Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
d1f78598b0be1071f8bc670f0519acea_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d1f78598b0be1071f8bc670f0519acea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1f78598b0be1071f8bc670f0519acea_JaffaCakes118.html
-
Size
23KB
-
MD5
d1f78598b0be1071f8bc670f0519acea
-
SHA1
7e8d932f1a944a804a0862b8aedca2959b963314
-
SHA256
30dfe59bc2910f4439942ff2d8f874ad49be496904409a56240b75ed453864bd
-
SHA512
7d26c80285c50c00634f6cababd0c0f0158f5f52b4ee8d3844843b07d86644eb8468626f9b9c4840d949b2bc2745fddb7157c400f69c2d6bcd62583697cd9b23
-
SSDEEP
384:zkQf7UOpZ8XRW+esLAYAJJSxhMqdVoEwYpumFll5BmPKvWbNO8w5:zkQ3pc4+kYAr4hNCE5VeKh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DC89D31-6D1B-11EF-84E7-C278C12D1CB0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431876746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606482f42701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e572b7a041b7e8a725ac477370dd1740816f45e53456e1f27a993c7b0b190d78000000000e8000000002000020000000c56887470ea6304e6934a63b018c5c4e8fd947a663b80baa25270d8dfe58b87520000000bbe24bf847a4439fb6b85f4a8e393e54134718c762dcab3a6193cf3fb22c25fa40000000418fd593001b7ad827fda52aab6e5b15075b2ed5bb0c0a556626849fbcae384374779073f00220987c9b35abb72c7861497c5df8dac3b0074d494a38a4129ddf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 3060 2004 iexplore.exe 31 PID 2004 wrote to memory of 3060 2004 iexplore.exe 31 PID 2004 wrote to memory of 3060 2004 iexplore.exe 31 PID 2004 wrote to memory of 3060 2004 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1f78598b0be1071f8bc670f0519acea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5340feb91e41f00c9c6fa040dee1cce52
SHA15a4a3bfaae239faa873fb750837141429af6611e
SHA2561f60d80c1cd8d7b4c831f950ad41677fa55f0eb22c414d82b24b12e1ef5262a9
SHA51297610e6aab7c54dccb95a07876f211702dbaca7c2452f03ff6076a47511cc5200fe7981084f3841e5d9a44625c7c35c2dce71abdd21778b63b035aec4b4ac64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343fd2b2052f3462e7bdfdb133c58684
SHA17f262c147b4007aa54f3b88ab52d02de0cd8b10d
SHA256f55e318c76f4690be7c3a3b65a39c0314b0b1bb5e3f23f13039459e9d93f8819
SHA512ff73a5031f52b0fd957143f8cf7d20981eb0479a0d10292f92e4b4a5df7f93ed9b23b7da4ea1e4d71974ca3eac4d623fdc512cb6e4d8a4319ffc1363251a5ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009e84cc4ea342747fc4a14e81ba5499
SHA1e22cb4ad27476c19759c3c52585bc480596839ee
SHA2568f823cac28a8e1d4416f165a10928ec4676fa6920dbf838656931adbfcb4f556
SHA512576661c1d5af5d1a6ff2a27e919730389e46b342e5b49c1ef4b79bc7241b1055629b8244d270e3fbe1026df9c4927c2a5b417af316c9fa73ab575bddc7c62fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531fd8f5dab8c5c36d51d0c6d6dab52dc
SHA1d0cf39680c26955adfa588c67962104977358ca6
SHA2568d7ce5a3b33608501e3c53c2eb0006c494a91ffaf5b66644f683ccd517e5ecfa
SHA512d0db1d0d5392ed507ab8311f8955f33cd1cb250c0c81522916e88803aa157b8df7703d0c34cfd2fb99126e6dfbb050e27f36d674fc9181f7fd56ca8d34180169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568200f72cdc6b33e493fe30761e0b9a0
SHA14778b466c2b23157cfbc34caee7490bd143f9742
SHA256c592f1e7841929e61def8cbe48cc9ff0ada418d0f1d694133662d761114e0d41
SHA512f642c324c1907b21db1f5d4820d006a239b536a2747c0358d2590af4bfe06157353e0b9cc69cbc772c8953e39dd7ba010e6e4452662ae59b41f4c2ae95ca0283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e5a3d4b53a59ade77c528f58f63b34
