Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
d1a09373bdc225867e33cee5321cbd2a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1a09373bdc225867e33cee5321cbd2a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1a09373bdc225867e33cee5321cbd2a_JaffaCakes118.html
-
Size
139KB
-
MD5
d1a09373bdc225867e33cee5321cbd2a
-
SHA1
74f3b9cccdef4dcff6230bf5f641fb6100172504
-
SHA256
ff84b951a62283555eed9b7891ce5735d6fe5e756b132640bb9eea80956c61e0
-
SHA512
26031473d075ca8bf970673457cd6799460a757445989cd3349aa768e9184418dbe9a40f36b9a23f914e47aaa075eb44b983a52ba357d2a8c445e4e64e495f54
-
SSDEEP
1536:Srrf8hlUByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:SrQoByfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9003a6a70901db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000354272443b89035b27a72b931e26dbc965b03a57c48be18b6fafc275e6841e6c000000000e800000000200002000000093e456c0a2e15a69875d04137c3146ccb33c5d038f4a95f7224f99488a52ffa420000000396bbf7799a36db2f940328d0dc94e37faee8db40640813a9ffed4044d97900340000000116c5a17b3a26cf31388aabbfc421a606f7d05d924bc6eff9985f7b986d2aad0150ec9c4e8dd2c0ee97b582c3cefbdae9a3ed9dc6380b47f43acc96e7536c69c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9116DDC1-6CFC-11EF-98BD-527E38F5B48B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431863617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2864 2116 iexplore.exe 30 PID 2116 wrote to memory of 2864 2116 iexplore.exe 30 PID 2116 wrote to memory of 2864 2116 iexplore.exe 30 PID 2116 wrote to memory of 2864 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1a09373bdc225867e33cee5321cbd2a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9344a95be0a600d32e9d69e56bca6d0
SHA1b2e3f5b8f30104c637cfc03a94c852ed728a39a5
SHA256e3a79c1282d310b2ca44d1ceaa4ace42054feb1835033505545663ed3cb03a8b
SHA512f7956806fbc14b23294755d84d69ae26f2f10c9e5fc5ea0f6221f0aa6775b2f1e6c6c16454c41c9154ee5a65137d1d0e2aac52258cf9925d1540a549519a6c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b0b7d002ce192b028509ab5273fadb
SHA15756edc8271d5254b1f4ba0b2490dcb4afe33e4f
SHA25641772178c2378cc7bd92bd04dff7dbbb199894e0af7650c5ea15de828189add3
SHA5126d9b99ffadf075d43780b02c88805e249056582ed466ff19e8ea5d1445ca5b93925cba68a962037034e7abeea820fbac9f3799715587da1b85010ea386915654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e74446d007c2fedd46a22db7bf98018
SHA1e42582ef3aa1647e7e7749a8ea7b1a2016ea0d1d
SHA256d7cc634af67657b097b121bda8c4b4efb6db7c4836690fe5eceeb7e562e149b8
SHA51234c45b30ea2ba0e693465b93a9fcdb963ea7e813c749d577c3d8d8ed743607c29c595a8d8980568ce5fb037ba04a682caaf7d36f9995490e7af39e12d7d46fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101faca2e336c0818d282abd2600193d
SHA172d8581ac2e09e4f257f23be577270b0da2e1c2d
SHA256d3b087a7a6c32042f2c6bade482851658656799f34892332e3d7d68e248c1b8d
SHA512ae8490d0a7b40d06b16108ff741b9165f089f0a6ef5673fe4419ce25d49711ca8468adb395b6862e740ac5bf66a97cf85038ddeba968df27bb99a107b96a9e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf96e0d7f7c107db01505fe3027d9f1
SHA1ca25760f8e7782ac112e42e679902a9b052c4a70
SHA256d916774b13bfd56c9a75657c1d71dd1ff3c93db3b687107ef8cf09edba47a153
SHA5121ba3b914c2e5ab2fc81d66e1f0bd8ad35de651b667d59da86d12a8828938b71d04176979f0dc898664b1757b3749f6eee9b4b6d17b9dfe450ef95cead7f40314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2127ebd81db5c244e6c0acb9e784e2f
SHA1e0354788d8b46529839e2b498886707346c7721a
SHA256ce7765dc29ca33103e447e8697dc3edf8cd0f1b406a3d4db20745d2b633eb195
SHA512078c3b42fb67ca335a46cf3cba35f23bfa9a79c373054abfd530ac5479aa690c363a8e39f3012cf835ab0e92a8e37d3276581cb63a5ef8f6b2c54ca9f41fae94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76964ce1792486a0d521b9ba2fd7e05
SHA11a13e604484c12c2c103aed7aeea3828925f6607
SHA256c5524fe6f764146b73109c2a960012d93cd9b10e850d046d9b9b312b65f2b166
