Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 07:24
Static task
static1
Behavioral task
behavioral1
Sample
d1629312c869b558d6bbad586c79a8d1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1629312c869b558d6bbad586c79a8d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1629312c869b558d6bbad586c79a8d1_JaffaCakes118.html
-
Size
36KB
-
MD5
d1629312c869b558d6bbad586c79a8d1
-
SHA1
2584b6712775c89a134fde71d2588fdd85a991b7
-
SHA256
719c8f97c454d2d23f4dea860b93724e9e8a9707796f6bb64254a16bc89a3df7
-
SHA512
55c9dc8c0bd66d04d7fcf59ab3a2f17f211b317448e2fc828f7a0150f0db8f8eca9e8e7fa03cbe534043b082e4d8949a67f6fcc67a2a3f7a0f195163986d0064
-
SSDEEP
768:zwx/MDTHik88hARsZPX7E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRcf:Q/XbJxNVuu0Sx/c8QK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431855754" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a075ba1ef700db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C613F81-6CEA-11EF-BFBC-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000005d6fc53646bd3e37ca5db67b71e2ac1e9a3cfd9cb17a8ca17e5154a33de69be3000000000e800000000200002000000039c91388fa23b341911be6c02cd13f4d8bc224741b5b9328c098814aa25010a720000000e6bd1fefeda2d77f8261c064f811980f20a8001a9b7b37c0b6ff64a12b3e175e400000001382e1b086598c77a0407e8f50c8085f230de4b13f7a67d82e0dce233c6400395bd8d705d4ce5f085bc4df559e8c224f8005b458d4cd23c1eeca940cdbe8b1cb iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2212 2784 iexplore.exe 30 PID 2784 wrote to memory of 2212 2784 iexplore.exe 30 PID 2784 wrote to memory of 2212 2784 iexplore.exe 30 PID 2784 wrote to memory of 2212 2784 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1629312c869b558d6bbad586c79a8d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aba41648bb97353cbb63b04627b9ce7
SHA18c039b7a1987efd812f845e28008e375b024fdce
SHA25603bc6ccd881f9401edfb6f426fa1c8ece818e8734932dd9f583a035a75893851
SHA512a0935f5dd733d88894d924bb7372fd63257cdc62749033f10f0361318abb77b29919da79908e06ef636527d94f7acb238cbe3a15358314d06a183d28bc339d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51910680dd6885f2cf80524936abd9b
SHA1c30df95d33187eacd858568f750da450b0fe05f1
SHA256f4d35e3d4c2ed08efbb3e193f97fc8e5afa6e6638bd2669f8f63d521656d0154
SHA512d0a24a7f555c5cdd03cef9f3d4f10648f996995c982104f1b6ee7f43572f4c9d10f9d0ca95234d28c1daeb99a568af5d6a4383002b27d44016f9e1e89c0beb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57364f93513701f3d5b3ddea475f8d4ad
SHA1a9dc7de0b7e67ddb7d6ca1bf4d356f02be3176a7
SHA2565adabd9c09557157f52810516ef152b39741fd72f4534abbf1ad0555a4c5944f
SHA512beba6fc0be4988abee46179d940e2335410529cb0079701bdef5e60ecc3bb0731cca29cade024c17970cb0040c7fbddef79e90164f7581674329121751975edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bbda9f4b559d16eb87fda16b418e3b6
SHA1603fd72f6eac4f189d42f7f3210013eb6171f495
SHA256e628849bbd0ed540a5bf2a6b2c92598a9452966eea75f063864f11cdd38f9418
SHA512b2b314c74d9424aa285addaf4c5cb5b5ebe7b632e5d60396b3865525543bd7b695927a01849c4f997ae2fb6941d493725aadb11d14e9073a821c4ec976388cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4c27a586873f5bd387cc036c3702ad
SHA1862a47919fac2af44d68ebd9b4468a18bd5c4c64
SHA2563362e6b03482a18cd39db86e1aee51aa79deb5655b93e7cabd6646a7db0ef082
SHA5123275664238c6a7d31fdc6b4f127160f3b1b1c89ec98b8b2ba48ddc8b049392a012444fa185882e17c0a4a06408408f827c5e96d93bb279f4d1bc3c4b354721cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518139d3486831ba1d261a47403c49dbd
SHA105d41114112be9cb7a0683c5f9ca09a810afdb5f
SHA2568c811836b08dd5f661b75bb89ae869602e7bdbdc3567e6bead209df3086c0da4
SHA512bc144abbe9cb19c27b74e2f484875ed808117756e65f147fe77784127984368876351ffcc33da3ca861f1f5657c0cbaa174b345f8d9d89354b831b4089bf315e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48c49de69542430ca551c34e175dae1
