Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
d225d6916462a41c6dd52725e3f6670a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d225d6916462a41c6dd52725e3f6670a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d225d6916462a41c6dd52725e3f6670a_JaffaCakes118.html
-
Size
179KB
-
MD5
d225d6916462a41c6dd52725e3f6670a
-
SHA1
c12b49c60a3a1b51db15b1bb18be0211607cd435
-
SHA256
8e4cc4b9ecb2e41337a078003a7498efed3e43d57e239a7c52f3ed16182e96e9
-
SHA512
e6e98ab1952c6a68e462c6ab1f86b02e35289713053e305daa6b9399896c4ad188e1f538511baa184f838b8783a362628e35bd06718b1a154a5ac4d10034d439
-
SSDEEP
3072:SoqfyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFis:SoqqsMYod+X3oI+Yn86/U9jFis
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b22c5b3201db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000298c35ff6923114f9415a62bf5fedd34c96ad48b803eb0bfb0e358814ac5fd7b000000000e80000000020000200000004651eade7e745e8047331ffc0bfe1e8125d4e282e7f71193db8bcecf59b24218200000007569d9a69e10054075512c0915a67efec8fcb6a2b5f61c2cf838ebdff09df3bd4000000007d1cf4cd1e9989bafb28dc99fccb8986173cd96ec5cc97a6a64c6ec19b266dfcf510a8980bc89831c169785c89c7661844e872cb7ea6ca18b198e00aeaaf11c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431881104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{478717A1-6D25-11EF-9BF0-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1660 1672 iexplore.exe 28 PID 1672 wrote to memory of 1660 1672 iexplore.exe 28 PID 1672 wrote to memory of 1660 1672 iexplore.exe 28 PID 1672 wrote to memory of 1660 1672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d225d6916462a41c6dd52725e3f6670a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f42551cc8081807cce8bd1840bac61b
SHA17d3bc452859e4579edeb81d492a0328fde21b4d2
SHA2567b0d995b87e900a62c81438b7d2ac83f3abbeaeb92463e1f21d34eebace82f63
SHA512a08ab6fca0f64ab6c39b4249a69365f0701e9d4fe5a826776e23786d167163c72fcac95a8e16992b07499c70c37a71fefaaf1713a11e127fb550d79c428845b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c951c9c7431cfc771b79e737dd24e737
SHA1442fcb84eae563d0087342d22be9fd3d306fee1f
SHA256a8fd29fdf4ddc8ca95f39476192436832966e49f14c1e4a81ecd2a6e58552c76
SHA512986d649b031eb08d7195a76f6390b19b486d2f128f1512e738fd6e163bfb6b78d4b47561904bb89ee6296904f3964175d4f24558819de8726bc80045a2fb8648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c291d834a3dc3d7a72839c9a6e4fa194
SHA178b37ea796b6b78477dfa83b0855519d79c62702
SHA256ac01385ed4cdbdebec383de4632494a4f5f0152e0f0347c158f17dc81c77ac21
SHA512733ea5858bc9fdffdc6de7ce05445c412cab288a728bdcd69a8b511f360b1ac0e2f326592e6aab8d2b4bd45a056ad0e50d8c9aeddad95f42a7f3746f07cb5aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769ce1ff412629f8882bd666075f13ab
SHA1b07c8f647db79739f287c0ff431a9e13208807a4
SHA256eec42a4d476037419d2b5c9a3870433ab44473fb5c07add1999ead268db7fac8
SHA5120ae94495e58a32dbb6cc5ec02725dc47da1b381ac6f9040dfc95e9951a054b68e7e69f5da371b98b732cdc5bac9eb65bf3a6481c42cff0fb6dd9899df9f32ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eff240f1ae641f22441925435b62f5b
SHA12af1cc81764eb0459315c5788fd59b05b851faee
SHA25626cad1d467de40553c97456496edfd11cba5d2edc689d66f502458614d3140f7
SHA512d88f331572b71d22e323511d7857735ffb719d27caa2fcc7234429ac649ef1bf2b0b395b5532bf32271d466cf37f12c6ee28a1b64c9b65a7bca7802c0b4f4516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea4bbff59bee287cdb2ded1515ab63b
SHA1c8f6a2c216bc84a721cc9f3999764ee49940b696
SHA256c8718e123e461e31b40ffab1fe3345edd41e3e8616090cf9f26844f5a3ce406d
SHA512b10a96d6576bf961ee7f4a862813a2c8250e5a01295508a10ebb5e79bbd7ab4eca6a595d018799130b41a3700e52a937728c6f3e8a42f8d254c25d41a3196044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11f58ca08c10c09ebddcdd42ecda4e1
SHA19b5c2ae8952ce5c27429b17f586370eae699593f
SHA256d4a67d8c35131b78440bbbc2e9dc2d6da34325f4c6678e8dbb0cb7c83ca430e9
