Analysis
-
max time kernel
71s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
d131e6997abe9e00e3d7256b5c67c05e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d131e6997abe9e00e3d7256b5c67c05e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d131e6997abe9e00e3d7256b5c67c05e_JaffaCakes118.html
-
Size
23KB
-
MD5
d131e6997abe9e00e3d7256b5c67c05e
-
SHA1
21d40db8d9c5085c0ffcaa1db0779217f366756a
-
SHA256
b95fb60426daa3e98043e0800bc25f8c04cf259921f9206d4da1344e39408ecc
-
SHA512
f06829cec66163231337135ef3d3ef4398182bba4f4112004d3482927c5c01b43d8552ccbe4b60d1f4b6ac1e0fc2003f4d86da7968feb8431349b33b7fb91a41
-
SSDEEP
192:uwfGb5nrenQjxn5Q/KnQiepNn234nQOkEntawnQTbn5nQKdj9vMBJqnYnQ7tngYy:MQ/A3PmTf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000016d30f6033901680258e6873d09300b63805dcc600a244ad6bf9cef691106ae4000000000e800000000200002000000057d59bdb1e6b7c4302d043a7e0d0ffadde77799489511352f2b12aaee417cc9120000000bbd7263708d0cd953b801db7847267aa79016b8e081bb4062f63e2b7d45a22e240000000b535e774af7d09a3fa420fc72a746b007bf54cb8e5bafa4034b43c12c757524f552b5871289aeee7ba44feeb159b7c676defea378fec81181d073818bd91bbb8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431849359" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0225836e800db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C0EFB11-6CDB-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 584 iexplore.exe 584 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 584 wrote to memory of 2144 584 iexplore.exe 30 PID 584 wrote to memory of 2144 584 iexplore.exe 30 PID 584 wrote to memory of 2144 584 iexplore.exe 30 PID 584 wrote to memory of 2144 584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d131e6997abe9e00e3d7256b5c67c05e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530addc7cb150b7fb74bc77544cae84b
SHA1e5341dd0ec95793f573fc6ee20676b73c4a68722
SHA2566169e2e5532a3f52e145e68d66b990af1f7bfce68c67b83c611b041abab25482
SHA5128be68d7c4a2edf5f0ac5660359384e7f4b38f2c372a400dc1b5924f4a80b146cd0c1af5a6c0e5213ae04b98cdb8c20ded9d34e6b89a704a4033dd12ad54967e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba07fe2a1586cd5f71d76a524dbef33
SHA1169968418989fe4f6a9ba76d9d44741f9b7c3f21
SHA256cda7da7ee762ab1b3e5c59af99012a4d69174e352b176a7d2e1db2191d534a66
SHA512cd4c9cce890498e07ff417c68653a9e5645a92790836b78b2b5d6f3b51cf2314adbd76d3bb51bee77f9994ab4897f1b14573fed0ef563493c45b092baafb528a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d96f104ff2230d49c9c169c10d8413
SHA17b5ab346420d403e8280583bd95c6a10d92e24ac
SHA2565f184f7471d9c51d4d083aefcb2ada703b3f4ad078d58fb8930457b374e20520
SHA5120b83ea9b865866113e6a87a4cb3a89fad81ba4c5f066e049e891e1b15e25e02f6df983ad426f1d3121975de01ae62a6191276c2fd67dac9620e30c434ba34b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b4edf63d15260b2d2f0f3054b26a49
SHA1dc0d506c02aad75b29cd02e39811f24fabcd67db
SHA2563d2ea82268f0685df9cbbecb9845bd6859d0497f53a1586e0de4b3b0617cc804
SHA5126cc6f65980816d412c75f345ad6683196958bf9587f8cfa6fcb4056e17729a341ae89ce8b37b364e1a4aeb9135c00bb1cb9ca7492d8d7c302cb7fac0d8ed8dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565e0fe8df1dc80ef8fa61e84b8b227fe
SHA1b68ca14cc92f12bc1a4b2704c10c1ba36492154c
SHA256a8a27ad95b7d5aa07ca5818e476c800732e53e55fb1a6489bd1310ed12701e3a
SHA512c4b6a8082517724855057685a9bf60a4ab609c6419c63cde0c5b396ba66fce86c6cc6b57c3b66e634ba09b6a82cf418ab1376a5398efd8295492e164760c850d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ea85031556f701eceb29be232d2acc
SHA1f57d8db4db3f4c46d030f2a9a665c74a1f1e6893
SHA25690feddedd156d1c7ef43e2cbf299d358b9de90670dbccc697429048b07aa69ab
SHA51224798070777584cd56d6debeb142bd08de3c3c963cf916041ecd7ea6fd841851e1153c4f3320cfbec248f766206582daab4bbca80bd632487fec806ebc9e89d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463b15bba7a5d7c7642ee5b82b19f0b0
