Analysis
-
max time kernel
69s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
d0f46b5c6bfb1685220a5692bb4bc860_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d0f46b5c6bfb1685220a5692bb4bc860_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0f46b5c6bfb1685220a5692bb4bc860_JaffaCakes118.html
-
Size
41KB
-
MD5
d0f46b5c6bfb1685220a5692bb4bc860
-
SHA1
93f78042890067dd2e3698a0577589a9d9e39f78
-
SHA256
1d7070d67794da16e0cc664c87e5a1382687f72b51a755b24b2f6e4764cbb295
-
SHA512
1e8f3ef8c1103b75254e444775a1d4230b20ba2c3c0b99cab88c6c0c0de43e8811f64fbe113863342f2c593ad7d11a0e285c7329b8cd7ae47083afd59befbff0
-
SSDEEP
384:oTIzUXuRmkYPl40H1WMlnMtA55jyA1LRaZ5JUQvoVo0lR95R:ok+uR9w95R
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431840559" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a6b6b4d300db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000dd757fa215b445a6737c4c3e22d332a1d649ca4d2eb7d03f934bdca3413af23a000000000e800000000200002000000078c800c23a5d7a6331f9a6e2ce99710c02a73e0936bd1dcf0858b072d640a0fd2000000076b089fcf85f87f55d624ec8934d9db2cf771aeb5bcc01f10c3e0543280cf0d5400000006972b0eb3324c8927fb663ae334b401835fb60648f74b83b08821cb38d9da7ed13c7a0aeba44e17be33964fce92f6726338724abc5842cda7a702d467e89e5f3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0362D11-6CC6-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1328 iexplore.exe 1328 iexplore.exe 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 588 1328 iexplore.exe 30 PID 1328 wrote to memory of 588 1328 iexplore.exe 30 PID 1328 wrote to memory of 588 1328 iexplore.exe 30 PID 1328 wrote to memory of 588 1328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0f46b5c6bfb1685220a5692bb4bc860_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1e2f29499833fafca4c17e4745b3c1
SHA197a8480b75dc801f3532414746860240b8b4d6ce
SHA2564b94edb030e6eeea275e338ff8330c8023ecbdcca60ff4298c07e9e80a8e6381
SHA512d0aecbdc4ea33971ffd60c6c00c437bc929900ef709bd258d95922fe38424e67b6348f6249e28666daa3c169121cf7256cff2017e12a2074c572d1352dd53875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c817d7ea12b56e63fe55401adf7ff64
SHA1af6c818c6fc7cb66fdb827c0724b2834e5efeafe
SHA2564bd87505a701836431eb54c0592cef35f40dfaa87cc33fd87bc7408e0272e727
SHA51280dc42a4df015b4b6875af7c7a7b2e33553c253d65a657b9c9efb511c25ba0f415a6107165a00d77bd2b1fb3ad09a8da150e4472ae55f42d1c27ef7fa8a583cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301f60b4daa070f10e5e49d5d78affe7
SHA1af1b475d966c8d540476fdc28893525c318aeb27
SHA256a1dd9599b2753eb3482bda505a6d5876f3c3be1acdccb254535afd229f473ec3
SHA51229df9d5166e2953e7af1019e2788dc9f40025e074b3743c9b2c14bc88163f0e60c75872724da86c94759ffe54b9b0646037abf9fcecfdd96c99701f8b315e4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d68a3133658bef67c86fd328066eaf
SHA1099a25b6ac6dbd8a62a88b4919b000ab2404144a
SHA256099e0a9252c85db5fbd7037f44caf9cd404e9ca2ac8692ecc5a5c59042a2912d
SHA512d21299bd9ddec760bd8510f1eddaa5d1e6f0079347c768ff50e0926ba2375c04c30c4f7fcd34b3c569051c06666ec2e443b1be132983587b8a1fed5660d3f41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5506bda7cb1b72c25329036161ad4c53b
SHA1a9ab57e511f604f8a845af2355cbe666d80820e2
SHA2561a098e9e91fed4d2651707c9773a47a3434360e92764e41f750ecab55ba6544e
SHA512a38ed5ea34769ad5b622b01a7a844cdeb0146845f7d7a9c77897a90d62f20fdbd6ffbdaea44e686d2c55ca79efab5269284d741072e196fb3577d11ab110dca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c7accaff4a3c8ae10e81b5f3dbc3e8
SHA1ad2c55310bac307e6d851eaad27217128ec987d4
SHA256d0c5c5bbf1a82adda5dd74a1856651f077c583e596fd5a0118610e434fc685ee
SHA5126c4690591377f05124db1e2074ed73c769e3ad468dcabc946d70cc4c33b82bf2a1a7b00202fcb59822a9bb199007bca55d393da1aff52bbaddfdde62a203bdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adbbe84e21cb5dd540f416019101c7ba
SHA1339ea79666e46e1c6eddfcef8c3f85230c5608de
SHA256203b30846129c38f68192de94f4197633ba31a4d47d8da3987dda083d9c44cc2
SHA512659efad26ad03ed4996ddac8c73fdea0cb9397935205e1ffdec1ff3ee28ee205ae8d817225b9e599de0d3ea998a6eb31d10f94758421b7724ac9e1c35c29623f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0a8980ef47b4fc752ef8efc1545de0
