Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
d0e43c7561fa1f6299ef1b85c5a711da_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0e43c7561fa1f6299ef1b85c5a711da_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0e43c7561fa1f6299ef1b85c5a711da_JaffaCakes118.html
-
Size
13KB
-
MD5
d0e43c7561fa1f6299ef1b85c5a711da
-
SHA1
fb169e7d0c11c65950f2157a56f1585363c9d513
-
SHA256
c7022f7a58163852e7aff7b6ecbf13687e0fbabf77e4b4941df44e85a6564038
-
SHA512
bccf5d6d02607ec47d2239c46236d149837ff14fcc3872b51292e35bbc9d51124869b1a7d40b623c8181456fb101c8c70139f961f8ca97852ea1eac26173d923
-
SSDEEP
384:Jp9awmfeWxm4yqebrb8tUveQB/wTGeWxmpYOpTsraQ1dUS:3OpTivuS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D36CC01-6CC1-11EF-B38B-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e099e701ce00db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431838136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b5d684a984d0c242388d92eb439a139fbb86c67566de49c1468a84e5c49cbdc1000000000e80000000020000200000007f2f02651ac949f65b1a3b845d00b1293c3d17f4c88c039e738934b07f915dd1200000005276f531bcb4657143e4f5ae5af6594688cc7acfb54bfbd25cd3101de4de276640000000f6579a6282070b811a3491fcadb7d55cc57fb86a5860e25381aaf4316604989ae23445213e6eb9116aaf071a4b40daba628003b6c73c3be3345978618c606b1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000000a7dde68f5bbc1c65c342f3aef90ca81c4ae6472ef84401f4fb6cda221b55def000000000e800000000200002000000060751fe425e7f3a391dc52865313145a6ee1ea83bb3da0fa01c6fcc2494fa90490000000b8909985f31c715931a7c110b11d37530c6c925fac2d6a26ec0d4a0ad9959c04238b07e061df769109d2bec11efc1aaad97eb73892de2f84ea523c5040ec10dea090d25c2ec26fb5d7e75159cce397cfc0b5f67fa506c2e1333a5be4b23bf6aa65198aafb898d0e8e2e2161e908af28c8bc45b8e7ae9e776709b9781b413c904716af413119053c90bc7079812dc4bc540000000308fff23593ec6a44e8dea2dc33a98087798c4971b78024f51a771fc9451e7b850603cb4cd77708163321a402b9c292b1f107d0ba11ddf61e2c744fe4d31fc59 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2524 2344 iexplore.exe 30 PID 2344 wrote to memory of 2524 2344 iexplore.exe 30 PID 2344 wrote to memory of 2524 2344 iexplore.exe 30 PID 2344 wrote to memory of 2524 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0e43c7561fa1f6299ef1b85c5a711da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b6161bf9c04959392ea32f28317c6a
SHA1dacbbbdc19fd7db699aba36904028a5ff3bfb768
SHA256a0d6bb0aab8b3fa581b0925bb002452dde1bf4c6f264071c6027358b582a0794
SHA51267bc395eafa7ec2791fb63732ffb898f6c3a295df79f3fcd05b0e6b98ed18b8300ebd5c2f31d091f17d8d8571bcb913ba58bb50556979982e9d5314d861faa40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c226d9e61dfa4bfbf12fbfa3a0faf8
SHA1fd286524edfecf82380d2d844df98d40f1c19c45
SHA256e2f11c2faf89ed9e2b1fc8afa645b51384d1678f905f27fc9d6f47419a7641da
SHA512c922b852d70d4393546389333be164388a36d6dbb15b5795b5feff805104b7c0c1dc54a20ce67ae971f13f339909d6a3cc966cdd88fc7f029d1a439da34becfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec31eb177fc3f7cb309f37a9cacaadd3
SHA1a3d5776acb5229ca3a5cd26f5372b6b90501bed3
SHA2567c5acb4137c3dc93b5839d381c78af2abb58285d667fb8d9fd0862eec0479449
SHA51225e168d08a984cb91f3aa6741a4bc1577000cd13f84cfbb7b086c8862568958abe3a058217152a1359ae957414b28f354f4a0d346dab6c5b9837b148564d5569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1afe498f4c154958c5c815cbc745612
SHA12637e004c90e67a6aa436f7eaea06376706c1bf7
SHA25655ffbe7d5a926dc8d25ab8bbaf257fb29c3c88bac7badf436e6f0344e5193ea8
SHA512712134164e338bf1c87d3390ec496ef5431b80f690eb7834f23ba679e2eecb3df4e55563d6c4343755fdfd64da05b4a2e21aab23c35176ae445a660c4994d9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68fc6d21f3c37ec6b626ac9105b63a6
SHA1ea327c85ac72566b091356047cf0f4cc3f7fd9e5
SHA256cb96e30ab03e236287d523bf76646034ff8bd9ae795d26e640eb26b28d2bdf79
SHA512052efe073327a47028f710eb405e7a2f34d1594b353efddc29f490211da7ee2cf84d573d608aa444a63b93f93f6ee817047f59952770e702d59deecb3c844846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f31f245f3e9e9e6dcaac60aebd097b
SHA1a82d7b4b95253b0b231df0d117509a70776778d9
SHA2563346d696ad90794e04a5eb83da2efebf050e2e38f81b2d0599e06550a99d5f7a
