Analysis
-
max time kernel
122s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
d1dde63fa3cede533fa515b38cbae193_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1dde63fa3cede533fa515b38cbae193_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1dde63fa3cede533fa515b38cbae193_JaffaCakes118.html
-
Size
26KB
-
MD5
d1dde63fa3cede533fa515b38cbae193
-
SHA1
dae6505b72f3d423b75a61adb7f5178f824b5081
-
SHA256
b0e71a33ce30ec163d67d5700f4974b6dd55a8037779f78331fe781e1ac89d2f
-
SHA512
ae4cb2dbacd00b3042d81c8a81dfe9229400392dd9ad7b5873a2280a2c652ca1840c15e28a58c35940c2e2f60e10634a5fd75d37fabf055326c1fffcb79a8743
-
SSDEEP
192:uq7zrTb5nlOnQjxn5Q/gnQiejNnHnQOkEntcenQTbnxnQ3CJVevo7NtCFo+NzQ4T:nfQ/Nygcd5F0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431871760" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f3e3501c01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79ADB921-6D0F-11EF-9319-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000057a834efdaf03b6dc6ec62db66af2daa990c666c31c24dacd449981915f7e731000000000e8000000002000020000000a47146a386a6911ff601625dac99b3918a28b0f4f127b2181962047e5fa1664f200000000cafc71e6739fdb558c4318fe20b83d1fb719c10305386e041a76106b9c777cb40000000a17d08f27f22b478c7442551ddeb8f10059e3b097c86d8d09396d50f40222e3327ce87b569595fda70ee04b8301376439e7e6bfceac15ff8f5e8d00e3ebe2f74 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 468 iexplore.exe 468 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 2708 468 iexplore.exe 30 PID 468 wrote to memory of 2708 468 iexplore.exe 30 PID 468 wrote to memory of 2708 468 iexplore.exe 30 PID 468 wrote to memory of 2708 468 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1dde63fa3cede533fa515b38cbae193_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb991650344fff8e73ccc1b33c3a625
SHA152dd6fbb3d94faa7e76f0e7f437d022c62c5cb4d
SHA2564fbc1016707983a707a738f4414828c7ca9c2b30da3aff9399314b81149924cc
SHA512ef040638de066c8bf04fe4bada8a44828c927a7efdd0cb45bca8b79d1ef4854d649e149a8677cf2590997bf1002cd8bf796a1d2172fcd02891e42953e0b2f8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18f2413c26749713d775b734e9bc5ea
SHA1197a1b7d3dff78fb5de0b8db45532a4d52211c01
SHA256b83a0f6a21a8d9a1cc63b2b9d576fd301dcacbfda54c9246add02679d77ed595
SHA5121cd05cb7435876ab03123ddc05fa9e20b42099253a9a99d69524708c016a4a1219f0cf316ead6de1b5b7a850a46704ef8e22423c3a479f81a854740c02837896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f984b31d090545cfea7d8fefd05514f9
SHA1bae262c1a48d834d135639fe353e7bc741730fa2
SHA256ef8eb253ccb30b14a59baef0a0e4c480399628e4b5d96664e77406e70b42ddb6
SHA5122473304bb1fbf9102cea6a911a6dd3b2c3bc4ea84b889bd1ac9f939653d2a6a2dc3b832e80c7075127aa6f42e64bcaf7c6ca4dc3e0bedff10be59b208cc9b2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e973cc57e50addcace90d1863bc0f61b
SHA18fc2d9321169af8a1ca00f8106d06391cb3ffdbb
SHA256d02f0dae8df809e484696870d85bf979b5f6992c05602c350c62b238f3e0fde3
SHA51221ebe007617ab49ca9ca88f1b4f06b75e77fa01ddfd647fef2afc445a55e1562eb8f55a4f97e638bd230aa47911255eb9a0bd688e5aebab778819e79e41bf5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf175d00ff6a11bc1b72897831d748d
SHA121c69c1a90aa4ca9d1d3a1d7ef1ff795abce0f3c
SHA2569aca2101420a6f1256c715e62148a5b49903a52f3f36852e2b1117bc4eaeb95a
SHA512f5c1b04a1c553067f9bc595c0211802f4e3fa04765ab31a0ff2bc3b33107eb933265321156dd1d2696a47e4a18834bd2d301eda420945d4233ce6504993514d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c980a7f7463c730dc261d005642c7471
SHA1274b0dbd0cdd2b4fcfe0678b55d3356198648274
SHA256fef9208cbfce9cb87df493c06a071f7ed4a7139f8a84df23d5e1e4055847c803
