Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
d1a88ee93f9b99bc9d6fcd135915991c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1a88ee93f9b99bc9d6fcd135915991c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1a88ee93f9b99bc9d6fcd135915991c_JaffaCakes118.html
-
Size
461KB
-
MD5
d1a88ee93f9b99bc9d6fcd135915991c
-
SHA1
ebe0d9a0ca6df3932bd4c4dbcb1db0bf4ce3595f
-
SHA256
9e4a932ec0e4f17687517bf93877bf1151438ff0d77c052d8d1782e88cc0d7b0
-
SHA512
5d3563f20efac492834ac7226a5d32e2155c877a4069f075c80fb6735a7760daeebaef87b7dcb1720b480d56906bb677f3f3a436c1cc95e2304938e789bb4916
-
SSDEEP
6144:SnsMYod+X3oI+Y9xsMYod+X3oI+YYrsMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X3F5d+X3o5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509d31150c01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431864761" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3AEB2CF1-6CFF-11EF-B190-DEC97E11E4FF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000047d3dc79b0e42d9d48bad6529208d7766b13eef7636759d49c632877d1bf460c000000000e80000000020000200000007dae3b84e5776d99b749255f1863c00551bed79bcd4d341dd7dfd7dbdcb2a600200000009365adab19a7654d5aee7a6a7f847b8a8f9b236361c83721e4b12a8c0c6ece0d40000000d5f5f1a0704c701ebed81f20af699052bd0f0dbdd826e0577cc5f8756cd719e1fdc03352182419a66e43ce9fe1506b7a34b77d9a96ced96118045518fea758aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 484 iexplore.exe 484 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 484 wrote to memory of 1712 484 iexplore.exe 31 PID 484 wrote to memory of 1712 484 iexplore.exe 31 PID 484 wrote to memory of 1712 484 iexplore.exe 31 PID 484 wrote to memory of 1712 484 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1a88ee93f9b99bc9d6fcd135915991c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52956ca6d2b8c1ca48f002b5743d9b683
SHA13de9beb9ab57e6b13b1df4943007e7b3cb1443da
SHA256658da7210ab8b0aef8b5552973210da3aebe454adbfcc5bd2bc1189d95b6bc6e
SHA512f6c22ee699aaf2d8863afee2263552ec2d03a51367e3431f91e494ffb626c1664e20dc8aa4426b00ca1bbbaa23017443db7f7bb828e4b000777e596ce2a7d5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef60e32aed45f35aee679150fbc1482
SHA111d6952ea52af818e34d0e5c086a1d75ccbcd98f
SHA25609dd0532743b230c119f71e0f23920a577c9f8ce608345ce122911f7a4b55abc
SHA51229b48066d68f7606e0f050d734cb8088c6f4c09f708bfa6177699fe7a00246cd0fc4f4cb3514fa2753b47ce9dc9ef23d031d8882626072203db4d72b2137146c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dac0d5c855770f7934f77bb945607cd
SHA193db2cbf49e0ffee1c241c97168ffe4b69648265
SHA25688391e21d2cbace3098edb4542dc090b1d446c0f64e1a50ad6c4679d1939d15e
SHA5120e2e0211202035a2f1d6a5392b3ce204eedc31166e5eb73a3c4aa7cd977085a5019f0c3cd4e09503310535700d976ee1bf90bf55d7e5ee7236d17222fac118f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55510e9ae727ab23a5c2a5aeb8698bc0d
SHA11b35c3251ce9f38549f41d9b8dd8fe29db5b8f68
SHA2565877704dee5bfe851b9b2c76e56ccb475bdb382a3d359cd863702f77c470009b
SHA5123a247c572ff04c7eae78849e8371fc82092a6466088e05489872edc350fabc8e6d20f3cb456b18c84e7d436d6b056943c35d477932ac74304710c2b078a02cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ee9d301bba91aa15b8db506377123b
SHA176ce6a78c9881e1f2c5a54c1497b29e333465d58
SHA25677ec8c556bc202fc4b51ba12d51f737eccf33ca7f1864d8f81e31a3424f6b089
SHA5123db882ab13cfe61db38d7900c4076209e4f6081f5d0cd5bcc412013f70ab8ddf3f72236c6f7fb58dd27a474eba9e33e8f4b115ef00fc1139f2d4a181e9873b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df9451c8aef2741f81af320aed275e87
SHA1bc622c284db913a183ae549b32985d5e60ddbc38
SHA256db6206001ca42ed5412fa7ef66a7d965483445e0e982a5878977e0dd0d81feb6
SHA512f2cc951135cca724cdc8178aaf0a7b133a5a022eb6fb1240587be2e6213dd608dd014324cf3a050b7c03fa3d59ba87aa97c075888f77430bcbd78a0b72038ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54425edc81cc1c89e9b8168e65e7ef0db
SHA10d813b0aac62395db0690f4922c6d437636588be
SHA256d8de3e1aeb6907b425d21306ea177d590deed2cd0439a73a1e42775924044628
SHA512b1070159ce63761a17cb73abb2d061e83c7e39110ed2e375c09b47667c3ff0b4788d9a84cabdc6f3e225c8e229658ffe436af0ccd44b926f22f4d690bc7c862e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d2ec733d2f88f2ffe90ba7144112ca
