Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
d2ffa156055d857609e12cf811d153ee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2ffa156055d857609e12cf811d153ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2ffa156055d857609e12cf811d153ee_JaffaCakes118.html
-
Size
28KB
-
MD5
d2ffa156055d857609e12cf811d153ee
-
SHA1
f557a7ce8b6955ec43f12540fcc7e6e3ae5a41a4
-
SHA256
a9661fb978f0caf789d94c12a8888e179203b3178075c963f60c369410e09e0a
-
SHA512
76ad47bac3f7873ac77fc73c47cea76469bb4f253e3742af0ae1e9a83901f6af95c6a7ae19c249205c249a1f63fff474d966fa2f210eb329b3fabb3492254949
-
SSDEEP
192:uWDxjb5nWJynQjxn5Q/snQiePNnjnQOkEntwCnQTbnhnQTXClAWaEAWcwqHAVKQv:eQ/hGUi5p
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF966921-6D6B-11EF-B57C-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431911399" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000005b5bca64e12bf6e3038c792b37363ab481d5c1b671c5d8f36b1767387fdffe97000000000e8000000002000020000000730da90f464eb25f4305573440e2420c98ac22c31d04475a96116e92ac95ef642000000070df8a1df481b69ffddd5bbe9b43e3aef1d499df592ebcd451a2a90d2bd269dc400000000bf7615f45dc99d1d5c3ea248376316b7fd12f04505113e5d453c002c2198e7c8251100b71bc94261b43fa02d1d0469d78f25d252074c4882ce98846c4d1fe6d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cb4daa7801db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3032 2380 iexplore.exe 30 PID 2380 wrote to memory of 3032 2380 iexplore.exe 30 PID 2380 wrote to memory of 3032 2380 iexplore.exe 30 PID 2380 wrote to memory of 3032 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2ffa156055d857609e12cf811d153ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c609a1b344a56d27755ada249fc282fb
SHA110abf8528d8e626e02ab8880e1c219a41680e8f2
SHA256dc930758619ee29b90c023dae962a13724de5e7f6e720fda257d06e96ab86815
SHA5126712ceaa013283688e8dbcfe233a3b056c826b27f26279f0d6bb4395a3762224d8a5858716f83c65842ad99f441a240b49fca7bed173ad85a1d63d896ad96e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2ab55df2e782eabd1b56e7f356b0cf
SHA18cf65df5cef080abe4ffc225e063bce618fb7e08
SHA256a6cb1231602fb2b6a5b39e38fb6a4742c2c10a8e85abf0f718379e52fa0dc966
SHA51270d9ae11d91ecd2c04883409ce4c4c87c1f3d4df35d6fc116ac5dbbc46ef18ed6e4758c087211addf8b792e84b32581ab7540d784ade1fd8ee88b1f876dfef64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce38bb5d430f86c08ef62bdd86efadb
SHA1175c338259b3477c4adecb682cabb4c42c017955
SHA256d13afc8c96f5d36402831ff9abf731846b7510b9f8c74a871761cd6ffe6817f8
SHA5120f44efb1d089847fe0477fc55c605ff60169f4b8c787c0de41e2a88b635873425891c0ab5f27804f922e133550f5a181d12fa5d56458eed89f6b57d731276f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee809b6e43b77598408c6cddd006429a
SHA1cb6548d5427dc302b228ba35b0d17ba7b598cb37
SHA256a7b55cd55315dad3bec6577a83fad46de0a6f38f86c22f63d912f89b3d7c2620
SHA512463e88eb9bbc0cb4eaaa2ab15f1edfa2f30af9b3b8dc7b2ad09007a43fb986f298818fd0f36735b718624f9d3bc4ed9d5a06a0c1c84b760743cb4738fb620081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05c3826954b29bbb57faa9039fec499
SHA18b3933320f8b408aad9e7b31bcf09c1cf1fecc43
SHA25694ffb78402a6a41004d199ed84aba5baf7297632bdb8be64245af655b50c9d82
SHA51259a5b0ab486bd1e3461fcdf42d0b22de91b1be42c1d2cb93d48b202e4b5d3306db487dff54f591873d39da04a59b0e0beaa9db0a37723042f41a3cbe6b7b7eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51686ef132b85e0c348cd35ccc7b08f03
SHA134d2fadab962a411c1bfedd18a86648d0639e201
SHA2567d2afd2cffb8f012ce1f03c714d222b955cca2c42a85524d883bc72db2672995
SHA512d52fb66c68aceff16f10a1ee48e7281fdd016850fb3e251e49089ae36a400bcea8b4e8e699ccb58b0dc9df1f93f1cec3c91b1780b28df3b13e69abeaeb736921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb06dd6e43e24491d4c0d2c9cfdb5bc
SHA1383592400b6f5d95439ec41c12d862b9fc19e2ab
SHA2567d7eb02e042ac2d719ac87045590099651d23a74a56d452297e1845708371d16
