Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
d1d8c904e8e0756143164dc164062425_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1d8c904e8e0756143164dc164062425_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1d8c904e8e0756143164dc164062425_JaffaCakes118.html
-
Size
23KB
-
MD5
d1d8c904e8e0756143164dc164062425
-
SHA1
21d8a8f3ebd5214100074d81d1d3186fe7f8d239
-
SHA256
1701a77d3317bed03df92f8629a726d7840f98e812c2581c40522daf9ab2f043
-
SHA512
307bd25bfd2f5ccada1141057fafe9fd6e07fc065dab0debb0ced651fa3fd0ef6f789bfef9ca27fb726a1b7b9879e39875c8763b4e5158ee5f4fb734f2a85fbd
-
SSDEEP
384:WDErz/IMaUgq3ObJoccHIJR6FL4d+iuOdrHjvrEqEag9FxFa:WDErz/IMPdViuErzua1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90991cbc1a01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6B4C601-6D0D-11EF-80B1-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000528056a336f9fe71b36267e9277a0390f51d9cfeaf97797f75d486782a690317000000000e8000000002000020000000498302b84266dda925d756d3a6daef42a7ee504befb28eb5c3e87615dcfce94c2000000022b434ec93ee12301f14856ec0d1a08db19b7289d4c172830d8da6bb1f2b5512400000004c6dc50a06e3c60b0dc9491f0c441a6a1881f77c36a4030ac94b8ee01a7fc662759e7e0c8ccad64f59be434523e3b1ad1a4b951eda99b8489856ef76f7be1d2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431871061" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2852 2140 iexplore.exe 31 PID 2140 wrote to memory of 2852 2140 iexplore.exe 31 PID 2140 wrote to memory of 2852 2140 iexplore.exe 31 PID 2140 wrote to memory of 2852 2140 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1d8c904e8e0756143164dc164062425_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59928ef36486787435077117461b05081
SHA10ec1944dd0ab722e4e660adc6473b668bcce62aa
SHA2567002df33fa3915ca91177339fab715127d459ce094be2a7f532a679fedb8a2ce
SHA512b3e980c07d3a05b9685c783e9899f59cf899a868d3ada84e8a423788bb34fb954db1e61447dd70489bfcbf96ced2f677f2ccafba409586302f1b883fc4c487e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd31296cb5ed2db6cca563f221395541
SHA122006fa2b69e0ab7c3826bd0b11adc589839fbfa
SHA256e767ee150f5c8276c7e37fa2f0b506779d76343c44ad4023cf91f0f74d678ae8
SHA512a18186732ddcac1bf176923817862a249256eefdb55eeb219a4e652c364b4cdc3333fa3f1eaad793b2add6ffdaad9163b4cc655c6fc4f1623dc8e8e4a821cf4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd35c62829093b50e2d357675c17297
SHA1a431c4a971ab77ee53624b0d39ddbfc102e6c199
SHA256603ab1bced319600769ae3e67629c23906a0e7d8d93a6aa7b5ecadeacdec76d8
SHA512b4ec64fec2961388e96fb8667d28cb78b708b1434a239e9b9824d225cbfc3235a159accb0d2261fc0b44bba64ce5e9b369c156415fbccd4cea98fbf6a084319c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3f587d4b9835024b5441696c909598
SHA197bbc30808d42df5471550f391f0823c67e7f28b
SHA256443b464ecf79286d33cb36b2fd59d757e1431f07fec792f0e77b78fe7bf8d425
SHA512734e4a6a0301f7123645ef2fed64416626ddbeccda24f5cc7196540e05d4f48a01f93e8b846ed2f7600888772eee3c5a21083c3c73c9943ee9cd1f1e21dbe76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fba0f2dd01ab33ed65bb93625a17749
SHA180c8183b6b25dc39c17c0c794fbd3b34ddec82e7
SHA256a0aba22c00e21fdf66ade50403747f744a21fae90fefcfe67dc46801dea0d35c
SHA51278e565baf6565b861057ba7ce6ef8797ced8b00545d5bf79d6bfd0762da73bd39b00632ba7ca935a84de6e2805d8de0a5fa93322956ce3017d4e2858dc4dbf90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58751143990f2046c0e7cec69bcca5d17
SHA1d5b865903483a7512fdc8f40faca2f314aef698b
SHA2566ad2e0a74d7dc0c88275099b1f710d131bed95aea138890f891dd882f2dc43ef
SHA51280d299578f5482ee7e3ea54f75bf2238f26bda74022cb06d1bcca52129a30e43e1dc3d56dd62ac748a4d4a105d5d3c265270bd13a2b3bffd936310fe467c977d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ffe4a0650e62d5db51b4438b5b38aa
SHA14cbe21830fb6cf7be1ec0b2ecaef8bbef5e52ce8
SHA2562a60727cb0d2f065049ba88ab574e616f4349a404dfa3bfa33897d1a5c8a02e5
SHA512bf15288ee9ffac14a193ddf8ca6103b2335ffea01a3a64d4a444c04a2166d937ae1144d5ea5ed16a7f8aaf61cdf7cee2d38f3e9103d13a0b8410a93568f28166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb06a0f8a99dc84162b0e5b35f22834c
SHA1d47d90ebb6c1c44b733a3575670b3d665c94e6a6
SHA2563450e29423c73f11a18d3da4a1b1157a8fc0ffb20ca026f035a408d26596bb91