SHA512f301d66b5b5aecb8b88a767160500ce3d85180196022ff5ed0fe7e72fe93cb491fc1dadf836fff957b0295f71863a7ce4dc88ca3a1d6e20f3317c9041cb6302e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6761e77a75b944ecd7995b6aa2f5f7
SHA1cd7894549d31d8df97c3b193256e45f8355023fc
SHA256d73d69d86b7f64b553c09c0bdc4b5d757ada4cbef8cb37f6534dcfc38f69e76a
SHA512e8f1e804b4cfc03d6eeabd11edce9b2ab32c8cd4c2caacd261468918a0e441cc3d0c89d07ad9fe7a04b48e84edac8c1b12ccf026091fc9c333d1f180cae3b83e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547836a5ade83e592f07403831d0341b7
SHA1af68400a9e993e27e0b99308c3abde1456e9a8a2
SHA25635d683502380043542c1b040943cdf903a43d981b9a6be1a0c875bdfe7e52fcd
SHA512c362b2380433cea3ff548e4a1ea2ad494ee16e91c19c317577a1d87281723249bf3d5c727011432591fda1c939a20700100eff02514d15387c613d6827369fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f19bb12e75dc0c606423df3ffeba4e3
SHA1b804891a586e8b4d327eb69076055dc9fef8536f
SHA25601bf5257b643db0efe3d81a5fdf7adbd9e055ce726ae9623fa1ebd294b26c47f
SHA512a2bb3cb1d1cbdc4423355906ed7414340a540b1ba7b57d3b133274fe90a3d74d9300634e6894991abbb07b3ed29546ece26c83e1243f79143b8edaaa58601312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e565dd99552439af03dbb9d7ec8fa58
SHA1ec03a30f3add5882dd60d5737cf487ba2cfb4b8a
SHA2569ae284d9b76e4105488c1bcd00e81a74b906a7d7862ae6eb86edd5b44df795ff
SHA5126b128c01faa555df84e60cb2c947e9d54a0b33fd80b7ebde5b24220320e21afe8481b9cceed5f878cef4d77e2aa0596876c76fa065f42bea42c0b128732d7e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c80d9d058c954e1d2a35f745b94f592
SHA17a029ac9894491f54747a23c01a7fe49f7e014dc
SHA2561871ab9619866e674c95c5072af87aa7f068f2e9799f3c0039d484c4a471eb50
SHA512bffeddfc7757fbbc9a774ba573d5c286ab7c21bb746b5d595e38e87461f9759eba573fb03f0c02575107b10b7e976187c6059b7cb112d011e7f75ce815f8e0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0545c536541a53d9850623237add34d
SHA1069e6cd6b486bb8089c77d65aaaaf786c9a3eb3c
SHA256cd785608634e40237f0114b878a6ea9f7518a60500387a034a06a72ff7eaef56
SHA512e29d258b930017c4930e66785cfa4f0a282b40cb450b7a0363151d3a9e89447f2a151ac47d717ee0361a7463ef62f3765125afd1a5cd486d8868e9e69d65e005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a1cf23e905f1b33766d1e6dab0b1706
SHA1edcaecce491e66ca531da21260c32d2f32d692f4
SHA25620d5759a413d26018c066b238dfd54f82c4c090712253d8d4b7e24e678aeed54
SHA512de399cbe0bdff57c429ddc580519cb355cd364ec0c589b14b7fec7d807aa61352e04b3bf22d18158df7be296b6f2fbe7a59c78895d8fcbfe93de467973855b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5097a7bfb20d593d66d74229c3632d168
SHA12ced6e3e16f290fdd62a644de4e03fc33c27120b
SHA256146816a417242e87b78cd96a59ee80345c2b3189238b31106181b85cd08c6f05
SHA512d39d440d4461e11752cdf5a5f4324e23752b3201cb510dbb0eeb5ab57065f6d7b129c17b67dfbdc81bf09eb53b81b56b8f583e69c314937e241f59d84484e67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a72b8ab9343f9656c3b9c16892391bc
SHA16bedcb765e914443f177b35e1e510ea6c423d57c
SHA256916a1577ca0b643b5d08be2c1f264e4ea2f2a14426c0266080391a6e95242246
SHA512db252fb672265faaff2892f2589a239de1bad126fb8906498a7e0a44cc95a4385583ad0a499df917e8fa037c133da45f2e5e64850cd009461de1755283a30526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a806678cc0990495d3bbc6f4b29977e9
SHA137177be61ce0def19a6110ffb201e0a847745d87
SHA2564e7d8adff99da28c6eec0c7e2ca77fb4677c71c0e2f1af670545b78171abd27b
SHA5123b67e02eebbbf7e32091755ad8017591660d6e8bf4b91174b80def61919021d2bb14e5e3052a41708f7c2fc77b888a6becd1fd491956c165e45618957eea68b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ecb13ba7af8e030251ff47fa10aec75
SHA121d57fb5cde41e783cadcf927b750dc24a56d012
SHA256a6edfd5aa12e1b6bbcdb0bc1e95e2f5facc30fa0f016ae18a630af7097c64eb1
SHA51250ef7ca5831bcead1ce8ebbea317c1e8bc3649548e928fc3b4bbce997f0764d8db13ab5069e1c950513ff44e6facb6d1888183c6ecbd1348689aa6d2d989b6d0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b