ff3fc68469ae72359e770e942f7bcf08da817dce785a38779
SHA5120cd399ff910561f3667685060f8974054e435413be0c7bea5cf6efe6fcb48ae68cdcef7dab94714f58b4807a02c988e44791e347db49a352ffba77ab3da94b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b12a0ccd7ff5732306b931f3f933a45
SHA17bbfc5ce2d7a0607a019b5813a803a1ff53aaf76
SHA256d04b0f7d37f65f7de5a1432f2016d26f539b820377ac81e55e8dbf180b55a6f5
SHA512956c10a17f219da73987bb069b60a1302893d6bcf0f2dfc7779baa79945d90fe20211f16052d06279100b4ee7e5596eb47998059a7b5d45b5352a562b58de399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c40684c7f264d7ed3a8f49116c5a2a0
SHA14ffba8a479e9fe0a7a48e5dd84e9793a3e6a47af
SHA256b79ecb50563ee4175bfde533914264e1e35262f590754c64dec5cc616e69333f
SHA5121aa8d10b88eabf9b387d2345fe5e31a04f7a8e5cfdc73215d3c571a7f6f9c3c68fd0c3e31825be5ba685815538505231a66e318c62847b55db3b5d1ee6924b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b6dd6f73be507d4197d0893e4414c9
SHA1b08c811484230e126271e49214f85589280bfcab
SHA2567dce52386fede7cc7de9e569280f1dc82bcac94bf9d97b634356392350709eb0
SHA5123f4a5db3d6bd312bab7d4f2388b951c58452e9f7038a067ec1a0f266608b88db767248b0e6656a07fc71969c6994180e323e4716789ad9e9e427f8bd203235ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea66f3ed5e1bbbea99758bc14b9ed55
SHA1eec3811e8c3c46d8fa37a2c7f3c8796e577e576c
SHA2561a559512c6f2c47ffdc64dc1210f41128f3a1a6176046f13cded8ca823f130de
SHA5124aceacd337c35eeae780c49bfe2f7cf75f684b62bd2f4ad1f18dd4a87e39eb0c376ae0f65edbf6e5cbe07c801f5f011c802ab01688e282debf6696c57fb9a5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f6416608d1e604902c630908ab2928
SHA16818cc4e674a62d05dc0eaa063838bf43555687b
SHA256673efd80af92d068436c8b632a2f486acde2a55ed10489436e4f43322d3223d8
SHA5128293722858358022dc0476432611798e972d47880b94e37fccd4ebc63d378c973f9790691eead625ded356311ee0637a35cd8a82e5dd3e0f80956dbedf6fe27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71097b87ce99784b59efdfea16f7ff4
SHA1efc2c1e65f60f70c22ff5b70c5541ea7e7ff1fe1
SHA25618791bb4dbd8a6c87996b0ff1debbc97f75086e07354c1a268d37ae1b4fdbb6b
SHA5127743f43e9777f47473d2b26eee9a8793771f160bd9d2ad694907df242346a236d58e8676c7fbfa14091d671348d675db9edf4c07475b7e2bb5ae4fb76e0e8117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c82dd1ffda0b00d2437218f0464c09
SHA17de0aca9c20659c372190da84dac0ac63883d738
SHA2564024b05f522788d98ec6f08f5ece54c7b759bb8ff8157377672d20a371a17214
SHA5123f3dd5bdaaa789f3031e1717c6ad0eb8637ae34cc8eae8a8e7235f08758e37938429554d1154137831223d3e5de0da628479152572664ac2455d5d7a4ebfab7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbb978d9087e02100c9e530e5c820c4
SHA14c84284c95f87a6fafa0bba555ce563ff8fa852d
SHA2568fd2c5adab94ef87b060f6da8860a224a1c6279f64a244b209a9974c1ac61875
SHA512ae08dfeb3abd9a406d340a303e49fcc33b5204e8a9ff6c02fd74ed1f25b3471fa13c7272f0e9362ac58dfee82c376a913328c5b062a776eee47c78038fc847fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b3c3043702a9f5171e56f19d3e6ed3
SHA1210760731df261dfe1b9a7c23b111d5500c13d30
SHA256d2e993ac25b9e71a415fb54880f71a54cf75dc187c818a5430209a0c407b0d3c
SHA51290358703717445ae08d5eb4c33935bd8d230d6e3942cd097b6dfce8acc3464218d89399673a14071f50e0779fcd78eeb48a26f4a234a9b36a140b9cf0fb21abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5febc8128ca8a1183656f5a44e5369720
SHA163073fa79449a30afd33139ef34c25256a689189
SHA25635c3102a0bb1ff2749ac3bc08abc98b4322fa458e6aafc9320de2dd4c52eefb1
SHA512b9c2ab350b37642f2d1f05632a7753d18707a6e8031c1cbf660e08849a5bd98d7fdfc5ca1e68a4872ed5039effb405d7a6c005a20422955f881dd911cd2afcf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52edf67e7c2f40e9ae9e34718fdfa4798
SHA11eb4d32f1393ca586eac65c172f9feadca62c20b
SHA25631e03aaf71403b70362102aed5acfbdbd5178d99d17d5b4325f46209ded1f667
SHA5129ec9bb44479b408c3f0fad9565a455e6c4c17686194ac7afeb0834ec039efd2a6e3d085f16c4649345ff21c9d1d5627915189fdc524ad9411770f5e9f6761f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744604bd14e182e95180911366e2b9ae
SHA1f3a0b08c85e1382b4ed433453ea958c30f5ab340
SHA256edc7796262227a1b0d9b344e0cd7ce9ffbff88a06db926b1c63e1b15b49c0fcd
SHA5123643b118fca3a29dbd66b5d8dbf4e138c35cbce3486dd5c9940e44479b40d328a01451b13c9c0ece6b24d7727aec8ef57aeae3b60544649a7f12890085481a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed175489054bda1ae9b2f755810f127
SHA1818c93bc6d3d927cd545fce614ccfa74ea7594f1
SHA256281f5dfec87a523b2fcefac9708f6b9dc66940a3a909bd885cf6c63d406d1117
SHA512116245aacde0193604cc0f5fe607dbda44ce78f69de35fbb44952da87f733fc33c941d84a95eab2093ea4c0ac1d4e4e7cba9f6f2cdf7cb4ac1d0dce8fa6418e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b