Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 11:07
Static task
static1
Behavioral task
behavioral1
Sample
d1ca7576b7e0c3348108901c9a1e11b7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1ca7576b7e0c3348108901c9a1e11b7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1ca7576b7e0c3348108901c9a1e11b7_JaffaCakes118.html
-
Size
14KB
-
MD5
d1ca7576b7e0c3348108901c9a1e11b7
-
SHA1
b644179c7a2f4de55ef74b537b20e315c84d89f4
-
SHA256
4856ef630ed2faf98a045f57ddf36ba4438e60238e160f73d59504a99fd85d5b
-
SHA512
e140288974d3c3c2512ff5ba7dc6fd32369c1839c62de0e42a7e966183ea0b3b4f57448d7ce5ccd3640947ad66afa34c3b6ba7cbeb1e3facc6c2483161d9e8af
-
SSDEEP
192:4s3L/3J9K2/KG69Le36M7ROOrAHPYihaXuayVyI8Kh4F2kHR:4I/ZdO9Le36SOOkHJhaXlyVyI8YoPHR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6251A5D1-6D09-11EF-809B-F2DF7204BD4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000aedb307bd15dbd51e169f67c42abd8980708cb803bfc039e6001f4ef6bdb7f19000000000e80000000020000200000004a87dda1cbd9aa4daee9010d358aa2c39d722d42ad42480d654b3c1b7740febc2000000027b4dd061970804706634020dc789e7c2b8d9603317f4faed3859365695c55e44000000098de9477ccc7611c22da2aad9c68c6f4721f2b17d2aa621de1c19c66b049bd2882374f1e894d747f5b329ce94fd1a3031a2fe63b9484e152e1ccf7ce700bad06 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431869123" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506ee4361601db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2184 2156 iexplore.exe 30 PID 2156 wrote to memory of 2184 2156 iexplore.exe 30 PID 2156 wrote to memory of 2184 2156 iexplore.exe 30 PID 2156 wrote to memory of 2184 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1ca7576b7e0c3348108901c9a1e11b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534724978c76ee4824ef257d9846b4185
SHA10aad0790afc44eb8dabb4c2a07695eb4eeb22fc4
SHA256dedd691354733415c020192d3d604f6559e2e5ceda37ae519456b557ebe23094
SHA512ece01ed26d668de67588d5924f0cc0c69d721b4f5baa867203fd2e0211928063457735a83d258fb5be7609ce5c7b17935c62087d7178584bcb34dc6b2a9b7a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50606ea7e6248e26853e18f4409deb9bb
SHA18017a6ae693ae50733cfe45495284af31fe166a6
SHA256aca691820b9ab3e6cfd5a11fde918e68b784d4195c8c254c1aabce52c37b60da
SHA512dfa57eab8369a4015219d1f1b4bbad25e3e6f327e29e791fab65b424eea4551d9f526ae9b2ab1533081e0d7ae6ab53985900903ece16c94f4b952d8c6808f720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55231c3de02175a2a29b9d0651b0ed453
SHA1bc2e797ab84106dd77fae69701d1684f1970dbfe
SHA256d1175c0c10faff67d86a0aa788876ad4146979b5ce3e75548ae8af56b91b39eb
SHA512b3b0faf3078022613e68f3eaefef7e28a4819513c243813a20ade5a2d39a03485ae3eb1e9aee625ccdbc8a246a03befe831deb5cfa426fcefca97f9a2496a8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e133423cdbc1dd91422eb6b5a86e4f8
SHA15ae6add2eb2e96dcb5324104a466c14d496f7933
SHA2568090f7012943eb44f2089edf92c69392a53afab9953a96c227dd59ac3badf1a5
SHA512bf49040c6efaaa58b560163845887f6ab679d53a23b039673e9fb75132a1e7949b518f2922c524d461aa3549f072acf3dcb3ce86afcd756a2313595b14397f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c4e784df777043587e6d731826ceeb
SHA1ba95cc1dcb96a86926b49ed5bb9cfcae2401fbcc
SHA2562ebe5620521566d958d39f238b973035e32da1a7871ab84d9925e619b895bdc8
SHA512218863bbb866dc49637a77f7379d65483e53a2d12dceb50ea2e968b5689e55aa321d79005224e56c1d337efe95c30b8807ebbd4556e43d9dc5d358fa1d1f85f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b84d16fafccb7e76b92b37541bbdbf0
SHA14721dc4e9212e2f339f5fad5f1fa7bfb2c868cda
SHA2561a2929321b882bcf1b2e86b82e1b2254191b2b54faa7a23125610fc54c83ad28
SHA5128b23946fa12ec50a176d9b54911177e54e713f27863392f7f39b3e3ce9d9091a209f368cf4c69d9fe56dce9c0427227519acf76def5fee352fcb2fe3d9d36aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ad16ad9fdc4a5f3b989667efc87564
SHA19937538847d0018a8af3d5f1fc2b734f7346ce08
SHA2560f5878cd8f26924e119cc83e9289d298ed4ceb943590dffe00062d3998f854ad
SHA5120e80d698dd089ca12b47d95b4eecba0ffde1323cbf6b5dc510b17d32adbfc13f0d7df830ab5ee738899c87be29c326796614cebcc6ea90223bbd1952149f3e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538feebe554c37e63a5891de51887c10d