SHA512d14da2b6e17af22d7ca8225b255dae497e8342b435a3b0039343fe03f5f71e052acc027f91a15144da6a99693d465f9c6daae2b897c609d12eadd7147b557faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df603a140a3ceedb4b486e5e7ab9bbf
SHA165c95858f7ea2561683ee344cb0896e3934bc077
SHA25680851516f23d86172352eb2085e8e345a5d15f2dd5ce185fb0e010fb5e614b09
SHA5126b79388e514b493b5f16d614df7c031ae520f124b9e44b41a60713f84d7316cacddf04b13e0e842a41e9966e527fa3fe0e7c782f67eff0a93c6a5934264acc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253c9a0c32222e2a6470e944c8f09010
SHA180ee1b89233b69e4b0b3be2a73fbfcbb0e1d2dbf
SHA25620ee5dc0c2448ea7ace743d406a7d98f1eec6b360c91e4c6bf55157618fa0d62
SHA512ec096eba1ba4248d2c67fd96534c7ee17ae1722b1a26735df988ba3cdd3564f16a9ff62b57742d457b106432ead20da28a56fab51ba27bb479702cc23d080870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2ccdfaabc78bb4ab22b3366ff0bab7
SHA1a8716d2e139522e9d12eb2c9e69c0f59abb96d14
SHA2564f37b59c8c98f1179845b8bb625927225ed3236e297f578d33d52d6bded7ff2e
SHA512de374c6d39e98d32c878bfd43642fc040a8841046f06cbc39d01a1998b1b5ddb33dc8d4da08b7eefebead4dd79c48cf786e5875bd408d52cd56bfc7a0a4e7b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8769067a5bd212933ea2637dbd37b66
SHA194f31da0fb056ff899fb1986ca7cfb5925aea182
SHA256b693fc6e2a018762a1461b7c7bee1be85a0ff3deef6036dca22fda41aba768d7
SHA5120df04757ea1738ec87bdbf30d76998a32b2a256836330fb4b7e018e22f7349278a998c43ab45349a3769dbd188ff06fb14331bd0ae7e358959683f7e0641ab3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6268e38914331ff0254639fedcb08f0
SHA122104a889d3e2f0f65fd865f8442b052496f2ee1
SHA25609f65d9ce402cdfea42aa4923bdee79469cf156b6c7ef2c533c7f81256d49bb5
SHA512aeea8b8f692cea48caf12e6faaa73354ed0f48c4ef2c0bae64d18947d1516a0c42df13d87a5efe12495f004d781e91b2d2c60c5555c02c6483510c02574da73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef93d987de83170e2e8e2a5dd5fbeeb
SHA121e187c68f8ff7648eadd0469d1478b48afdb13c
SHA25632e1030d495a2596c01e68b18a83572ee205fa0fe6420a144897e335fc2baf72
SHA5128aefb01b303a613f03a6e26d1cedc42fef6e481196a21d4bbca7c10774f51c938539d21133c89ef71c63a9355de852090e2bc100feded02d92315600f96282e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50158378ac5ddea8a1562549aabdc13a4
SHA1695353cd71b4c98b9a786a4b57d5dd3bdd18deb2
SHA2565e455334ac5e410dddd9520b90cc45c4e80368bba85d7a0844d8cad4a654f661
SHA512a01baaf035724739243fbd971d64a86be01737ce9802582c45f4c19e78e70e467eed7e003bddc7d598198f450c2032af7fd40beed205353da76ae80f2b08b6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50960b75e86b913c0e6c5ddef54d42ef0
SHA11aedbd212df3ca0eb3b0962742f62f1500c3f843
SHA256b9d6a26a967f69084c6b051b03655cae23100301ccddb073132fb0edcaf55cf5
SHA5127247641a112b8a41d6d8dd7705822904c0600992696af1dd491de46f155406543bed3b09b0a3aefae412d7301c079b49522d9cdeeb01e52b4a1d39e8bda118c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee8261c402110f6733b05a579846f65
SHA1a84494ce314ec386c2f8f64fe989253e26aa5780
SHA256f19d66c26bd4dc336ca191087ea26d988d4d2829105465dbe04e8c43134c3934
SHA512d695e76e008c82c9fcd70db3e027262651eecf3edfe5e17eafd496839bc3c9fd0a5fa84cf7803e2d143d9349762d54f50d42c9e93e5109336caa1c56cb224827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5808b735b51b9d15a21cf256fecfb76
SHA1c04fc743f5ce7060f6199e526534519ddeba82e0
SHA25687a9c38576e5013f7be81f80cdc69fd436e323a9c17ebd38c3c358281e0ec18b
SHA512c43ccce362de636b93a7c85e21fb85ebe7e1e250fc1d40f7fb56e6c223a5ae0fc70a0bf298c64647a8420f5b14662b05c502d4b9a862950f019013bc74b7306e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139f18e5308e67efa4b8e8e23c6c5599
SHA18e3f7ea20c79fa982593aaa241ed76976d030cbb
SHA256a33678a49d25032f08a9b1315de0e4c0a4b9ef859a36cf5da9984095c1ca2c32
SHA512b7912d3529cd5f64bbc5267e7064eb280ed94c8c4e631104fdb2d561c7c3ee9c082a4bdb94d366767d2db87f59a07e732f273c1b1b9f365d13f3b45589380b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc3038944febfa67cfb7f5416dd01fc
SHA167e9a68926887be86aa4e6d120c4959bd7cd47e8
SHA256f15c718c7d8019ee67b0f72475eada9d0aa3479369ebade5279433bea1867e2f
SHA5123c7204a993222bda2e59c72080c14af5e795f8a0179a6c338a591e9a1839b04b528e9f8dbcc777719f3af5fb4a467117cbeb6153fb02bcd495b701235de70f8a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b