SHA512dc1493e699c809b78c2cf75ec1bf09be2434df9a3bfc01b4e27686d6d475a284a8d8d47b62592c5a29cb101d9f53afd4878cea35d6160c012a50d6187baff7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161dd11a0617a5d1cdf3592471e7e40c
SHA1e734780e3ec92f34ca5f723e4d3143d79af17bbd
SHA2563d24b0eda39c52fe32ec68151130d7aa5e358757d44c7f1ff68d499e4332ab35
SHA512955277d13a744b0738692f39b25ef42192c00ac3b539e1c672eba7d14476789415019551bdd9cd6a352610450c3bfff40dc612b12f00c0bc0dff820f9c606b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531693def3ae0ec83c14c9cbcf55ea915
SHA1aa016af84f12c42008a28babbaf139c4b9e6af58
SHA2563d3577d7031d8f935e70dd0c09191ea91ad5049b88eea029a82dce2501bf63ea
SHA5129965f685773035e60d6af810d806623ce74db16651908f0f0325bdd8eef17b4ea228efa14580a7ff2b67bd5f90235dbabc991ca3cdec8b7fd3d1f5b92e8cd8c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5791c43d10c02f4f528ed4a9e469e1615
SHA1d742248da4fd9cfd6f67e1e0144f6a6b94f368e5
SHA2560416bd8d6048f14f78e4b2e551444323ef7f896193821378fa3c61f972d363d6
SHA512f87e9dd9cc4c0d28012375fc581c5d68d4bbc65dc82488a71901c2ba0114456bb6ea83ae42ac57a60d3a16ad148b0b7fca79b1095cb9b37f5037afa654392e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a972e8aad35b4424934d9b70c10848
SHA1d47c585e7118684c1895a887cb7642b896c89113
SHA256224405b1cf9ac7db083223d2ab65f2183e3bef187923d0d4ba27667f0ee82273
SHA512656aa1a549965fcadb7e9c2fec136d062f2f82c4f319b6d3c370b2c0d700113213285cc02204a7f88969fb1199abe32625985d5194bb2c337da63bc43b1d91a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c2b8c9ea6ea8ce129c8d8abc74b098
SHA12bd834b8c6fcc9e8e6a2e3fd0dbb6fe04676daec
SHA2562aedca4ddc8b31a4df2c742c6b5eea453f4cb81813c980c018dfb4bc3af2b227
SHA5123b06301bc29c4c0142d5e2aaa0ff15afd5a62f4cfec5af9c716882a153ccfe46e83e808d5f960b8ba89d5be5d6dd190df0cac60af0a76d8f4976fcac0449fa4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598cef183314098eb696724d8517069a
SHA1b4d92f8afbe464e61c14e3282dd40d3c665c11c1
SHA2562909114c7b8e8460345e76e941f01eb82e47cdf520d5ec1e9b097397a74d4def
SHA512a585610ad8062509d0f8cb423c01c5b37424b666b79a42d5923e79b5bdf27d7f4ba3789fcbc0b5586bd4f8791396ceb157468e4bae735371f1a283b0e088cc0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b47ac28fcbdc89e9f5639be16752a672
SHA11bd7fe6fc9c4c30c3703c9947326ceee59e2ef5a
SHA256135148130eb7a8d8473fef1a877f8b5d6d41ba850847ba5afe23f5e17f395b2c
SHA512369653773a55a00b9cb0bfc7e2f28ae5e66c86b50695982ccc06032e3b4729c28d3349bb364b679c0ec69a9a7562ed5a83726da948e7f10b56a9c0fa34bdc0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbbca9c9a0ea82e981efb0ff5d2f0a2
SHA1b18b4905945c783fdced26f92a8fce084e6e593f
SHA2564ace8cb4233fc045c58c4db2f7e61b97dd4aa006a221d8d960335943e7192f54
SHA512ea22d488784f0fd6818b515dbef8f9e4b9c85eaebcd1cc6d4d8df80500b0c195b23247831c91b164310cef7241dac4e2acba635df1110a6e03034023e74d9c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a669c3fd7e7aeb5ec263a1036b0b9a
SHA18050a2039788fcd2b713a55cf8582241ac60ad8a
SHA2563f36eba68fd2b12a99a66a40529700235e007b7fa5b14447f5bc7daf17a674e2
SHA512942685edf36d55a1f3a8c3e2403743e79bafc3f97b993b20dcfe3a84f027e105de95895a2f818e5582b0da7b835ebe93125b4491651778a8d5078735199b8fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea074c6429c9c305d59c2bc026633e29
SHA12708ac2483b3b51fe6e92cc52f48c34f26897e98
SHA256eb845585f78ba6b01ad2833eb0f3e104b0ca0f97cb61de6c7270ea90dfa25316
SHA512620c79211e9369bfc1b820239946c596982fe3ae519958c60fd3f968faf41b450f28101e252d8ae776ce7f94e8324a01e285a8c68b9fda1499a8d76f3b5ecd9d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b