Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
d18a95a6e08eace8e86c67b622dd78fa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d18a95a6e08eace8e86c67b622dd78fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d18a95a6e08eace8e86c67b622dd78fa_JaffaCakes118.html
-
Size
30KB
-
MD5
d18a95a6e08eace8e86c67b622dd78fa
-
SHA1
f282f836149f749cf8f1138f512e8712968ef287
-
SHA256
5f7d6d5936bb7d55df6f95ce205f205231ce7036a921c99b54bfeaea6c18bd02
-
SHA512
15d2910d7d8d1320fbf48f122adf297b51590a3cfe7f8059777f78ae47bf48a8cf88456471faee535b9e773f75da01795698fe24a233e3127bc468391543c31d
-
SSDEEP
768:m1tv11jIi0aHyg77EAoUp7M63+SxdSouWVv7Jbix+ZCYMsmZ935Cnd6UqPgI:6d11jIgHyg77EAoUp7M63+SxdSouWVvi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000ed6b029a978b565422af342e6dd417e33168816a78be5dab6a2e63d97008731f000000000e80000000020000200000000cebfd332634c8e60653a76257378384a4ab34d4805e1c47cc73a54c791bd6e42000000047a1553ba985207ba5c11a9eca8a08c3e703673751e756d79e233b7345e419d6400000006c735a7dfbbf04b1ed4d44a8a6475331752eea4b4c3908b82c7f115fd48e050cbb048c83051460ed158d8e225ea09a00ac3cea6495aa4af5918092bf18767d1d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431860805" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109814e00201db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04FD6261-6CF6-11EF-8D6F-62CAC36041A9} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 584 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 584 2312 iexplore.exe 31 PID 2312 wrote to memory of 584 2312 iexplore.exe 31 PID 2312 wrote to memory of 584 2312 iexplore.exe 31 PID 2312 wrote to memory of 584 2312 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d18a95a6e08eace8e86c67b622dd78fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c19c614cacc8294f6ddfc62a3efdf28e
SHA1ba888855c2173eb47b0bc1c7aece51ac8805c3b2
SHA256059a7c772209c41db33c37a1c39c8f6c42a75d17aa79dbe49db68a88ad6fb189
SHA512edac440e2d73a8efd2a999bd122009e457905d1aa03fd882831744878714f8406c4a59699a4a6f76f3a78e11962b2c4a6add0d0ad61d18fa350400bf142fbf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59607d4001687935cbefd156e4041ac5b
SHA1be7d07ef7d29accbd1dbb13ffa3ad769749a6ff3
SHA256db769d4f82a1e6b18a78c1ea1a7daa2101ac5e89749b6fee687b9ebb480356b6
SHA512dac11069932ed3aab24af42e7214d4490c55887d2c8efb78fd49d9dea37617e8df43f6e81a63cb16b7274e203665b2bc17d0867b105763b4dff13ed56a6f7005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5097d2c6d64e7f83f87c3b7be9c367d79
SHA1caccb06c6eadf2f2970cd002d5afab9297ee7d3a
SHA256def21601f2bd0b9da49f607162cdbab6662b737bb51828b1dd5907f47d2c5659
SHA5123452f4536184e0fb45162af6d86dc9aed7b3f1c171701b2d310dc87893ef6669bb730cf4a64c9acaa5dceea86c0467f8ec9b742fa9c1e9f03a5a82743326a976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a91c6bd0f90a0ac901f6c1cbd4c320
SHA149bb3a8cd987f9cc7bf13c400c6d3bc22bd2813b
SHA25639585bc1964740afed0fdfe300d255c5f0d157cf35a422b7f2105c99aa9cd575
SHA512212361d4d5a297a47a78ad3e7a242494490d9f4a41a50eb63295afe8576c255cbca8ed21e58967eec0e440ac4b5e750cea31a74120414355a2401c8968653c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503143a7d028b77e89cc3099d1a928d2
SHA1bf503880d7bb1a1ccac40516fd84062be70a514c
SHA256218f5810abb714f1ae9b95ecdb4d5702ad869055f2a8f7bb3630569378147acf
SHA51261826c2fb3e5c85ab40289b1b15bd8ac3afdb3291ab59e86b2424df8664dffd83f2ee04290b3e11df8af22aa80b7b3f0fee9c57e8edb73186fcd8aac6c2f0906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4236ac268230b10c5dc60863fdb57a8
SHA1af5f2417952f8d48efe0b03e4b88e8a1122a8035
SHA25623293032c8a9a7c0211fac9292a2349a21c0ef287229706af569564f11e1d988
SHA512d17fa94779d946e012b0f2d09c3e3fb772ecc6e0dc132afeb1b9784dc5d2917f5f9d29102340542bec2e4fee639cde724f8e881213b5fd64aec2f47fcc2cd48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d785a73bca3c105ebb63bef1438bd6
SHA11c30adf7653caf5c0bf628337a2dde7c237bcc86
SHA256d5bbfd4fe510db8f34f56e9ba3b11ad72fe61d1d12bd7a44cc1cb8bbc61eb765
SHA512b5e18df5f1ac4e01ce1f3aaa38c62434df3402406db351d9cfcf73134702532d8179fe7e216a680c091224e429c4394b749e449415de8f93d78434b9cf352d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01d8af2297f24650b07e76f8a1427fe
