Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
d13b8213a059dafec3234107d61de253_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d13b8213a059dafec3234107d61de253_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d13b8213a059dafec3234107d61de253_JaffaCakes118.html
-
Size
79KB
-
MD5
d13b8213a059dafec3234107d61de253
-
SHA1
b1e9b26fc5e42b59dbe106053c01502750bdfe63
-
SHA256
213fdb10a1ff4a300ff78b81a14d617499bc68a224235c4e42aeb1baad48d666
-
SHA512
b68a55766fefcbef7661913ee622d1ccbe07cce860c3be771ecfda177796f9aaf6143b884e6e5878a96e962915e7f8f544fccc5c741e2890b918c1f5b4bf7d9d
-
SSDEEP
1536:OBZw3eVMf/stMf/ESuqIL16/pXSRUSgyFvTzrrBNWSfE:WZij9IIRfSBFbzrrPWUE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63B3A5C1-6CDE-11EF-BFE2-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f95f38eb00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000e69ec42baeaef89208677fa3d183a6687cd131e9361bf54a66f4cca5fd01ca18000000000e80000000020000200000001a671c7cc10e9f48cdea30c6dc42649f76f329aa4d53dc44d90abfad3545964720000000750d65defa0dbad980bcbe013ef01eb322bbbac1aa517fb31d9905cc956047b940000000c384b3c6f47aaf280bec75150cd62838215c0c49609aa66562d6741c54c521fd6147cdd7e777ccc962e6ddb5bc9e2eb26d945ffcf668838081a8254f75a7cde3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431850655" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 iexplore.exe 2444 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2884 2444 iexplore.exe 30 PID 2444 wrote to memory of 2884 2444 iexplore.exe 30 PID 2444 wrote to memory of 2884 2444 iexplore.exe 30 PID 2444 wrote to memory of 2884 2444 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d13b8213a059dafec3234107d61de253_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d99e077fc6af3446fd36ebb9824bf529
SHA1d3ed20bab6f5db8dbb135c6f74677f981245822a
SHA256e39aeaaab438e4f019dfcb25e60188e3f80d4527501a55e4c9425c3fffd0fac8
SHA512660ac12f319f6b1c57eb442f48463e34d56580f5b6a79dd1692070682eef1360e29bce4dc365eb193e01f0c3e54ec37cf5a44c21f1330fec085492d8d96e8c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396c75de3aa06d1cd022525142b203b7
SHA120e33de9c0dc43d048e79a14b1c95bd7936f07b6
SHA2568b4d895ecbfd6408750222ed793412cbda490442b5f08ab534b66e60cb1f31d7
SHA5128da8efe8e30f7ba9e88b01335345d58fcdbc424786950c25415d78edf919e3a5f2beac34fb85f26b4eaebe6c711feb8cb9cdbce29b4db2eea62ed2f5a59fc5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562cdf890e16b21a8503276bc52c3ad0b
SHA1c4d8fde989c9da5a4bb7580615eec6937eefb2ea
SHA25660c3d3fc17d829d79e28e43b5eb87b91bb16188f38fc11506dd9541687c28fd5
SHA51294b49f93dd0044f5f5e77ea98a5a0cedcc3d475e9bbc2a35c5b9fe50e898ae551d7d87ccb9a58bc82de46b6122ad4f3037cc54751097133ff94d63c63000a3ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981526bc1389cf6a9dd1a049fcc55ada
SHA1b8a02e65a2bd199eba1d4a74b299252594fe213b
SHA256dfc19389ef1e90b3d333b4d5fde28971550c69c0fa95a5df33edb3e5dc691662
SHA512c9f5ad8828c48e7b649bd9fd07b06050c0078a5bd5d9eee4bbecd05897e8dd66147f49409b8909209af5131cf2c7d72656e1449c57c0b3c6add13ae3049f208e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d99fd41d5acffd82c987e9908ab132cc
SHA1d18d13bee0586aac0e6b8a62176aea3a7da0f23e
SHA2563376d93a9a622154d8e2bc4e45c3b83a4e2a5bd1ef629b1282ea330abb75bb70
SHA5129124a20a175ee4ee807e4bf6523246939ce7a95927face367d48075aae13d9fff7629ab004975ce72567d0637910ab072cb2dd8173ad25608d7c3ce253500cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572406bd910ce7255f251b5bfd0e747b8
SHA12d748d7a9bc55a880bd06526fc886f394afff36a
SHA256017b6086bb90d7a00ebbe82e1ad5f5b9388cc1573631c8cac85536d297537138
SHA5128502290128522a5544b77bbd31d2990f0209f7de0951f02c6dc0e3bf6fc59c4fd73b60b3296876b44b6c10fb2bb249b73e55c6d1a960a907924a6667f3d83985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5e3883bed844f91b11c603cb591f80
SHA11caf600c2471a4ca6af00e312887f44d7e081029
SHA2564565ced63c0b57ef3f6832a838003fad49da32e08df64e8ca99de440722dc6e7
SHA512702a5e6fc511ed80820f96b86be82b8ccdc063bbcbe9d02ffdd0a645770f68d97af7f790c59096a8ef1996165581522d78a12efd20f4a8bdee1ee01129d0ecdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299226a23a21291aa01529633b4b7780
