Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
d170909d8652b1e1afe817c1583d4d45_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d170909d8652b1e1afe817c1583d4d45_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d170909d8652b1e1afe817c1583d4d45_JaffaCakes118.html
-
Size
139KB
-
MD5
d170909d8652b1e1afe817c1583d4d45
-
SHA1
786f95b7b72056e5c370a1ff68e6bef93c4986fc
-
SHA256
642c51df7cc63fb6e9310a709baca1b384bbebadc8d9ad549d22df039a40caf5
-
SHA512
723e67807224db4d2ef92e0fa4c563aad55e39da9e6b4ef43b454ea42d690b847b07ffcf4be7c8f825fe032a9ec1edb04403b00d15b841d85a50181abb3f51de
-
SSDEEP
1536:SeD2M6qS+ld68yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:Se7lSG68yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABD66711-6CEE-11EF-9527-EAF82BEC9AF0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000086fdba2564ea51f9122251dd4045f24937f41803ea4bddb152e30a63d824ae95000000000e8000000002000020000000977e51a40e91dfc0acf82674b86768d4bdacadfe64d4e5f14d799bdbbd101e3320000000098ef433812788e5c37479de05c6fcbabc6e63a636aa1e67ff8cff77e6e2706a40000000ac5b58d432306d8be342e9f3b91ec39ea13dd41928c3b1f87d6d1b13fd5482a5747d60b020400a0d5ec4f5803b19d032244b4683a0d2948a66891d271e0681c6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431857649" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0eb32c2fb00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2936 2140 iexplore.exe 30 PID 2140 wrote to memory of 2936 2140 iexplore.exe 30 PID 2140 wrote to memory of 2936 2140 iexplore.exe 30 PID 2140 wrote to memory of 2936 2140 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d170909d8652b1e1afe817c1583d4d45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a0f3f8d1c4d41a89b44c00a1b62c0b
SHA14106651a155de205d43a5b17ad70f26e5f3348f6
SHA256dd5be393edd6d8de71f412439dab7c588513e1ddfd74fc5eb06c73f09e311025
SHA51243a2981af2bcfd2e2a46ee73e80f8b533e614288b0cf65aa49d4a6bfa097843aea5e16431d4ac225e046884262bb7f1cfe44e3d3b85f7aae6929c77a361a8643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90eaab594dee42859823a6c5156f36a
SHA170094d2d57aa5ecc9eb8a1426b08e9be50163d67
SHA256f6a11a8e49886b0d5d97b89c02c0877c0e01f8a2759a20b657dfaf2ad5df4a93
SHA51200fed4a6233b1ee5fe7ed3b5f0e3ef81fd1cd4b1cb9099e5885e44c07d41c83a682ea084ebaffa7b9ab4f4f00f22da293e095bc7794f8de09315777fec2ed043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51626d254f5e99365d0c67e32ee489abe
SHA1a5aa885c7082f9d1317a823f4620db8158bc02bd
SHA256e14bb01a22cbd7e0323fec6b2cf13bf0091d8d9a7e7ce521a3c043e0f7b478d1
SHA5120b1dbe9f69339df8503131c40ac67acd664683fb29d1c556f5f515a86169bf4eb2785c65d2e46094ced1793ad3d56027708ff56cfb8efb7526d87c8c0e833689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a2b4d84614a4f5a97bfab522c9d530
SHA19037823ab4d49ad6b2e643c49171a98c528d7b8f
SHA256de954bc329fca0df5636c613a088b6fea07e7882349af3e7bc3ddccb4b45f736
SHA512bbb10e6719154fa598bd5e78a1a78f70d06d54af1337159fbbb4d7494f45c6dc0efa03212655506857514d1e31d9d8f60314593989d87dacc876ca4c4ac4c235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601445a7c9f143c21f9a4c259ce7cd05
SHA19147ee28f88d0f14f79e86254a39abed938a6fb5
SHA256fc34356168b48eacaad20ff27525d8d24ffe1d527289e999bf5961f79557473e
SHA512072f08fcbdb551355e913ef3f81ee3ceefb8894463d7040990fcaab7f993adee0b0676619c7594bb85d03c2fe70c6c356a5b95b3c1b5b0cb4eafd9c9e5dc9fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742fb012daaa83318c27184cc0bb7b76
SHA1453f817dffae158d48decebedc75bc8a72171b6f
SHA256f3c09a5dad1b5299393461ed1ce904cd5c973d159ab8052365c9e36541deb317
SHA512af91c2f57e96b4352422f642bca7dae5e39f4f7a6724849276285d126b767931e6ae1f18a655a977fa0e86d5e22958e41fd5c5c067e4ce1bc3ed9221e565d90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46073a9f2dafd96735b0f6ab6a4ea0b
SHA12b15328b921e43dc2b12e9bc2839ac18df71a919
SHA25690af39a8fe863fd0d3ec9af1d6f4f17d2a6cab0bbd87c2c0bd329201c01e0456
