Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
d10285e310e6e54f1a0f624f046869dd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d10285e310e6e54f1a0f624f046869dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d10285e310e6e54f1a0f624f046869dd_JaffaCakes118.html
-
Size
1.3MB
-
MD5
d10285e310e6e54f1a0f624f046869dd
-
SHA1
cd948a8b3ff6ae4949dac334bf5cb36fec9438c8
-
SHA256
01d7de57f42bd5e44409ffeb091bce6363c7a0a877a799e6e4883e3a1c75ad54
-
SHA512
c95d10e3f00986f317e5c4dd520dbee4348fddc046c2f62dd1d16f854961cb1668624f2bdd1521f02fe4e7c3e09c44135e5be389ef703744b4e91048eeaeaf38
-
SSDEEP
12288:K5d+X3mjFtGO6DTLWHICJ5d+X3mjFtGO6DTLWHICe5d+X3mjFtGO6DTLWHICm:g+GIO6viz+GIO6viC+GIO6vi4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20889e4dd900db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E43DA41-6CCC-11EF-9D58-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431842916" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008f814568114d745caec453b6391511747c9cd254fb9cb98d875e364314433a57000000000e8000000002000020000000d6df74ebb457d882c5999555b466698e6f43c2cc48706942ed3d33a290191baa2000000055d963dca462881a057dc33db4006fed8cf5ab10e19bfc0936de7cb425d1461340000000c46096e5ba6dc1ce44670cd00666f8cd56ee8cce1bf06bc150c3cba4f7def280f092dfafe669b71d3d74920a40c1bb691296dc893732997171609c872c573b18 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2152 1732 iexplore.exe 30 PID 1732 wrote to memory of 2152 1732 iexplore.exe 30 PID 1732 wrote to memory of 2152 1732 iexplore.exe 30 PID 1732 wrote to memory of 2152 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d10285e310e6e54f1a0f624f046869dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b036227e0d26864ec34431744af836c8
SHA1644a2aa2b9ddbf0789c04f7723d621959dd1f75c
SHA256abfe01eb0da10cddf5df89f5e85b621e4086a6e0534ebd5579ef7e9f7e6214fd
SHA512c8d29d957b1a67963e3aa86de9c2e4da95b8dcfc2c84e185fab746ed44f6da6ac25e193bc3db292cf365fdcb2da117b15f0c909faa2ecf2cfd960a3dbaf34cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c8029c289f0c4ce7e688b2e3341b41
SHA193733232d5620279cc8466bc6f8c1d2caeae984e
SHA256b90c54af1d4bf60893a81b0786041646951c8cc4b9c36f421980ee2a3288a2c6
SHA512c7691a9b597f541f920605daa0ead066a08a0e1d7f668ebc684a95c9e60d7c9ba3c5908ef47bea492a7abad8fb1d1d9a162839a70fde872298cbadbcce0c43f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088507ba1c9ca52c47d7144c2814149b
SHA1595fd38c2c475ee3baf361de35c7e2958d532b2c
SHA256c60f97f646df37d9bdd562d23c83a0e71dbff5e716fcced071ac3551db54113b
SHA5120f0840d2967f4d104f0cfe67e1fdc24d7b860e8a6a0e132dc3e3e8753ba9dd42a584d38207fc15d4f97b5047f99acb7552d7720c3037a60fab4e3b8b66655e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c402a4a7c179ee0599734e18e53d241
SHA1f3bca53481a497574fb25c8976fd687706f576e0
SHA25639950589681303bfbff9143f5679ea6aa953488c07752e46f69e58b5a0d9f0c9
SHA5126f05a8e96ad2da82a656031620b3ed265564062242d4a4cb1aa874bedde093edd8097528a2a1abdc8f4970aa539c7db7e5a95878e435dc4f2d745fb88e6a0f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5152258ec4dcbe3e9069fef7bd0b3e939
SHA12a82a8c0f17fa1ea78d5f5d5cd2db17cef17ccad
SHA256fb116b917e33212aff8fe0f3ef8d6e8dce4fff20360ffb5a516d25b82f7c2b92
SHA512ed4061dc8c979e3686b999c3f6ae387950c83fa5778c6af1c100b1016fe67c49ef447046c75011000c9083b0fe527fcc64a7b0e60a5fc7c1dfa2261bc61e99b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751ebd47feb58595277c0ed427ac2c94
SHA1e4ee9b69ca73d0de14c360c44ab2c9fd5db5fc47
SHA256a3e45a09e57c88440ef2b68f04d57e0630a1edba7257295dced100e6c8c8dbde
SHA5126fdc76789b8de776907a2eedd230f85dc8c4aabe3d4280e26393c397f4c93482ee5ba9f20d05dac801595ad64163a6f11c8c685c210721119a67adec9993372b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ca772bbc7430191aad9cf224e50626
SHA1788853497508be1de3c68c698a455fb531c827ac
SHA25637562045e885b877f801a1af707ba5f16bc478b03d5139e25e02a31b47604b38