SHA1ce60bbbea318d5fe49925f49b68ef1988f688a42
SHA256859b9933351e248083ea628ab78b9dde2b40cb580a6035c6261390b2174491a9
SHA512f8af2af56268c97511d56dfcc9db7b606969b66b4ae39fd4b9fd9ce92da2e4a9a67cead52d02a60fcd61ad259beafaae10fa3dfc554c37fab5723e2d32418635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e8e34c086e63fa790abb296e48fb0c
SHA1bb6b504d5fb1bf72d9fc62bd881e6681de0746cc
SHA256a4d6d9cbc5d38839f540b44935a7fcddb5d89f778482f6124b47eb11517f91eb
SHA5120fe1b82ba65aa87241a0f4edc1bbcad38bfbe9d62f86ec2b9c66b8e9c29c268ab459c3b026a0578cd2719120081417958af8bab21f38135b29f10ce88866c9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55540113096660eab1026e270ad85ce1a
SHA1822e3540fb5a0dc3aa06bb5467f5c9af37f90c15
SHA256f3c046dd159845710e201111887dd566cd62c73df7823c743b73b40b826280cc
SHA51269e01253b0897aab1f5dd0d01bee59a463d15b6695577e0ff20eaaf691eeb074dfda79e88771216ff252977bcbf9e515c7904e32a6697899c24af826d811f56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fbc7899b3ee68a7c3c4b6ae3018d318
SHA190f308ff240677be7c2adf1aa2420671cbedbbf0
SHA256a24b8529a94e5fd82b2acf5cfcaf0d3262a15fde36523e583259da8e3ccc87c6
SHA5123e9f07f86dd218ce29faeaf813fa41da8db64b01afa2194f7d411bff86ec091fb75249a915c3232bc79ba9bf56c12e4077205bf24653aff091c87577bbc16ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e80b680af7ea6c84e7d8e232c3515209
SHA1501cc1bcfff4828e6a27a6eb8ee244cf253144ec
SHA256cc60ffedfb309a55ba2343c9033cbbe2dffa2fc69297ac51b95af64802945a56
SHA512b1850971e33d5ca5deb81ac619df0bfc356e01df076211e0b9aee028810aa9bef247acbc4bb87ecf21c4c3b5578838e2fb8adf33ac079a1d5630a1089fe6b29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6bd9ff64999a9e2a64ae38b5ca3072
SHA1fc4ee607ca5dba42f2b94d58e75c74bd178ef54f
SHA256bcbfc42e8c43f7232d705cab940704a97f185aa800ae3d1f5d52f5a2e3726b36
SHA512c744a622b193ad156de5ba4b1c9ec7d652137b61b8f64ba4ab0de2cf253157d82b8aa3ae095a630ebd256b4b74bf815f67cb62271197200330d0587239486375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b510ae06ee0594e8a19a017ca72d7370
SHA194b8bdee91c5126c9378b8b462722aca13da8f62
SHA256d9658ce2f803612400fa261ff3071992b9c30454d907bd12bce85e6a70ec3c5e
SHA51271611fe72bc8f64f17c5a5dfa12cb5a6bd3bc913ad1cfb570ca27e0f4e1dacc38fa44dfbc668daed990d03d7c48ec13ee56f195e119b53ad0e683ff1fe74837c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59530080f09ca42ec3bd70880678db7c7
SHA1b950062b420fb41508b26339a76b265754bc9848
SHA2566affd49864cfdbbf453fd6cb7d2898438f5ab2ebe283b8137bb61595ba4ce898
SHA5129110c9fbc5ab7217f075fbf5100e4e64ef7bcd5473946286e8764688f0d46652695c8bc7179e86f4ccb64510cb0356aab20445be99acdf7047f153a9be2a3c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6245ce85d8ab63fd3ed6422582187bf
SHA1c23d47595c68bf6465da5cc3de49106612fa971c
SHA256f42c627171c0a137f976167206b0c1d8aa8888096ba126e23165bf088b6fa231
SHA5124164ab99d3035169cf63ae0639de3131b4b3d1db6c38b9c0e0f39bfb7c8248b26f82e7454a33389cb8d739b0c10418abc6b9b7046cfb04052963ff51cc4ca6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718cc1da39e6d5571c41ef84d5e6f4e3
SHA17ec7055c41ef9e318ea89367a4d9fa600ee44f0d
SHA25676811a8ba9366ef3ddb35978c6b155a8c740a3b63bc4f81c6ca2e8d39da58532
SHA51251bd6aeff772368f3877979e229eca3ce0306d0019bcc6ed1bbad80766422c56a087af722458e7a54b08b904a380abfc5c9d84dd92514049d99082dac7808b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588afb87c8755bf41247e39df2fa3ee4
SHA16f21fbd17f24e494a0f59118fa41da63c80d2aea
SHA2561aec6f7070468c51a99196768135f21e4c67e212cd839305c6c86b671874cae1
SHA5128242a261af03f9880709939d79ad56bb775fb41f9f6bbe3a07493011f3acb8e4d38d0436f27f32eb3c701a0df1762866e4c22ada8c3913ff2622978f3e94bea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be10c5ca67342245475229418788fc44
SHA1d585a21fc0e7cc50d1afdab04b5834c3e6ec44bd
SHA256c2322f04f6ce5275a948571cd77e14c7137314fa233303b6316a11dba0fa2583
SHA512d2e397c022c60a874f11fff47e5fab517c19ffe1143bc7dc165c6841c6fed29b20060f7bb633e57b525d707a3c62a8b90e33f34109a744cd6fd23909a82c8207
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b