SHA19efd747db1013e5ae30415a242baa4b830294e26
SHA256d9e4c1af3d75683b6778f34502fe8cf2b0e71174ea927cb74b5dd8229c18d83d
SHA51214c71384133bad5a9d9909e17e3b8c72b214d5c77411f871b04e7d1fa391b4bf7847b04bd1b5e20cbcd4d3f6ea2da0257cc9fc44ca050ffb5fe1af9e510c4e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c40b97385f048f64e0b14f2ea06b39d
SHA14f581c776816f30145dcce831ad3a92aedacc829
SHA256b0c790e5b27b4433eb9fecfc0f7248073a1f00da1a15721f115b5c8875e34e71
SHA5121011aaba31f38e08dec11132f26632cfea19a0d5277ed34af4046abf3c1f2907579a9c7f211e7a358de424d6eb621120a12cef5b36de8c4d662f3fdeb906190a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58822df2b095b0f3eac0a9f6b506d7e38
SHA185a72a82257d8450269b1ed64b3741bcc0a9736b
SHA256556a77ab1a82cd524ef1ea4203e25843c5875565793d4b74396d2bb18dacd0ed
SHA51299a4c874a157f7482301d9153bb72819d2da635894c0c4cec1f8e8e73bdccde9b4a8b9023124a7635323c205595493d4f912ef28a1f5bdcac108ed4906e2e06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df445964192fce3b0d0f3fcd31ce95a8
SHA12cf9fdcace86bd3ff927d5680c16d6070bc646dd
SHA25620f59f710fbc24efd27ca4d425738fbbbdf31845973bf6826154ddbfa7b6ddfc
SHA5122b282f5b1a94c712b89132c59280a9503e047615d40d590fbb1f14a965a3e74f6189507ec97ce22e139bc7399a8bc0d4bda3cf11951725bb630760d1fb640af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab189c56cf88f67dd6fafe64bdf1d99
SHA1b69713cea3a96c9bbc925c0af2d665c74f44ecb3
SHA256d2782a7b42bbb4b5e234a095fd2d73fe83e17fcc473d49759bbfd2c15bc7d3df
SHA512dc287ec5ac9191eb077b184ddacc5ff219223075942bdbcc624702b172b5ed6ff5465f4ab32164673dbb8064d0fce18961d87b8e5daec734949d85f1ccc5755d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc77342f55df48a3f365459cf9c8a3a
SHA12534fac45a45ad46253627f17d8db182dfb2bafb
SHA256916f21f8a207d0b02dd188486d1db50edcc957231b779ca51becb75b768b0f23
SHA512e9459840c5e5c6094da12c033b8a1c5b2eed6f29040592e4c03bbaabd79d3941ca9ec8a3b6c621204df2d6247994eeb11732519fad5636d52a94bbffad5e26f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59946d716ec06cc2b3fc553c0e0dd6b85
SHA1f6ecf1724258b77577314fbae1bb3f8b3e24aadf
SHA256d182ba8f117116313e7efe509a3cac0580fff48bd5dd996338e4117f0f48ae42
SHA512749099c5c71cbf90ce3d4b4ef39c19a40ffdadfc09839a9e91d9adef1937ba1371b373f121124e82edcce2a629b04d765b418f8c1e3af067794c9b92209d2961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566847578e6c936919ba235f8106b1131
SHA1504fe2a11a661524fc5830db2ff7f0b46bb7e94b
SHA256c91e1ac4ff485ded7db01b51451878587a86cade3f2824f0c811dfc83f8f2674
SHA51209e06d45a807c4abb9382d2c2c449513fc6cf01bf64e4205c501c506240a784cd3eb91f497cb243286c4e652064aabc70a07e342ae10569f4ffe985486e38dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5494ae0b5869eb5431a93f6ab65ccacfd
SHA15117ee77f532b721f6da583ba07014d5546633ff
SHA256b2be5ccf796e0df60026d0804f5402a73e586b4f41d7d9923e0ba8acacbe8f89
SHA5128db9b73d2774060a0902e7606b5ab70bd425632ece373a901c163e84a8c89893b6e51ef8b3e7357aea7c09998901e9e4208a0edd60d5115636502615d2b359f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a730e13bd5733144dc592a752ded069
SHA1854de45e713193f4d2c374f470301c1b91bd34b9
SHA2560885c50dc30bfcb60b3814036753d6d85067771bd14d0d80c48c47dc5abd4c94
SHA5123c93ea45312817a7e6a9087039358584deb0d2a6f691e2e4c8e891ed6e3a01a933b9f06bbd1e0b81f82e1c281581b41771f6d606ad61741e215c5d5b6a7e207b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55229a3d41be4f5020c2912ac653e00e0
SHA17cb8785adec04214467950e7e2ee5d98524f4237
SHA25630e58a3df7b323cf0d7b0f395af747b9f713bee9a07d625e54a0dad8e3effeef
SHA5122a9ce15500fcb2571b80758abb0cb986a99184653042735551014207623dcf931b182b4c8c98ea2c184a5050a7811f58bf9c4dedc94545905226aff694d8c36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f64daca7fec132509efdd12f0370b1f
SHA15c9205432a1cf4f7590dafb86f2baf5c0b73d0d7
SHA256e2e16be4715b7d0aaaa737feebea250de36cfbdcc12ee60a5e65f1369f833a51
SHA5129c92c9a351d099065c551830c02da6c9f23080eaf96e11e8a3a4db010818a38a841fd6cd63307e93cf58178473e658de7fac34e29bc6acd8f6562006d40b33aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b