SHA15e6e43a16e6d63ae41e928e8a838feb0b371ee5f
SHA256ee3558b80e65258d98a24b03f419efefa9f4cbf05f9815ad08d7c5f6cecba903
SHA512daad3099b8c399b6f433cdfc6c6d96536486cd283a1556c449e5d39dfae422a9ce1b6498a4498140193ef27826cfb899151c7efeb6e4dcaef8e726d48c9cf45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75e8cf1be80b7d68e0dfa83ff34c06a
SHA179661d0a600e73bdacd7b9f70e53b95c1213690b
SHA2568db5499279371c86e5c0d455cc595c883dd9eafba85abcf96abbd433fdfe49e6
SHA512a65d923de853fa063f08e1a799597835cd94c787b586024afaa2bcd3f450c56b551c71f6c419a921a05999d7ffcc5eff7409e30362aff7241831f88b04aad873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c0520327232189569e7df1db48cc38
SHA1957d39f9086129fd75029fee90acf11faf638d7b
SHA2569ad113b61533f43ff90f1d0d383e7a713e6e7406e199dd9f9fa943370f62609b
SHA51251ed9e2fe331b1f6c93f4a11121b5e2909f00b8867e161112260fd5d51caecba716ba5a63598eb9bf9235a5b2a2e634f0e7910c62eccb0990ea86106b0cc4e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f75421d19f8e05940c1b37c0a6ffe6
SHA1992bd7c94a01dcd5d3abda2d4664c97366fdd8f7
SHA256898988c1c06523b5f5e77c915783c5e413e67c45ef6c0bebccd9fdb047ae4c64
SHA5128642bab1ee7b239b38c03491cae4cecfdec22ccb3b7a0759950c998bc34754533353eb2359ccf37aee0f5b6c0f03c9f8900964a91521e6342e778a2c555265eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f734581bf401fcfcf15c18231a1c6612
SHA12bec1c0df7e93cfe2aca0cce14cf54ddc4fb94d0
SHA256b9254d85aa6e9b7feab6d0f576d8ed00138d4e31ab6b9fb4c2147463bf3ef4a6
SHA512a45e7a0759efb41fd3c436195934c8a5d93f6a710e1c288dca5011f57eb84a739f8bcf1efe5725ceec5ac2380650bf0554dd1facdd6733e8e2c5a166f46bf483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8471db8fee44ee05e1d86398ad04628
SHA111970689ac91d1b7847ce17a1063f2fd81576aa9
SHA2561a6e30ecf35c75e0ba29899b4b49f14e703e2ae6ee675d7ba28a95a460c4ad4e
SHA512460166cd2d84670bd3531025cf98c667d9415c13e5e5b9408592cdb5188bf185a239f1f989f1f63c906ef8dcbd0cf5c2d475475aa6a6a1927d79584f2cd150e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e44b26e58092b5ab94ac78d00d7dfa62
SHA1fa5a54fb64a542df6facdd649718c829b0bf7df3
SHA25669123766412be3aa8de830cece4c91b948c6bb75ab9ed4987a375a5416fffbb6
SHA512cf9ca6d0c14afe6e59ea641263951fc0255110dd2de9e882f0607db38a986636725cfe901eedcf5716893feda421bde04bbfbe22122523126d3b94b8138e7fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e6286134fcffc9a4743b59731df371
SHA1246c3c34420664e26f04c6e99e35259b3f82cae1
SHA2560b206b0fbe0cdb5acafa2ac6a68c9e2e0bf1f43ebc0649ed305a42fde02424e0
SHA5127a7b5600fec8104e66a74245b5807b03d178e7e47eb3d0a043a458ec46a96bf5855ab03b576ae6bb05d5dfb58ce3fb6451d8d4d57f8461a1546cf00f296aee12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD569250cac40dbf4d7719074731e59f41d
SHA1c752e49675c31685e9acebb90a23289b0287371b
SHA256087900d57f78afc8857a06b8fe8d6e23712f91c17b7e82ffd7446095acc14b71
SHA512f6e3c5000164a67be5b2ea645413efb26bfc01af64503c775485875efe6d555ab4244b267c002aa3cd6de8bfcd7f1abc20507c28c66af7037925ad80bfd6cd5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD582f8abdd12e4486273153d0e0495d20f
SHA1b7e852b0fa92702e82bbdf6abb2cb46d144dd66b
SHA2564028f915c23e8d76f9479f05dba4fa7b9f329f9abb1cf0ff819eefe8b9fe4a2d
SHA5127763041422f254d1dce391e31acc49f680801cd4cc725308725f3a9a77455c2cfadee59bf96045779915d89335c4ce7717ffbd96d58d5ac90e67817a091be41f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b