SHA512acefd537ac501e11e7da64f8bc6cae41e0c7e91c30276d346474de0826ec7a935e35f09f7c45fd4f988b4d523b8dd6afff4ea2ba3ab6c200eba4ea5f4c60c5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5595b42ec904a8726e6e84723eb92c37c
SHA11515cbdc64c7ec58d02723956c9e1a12b162897e
SHA256ad72a84ed338c3b176f7dd620e7099f4ff70ee8197ba702b81fa8ba0a6c64b7c
SHA512b775b38477dff8d9ea144c970979d05a40507d9845764cd4aad681447a5fa28bd72046cc2ee0f6b9d54ad8e803ae957f0fc9aeb8dc94529da766b5271cc27f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5674b00b0b128561ba9abbea62be2741a
SHA18fc5ab4e78fa1ef459b5523eb9db2fa93c30de2c
SHA256b35b10c424bf486d13c491efcbe7e0e0c04472694bc385c95aec79831967cd95
SHA512c1b91b6ae1e0ba8efbbe420946848114f25d39662dd2872494348a6e589d77fadf6a894545838428ee3985555c42dbccdbc192f591b2042aeb15ba4db070164e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d31dea491942991768e8b23fb9e95f
SHA128df2abb47d70613dcce9f7a9d1ee907ce555c5c
SHA25696da1bef0fb1a57b55a0f2f29f2223aa45d241e2837d3e1ed1634b951e10e831
SHA5129761ed6e0305f70d32213ea85062105d3e0a4d4e87fe14e328e00288ade56c92aba022b85824dfd69e9ff98f15a88b6c1d2981c89990526f1b9ebf8da696315b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530cd1e64c88ad4056be742dc3fb06ada
SHA1144c528cba5f5788c3707539e6720342ea07e1b9
SHA256935b482e834d43c2767161a7005cc0eaace5dfa4d5476e113cee2b1c17fba3e9
SHA512746f3f7be415da4f54917206a8f79e9724a884da5b63b7ca658dbe78773b1eb9810f2596077cd1493be1bb5cae4c0ff72df5ea14839db3e6c135355ecbfbb9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694293ebac1aec42fa2a849515a9eb44
SHA1018ed52afdd5dfcd1e352c791a4cf87de2b08d8f
SHA256c168e16a8c3eb5ef4eb7d801efb49f135a9b5fd5beb043ab924834fd211ed5c6
SHA512806f00566512748c489da285630ff8819012b46243f48f391e71f504d44dd54168def8d9a3dd53da73f02be4e4ad694e465c1d00b9454a669eeabdff54da03c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb91e2c8d5d3599ad10bfb5fcc3e4fe
SHA1ff72cbf40f439cb5bf40a4d49d95eb02c1102233
SHA256cf8d641ae4dc256aa13baecc1dbf7a0040802de242c038aba005aa856741e04b
SHA51218df328040b68b0295525a4a554cc9c24767f08ef94c03a230fc6ca71f9995c62b6184c361ac2f0cb2dbc61173e8a94af3b0282e7ae7b96a37044d4fc3c84b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76efbc47b93d15cee4d8b1bf8b22190
SHA1c8d3eea81ff9c754b6532aa92034500094916c12
SHA256df5a72e3d5a4dc004af5871bcd73007d3d89062b3136ea6246365b2435fc0dd8
SHA512f71dd57e4d14a6497f45b649503660059ad5760eba2309bc10afec741c7bb56a114d201f49ba51f68a3feab58b1d46f525cf4d65d57f92cd76a4fac428428712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c3784083f8d5ae1eb87efc67346736
SHA1120f2675e23f468ebe23db19515ab29ddd38f2d7
SHA256f83f93a1e59195dbf5720197d8c05ebbf0924b6d8c71d6c9a52fc2663d195900
SHA51253602548b535e6745fde474f9029aa5f6286ddea0e32289fc60928e307dc0a499270018e754c5121b8a62df94a35f95c971f0f64246de5292591be13ff2bb564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c34d5b808923e13256eb1597da28cd3
SHA13c1577b2c340346dd1cd0e1d61ca8470ad6bcbf0
SHA25670d06635acd5c6ee80aabdf4aa6f7c15fc54b9f532048518f1a170878facd89f
SHA512e260a3b09b02b5d3ac6a8f95c892781d6280248b5ed83059cfab524d8752c2e3eab95c28b9a17dda4525a5cd915b6a275f0a045874cc1ed1b19948d506a6ade6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50468b1a644baf79c0df3da6df0297e25
SHA1bc3f226e6bfe6d0d521f7fcf3cbd5600cd2526b3
SHA256a359f51828d5514efdcd953dca126c245c51b77ad299abcde8fe4d139d5864db
SHA51216ee1e6e84cd320002289fc51c7e0102e36d479cbf51215d66f79d56e0e9d70e07c16036f4ae72e172dfbe4eecb9591ddc51a73749a14efeedeb7946db4ada55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53048de6b6cee17eba8d014378052be24
SHA18b62452581050f55a440d53bfefced3f4b60657b
SHA25678e6b8ba3ba5790782a531703fa76661387ca6f808f6194c310bdac9959e2395
SHA512ead7b90c37a2a8acdc3f99fcaab3b227f9b3ec8751face2fe6967e578539c732dfa0c15217ab4842bd8b9741aa6dab91ea2563abc87ad1e818fa2c0045974d37
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\sale_form[1].js
Filesize761B
MD564f809e06446647e192fce8d1ec34e09
SHA15b7ced07da42e205067afa88615317a277a4a82c
SHA256f52cbd664986ad7ed6e71c448e2d31d1a16463e4d9b7bca0c6be278649ccc4f3
SHA5125f61bbe241f6b8636a487e6601f08a48bffd62549291db83c1f05f90d26751841db43357d7fe500ffba1bc19a8ab63c6d4767ba901c7eded5d65a1b443b1dd78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b