SHA512f6155276865d45121f01ff64a48e9352ee53bbb7b37e5da5b7e660d357b6f7d858925eb471bbb590d2b33376537d037b440e98f8f2d3566f909533b7b5af2def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfc32f1af2c5b4ff2e6571eb776b7f8
SHA1e9f3670f9cadc6b9b711df81164796d890293629
SHA2567b2907665e0d3a4c922fc38e26dc9d2be83510ea95a127d92ebf00b33c65c01e
SHA5125dffd97eb8f13a98b290c183352e59a1db65006cb97f6e526c20fa26b3cf9766c9d2621c759c189cf0336b8e7e50e98f32ffa1842a5e824952553a06ad01394e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba5c2d19e4a7884160786ac9ce9c07c
SHA10284bbf1b46c000ccb57e9c657314efdc532cadc
SHA25622eb01dd07b29c28a60205e948e238cbba73cef78b9e74c27da71f30b0584ad7
SHA512fdccd3129cfe3c9bc56497ed2c0d8a60b65e5e8e1ce8c5e748a477a28a914c8d5fa39dd4f95639718b0c95361513f749bada2d9c467c434b028622214ad86c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd75bc4db7491eefaf1b419e6ce291ff
SHA1494366336c2cccf63d36b4225216f6c3c33afae7
SHA2566b4a9817597b83c97ab5c3bc8489fa941fd381339d4685b4364762e04c5c9cb4
SHA5129e000ec0492ac139fc0dc7e624082f16e51c19bf4d7a48e5535e25e7b73c87f5620184cedb08286d9931e206b110391ecc45d8567866555b39bcd51f7d223fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a202e46ca67d7c178158556a900cbd39
SHA182edce06c4acbc4978a74c76ebbbf08c44f2bae5
SHA256b4a77aa6eec4530a98e6b8c7a54b539d2039c768ec907aa29489d8aa6b7f2116
SHA512dadba407d78c89d167b8796fc34509bdbda230e86f6f6e61ade2eadfeddb7209c27085698f117ca37b16ee51b89d559834ab056e638baabee47a1d33517a5809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef1bf89125bbd63a2eda406f3aa787c
SHA1994757f56e11f030dc7a57e844844920f6da27b4
SHA2560ed4e2b5af4564a42b1e4f91c2389277ee4255eeedfa771db7bf15d860d15878
SHA51208666cc38975b6ecb16111f91d26d246b39f027cff220842d675a2c27d632e0c227a215dc65bd0d23a2706307a2f3c3d6123b3ab8acc036d50462555ec4368f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c94d726c66df57db5f67814cae8b270
SHA1bbe9f4c260d0f6d349f113ac5c036d9fd3048f8f
SHA25673bf1c6a29c6ceff784d42330dc61fb9644aa34d2b9248f7822a66e0070a3a1e
SHA512533aec28d0963ea3562e2d93349d1eafb4be4a7c44fab6a4869f9c98af41448e345aac12084e95ef1841ec4ed55884c2cc2a49d9cf933605095fa7fa9cea642f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58644d7464bc33b937428d9a6135a286b
SHA1a4d89f461622d28ccf09aec24f7d792eabcafb65
SHA256d1ca5eac69a9ed13b2ce4215956ef11696c2cdbe0763abb0992c9e7baf3bc02f
SHA512ebfc669ec473b3a7f1502025134ab74adad1f5bddf158c092b5c32b66e8d62b51ab0885f50b4ba526cbe8ed0d9e794420f480e3ea1202e1d3e03ae81f1a36b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b5135a938ae5b3949a7d030206fe9a
SHA142af472bd39db0e8690bb8295391c9377b800e67
SHA2565d61a5cd86b66d4588f51d89a8b1c29605a374b4b27534b048b2c06ea9c12215
SHA512d3b9438e01bacddfd1a65818caa50266d84ec2b8174e291e3479eae1d0bb518af9eb6fd609b864c3e254cb3a3c33c8e063b0aa0d53583124a0f38423b6c2585c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e235edd56ac799fd525654fbe805e2c
SHA17058a047763b304f90e65668efbd227f1bbe6250
SHA2561c1473bfb577db9e1846c61aded436222d6c17aad8fdc2c19cab2d1da62d2f0a
SHA5123b2d1b422b7b84ca7bc6b56cb1611cdfb626713ba72bbd54bca2df06f133ba703296eff397584f8002109c1c28b20dc919a8b6c2961845d22298b09d6066f8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcb5612f69424a1bc0a864896b4a503
SHA1f8bc613ecd614962ca824a267fef193989d37e71
SHA256e10cdbc79c287a4cdb8711035eb464275fcef860b8427195b1c8b76e12674c5e
SHA5122f89ae4013029317fc712140c95244d1014ba65759431113790ab9cb3de2faaef0c682f3a3bc1fe1bda75d0baf150150f2095f51503e31e80f242da0fc49cb57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69908301e291c7bab153f3468284751
SHA11877316a25ace8e094caf0f4fde0a6a283800865
SHA256581910354d619fe69ff92b12e9654dea4ad178a103baf95cc4519fc42282c01b
SHA5120ab7037370f21d56b8b2433bd12b63313ef6969957dfae3076d7c09ea1bac810bda8fbce444fddb4696f810f68a2ba35a2bb36a0716e305f5b4fb26b1e541deb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b