SHA1f5ccb047087598be1af1018015ee18ead10ee242
SHA25609d587247eb21aa0fdc8d9a7d57167caa3e63e655a8ba1cb6e8bc4d1048f84ae
SHA5122c3f9970b46db61eca7ce4421ee6b3a90830765ff0a900c2f02e08524ab0352e6f90e0073672feb1001b4716bc6f91f5aa8bb0e64029c27afe2def499153a133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fd1c6365291da5ae50ce846bcc62ba
SHA10c7726132bcfa00d3ca357d729fbac05d51a93fd
SHA25606193cfbf550f1f607da3913f02c90a3b538a3070e341aaa54223bc0b19bd24e
SHA51250d5dcb71d202effb8d9d9f6e70a13b371c091f1ffdafaa345399a289dd0a20f98d961ca89a76645c0789d22b063e5571f7609ab3ce3dce322872e8ea10f8c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5932204ce0e78297cf01f4504edf12384
SHA1082a9051c2f448d05a6dd9e175a0538c671df2b7
SHA256aac7e6507384569955f7703fec339731fd3aee8baeb0515dbb92bac11f814e9f
SHA512542d360ac8168c82dff5da6215cd8daf294109f6b6e87c0041411eead1d0b2afd11e39ea6a2206329341535c589c6ddc9ffdf0dfb53824cb936334baa2e0d95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583516ff7889076676e46b5bf41baa82d
SHA145b885de7a58bf2f822bc416a6204cd478dae54d
SHA256b1ce7f96d7a28e98b46b296dea00d97b85dbf9bedc97b59c829c015f6a94548b
SHA5126b3861b74102aa3cac5156395f260275e3f87f33c2b1de2ea08cb92b2afc90fed07165734965fa397129c665b90808cf5bf29a8fde54bd108919786853d44d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586772faac1918a4bf85b3a20efd14e42
SHA105f1822d6a50d2bb4be06aec04e7a11d856458ad
SHA2563408569d9c7be8b3287fca1483e221c90da5d7e6dbc45f308e75ad7adbdd63a8
SHA5128df42f3a8079e027624bae4234b729b7bce2dda72638f351d43c228eaadc416f8eaa2c95f650c1a765021d4973d10b626144032c8f6328d8e426c036cdd0d141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f033d40a92acc2a30037dbcfae584f05
SHA12a5a631d0b2b243d1ba6ea513545b0c9416c0b71
SHA2568c1ffd9de0d11b271012733110a6189ce374436de9bd1953e97a27eeb71cb32d
SHA5126a179fb8cf7596d476784bd938f6ad72bf5470b379bae84ed2822f5ad417b28bb2a3ccae98a1acb43ade1c106e56cf88f02d3ecf947ba929f8cf22aed7487922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998837aec8f9f8a89814fc4fe687e02c
SHA1d4831391922289b97500bd01bc486f596479d6b9
SHA256e08755f61a6823eaf3e3d6353950b6f24a279c0005df179264713b559366c20e
SHA512be2d0598164d8ba9a983eedbf001898c68e1ad36cbe08bf505b9ff16508490133fc4517e07fc7e4f42b93ffb09e9f324cf136737a0dab2905d6133289f2c408e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58aa5f892294eb5934309afd40d503c
SHA1b4b451018823c81ff6b28aa2fb93f3de9a45a9a7
SHA256c4b0749a484944f3f7da4243036614f69bdd891f94e0a9473f0302c25e39b33a
SHA512d8ea847b447b152bfc5ad4320b1968891f5e4116754eb30aba6da015d2cb0aaf30fd7c96dab8f16756e1417f26bc0ccc78d0509151b02ac59ebce635654fc6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a27da0c522c889168331e4c6836f83
SHA19e18800f6bec0d11664210c1b45cee2552b3af64
SHA256d9164bfe2079cc7b063fafca4a64c2272fdcec9bc0d74532c8dd842e508a3fd5
SHA512c5fe7116aeba1c6bbe67f707cb3d17fa230623cd0d4e54c7a68fd7a80f709d4fd0de15bd3adb13d7048af53db30f80e530dcb4e013d362052d470600fa1f0647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b98998c78e81b3393e96222ae94e948
SHA1d30e9a0fd4071e53d7cc9811d9a4ebf9a4e7d5e9
SHA2566bbc559c4ef3c2df9160eb0b1913ff01a0e420313d9cab1de00bce2d37bb38a0
SHA51223a36f87308f441f7919edf343a241cfc5d15e61465c69dc77c356626bd69f242d54d94a18c5a721a32402ed7de5845577fc68fe8b8fa8852d52b30e72c3ac64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f41f7453f65a7ef79ad4fa66a087dc
SHA1a970aa6ba336ea3356baa32dbb2300d0adb5cc00
SHA25648f2972a763129b80d269c89fe176f98f645c932016258a12f598f9455264a92
SHA51279959eba32cb016f94fc87081ccd6d6f4c62f1ecf6b195952ff05a98e8958323ab2b2d24bfbd98c37da16eb73043ee1bfa224898345483971f148ee0f4510e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4088e0b4bfb4a29a586c1fa29c024af
SHA1244c7de49f9c26be446ccf58e44502a75d4636fd
SHA256419bb7fb404ada3b277755723f199d29bdf3c081ab4c3b699e41e0332d23420b
SHA5123a67ba4b551ffe0b33ec465c8d37bc2342be78d9b58be7a7df76096ea5ad3baa09bf8ec32bc1256d5e017eb8339b1392ca94b5c107c6b06090ba0be2e8ae40f1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b