Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
d1f8db78077f54531179758e49fe7eed_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1f8db78077f54531179758e49fe7eed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1f8db78077f54531179758e49fe7eed_JaffaCakes118.html
-
Size
57KB
-
MD5
d1f8db78077f54531179758e49fe7eed
-
SHA1
691fe752d597ec6e5028cdcffacd2f46fe042654
-
SHA256
42911dd9a7ed81843bade47d9a35d0ee2551884b543c0b4969a93c92dcba303a
-
SHA512
bcda039f55161fa453fc9700102294b638c8bc5249e4aa1511ec822ce8cfa8e179a83898152a61e915282de3cbc06cabda8554bcb05b1e2f4ff3d09634984f1d
-
SSDEEP
1536:gQZBCCOdA0IxChXgBfYfGfCf0fofWfffufefsfAfQf2fgf+fTfqfAfBfiflf/fzo:gk2S0IxxAOqMgOHG2U4IuomriIpKt3Lo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431876827" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000eacb64f101b3890a501b5a7babe050103a102eb7bb6ed63c2caa182575ba04e8000000000e8000000002000020000000fd131777503c53dc893cabf3b24b6c9c8f2594f6eac5726d245ae232bfc53433200000005ae6c4f800ca5f4ce80517e173b9faa7b868210e80ebff82e6347af95a6bf930400000006cd4a24880556ff36bc3bea32a4a8c9de12625a3e594aa150baa74ec2330a08e242de87f264dc679d195d2643563e667952e0cb389717a0fa88e20add81fc81d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52CEE4D1-6D1B-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01c1c302801db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1476 1928 iexplore.exe 30 PID 1928 wrote to memory of 1476 1928 iexplore.exe 30 PID 1928 wrote to memory of 1476 1928 iexplore.exe 30 PID 1928 wrote to memory of 1476 1928 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1f8db78077f54531179758e49fe7eed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fdb2281667b28986e6e9feb525820fe
SHA121edae1be0e8908fda5f9452d0ef0598ece04a50
SHA25615586b8f111df66909141371b8f168b36df3258623d489522106254e44493fe1
SHA51216ab6c92c60557930d2eaa83631ebc0ad753f6ace7b770d98dde334934dd821d65f0e4d537d6a7d9b9fec26233fe40727343c3fa8d548f96797460e9dcd833db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479fc8f741dcca04a61df970715e0cce
SHA18cb53d69a5c748c2d67012233fd3ae1e1dfed740
SHA25610889694977f9f541d26cf6235c99a4313cacf5e12ff5f848783a7824b73cb24
SHA5122add134ac8cb99a038220bdc34c86672e8172e43718ee728530eeb2b28feb473394c9cfcf47ad298515d6ce58065f4b2957c30cbee730c12b85f14a3bb85b2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6af502fcff4f42b923349e3d9e69b02
SHA1b7997dc3372d0dcfbb69ff8d23f350b0fea748ad
SHA2564abc500b51f033d2acaa40f823f7855ecfd6ccd8883f33becd837c79fc3d96a6
SHA51230c49b2b087a8a15e8d1f13abd2d259430708050cbe7a968668a95ef60ce463c24cdefd6a7a1b0eda13494af09b45da1d433a26ae7318898eb493142b61bff44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea5c06832ab89d02a11ef2041812527
SHA10375026beedf1aba06d389f9b4b7c718bb32435b
SHA2565aebcbc59073356f0f386a360ce6357578f39decc97718a2fea90e6adb1a30ff
SHA512618e8c89334efbf6297808b3876fa0537c85de0149a1592e525682958ae92539d612469b2addecf03ea1e88a84261cf1969fb9d34b73edbe0b8cd7ba5de4bd76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558498a335c3250baca472e5f1ddbcd34
SHA1d9e04b08ec82ec41aa1491658bebdcb5b6cff49d
SHA256fbc3c1d383ad12cf6ac5cde649be6b8c030843721daf1fff14a46bb091421342
SHA5127dd7b6cd18063890d5a253b5d281d0045d3af6472d49caf1d893242faaffd3d95612aafaa0080ea3f9be89858e24ffa10f9a301d582f1c1c708bb46aa28f8368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cbbbf7e741afec04ff552e407984b50
SHA176c440b5d2b590901e21e0c5b94afdee0c0c1819
SHA25695ef520bf25dbdd34e1e54faaccb7d81d7c2ad02ff4d03d2711662dce991276c
SHA5120b49c26529b88a7f4152154a35f056aa40d8b9657f261a3bfa55be4b8ccf7a63ac7bd2c04c589835ff98a29700d027f4dffc0877eeac048a087bcaf7db1e779c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccdc6215c8eb6f786b17c3952c81589a
SHA177e4005605d08e9b5c94d1d9bfcbdb471cb66014
SHA256cc594e694ce10252347829fd5008d4c2139a3660a0242e1007eaeb334b095e52
SHA512beb61b5c9e44864332fd15c3e07cd99f507b89a5c72da1ddf366510d432170392b6b0f90c5f286e801dedffd7af75242346b3eb25c62cbbc1cfa6b53c7c851ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a890ec302d64cb6455b9b83d1967d7