SHA14bd4ac9c31b0886ff46ef9a8ef4f38109868ef33
SHA256d462e087a6c361a1cd03ab9c96b425de39297004591da28a4dfec08d79e61756
SHA5127723ebd41bb286ab948dde8dcf23e0b5c1ba0c2d953cb3d89dc633ad92440da79507dc3909838f794f3d4dfcc8c2a5e6ab420886a38705091ec5e69373fb04f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c042fe724466adfe47cbe84e0fec7d06
SHA1b0158b87328fe8b931c9009bf399b6bc006adb7a
SHA2564d880b333c6a0c53e6b2b11aed498b7cc49a747be55dc239d7935866462cc175
SHA512f550d2df3bbc2a49d6141f4099176a699078aa02767b34da7433a7ab444aff5b97349b48daf5f0b0b34e089608ebb8f11a47466523206713287689aa91ed777e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faea0e2032cd4722d6564651acaa4bce
SHA150de08f70cbb5005bd31689b12506430a001c68c
SHA2569eaf20b1b9c1bc4f6356f989ac39d8c47debe871227ce16cf1603e551498d95f
SHA5122d180e6789efb00a9ac8836d54703baecbcce84f46fd13b6f47e8254825e4e7ca1dddf6c007003a2fa3ef12d07ca371b2609a683fad198092bbec765d59e42d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de2fc8edfefd0f4f4def2c2e534c0801
SHA17e2f46a8c69b2782d5a508da24a1903df12a68ab
SHA256ef9e054ae36692b2b313eb4593421c8ca210c40081255ee3bf7f498821ef1918
SHA512c9de6ef638300b8548cbc1f01314ce0484a325673173d733eceb8022aec78a13d4b90674e11fac91c87abade9a50d01fa9449959ea97d102d71e34d5136f5eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5551dca4a759bb49ddd74182988b8938d
SHA1829727f37d44b9afb4a68128fd6c235c3f0ae444
SHA25671f8f5b6c09afccf6a5b6312ecfeec42ac24acfdc7d6935e6a876ba59c14e64a
SHA512afe42d4a35d173153e8cc13044a5d3b8dc2582e4107b6b37ebadd5d567a07908d0169faab6ad730edb4adbfc75bbe2b136f3dbe0439909a22c6cc60ec8792895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a900a9a9177cc87d93701d0bfa2e07f
SHA1b01426b9b1ec5d83cdbfc5aa00c0bf1a3d75645f
SHA2564b8fbe1c60d3721ef78bfac1ef0a5a0cb197855298d159b0849906ed5aee28df
SHA5128bb51dd757cb0a97d36adf77bc100ba8efe30795bdabeb756f202841f2e93b2f1a10a6ea2773434c79947ae80fdcf018c53d79190df13fc4235f75e86ddb098c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ebc38ef4614cec5ad64a2122c976f7
SHA1225f7c6661a3cc57172ec125d192f204a42bf544
SHA256e73df84c2f38b3032d0acd250e0ce5381032f967aba88fb821366244d41d30f8
SHA512d08254e79449232cf109dc70552f95988fc730057b26a3c4bfc597faa42024840775e690dbe9b5663958198367e1a5daf680057ba772e9de0dc4d5a95ce0e59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb0e6e18bb5721ab3df81070b29e65e
SHA13c0f769a06866c7d7a0c432e30ab4edd42518c1f
SHA256ff1e665b81da7832baaea9ad34ddaae65f80e19c1ab278fed97ed34427b762eb
SHA51247b17d2c9982e06206507ad125352dc892dded4d388eac20ccdef247706f8a35ea9813c3b285f8aa78dc96c51163b56bdeab90e3ac3749595d4f30095427d428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a54bd016b11cc0da168cd1867d879ed
SHA1980cc0ce8820eeeac79e152c278766525069178b
SHA25635c769a9c5642c22717da77b9b1d62f1d76784d6df442947ccba0748833ad786
SHA512fe8c6b1973be19283e2d8ecafab09e2de56bcef39f957ad7e40d58a73c75c572dfd95fcfaa560ecd9febb34919c8307ba32a1005fd38e41b82444ce4b71640b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49719370c3c86beda989e6e92d774ca
SHA1f84555939553fdef76d5f9ca09947bab4059e579
SHA256bc42ac32deaa1e5dcf2a89700fe7c604e39a9c3bc97444d943a9d6aaef28da3a
SHA512c32f79226d490069e6615bdde547ee57b332aa44177cb2a04a83be5c6ad2c714ff1a7f3ebd05681fa0b8c99eefd9b060d1bf9dcf95029e1a57ad062c06fa722f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb618afd421371516ce278f6890ad50
SHA1114321fe75eea3cb19cec9add17f60a1c2dbe2a0
SHA256a39cab6a88e36ea2d977a7bbb5800635b1f0ac2e5e4a085ee0a128aa5eb0787c
SHA51227c4b205f768497c3a68227c77eee7e594caf7b5d74885d5f84d4cc1246374bd3cd385fe67cf3c6a59adcc62fabb34a92dc37be762693abdc8899c2924b3c977
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b