SHA18b583434ef00022e75533c2c3e3897004971e246
SHA256ccde7bcc7c9e74126ffde260cfc3246175063dd9545786cbeedcdceb07234ba8
SHA512696b3e3d3068c5397b97668942d46ba85b1a7331a742c11abab687a36d75511d11b60ed55348ac4f3abf3431bcbae1aedbc2df985fb28d38dd3561abdeb66111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ccf1e42cff5af2dc0e8d76460cc88e
SHA163f405d81750b545202e7181434e60a2579ebbae
SHA2564b2a261654686d4abf62d29f49c0f911c72e018e2238938ceed47894f077ff97
SHA512cc4489527827a599a9a720bfb5259b0fdc535f248639e2d8bc16bf28a4f8eb2eedf298d5a2e01719fae75417394d7c36c950c9b71df84024ebced4f1cda9a0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd30eefad7ee15e39dee8225ecb9b30
SHA129fc214e04b8fe138478934674c6c3114cc9f4e8
SHA256c9083df0d60706aabceb06af0870e7c6406ab5c18535b3dd1c051245a5b57de1
SHA5120e8b9a774a7abc930318a153c10698389b79d8eff2b5c5c21c9ff917593f44e92b98cafb679abd0f188d67250fa6e2a1caafd32704acc83cfd34f5cbd660ed6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d57bbf195d4d349d2dbea12a773f239
SHA193c4a23fd307a6b80b4f63c66d9c853286810d16
SHA256e7eb09c45c73368a6cda283f05448287d1b2107194de1022507b08fb077faf29
SHA512d13d5a1603c8ffc3779398c16e4c2af3edd587499460efc6c3a5890b1313252a4957528370737a3483dc8d1aba87e02568374aef1e58989c07e5a81fd5e06133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634f7b10c0d77bf049c216dbe38156a3
SHA11dff5d63d667cc98caa0cb89efeeb30e5cf00077
SHA2561d9beee41164eac28fdf5d95b2f5650e66379492d0c33bf1f6565d973bed62b7
SHA512996bec56449b5ade9d2d442f582c1ba844bc90e424bc343828989d9f921585ca5bb06761f6617fbc785ec5c40e812a05f9324ba06288f6132eab735dd1f04939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc9cab5dbaeaae2c0d281fbc928b15e3
SHA1c99d988f5a24567cbc332f2f81dab8846d33c64e
SHA2565a044235b9703b09118a20170cfc2f1178d0854bb3250cfa572aed2c2de7ebf5
SHA51268392303a257e16df24507a7327b9a567af16e97ca0cb239913fca4ae6f6116f5299eb9a3471c3fa78f9f0b8dd5cfe20ff55ea7b3642a7fbe0b0746c6f4ce1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9089a7ca4ce74b3eba07f6c39f27496
SHA1331f6ecc93f0c4af36e75a38504c2501c7dedded
SHA256c13e1af44b638c09eec64fac8ce925118a9b4599b8f8c251031c564bb12518ad
SHA5127305aa361e3665dd1710959357e08cc43b4730d26a7b27ea92f06fd964e23dec4418feff0f58a549e1f041516a6bacb7bbe5b9b9110307fe5206ad260d463b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f382a4c4cd0f085e61810be476d8c5
SHA1d27aa4b8200c33ac64fb7a5304b65bb198345120
SHA256b536f0f66565122f83e72342b869462c6324fd9b4b36a9738083932683728011
SHA5125d70b8a81ff82395af32a9df71523e860c7ebb081cf594bac7a0e079c4e2548fb25022c9b296f2cbb981264c23469a54d8dde3c6edfc2f6cf02ac2b16e91dc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af509b4606f61b73f8b901b26640e5b
SHA13c240ff49a6c0aa78845fad0051517489711148d
SHA2561dd54c2e6a79d011f1dce6838cf8440795d18ad7c43291d2774d0a460af2cdbf
SHA512213108caa51cdc8f717555fd2d7d2c551b00b4441046488b2a7033f58434415bd04a6aa859f558b5cd5fdbd11ff0ee53c3ed678841ad24657f573b69de71e9a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54a928c1401370635b4466d5a00fed3
SHA107e345fd0eaddd4eb48a96765cd80f404bfa80b9
SHA256900c9de544eb9ef78f99448629bdc6e7367d191b3086719e8a53401e105434d9
SHA512fb52daa7279a726b50e38efad8a72e734f647890697a01a7d0de134879634ab075c8e927b7161f7dbc619999670661784b32228e3ac2c85926fa04283ef49b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845de08980103b2f81e11e68b6ee0b6c
SHA1b44559091fc936b6006c12e5fd64e6d3ef413444
SHA2566e621a109eb90862ff3d362d60c45b526744e3bb8cda949d80523da20dda327b
SHA5127249ea582d5e6ea309fbf2db9b8a229cf2eb53633e7cb130aeb861809d6907be93e439fca3c3d8ad1fab1b2d7cf11d643e2e1cc1a15d01e6c9fecb029634cd31
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\936f26abd759555807b0105d4e610318[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b