SHA512294fb234216f04c7d2af033d7a0dbde1021790b10f711e6546348f3770d9f2d3fab7422066562b2fa9babb10f499cb76e5e018a2c121ba6be6923bfedccd48ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c471d4dbac1ebba8bb898933153905cb
SHA1d77e8144c96b64342fbd765077a84b59f2b6c189
SHA256623628e06be57df62599c9a12885df0a4d0ef7f8056b3053b45581ffd3a1224e
SHA5127e0738d9aaea71640a7a5fe50ebee26c4511a16d8e5699277da3040d813e0064faf7c1cf871212c16993f7df8de8ffb1eb6be1b7af5bbfc661f77b9636bb37e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc2d8baeb9030ae78c07271abcd4062
SHA12a3654190a3f55e62e4df3b7691250dd512f8618
SHA25657a423b0f50263d026025571e224aee12765a35d57a3a30915f8fa410353c400
SHA512ef79d2a53dd1c96f08a7e7771683ca9c891ec84d534ffb3f8b3dcf21fb76641722806434774c52b65bf85f49fad5604726ebdca8ac4a3a1ef505777843797bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503eceee94f3d22c13a71d0d23a6f996e
SHA14b587abbfd157c9987fa106ebc2e1258da32c335
SHA256b5e30a400e4dca6501e332d5d7d0a097df5eddbcac346d9a2e6ebd69b06a0088
SHA5123571989bdb9ca2a02eadf11f19b4d2dc71a54642c76f5e6e3958b9c847b045c261faba3d3007549bafc9cc2375978384b80e38c11608bb93fbb388e3e83080e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8827f6690171d3197ab51b76539ead8
SHA1eee47e3a27db70e91894db5bca3a9adba6c6e260
SHA256a0a2b9562169872033bb64f438a7aa24cb8bfa4cfe9c32a5fbd02f28564cd3d8
SHA512bd5908d5d00cf6dc76bd65e0352fb258848722bdc0e162ba78160daea322427fa0d9312b117feebff6e80aa9013b1ffacb7f4688aab934787a14c25ec24efba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab80780f687399e55e81982312d5cf4
SHA141dfdaa16aad4111f043806708a40180ec192e12
SHA256c287e58f9cfb5dedf17509becde1e0ebf783bb491c0a3450d755ccc3b3c5a2c2
SHA512c0bb3832e3dcd3dc61e9bc3a129bcf170055977673008a119bef1e41e67fff7aabdf2dbbeaad2eeaf33e2926967c15a3fcdaf16a90f316d2ee92f0c7924109a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd92b3884e48fe7cf118c20acfd5709
SHA125084bd44496d072359a7b1718ee5c396c3de042
SHA256c0a3a21326437ec0dd2de5de4e48ecd7bfc736783fd8dabbebb39abffc36b655
SHA512b514c565c57c5387706fba2a37272cb93b3f85ad11585f8478beced94b644ad7d7a89e47f6f81d99f1edac0be49a3e95bdda572ef8e90fec2d5a04d8f0224204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74abaabb99b2ea3f5079b4107b0b1d2
SHA1c1d568a09cb389257a0cbd87cb2ec6d2f45676ac
SHA256192de31adbb2b4ef51868879c4c48d4bee1faffd54b04dbd9169cac06d6a9456
SHA5128146c53fca8c3472e6e5d70256db3653eb15ecb79723afa5d0c8e6021a4f686b141b1fab63ec79d41c198b3aa4f50cc4366b1c36b688f523045bab2c5d4cdcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699f90272fb82c6fdf4f3627860f16b9
SHA195df3491f88ff60e41d2ba6a2d9762a1551954c2
SHA2563f77f8e21634e3fc2e06680e42c7d4a85d9f8162692e8c7e278962decad44d46
SHA5121e0fd33f8c4714809d661cf7e0197150d580f8a3d5f1891cea81bc1ad6053afbf340e8c86ca4541058fba8d86d53197c59e40ad932cb850f685223098ac6733f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657869d2fa525e8bb38ed951f3e2de91
SHA1f50c27374b146df07f11c0f6174c0d46cc46cd37
SHA25636715f25f5a40d976d28084708e54d0592958dc3a8cbc87f5946a512b2833ce5
SHA512e0df300ba1d6aa32e86d87211f44decbe783bce8d6fb5570e5f4369c69d8278085ef535f2770f98372b9482c0d6cad088ebac538a5a047e1f8467c42bc6a7112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b384552087c63dad6a75a1309622c7e1
SHA1ce518be4fe0f7a5332e5fe131980fbd8cf6525ff
SHA2568e5cefdd9414b6731197197398719a627a98500bea499f97d84954bb3830519c
SHA5122b893d15fc120bc930cedcf2fdd74834486a01e06bb2147700ad99b31927c196f81f7a25bece301effca70f9e5d677edbad754279eb44e3c4af2b3028cdfb75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5184d189ab7446117536155c985717432
SHA173c7ee44ea344cb8184b4ad4f51bc70a56a143f9
SHA256e2681901084f68431ee6720d62a0f0997fcc2c5f3cc902dc28663eb9b4914be0
SHA512dbc3f2b43a17f3d53f5d6012d00f3295a904c4b9748737154bf7e22e93ea434453d572039d2758e51fec81821f1d217184484f63ff8aa0199821bd73c9c8edbf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b