Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:45
Static task
static1
Behavioral task
behavioral1
Sample
d1f6dd92a5d5734d8eea5299089015e6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1f6dd92a5d5734d8eea5299089015e6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1f6dd92a5d5734d8eea5299089015e6_JaffaCakes118.html
-
Size
118KB
-
MD5
d1f6dd92a5d5734d8eea5299089015e6
-
SHA1
b262f9409539432337b75129e9aa4986981f96bc
-
SHA256
e9deb97d1298b52d742923e2667782baceb7241eb0e2697974a916d1d770a7f2
-
SHA512
19c617453b24f10afa9d2f6339e201e64539f54646628e737356086dfb5c86b378f345ea66262a44ba2f8d00528f61ba82de773f82fd52e0c66d411e4d8684d5
-
SSDEEP
1536:SdyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQy:SdyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80211e272701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{528F0A51-6D1A-11EF-A0C3-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a71f7a9be4d0353fa10afc77970fc2d81770ff1e0b8ccef3bf3a51930f95aedb000000000e8000000002000020000000df18897f24586c23411fdb5b03b197e6ce95cc4ca76afd0d2c70a8edbd6954662000000075da674ce168b45fd907cc2148de0015d03a53413ce794fdbbb2a7069f22500b40000000c966d37ddee762cd3906a35f08c783bbd3b0e98403194fa197071fe214b0f482020478b0883aef7592977c6031c55b09ae85cbc97873a7ed9a32b8075c4790be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000037f049750643279d85331713b2a0e668e9f4d048b2ffdde30804532522cd32bf000000000e8000000002000020000000ec74b4c0e5afc415465594b8a2da8137d729868fe5fb19bdf41d22833e5ba03d90000000fbbd23675e08d272963c790f69708097f46805ee7c550f9089950ba676fd84555359cf34756dde073775acf5fe66bb04b50a725e98d6e62592170d6ca802a04e2a563dfc91504187603d9a826e86e0e7d6b435c7a5885a1d00e413e81fd13364cd056bd11ea5dc95148f9cc70f3f9267e8b3c46147282c851123bd6c57d1e6b8620c6fd2fca35ce59e0b2d0da245e88940000000c2aa0cceb75c9176ec3aa5915ee7d0dbf4b01b8a65e8925424e704b2473d7b88fc777201a06aecc7005ffcded467aa52514f6a576abcb10112764c68b603059d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431876399" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 1228 328 iexplore.exe 30 PID 328 wrote to memory of 1228 328 iexplore.exe 30 PID 328 wrote to memory of 1228 328 iexplore.exe 30 PID 328 wrote to memory of 1228 328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1f6dd92a5d5734d8eea5299089015e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d95dca3af3ef196568ed9d4f395926
SHA18624220bd308c106b847f9a3a548d553abaadca4
SHA2560f59b8ad573b32fa00d1c9086a6d926104fc9c307cacce563b713333f7ad2c5f
SHA512c863f3a719e354d9d1e87759d243f8c7cd351c7c99d27eae39050d66597c6da8c277d88d2bc016f5ad4b85cec97cbb8f3e8d7a4d474690889af31223a273b3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de289a1af10fb47f22c7de3a8081461e
SHA1fee22390fddff88f362423f020e86351effb44e8
SHA25603abea4069934df30c40bbcd3e13ae3844f479513f1fd70c5313097b0666311c
SHA5129a0ce158405c9c55afb9806dd15c7329e83ba238a4996ae8b60feeee381eb565726145477bd10ad95c1db0f599be25a9e77bd6712094dbc65bed85f2bf45f927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbb4e76e74a76351651c07b2c6608fe
SHA1e078d1c99704276576a4dba837f322c4dce3b465
SHA2568b258d45d413b990ac692bb061adfd0e9254f468cd911437aa2e9bd76eb11bf3
SHA512d034cc7c7f0b8242b5c61d9e79431ff9619e02f6622f5bbf27bee2b6423aba8f4b77a62de2ea34b9d23c7158a98cc92d490a9ab6eac173abd30a31623ee89a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eedd7487db6eff544f52840068f32c3
SHA1560a4d2e8428d0e6ba1eb0dda163ce602011528e
SHA25621746b9a836e0b520ab9b4a7b32f69d99e0d8891f9db34ca871c0c6f344af8ce
SHA512d8f81971995af77efd5e780b7d7d789630047b08040e038de2ea3d55c6a5b1bc059728a01ec0d85346d426bd9d5aaf87d78794748196ed0f02eed1b5ed6be603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae36ec01620d0555be55a01f533a7919
SHA1ba41f7ae7fe39df35d2dcad3a4590163b05bf42a
SHA256bda2fdb59536be14191e5260454f9c6ed415ebb897c6781cca8d3376caf82aee
SHA51292321888f65109188bdc3034abbceebb1884073df133918e8eb0dd9de3d01819712c8aaf733139abec76c844e08b779f182dbcaa509209ed6e78274ae8801293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8eedee4e6e46a4e0f269bfeadef83cd
SHA1d38752e22b486ecf9fae1aac00d2190f635e7df0
SHA2568a50c8aa437a02a5714b9e225fa234576570972aa5ee4ffa8dc8b07474f7aac4
SHA5128144934f496d6b18ea0aceb3a111701c7aada1811920415c89472e0473e354ecbffb7d670fb3f3683a0972e44483271de647e834f3d270a71d8263fe08e546f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcaa4fdbc554c7a81c6ed5ee678bff30
SHA1618270acbe95b83744f610105041abe6f289faf2
SHA256cffdb768eb928dac85b30b8e01626e279abdec7166d7893dfe316bf5ebedfa94
SHA512e078e03eb75e434d4ba6e7e0fedc0287b2fee5d0dd81104abf07146ad546445d99d1040a7bbccaadba0c6d8a47d4a5808c515b36928f5218fc043501e1f81030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d164e6a763bb59263978baae1ef448
SHA1b2d7bbdf0997bfe3b813f244eab5a419b8c41760
SHA25604ec416326b088a84c3239acf92934c5ce009cc9ec009f8d493fb9fdba062827
SHA5129175c4492990648e8ab80389d91d1a19693a87603c70584ad50aca751040ceb34da9aaf8ed92bb12a1cb640cb6cde951beabe4df7ca0fee517e046bbd0fac13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5fd44026b3b0384e0a9a92791163fad
SHA15950a1919b41ed5d574e3987c74ab97628a2d041
SHA256da60fc300d0395c9b9c1129d591d4c1d963a47b010a8dde44732a2c37369ddfe
SHA5125c7211e172786142e90f6a3162e0edb7d5ea0aa449f79c4ecbe65dd07b9f3d69c8f23441034c9b6513c50fe25071bb30ad55dc03428e44be43f36c618e5218af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec30be49ff5aed5330c9e7f016b9636
SHA1e0fde15c6758e54df6e18ae3a868d7da3db989ef
SHA25666db521c1dab45c5243192c5a13149f1503382a7c38c5894e111d5439088d4ce
SHA512af27fd1511a0a1eb14b0b4e31dfac505a6cac6c43b2eeeedf70ec8bc36bd727afc4a0962ccd32c84ac2579071d57f604ba6bac129aaf49bc9d9909a63ea82c23
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b