SHA1ec990572594dbaeaff27be3ee96561694590f32f
SHA256b9e04cf0b91fbb7ef98c6d4e9b6a966fa847f1cc4c8eb25029e3103d16e4b1e4
SHA512a44a6f2b29773bcaed7cffa1742411475b46befb003ba90317ae587459581c7acd4c692a9558666d62c40e9218de634cd891a549d209e5860daf35373e3dff35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a6003aa639e18df39bf1e7fa5934bd
SHA1e1b648876fec6ffe37a93df195af79124a57c8bc
SHA256e106c87e611b2cdbc585fba646a2edc13d9087411315b764e3c8988d9ef97bc0
SHA5120a2b957691281880f1b616b4d480a03c878c267e1ca6df0f37527ea14a898733b346b8ed2f382e9d294680effae3d7df80f4f301193c2abcbb54e0ae16d07fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87e05554ee88bc60bc54bbdb24bb5de
SHA1eec1d6a6adf331d9c873fc7d378f79f8eea6e743
SHA256d405da62138c25cfe3efd2673590667a23897e0a6fd4de175fe548860125a6c5
SHA51235bdaa35d57bfb3f8c6787fccd31e378b15cc5c113fb8f5d2aba6604b587082dcc96b3ba690fda62136ea76fc2204d612953d92a050f9ab5e414027631196477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b2ee58478724dd0568aad0e5dd3ec6
SHA145b3bbcf469577436c6d020afbc34b83253c1a6f
SHA256df10b6f61dc2864c6a3dd0a17537d4304529f2640886e678c83f402a8dc80efd
SHA512fabf9c52b67aa36f650d0fed25f95b0c15192655b6317cb12b7557bfc4bccb63155816b8722f56d8013919249b1a14e0eac67f0835e8be9754d6aa1f50746af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e05dad86f9860da8dc077807738596
SHA1b7641bb8628afa5016bc82e2f91cc91e0e73e352
SHA256e9c45b6ef8d766973e3f1096ea16fd7301c8804cdb46ea0990aa663278f5fb13
SHA512bf7a79ec9ce903115c2d839a51fc7d5f665c6e4140b555e913c0a77bb7004453c5d5961d4e03a299f166f5346d33934025b479e360a10efbf4c0518b03c29e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154a500a2ec43d34ed95e3e963232145
SHA17487b5310dbb6156e79d394d02c87e382c9bc426
SHA2566dfce3a5190232c7c96d86aafae150cfd1ab2f87e2c7344562cabec6bfb95b69
SHA51214b69985c4ec0820808453ff5fbe8f49535d011defdafbf65480faccb0db13cd42b31537b19ccbaacb6d3dc00a7791360cdfc575a02bea2baa4907b0afa556ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5511a8680be6ca570989f57aa82ce78b7
SHA11999dcc775ed864edd2ec92b0e2452ae35673186
SHA256a81a86772fbc8a865ddd3b64ec68727252cb4081599aa11ed7622139f79e3a7d
SHA51249259c6cae24d824fd35765b0a731c8245bc435f09086badb42f5d15f5f1734dc28cbe2a4319ae6a7c34c366a427e2e7878b3bd070094760ee4658293b15ff96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9439a49b6af63a1b4d97f4e65bfbb7f
SHA17578e2d06bf6f9ec67a6274ebf176f688f0094e4
SHA25671cd57bef50465280c2d81220bbc40276e381ad3d222071371f508b61d8074ba
SHA512b7e8ae6ca1b897f929c7329ebe5146d05275a2500b65727be1869164737adab81c0f490bac772b33759e2fee5c6d33b80158680d3d1c31f7edcf333e957aa43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571356b6375e1a80ac773895972260c5c
SHA186c4e5080511542662d7d5cedace349995c4e7f3
SHA25663af60877b5d14368f5935c345fab6d9bf0b5206b484b3f6017704590fd51e44
SHA5124c5ff5bf23ab77a22765be57c43e075fe7e4d215737fd85891faa5915c560ba17d3318f42695870e4209e461828f9c39c8817d43ece0e80d25f136cfcf5ce00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52708bfbc6048deeb4b28f9cd50efb678
SHA1ef582c77b0a174dcdc272c8aed240a26e7c106f8
SHA25670773dfde18b199dafd00283bd947e74abd26745d434bd6239d90c6df84a0b8d
SHA512d103fc6581e498eee6be5db23ae37d063c0dedf452b1baaf7a461f284cbf61319cadea9ece28ac17cacf2eba3c04e6a919115ac84b2b2f5c689d1d2730091080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718e1dc2a877afb17125de827490fbdc
SHA1d38a778e27b2177447896f56c3d6f7931bcf68ab
SHA256189d5b8b682cc0c805eab52dfdfe384ba312c7c63bf9ef41d7c4ffbe2bb58e14
SHA51205fc5aa699e9ae14725f0c75793f49498d1e5c452812568cf6c59c6d7a999cdad935b6e8aa40ada25134a4e5322db4913dd2909a968a9cb264a0b73e8f6b56cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779b8d2a2d25f6eba61fc5da00a2436f
SHA1c9f253ec4e71685e552e2485be4ad8a50f72add7
SHA256f12e95e7eac4db6d74cbc72561c68d76e14facd45b13772abf5dec9acc76f599
SHA512a40f95bdf069fe4a40dca36af1457ce8337a3f1dcab49ec6c81f7275fb42feb9957d28f53d612ef1ec1148aa74c281523f7008bfbf659b1196dd699c513a26c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b