Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
d1b63eace14bc676b27957cf2924a2f3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1b63eace14bc676b27957cf2924a2f3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1b63eace14bc676b27957cf2924a2f3_JaffaCakes118.html
-
Size
40KB
-
MD5
d1b63eace14bc676b27957cf2924a2f3
-
SHA1
385525f158f070781591f3bf1a2059b8ca466e7e
-
SHA256
5491bea14b40bcbf4ada07d903568f129756fb372f2e76a9470ec52736800c14
-
SHA512
02dcefa5e41f30205cae7318187a5656515a5732e5af407cf6eff03875e8f5005487ed745e4a0fcb2288b79f3cad40f21d0de050e12c63ccdad61ed962616272
-
SSDEEP
384:CvuvVvzd7dNgd9h+jAGd8XfkrvfTXDNxL+wpGGC5MbPXjAtwkffXdwg/Y/rc9gP7:ldMkOGg/q9qz9ty
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609ad6361001db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{565DCCA1-6D03-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000462c1d17c6ab50fdc0e9ba4523fc12dc2d295a15aecf3cd17240712cbfa55189000000000e80000000020000200000006e182d82a2a7c876c4fcbcb01872a562a978e80adc7232c39b77501107fca3aa200000004a328ad4bf510ebf5a4609d90bbbab2e16d8662f23d5a97285aff22b0f212b3c40000000ea72c758e0bebcc5cd3820303dd97343498a5746c4e82b4d87b07ce368d4e9242813ea702cb81660312baa4bc608458b1cc4af792cf3149b9604f4c6131feea2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431866526" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 1848 IEXPLORE.EXE 1848 IEXPLORE.EXE 1848 IEXPLORE.EXE 1848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1848 2972 iexplore.exe 30 PID 2972 wrote to memory of 1848 2972 iexplore.exe 30 PID 2972 wrote to memory of 1848 2972 iexplore.exe 30 PID 2972 wrote to memory of 1848 2972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1b63eace14bc676b27957cf2924a2f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1558147b2ec895a48b833780499c374
SHA1357033e58a12955b730514da9c1c12e90804495e
SHA256bd50fe8dbf3ea6b059bd116b21e5507c21d57add54b65935036f69c46967a322
SHA512f42dc6354fea4358a93c86a6739a0291ed4c70a804c08b6c4ed4908da30fdf96f758fd277a8f58d7472b29d27008157412620ee600e31e0325592fac7133747f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b38ca1c3f657cc6163c906aad0e2e296
SHA1f90948917f50e933be49ae166aa5aa2d21be545e
SHA25637efa2fdd80d6f30d8e29c163663cbf2fd2a70b82eed766cca93786539ac3dd8
SHA5120a292841ab2f70623354004cfd4eeef1127765b4605f596394da77d2d1ca46455f1780ebe3e7e201bce38785b7217c5597fbaa71a3e97d9458f8ef42eafc3816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b39e7f09c4859bac980505645dd5b90
SHA1e161206c01b1620b6c7e2d3e53048d4abd40a041
SHA2562d07fc8a1f210c213a86178001f4d5c8e8bb345e245425628a08dce70f8173ff
SHA512dcef67f9cb07a905ad25a5de1405262b23f65bb8e2d91abf4cbeeb42c8475f1b260fc6b71988cb9d9039e97af4ad428fbbae10752afae47d4a5d1a33bd6344fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a0bcea724cbaa100f870c42b4a9353
SHA13c968e300be518467dc2681c4250186ae3411cf6
SHA25683e4a2426452526f415fab9e8e7425d81b75ab64753f91e4ac98f4326954acad
SHA512f29f1f769610973daa6e5838bd870ceb0ffce7a720e8986870efedaad19393834209e4e5c9e6b54bc1fcc38cf5a7d5555dd8d8ef4181c8b1afb35156ac36ae60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3cabf8ec34e2488686cd9874900ed03
SHA165e1449166e971ba71cefae0fe89694271b002c6
SHA25630112f64f6170e67f86fb09eea8b043a91975a7a3fa4795077c4611a439399a0
SHA5127fb6db1ae1c590027a57efc121f1e39f5cb8e104eaad0ab51054d48b4a80495d132b75d556969c2b40c80b9df9f3c74eeb1190bfcc4d7e3246935bd764b847f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1c96d008bc86057e05eb7e51c3bf92
SHA1f42870ee8c2411c7616aeb55770a8d28faecae60
SHA2560e0089cfb8bd8fdadc3b0935eb3952b04a562812aef8dd8074a6969fe2b1ebb4
SHA512227d80c03dd6d048d4af62371d47ceef6f025cd045c21beb48e80d81cee452b8f09ebf90f41dbb15512f454c9097654de00cf1e14063ee4cb43c2c1877b0c759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4369ca9b8a74ef657faacc0cc64626
SHA18ea3040cfc79f99087e96bd786525a1ce6ee9c57
SHA256683328f0cb6c202013c61293470d505ae4e421e7ed3bb6033829a9e629ead661
SHA51220cf108fa4537b1e9f4e726bda4807ad65b3e98053b1797abde4a1c1eb3dc896899ab0ea75216fdac88e9e68b54505c7fb4c95697e64d7c8176de431592c189d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf449b1bb8d41171ffd43e90393c70f