SHA512aa3aa277c0b0fb1be52ef2b990139e8e251b0a4a0b50dc3769d655b3b1d657df28fbabd0e173847697b01a382fd9b3be2695740c3e5f15b094e9418d8cdd7a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0ab967afa28d711895d786e8d6a494
SHA13b8f3bc43c72d6b4fb6f74dc83534d9bdd93c65d
SHA256c44cf753f32d9d4b8fdea2d3c1d83b6e1a397986a275178cf331d04f1aeb15a2
SHA512419566cb53de0b718126abc08791097eb5d3aed588102d0f13548501f8796313c2572d61037aef855fda6b36ecf49b16ddd767f5726a3d0a15d03503b7e89d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d4cd06f11503130cf8069c18179779
SHA1a740545711eed0d4f4ace0e7244363b473fb334b
SHA2562032654217d159202489d014927a6b1c864f439c7a13055682b650b5be6f5210
SHA5126171ed2e66387bc48e391b474ed50b94d6c426327980bf997d00b9ed5ac4da667f94b0b2a9804178e28d8e5cd2dade65efe0813b528786c63276622012cdf78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516da253152efa342574fb901dea0c72e
SHA145191111b1b9093ff962668e1d0be00ac1664694
SHA2566ec3a421e07b86cdbac09577c1b61e10925563f902acd6cf7ccc9ac3b5513c9a
SHA51241455f705b308dd20cca85b600a5716da3f9c0ccd713711707c7219f9e334414a9a58af3d551114db23b0d19ca24514980b5086ea2a9cfeb1c9f36c883cc50c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50352f8e28a0bd463a01b47c041ad4d1e
SHA194cf74613a547ce9ba0a9af2fe137076aca524e2
SHA256937ddf99c627453223717ae8534e191159c30aec860ddd1dd30c6df45817991a
SHA512af77025febae09698c124a9304f51556f6b07dd70ccc3b65daeb8a4b36bce81b151a1d80e06666035ce47a420df261f9fbc3f89ef08d055a750bc1a35b030e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13b7db1a286398c5deb3951172257b2
SHA1706085e4337d815c91c4786a00c388c213416f44
SHA256be46d0057c7442e1eb83cfdb779b30487cc80ef5aa604b3c85ad9ffa4251a5b8
SHA51230896e23b78cd6b5ad50b385e3f7839ca016aa252eb3210d4684e625af87a21d28ecb0b864d9ed4a662c1099495952ce1ba6bb7e719aa1754789ddd7b73de97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67a2e55afa7e05c430e649c0019125d
SHA166096f53b261b82616a0deb4277db19b5f031279
SHA25689345ede4b697642c995c574df636eef28c9de86ec415d9701523f7e320fd1a7
SHA512427f2cdf9b22f351a3a1a00633f04f5214666c6603b0b66a5a5036459c106dc60359b58f8fa0992e7236931535262b65d8259b92bb07efd2a9f38561737c9848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d782e613d5d9b9e852c9859495c0714
SHA1d206f36e22d32e2cd9a94724c0baf02ba2666d32
SHA256bdb7ce1963eeab9368852696cd592d2311820de06050aa389cd34c4827ffb293
SHA5128d8a2b74aefdec009f7cdab8a03759af2e56b73b00e4684e39fc26cf497e018d776eabd311fdbcf930aa72458f40bc5c999fb8f90230f1c0e2603464a6a04eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf4d1cd798fab02b1367adfdc64861f
SHA1c2bb46d6817d460781559c796177852668bfc662
SHA256cf50139d3f05a5286f8fce3eaf4ceb4f98d9bfbac72d5d79918c7543e222c0b5
SHA5125a682f8c6c9d3c284682485c56e735049a6fa855a55a32fd87c9ec9a8a732497ba7a4707066bb1b345281f09e3343a3f3032a7a22ebae0a79cbabe83bcb84659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c3afec6ccfa95067e2add87dc2f4d6
SHA1bb1785832fd7d10df5ab8a3d1f781826fdad4f95
SHA2561fb987a2f7d7ad02ee66d5301a95686f08733cf59ae0ce8a0eae37070868dedc
SHA5123f251f90a84f7e9636dcff6fa99b4f33269de51028b3f0a0d8fed0d8654ad699727a69f8240a051d0225da7ebb104fc413baddf6df89e55b403f69b2314988f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59861171cd5f55a2dd7a8e99963106657
SHA1651f1e96be882ae4fe0c2aa54ecbc95b6ff7955a
SHA256e69bc246a59f414fd428b1a55b715805a5e6e384cd19c9842032e5acfe893b84
SHA512510e915cd62b07ee7f0663eeef1e4917a56522a2b9b0eb4d064292264f266907ce7c7237c11912dc7b88fbfaec9aa00600f25c9b68db54ba6c2a9a133364a7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eefa20dce8095156a94f1d8723fecf5
SHA1526e844e4b191b4077d0af95014992c96e8a37ec
SHA2564663c5bb8e6083a1e7f802d6f6160a4183eaa0081eea3631c0b84c1a5563f199
SHA512d20b4b9fc1d7bd411a1602e0db320d577b2c136b756d87c2254e78e0aa0af27dcdd5520d5101dfa0d7cb4523e6ac2e466b88c056e7b857d6c03f77c72d97c82f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b