Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
d2354d9dff4444811b3507c643b153fc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2354d9dff4444811b3507c643b153fc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2354d9dff4444811b3507c643b153fc_JaffaCakes118.html
-
Size
203KB
-
MD5
d2354d9dff4444811b3507c643b153fc
-
SHA1
adfe802cc216ad4a4b7d44df9180a461659e18bd
-
SHA256
a592be68e8ecd43e4a710e27756e8555f1715c43b8659d41f6430b6f56240117
-
SHA512
7a0298c2b5b461bb5fef1580cc5338549c98b0a5c6c70539dfc6909ccb4253d2ee279be35efb591afdf9afab30b82db2ffa7d6b98b99f2036436103bad9626cf
-
SSDEEP
3072:0epip42aRVfsyniWfSLXli2tgKhL+LLg2qac:0epiPaRVfsyniWfSLXlix7LLgNac
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3AB30701-6D2A-11EF-BDF2-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431883231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000aa0cf12fef87942e4e1d790c8159a11137cce06f9fd79968a045bb57d65736d3000000000e8000000002000020000000fed7c9010e112b8e0d9eb3efa6a04d22b1e0d8d14aea76dc383bd550b6cd097920000000257f280b349dc5d9d4a9be5fbb4bd0f358055bb1ba4dc1d355c098d80ee9e12440000000bb4ff30c9213a7cebffa08c72de26e42965b06ee351bb2919344146329fd557c05f0cfacbdaa4e499b3e15187fd2d5855bd5d297b9e4840542fe3532f5861ffd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b6e4b0402e038edbd5710ce33c6384efd18f2e73e3368d7b441f5541fbf59c68000000000e800000000200002000000033d7b6df198767be5d471762a0d7a4178c318d4bb354dbae841305b6669cd3bc900000008e4753bfecf93a623dd3dfb272a81bd58c201a5710770eb8362553b59f73247f8de9e4944b2d1df3699458dfffe9b71bfc05882350fce6bd555b83195baed68ac74d7c5264a9e29fb9242680298a515d737e9ad924351d5f149470c3b06183a0a059c0c48d2ba0ab9007018a141ba5b2680faf0977357440ee0b6e4d82ce656e2c8cbe2c56952b53c829e73a2843e5b0400000002c8320687114b47b2d02bb32eb4341819e7486f48b7d48b7f82ce9c599a81163db84822689135b4325a6a084e83026152d5da29a747c56d67fd58c5eda0679ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09fa1133701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2616 iexplore.exe 2616 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2456 2616 iexplore.exe 31 PID 2616 wrote to memory of 2456 2616 iexplore.exe 31 PID 2616 wrote to memory of 2456 2616 iexplore.exe 31 PID 2616 wrote to memory of 2456 2616 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2354d9dff4444811b3507c643b153fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ef07ec9c6e57c528c3ae067bb0c8b6
SHA1dc124ce29c6eaa5b1aa7ebc362d4fcbc39e6a807
SHA256a7389d24723498293cbf35031c75389b53d637b25df32e8da93044c02a5012f9
SHA5123f78272e0942479f40e7b390d8fd942fcdcdf6b56ba905f0ca8abcc9a55de7c818b5cb0229e11aba91bccc57920697a9d1efdc7a336ca768d66f18b5f6a369b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6e81deb711f0f29bd29e6186eea29e
SHA1156336f795dde86b73f5b7151d61873fe49b1dca
SHA256a85c9e968610af21ad79e8d83e4b9285e9c1d23a80cf18e69b73f404f7f3f592
SHA512c6d38bbce9798706a9268cbbaadae9301725928d69620009f8d9d7367e92b28543cdfc86f355efcee1b7715939cbb3fe825de127dbc286310970f18c9742e28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0900a10ddbb5a7fbcddc6200ea5762
SHA12bf03430814bfb13f5e51f6692dd43cbea20eb74
SHA25619c2c7513f8a3ddc52898ea5d49c16977e998f16081c92e2fcde856ce3156bf6
SHA512afa991fb5052ea627135b73996e738edf361a57c4be6d51bcc2b54399f90e090069e5430b315ddc7ad5542b3f4fd54c5b27c7a3ed9cf3adfbc37d6f017c97e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751bc13c5b400d9f34bd1adc5462f9bd
SHA1e0b2a99b6f7f2db7fb26ce803bd720ff996c28da
SHA256b2bc5c25fbb9b60b0be94428f23d5e3a95a855ba19d15515e7a02acf165a3efe
SHA5120ba989a782d95530268fc2ab46ebe79f87071c35b4925357289e7f5a7b8c5ee911df2e5ce91634088b0956dc72093f12cb8346d896ebfcc5bf5258ca97015005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f2c4c7aeec03b6099e7fe9b69e9266
SHA1fcc8a79daaee0c8bbce3ce7bfe01abfb67bc68b5
SHA2564e1af374bff02331155b457834a29e45d3d403eba22cb17d33f64139b1c77b5b
SHA51220d5bdd702dfad97ab22199586b45460a7057244f28a6607af1069b0b7f81e51668fa6f6d37de809a90a62022d326f9147b3c35b748ec287ce6ddb99d7f9c49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5721218b6d0d8a207f763e0fabf29011f
SHA16d1c70384fbbe68ad1db38ff34ba89f9d8c894eb
SHA256a68460ff9ee483976a500549b7adba0150946d5327504f6fb1fd0aabc0fe120e