SHA104f3cabbf7719c64f32dece9d8769bab815a6993
SHA25678fed9cf8a5423612e9ca4c4c322ef092b7cb8d4e0cd7ac8c38b2bc0d9bf29db
SHA5123bbf280ef425fba96990cd6569ae45c0104bb99af119d6fdd0db0ef6fb6f1ece0e7025b372f2ce44389b0adb4a1ab9f5ecece9bce83b6a5416651cf40ad48e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517cc96a7386f6a28304770b0fdb97872
SHA1635afac85117bcd5b8b6fae10554ff6ad36e87c6
SHA256e694b9d49462c49e1ac29f3edaecf1a808aae92eb59e61154c58f23526a0eb26
SHA512cc7155bb9bfdf89a99edcac202dbeebf69bc1a4c470145774b7e23364f27c1e456703ad15ef3d85fa0963e1c24db925d9f9c7ff2139dc60891d1f47b8683a65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53afb13e4e769f633677ee851f8fce0d5
SHA12ced083d3eea0296ffbd8b3f754a15a708fe1b86
SHA25647450748dfbae5fa17e1c9369d0c20c095876766c3704e2ad0196370d9eb3f23
SHA51277fa14968bbd00ca37ee16ac618e1f514d1f9ed18f3eda5e449c74a47f841c086e6ba51f615ba54834b166660b9581630b1f982d3e71e12d1d2bbdbe61501e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584523905553218fb66a8e8b8c13a8e31
SHA19cd33125f7e5d7910876933d7ba56dd5762ab9e3
SHA25694fb3d6958764fba78c7350a3bc95ab42c8cded26ce96c52612704769e26aec9
SHA512897c64e7a8a6d33e180c3c34d3bcf8fc4945f8cc4d14acb80bc4950261cf0aaf5bb6f52f9e1f7bba61907fbac34a7854b9c191e7376c11e6eb04877017b2ebbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d94a732a2f568a5e4ad3d97228cef1
SHA163c546bb009d16b4c1de41c144c67f0524dd6477
SHA25699be56600f2f48da5112f9323779bc641701a95e203eab1c9ac413494dc88d63
SHA512134923cae99bef72254f5e62ce07a8009455340c560a542128de69a5db7c85075b726b4a2fa4fe2b76facd922d029f988356199f1729f2e09d138582f27e78bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6138f28569bf45b97cabe22de389af
SHA1e27aef8e037c686e9e8fa7dfa1dda0b4db06002b
SHA2568bd0f4f369f625a84ef0d1ec750a40c5bdfbe2d09ea84f1da6bcc54cafa6ea3a
SHA5122d24ee4f682ed078f11f205fd8e096b6404fedd522e6f0e3ed2022c467c3409a2bd690d42cfa8ac58aafdaddfed019fdefc94cb86f850867b0b3030fcfa5fd01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3d46f03fe309750ca051cce2f85085
SHA1a1747465b367f3472a71fd9731c950329e32baf9
SHA256d69dbdbfed95bb3f3f7b8e3dfd5d7dff8291f1d858eac959842a045529911b06
SHA512a03c9f37aa3d8b64832dfd5faa2854c802fc7f9b5ccaf05e45db38c5c57cdb164643cc83219192e2b451f098ade6dbdd09a7bf6e4f8fbe2923669a62147c8dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532354c01481a5f384f38b9455b0ff388
SHA128cc69f6c767448ed4340ddf778ff66eb6008c20
SHA256ff9f9cd384f1e9bfb1f3fbe69f86a299d3f95000e37aab624223753a17a5b075
SHA512a4ff752db5438fa8b491ebbecda33b1d4c9c4e6ad202508ca8c99596db5cceb0ab58ab57ae0fa83388b164d0184b83556277b82dee4fb09adbeb692ab31c2cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e543e04f7902a5ffc58cd55aacab27
SHA1d7441cbf07c856face0e0e61381bf1c068aa1ff9
SHA256629ef788130081fe9b3a396a3b2f6a824444052a7f1031b0ee2870b9aff26e1f
SHA5123452ec060eb4083fb24d7af2f4ff14c783f1b38e79dd67459f271d6fd4480f726056a67fee1e458b413b764753a9de6055d045355f295459b5b93fc754858028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54059142b7035c4222e3e44a797334e
SHA1ae04344b947f143f5f6335f31d849ae0cac71587
SHA256bd3471ca789e9cee930b0deef15bf6030cde7a98e9532330a547459cae3dc1fd
SHA512a85299741f8b518cbb1e7e61be02ba60482e1d29efe8fe37c6a019aa8c13a35d9ad74528d65c38c587b483fa31dbfca4c7a4d0eef4dd0b972ae2c162eb007034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867a76a0f3fcbdafeea5d33e3b3418a6
SHA1bac902e8503193520e777ca2550af149d670d96a
SHA25611c012234b4597c06abc7fd6dd5dac5eafe9f97b5783f2f8716b7454be02da25
SHA5122d9d9484068f33051615d5760cb134798d9cc086341ae08c7b96f0a7fe9dbca25bc6510082510f16cbee9cd00b375c6140a5203960e62dbeb2cccf01607be2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f8103d9ce2ec92a075a474c358b85d
SHA1b3c1bc4bd46bc03851c7f5b7e32dcb6a449c4da5
SHA256c0bb91c4e3627acd63f777f0812b820126970d30979235fe6e9b85d89e822941
SHA512982d3af5e08883edf97e15ee5c92f264d6dfbbc22247dc43824220c7f12a182edbb090580f7273c6addccd382ce0876c863fb0dd6ab95a4132409ff0a28e2ac0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b