SHA1f4213e97da7d04625757c8b12bdf95098d63be00
SHA256455256cda1d1667b16faef2b8102ee72a008345a4a4a8e7124819c087c838ce0
SHA512e7d9676eb6324fc083970b01e23d0c129a5af15eff5211f63c20e08f712352355f36da1f66f9967cc60db8a273ad7849397819144a9294f52bb2e9d2713bdf9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c92ebb610f6b70182cc56bbdf27350
SHA1720bc7644d2e13835f9d3b3a288478b63da7026d
SHA256d66089bffbecefa438e8e038e24c67697e84b0822d805fc8d643e84bec052253
SHA5122c6d9f868ef3d444d7ab688840e7d73971198c6839c18096b65df408b9b78b71554684538873ed39a648c68a42335888c4e16c95b3c341407139d84bdea01b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd23e9d1592adbd96ba89208ca01d2cc
SHA13594e34eeb72642554ddd1143f4dbb1b53eea284
SHA2563861fb095c7c59da2922c8589b960b165213f1e8b0f2d66af9fcb4daf6e48ee4
SHA512f0762e2ac385088bf7cef41ed1af3ba3d52ccc12620f352053a5191dca72162da90fcc5e9191695b871d2b73a453687c10825f27dcf18cc4d15021da82382a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597aed6d13d301d5d3c66256c770203f
SHA1ce6b0aeaa47f41b6e8b31a9bed302deb9a0d7475
SHA256f8f498bc8a762b5e27f68c10ad41da50b37ef139bdadce2bba6e53f2161df85d
SHA51203e2c8fb0f75c2b958a0bb9de0385e3565ea10f47a4da3905fc1a0287b62abc2cf02f8a0482cc787b47564ac192cb506f1960de3514b6b76e331f589c0e90560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53817e8880ba34f815f94f6013a0afa0a
SHA103bdd5096a47e94c7eaffb6296a08bacbbbf3664
SHA2560e40e3ef9a3ecab1e6971e5a4137b5d7c68fb41dcd1a222a69a50e46b5c046e0
SHA5129afb89617c1715409d17311c5733b9e55008c36607bcfad6c3f93f5cf5e014e13dd60f31254212c3948f76f1976624fa2604d7886d6d82ceeba93f2d786530eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c5fd571b8f8710d714be5fadab7730
SHA190ac06c9ef5f6c4e2a236d15eb96d85c069f0b45
SHA256409c7124579a4d2f53b932aa33f6e82835d8bd14e2190aabaf1bb2e8f7119cd2
SHA512af36a837c23c255d58320d4c4f1f1ead52a7cae065946e71232572fbcd2b29c0364ea0ff34e1e90781713669f27c667318f11e504b344cc8070803e2ece1e2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bed757209a56c86750f02fb5c1ec179
SHA10717556d9737bf8b2e5cc0558c01859add937d14
SHA256e56d626d572deffea7b560d6d51082774c813d45dd5b535d076bd214960180e7
SHA5121f9bd440aa9904a165334e8b406fbd1bcb924c74e8719571b727d800577af2cdb4efd5f412005f1029e2026337b2d2dee805da2cb3f5126278e21c23142f3c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c9f1d27b36bc29d2d8b1a7f3d3d04c
SHA1ad2bf3e81fad911953b659a608fc39b831059ea3
SHA2565eff12fc65429bcf5ab3ee5ffe5e92620842417979e3587b99b86eda60eaf783
SHA512af29e296474f0f3f798751fffba86a650861e0bc852179d3cd422a0684312377aea96709a1e9eb5da753af41e76fc2204ca0edfc9b9d7bd00eb76a8535271ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d911b68bf17301a348d66260c302d520
SHA193d4b179ca9b11e9d96523b07be4ef340c9ae051
SHA2563341e0bec3fcfc9395ce72bce5d95b955e55dd8af3077da15b51ab0fb45b04eb
SHA512e133d615ee32e43fc9032d556fd186812ed32f280ca02aa91e31499e82ba9c1e7d707e17748e9a2d3804bab5b79035449a4ddbe7af7cbf4fcde16f7f066ca7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657f07c769333d1ba86248fbf402f7a5
SHA1fea4e41ae816f36d9168fcabb6fc220a024b5ddc
SHA256eb1bf08f6f287e0a4208a1ed034680b66e85389dfbb09137396e8d031d6e46f8
SHA5121b58b4251a625350984e95131b616e4d1ebaf3fe0221ea5b68b388d89dc63d13bfdfad6f907f5c0f16fb133d139724cfdf140e3bd7e3d546fa80648368a1ed1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa7b0d459d72338ce8c3ff659a5490b5
SHA1d19a0568488f107840c8efae3c93d387a784453f
SHA256947536cd3781f6a63f21f514e6ad9e8d45451bfec29b4a473cd8ec06ffdc17b3
SHA5121cac83d611e02e2d76e2fc704053a922e10bfb6b26ac673b3f339490dc5e8476d1b877ee5066d860fc60275a14fa7da0183819b948e90d28ce01d0ef566b572d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8bb08bed5d0d6bbd01003eeb2e9482e
SHA1975ede2c801a38c9ca86c76f8545980115297d50
SHA256e877126a6aabc304b181cd0bc7f4372d6f8d3514c43edd442429eccf845a9a7b
SHA512d99c5aceef40e9d563d9cf7166faedf6ef7cf3dba76377a7a5c3286a56e5528b44a8040b8acfdac49d505e3fc08e68dc727ac3121a41cde2b5b24b07fea99fea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b