SHA5126b0b087e0ed6c0cc0c613282ffcaaf887a5f8f2d7babc9b50ee86b729a5d878bdf05f056f38ffc1c9b1360adb92ab88830b9d834834022262c69bf14ddb4ca18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c066bf2c60b814398413c142596dc3f8
SHA15c245b16b880ec7bad4faa50e1365b9d6df06277
SHA2564308827f75837e99adbb841e45ccb5a3bc856e7dc54876c36f2f1ed754e292ad
SHA512c4d459953d8ced00097c47bfa45380274850cc6b64bd127afde099e64fb37d6e0b2097e304cc5980a18a6f36141b141e5b1b9fcedf08c8e2ccacd7a27b14b6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d587c24836e1a1f902caededfd9a3c87
SHA1b23e19b22e7e8f869cf0280ccfe5c6d93fdbce7f
SHA256ab859b96198d41bfddeb8933ebdaa2bfa6f7ffdb2bed3909b5c981ff6e8c62ce
SHA512cf919bb87cb6f095017207b8d37970dbb4255b4cf5699a78105081ef1fb73ec29c7c26c6a7bdfc7c0f2dcab16061d2d354b3fdf4942726e82474359a83157858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55206425da9ca345e3fb791a9ec609f09
SHA1f4e19db78ce72a4a524b8814c9c8cec9ccb4e6b9
SHA256e3a95faa487a8020776a59ebdfc52f5c17bf47cdabff7a57644f6d4fcbc8bc64
SHA5129cf6bc031e3046574015c5d13b0f25c90f9d47b7cf0137ebc3e4cc85864380019601a0433acfc7c9fca41ad3748062c7be6252c365c0dfa26b2a762cb3f962c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dcc7400429a098c5b3e7aba73bdd0c5
SHA17bbeceecb4d43093992520e8ce7f186c29bcc777
SHA256b8faca9bcc733ecee13f006223673748b949071b6ab5f11d18d16ebcdad03d37
SHA51283d5a87fd5b7258e679abe8ef498f1ec8176741417a1faddfbf97ba255d2cd74e1076e8488f3cbac5c436e33f9454a3365842832c13a703b6f6b5f49240851c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee77e5c568acbacb14b97c0e4e484ed
SHA1cf52ff243b8d87112dbcdffe96f8d54676ac1a01
SHA256300e7c5a0aa618a55ab20153c9aee67c906b090444a4f4ee5adc8f4dc98faacd
SHA512e8418d0e78302c15e273164b7c7deebceb406a5b29169d086db8570bccb5c7a9303edfdb439254938426d7c199b7c05a2d2665ea54625e628d4c8001e7474cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352da6a4f7cbf5b91c8b6bd7b2bdcf9a
SHA17c61be9bf09b300f8548bf7317b4f6fba690d12a
SHA2561d488b04116cc25d7748c03106bdbedc87fc758f538d5eecf334a18e0fb80e26
SHA5121885afd992a6cab996a9d9e77e5a0ee64eb012063edecb86f1d764b9d678063db38ba6a67ddf03a2059ae2a51a24f78b5e13f3dffe7a117d025ac864a5d6d768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b42f71386e49895f37ef5ecc1fdd49
SHA1de65c26b5d8d6c7f24cf73ba42c9d60a2c7ed5e6
SHA25677bdefc652eab55e6a45caf096a5768116f246f2dff07cbb6bded6cd12a75a3b
SHA5128269655bc77c6dec2754ad6c3fd0044a04eb9c41727c7cad8d95bbcd8773b9157fd8bc42e19c36179e31fd154ac2e17cb076503b4deb6317f576d6bf449252e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597397434990f10b1f44da386e75f70bf
SHA1ef578ec38cba222b1df23e8282ea6dd5ae0825d0
SHA2566059f4325e737d56b8c65a2f486f3b0e89c054d72603d3b9ee8ba0fe6588b776
SHA512a1f3232b266975013832f20d6f40bb281873f26e43537f7b159eb4b847e80291aa9be63247705b8dfb155eb3772b787a08e27070851cfcc7fc975fd5ded6e921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b0c1f791333e8639a8b07235bf7814
SHA1e8723d3eecf383ea25ca6b9ec7ffdd797a8044df
SHA256823863e21b6b825b83d5da75675bb30d6d84e2c357766cb1276a37c49d76bc28
SHA51266035116debed3375c0181838ae67e3e13a0a6915e7f867d0d57fc091aa64b3f59a403efb2cd230e591ad17d6b159c1ab44ebbb118f2660428de16833e12daf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2181f51f86c50b2fa63d9d5044695c3
SHA1206676b0229f2542ec14cf6a5e29f60863fa78ea
SHA25620d0d8f591d589c9e42e2bd364eea2761074a12ec7fae9cc80e03d84163dfcd4
SHA5121ad2c0ea793088b5d2bedfd708d70df988d8338f1262de23780978ab3df6476a1631da5c1b9fb89c5e3369ebb687b09743879a39b29d040540ac77dd8b094478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e91700943c69df3a2230863410b785
SHA1cac187b6455007a88470ec05470d13d00f01916b
SHA25626119b19d71660249f74bb98f3005ae8653a22dbeb3f69c23a5784f7c2b23eab
SHA5129707d07af32e25cd06007d8d3e77a041e3c86a05dc5e01828d98c53d89a0919d29952e9ff2b5c232562284b4b6225d3ec14480da6658d2411c625998be10b15d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b