SHA1b3682a859250ce68f261420341e12da6e456e6b7
SHA256ce3d152286a979add7610dec2884826aedbeffa6ddef169ca35a51fb70ca4e13
SHA5129b9d7056ec42805d3d4e4e1f28709b4097970485f4af079e554dd94d2b0cfc48301f826f7e5ddee0f704150e6b9554d11f0d7056d0afc8696795f928f9816261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b34c0c310279bfc9ae506e342007d0
SHA1ec99910ad4d311c641487a808521a2ef1bdee936
SHA256f296667513bfac6e0cc042e4f465e7338382d603adab1d1fd3228afbc3e60c5e
SHA51299b95c8b4edcb68edca01ca762a355a85c71366ee84bc3a14887bcf1ec9a7b2702b73c7a3e0ab391bf5768f5e407567459022743be20fa7f972999059cbcd4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce639b28940c615e52f8adb8bf4de71c
SHA1bc4ab65bc42201731480cc8f264d0b7c386ff5f7
SHA2560da5164ffb0c8d4a0b5de86898cd88b78f623e42eee075a594f80b3da5f861a2
SHA5123aeb20fe0daf91237ce8ae1e7b75f00a7eb47bee3e8e9db9aac0daa707c10be59bce2eb4c9e2becd5532fc8a30eaa4b6457649d4e1a3f462e9cc3379d674f3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd547ae3a09cc12c22534d6652642611
SHA162c556d7ef91dc6da5593207dba5117a04046aea
SHA25689a66bac3b5ccbebf12a0ab18c69b7426cc06805a7caf6ba1411fd1e6f7f2f5f
SHA51219af6674d8b14c3e3fb7403e61c095f69267c2b1a640205a3208fac24bbdcce286da3dbf1e441d33687077bf3d98d953e536b5e3da1346c021835e74d242ef40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad939788ae234b87049e0b8ac5aaf16d
SHA129e15f2b1a7c5207640033584d0dae7aab59d0f8
SHA25678b3d117206ad0655e6257e5688d54834acc9c51117c47d3df1e1ec431a0a4f4
SHA5124bbed28540462e0d856a4dc2d615da0d735b2c7e4536f8cfe03b278c04f2554d71b6258fdc61e3316fc2ce44e0e934b84fff09600f123d98cffd79457bd8dbe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534041c7467d33415da0d1e3abd10f7d1
SHA197a0bdcf2c66257b65971124a856fa087c8578da
SHA2569bce965d97e3e68d22523c33e89eda4e7739c6846ad7bf3c0bb0dcbc6a51c384
SHA51278e2fbca7f11bf7a98526979f534c96ab643531ab130e0f3a070028c22edafa91dec4c645df53429fda19534740fd9ad8063b68e81c1997fd11f12878b73a8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6a6176e662d7fd0fb054df2cffc4ce
SHA1cb70efe9a41f91efd17ba642a927e9b0882e5302
SHA256a9a4f9f138bc549b6dbb687012849df18e26839d9494a931a3cb1d0d8e008fba
SHA51215908b9460af1692e089053eda14c173333be4655bfdbd12fd705d1b575d8e2b0a4058ac9e34d8dfb62ca09e20f587ec44dc1f6b99ada7c6506b1b946d0b4ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52538b58a7d9f28ad9a67071f347b00b7
SHA19a20584c449798934ccd15e8cd7ebd0c202ef7e6
SHA2562a53e54aec49c1b235e36f18c6c900d49552d6dab01eac2f3898c9439e645c9d
SHA5125be3eace623a15903bb78f54b846b0cda1b51fe84a5a1d454709d452c199e4f9b321f7de0332152eb614aaf86e9fd71b770de2f2f27447c536fbaadf833a775d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e7115b9eef83ec2449630fdc5147d0
SHA1e9d6323e0a360a47664e1d6aa9061802826449aa
SHA256e333d5fb6796e3f2f46674e93e5cc6947974bf404b2d084e3eb9d77ea15f2f14
SHA512d0d1e5299fa25040f102195b1bd260b55ff00fa4683b6e42fbde30c261ab40069eccda2055c3d84c671dd1d3f84928e9e78e891453c8840160cebecc6d002fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a456e53d5c8aeb77da36c69693811fd0
SHA1d4ce4be04020f13222fbde647f98da0a8fe7158d
SHA2565034a12a7390dfbce3358708737085e84334c3112abae04c9625045c5cd05a3e
SHA5123cdde45f1d14aa08f2992716114ae4a1a3b37973d140d63757a48c9afd4becd4552f11751e800771161c6beaf4f93d4b2da49e4ca971339eb96d91868c979654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc54265a7b587d71a58ab778baea033a
SHA144fd365654c748c828369c661aae0476a948919d
SHA2560d275932629778eca3601ae4a209fa364bf30706bd52cc5a72170ff172cd799b
SHA5124782a33ae63d383ae9188b8989ed22c16ab8e596497ae0d4e6c2a68014c844cdd885e549673eb07d06d1e7cee27960ee52f9f2d4e728a2a2ba7e91b97b33a7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91ab3ab01872d65f7bdfbe68b84d32e
SHA142d7d4fab3459a2f9bd07f733ad6f2dca8ecd8d0
SHA256b47ec430649c8cc73b3ade3260b22218d4159221e7c0a06bfd786ce81472db50
SHA5121b38ad59681dc8a8739dd91aa8d27168f20efd2ec5f67c1c795c65d8abbf9af0c36303926008b965dad3a99b42d7d24c28c3a542d636cb03340c417758397daa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b