SHA512a7062038b99436f56da340fbb926a09024ef159695d9311112948294457b237aea575c778c0f0c12a53cf8a72ffad4883d028fa666cb07a009b381097ae34018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a74bdf1eeddd169dd3cea98037cf7d7
SHA16c55c3e992bf0bd444bd81a9896e34f6667befd4
SHA25641eba197124a7b4744d42703b4283d7dc7fc90f67e9f8c7c4aff7aedd18e77ea
SHA51235a54e488d8a5a00949c5dd03c081d23f05ea309a3fe588634fa6a10f7937648526768ddefce5174789392ef6001c55597e77f4236386199f3e731032a6a00d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b4a20161d55b073512567796e633d94
SHA18fd3d8a7abb61908719e5e30dcf23171ef69fabb
SHA256ffdf52d32e06c0f8b65b9ba2a1e941b7dd07bce0d23110f74fd7c4c46dd36b97
SHA512346c59cc93497245c23c1b4bb97f69e842244b39c6e701688e890a9886e3ee0393c212e5c9a00c74a36fd58da3bb2b0fa56371913f824f81b654d92af17608c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54890a8fc7f8ead264b31426f9a0bab5b
SHA1ad7a605d4702faa36a50be7147b0b6135e3a7f01
SHA2563367f684190aaec95342fb213bae404f9c26abf998cc8f8839f4124373ff8f37
SHA51237cfd91b591a0465eba6e397e793fbaaa9f3665995d890bacaa542b24e69a15e2224176a7381232486710bee755c1fea2b345ca240a1d4e4f43024162c11b30a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589726f56893eb677bc8ed98e04f28b11
SHA1250e92f86a1a8fa155e20d8fd226ae6f638f5cf9
SHA25653f9530b47b8e0bb5b0324c53e679b48020b647c1c9b77acc26dad6c7516e0b8
SHA512c413ec135b9f5ebc780ca43bc82989ac188f2311d41cbea504503e3a6554f5ae5fc12afd1fba44b12ce70947d300cb838246a55a91fea5ea3ff248682b91f87f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54909071b157aa27944f93951d59f1fcb
SHA197d0363706f674f5078725d288204cb816ec484b
SHA25617964a601347599b06d7d707a82193d83c52d52a9a103e2a78859264c75ea02e
SHA512c4a9c59b8ae16da0114f5c4fe3c8a806ffa4cb585c077748a23cd8289e855644b5c5e9fa5d292a8e96efd86fc37d1b357a91243a2bfe8fe71b438183d070835b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9440fe6fa735591fe5a7f16cedf7a9
SHA14829db4e44c1849de18989927df0c24cd276fbec
SHA256e5ae5cb879f31b6c754db9e3c61cba06341883fe98031da82ee22a5204d06d5e
SHA512f8664155a79d871612c0470ed77c1f93d68036972bcf32550bce28d1bfb096df0575262d3a3a91c5015564a920fcd68079d384e77d08c5c876cccb5914e148c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1ec0e6f7947110ac00e8fb2b1e56a8
SHA1a0b630e9444b5f546b2b2f8d403a261e2050536f
SHA256f9a0c310b15d4ecebe3ba6fe90c98be121c8acf91f7804da101fe868b18c0168
SHA512940f92ee67d83dc21aecadc236804afc11a4273cacffc86097c588318055b4cd8c8255527bdeaf655cd868792db88d3186df2d8a8dbc2561d0efa2058e75674b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50188996ab456fd555adcde82c1ef475d
SHA13a0a6536f02860cf3751f4031ba1644427ec9eb2
SHA2564cdcfdeb3dfe2d8b01838626b1a63611ca1c4bacc37c36065ef77c4ada574506
SHA5125e35e74a60352d854cbdd6f0592a3982921beea4f573c8e4354a9bd9f9f8551a8f7847bfb7ec7cb8851b62fa5842e53aff93623eadc7dadbc85cd650d18c42f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56146f4ccb87417b7d72a6ba34b202ff9
SHA1e36f63e302a46ecd104a31181768c219cad0195e
SHA256a2912fec0737eac50abf6a489891bddb368363322a7fe36088f86a22957ebefc
SHA512de16d700ddce82c6dcd9b9648bf06af335b8a17405c9711062cc697db903e1593669fa84cb95ec636664fc823a5db2d0f458cc9a0b816ab3551be95b5f609049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4215bf37327866c1077a543655e7b01
SHA1fb7515627a34383deb6a4ce58f4bcdc552b00400
SHA2566cbe3931a1628292d42b8d34eded94f7dfedde57db33abe92e94fa826238414f
SHA512404322f198dc4acda13251c881f39da601b65a62c3f43080fae29ded0492e43fff8b26165e4e225674d5fcb93f7bfbd1e59e057b94ebcbc7e918cc481a33b453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ddf25205314af4f2497c3ce84ec10a2
SHA102c8cbe9feceea91a384e3b2418c1ea2c586db9f
SHA256af576a3a556c5f34c905636b0e5cc698bc09d025d158129189315739b0c03afa
SHA51294b707ce0fa4ea3110e7f42fafd8ca0491a519f386178bd5f63790810b7da58811801022b755422551404e03523eddd77f983395e901890d4ba65fd3a53b34a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb37ee66687217c3e6b9729d4009d9af
SHA19ae8d584d1323c1ef9ac511e31ac9a58da657f27
SHA2566ca207fae9e2a3ed58dc2f036d20bb434110379b2b8598b85bc5ff4dcfc9ecab
SHA512aeb4b48563b8498f63b4b09ebd9fb331a99b946b9e5de666bd59ca3cc16c81268935004e1afb137a88e160a3bd0976ad7b9d3bfee43758963182dd3ecbc82c41
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b