Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
d2375351d7c4b70e09f9cd19049faf08_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2375351d7c4b70e09f9cd19049faf08_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2375351d7c4b70e09f9cd19049faf08_JaffaCakes118.html
-
Size
29KB
-
MD5
d2375351d7c4b70e09f9cd19049faf08
-
SHA1
90552b36dbbc855dc4ed4ea53045daa3bd7f8b5b
-
SHA256
86f4e12503e922605289dd6c5134ecd47b65033ba1503cf6b65b972a629bafaa
-
SHA512
890409dc1d523d7d926d43f5399c08a90380ccff4520a1bac003911c7d56116dd8b285a7029b34b2419a53e4aacca65f2b48b45677e99a9b929ebc61c432d409
-
SSDEEP
768:F9m3lWb4swZZRVg9P0BK9vI7X++h2o/RZHjmC7Mf5L:0K9Z+h2o/R9jm3fZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431883547" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c2bfcc3701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8439781-6D2A-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000018032763cea4a7e39501efc09e4789d64a2edea8bae9512013049c249f548f23000000000e80000000020000200000006e75d03c47c7a6f2bb262dc546f8030364886ea5f763627007ee34aa10951ac4200000006bce28ad7136e94b221055bb128b1ad9f3608883e9edaac0b522bbb818186a624000000055dc1bd055132e2b5b10f8fda5d6272d3066d6f8e1735e63913a3f850d04687e56cb0c4a5a6c5344509bd948eccf7a15a300a358a06f7944395f24ced3e115ff iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 1876 3060 iexplore.exe 30 PID 3060 wrote to memory of 1876 3060 iexplore.exe 30 PID 3060 wrote to memory of 1876 3060 iexplore.exe 30 PID 3060 wrote to memory of 1876 3060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2375351d7c4b70e09f9cd19049faf08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d7d4e0849f77b3f2f4145b05ad455f8
SHA16033ba752299106e7ed3603283cb90bcccb3b4c4
SHA2562c6fba393debf1cf8c0fec079fd4f6d7abb5e8568c98b4efbb38ef495cf6e2bc
SHA512b56e651fa3619a956cdb3237e3ae9fa194188424875fb82e2378e97c17e9507515aae2a28f1eea458cc630771b5342a9e446b33cc391cb6156a764428012a723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5792b0c11c8e1349962170243018f8131
SHA1f01937f7b3fe4a0797744d45e33ed1e6d617e742
SHA2561aea08d46459375300cb6383dcd981ec62634c493dd3a3981137f6946ad68d5c
SHA512c7f9890109ea5dcfa6616627ea8dcf7786f6f27c45e74bb8d3adbdaa2ebfd6f2be24130c8a641a7db748655eddeba7cad40b13f6f3384b9fe0783b7474165ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e289cb5e3594433015a99ed4e2031c
SHA1d87abadfb4d994e8e425620d619ab2339fe1b6b5
SHA256c6ada2a21f3a5bfb74318f3f85debfc4b1059be5364dc5389e98cdcd6c32aec7
SHA512bcc01d9db7c556116f851b437ff591f078021a4811773cb313e87ca943d5b73a420e3fe6a499a8c0165a2813e8d9a06c26665fd074d9871883fcd63a2a5e0feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea33079ede9ae4b0129d559c821163c5
SHA1660d5b2f1dc397ac286a93a7d038e676356bc205
SHA2568184ca26341d0818bcf6b5844f92f84a38cd4e0ed6e9e35e8307fd79719e9939
SHA512f0e0ae35e798a8088523f4877289b51dc68e1256e2e4cba95d9c1cfcc0c73ebbe533415c80ad13ef02c3906c683695f00ba1f74fedce07c2c2a7b35afe3ac4a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a59421a288f19e78c8887091f012fd6
SHA1708e70a94c226fb0fddb5bc3a14271eb103784f1
SHA25672e73f37ec8cb93297a85b7d510d8544ab18d68396c526610f1753dbebad0601
SHA5120ad549aabcece560230152fafcf5994bfd4ab817ad4d950fa132c421a9987195fc94b64eb8db3872a9d577fd5fa8dffd4175242fc212b81c6e97a0f4258517ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40fbdf83d950beed91c269c256b1bca
SHA1d81cb18c20c6d32c609be3f271ceba2757c37f39
SHA25689311d47d20a6cca5c7a267da663d3c56cf99d1bb2e3e12cd73a2129b3368aeb
SHA5128f75cacbf280184c1ad094ac43ef57e4f5c96425621be6e66628ae306753f8c164b801d034863ce0bc7d0968110eecb811e5c28876568c1be9e8f807adbdca90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea464e63995b18766dd5d6d358ce770
SHA17d9cdc6219cc9c1393c4cc408aff118bc014d03b
SHA2561068b240b9dd9d668a89bea227cfcebc83a647113098f1795c66be1273161e59
SHA512584d327bc10f538262c43652df04bd4e3c5fa31ef4f72b38207431f35090faf00c336b2e86c79142559f4f6d87dadfd61c7d5d9aa258e5cf5b4531a4533c348e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76aeda3a66501d0121fcd52719d0b71
SHA1552c10fa18b29c93695954e09bac48c6ca040b2f
SHA25637f78341cff8d8481b0c06f52088ea2c1190000bfbc132ff65cbf4ea2059e170
SHA5124990f0f71c7575829f1f90823e990197f3cc2b09255184fa21362f014cda09b8d2812f17a946767eead0037b0aeb79ff0b38a2f5cfc8ed2202307dd7f395b0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513324e9a68f2befa42f3a78742071315
SHA13bce575c593ad84dd4aff1b5edcfb6c4ad8e7acc
SHA256e32a79376d5f8bf2726a5bd75e94085df27985f563c89324b17debee34ba60c9
SHA512b9f2e175cce76f639fd52a5de4cd99a265dccb358669cd33719494342165031948613e043415786f868754c29d96a4b5effd7f2057e0ff8545db42b297b0b598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ffaf7b4f891f75fe7e8eaa8de5929c
SHA132ce3719ace906505874f5800dbb5aaa9cea214e
SHA256550098c16cd711748a011c56cbbd63800b4721c740bbda0bd55925cabe9ab0f1
SHA51233771882c1414a13e2ca970cb37fa108fc4d947022c04cc5ec4913a5a946408137bc694b5852bba7920bcc686535f2ee5642795940640d8d6980861f50f0b530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e06d3f02d165ec78eb723930f8ee84
SHA19118d6f02cf27d83e0f8f760235069147fbb8aa7
SHA2564fa11aeb87ea6cfbce6ca9b4e4252bb510ab9c997db20b9ddabbe08998547243
SHA512078539d3028a8ea885290079e1981b642c778c4af9777c933c175109b587815d8ae4785c873130c57bbf9b0bb11bcf4dc21695c8ec5434ecc2ad97d616ea114c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9fd14efd577cb52308e076b4cc4d4a
SHA1af377738264037b0481c6928a400a12276593780
SHA2567fdfa2e31681aedbbc6df2d74007c861bec3e263ef099053942dad5a8e3b4d34
SHA5126354edd1261c7bcadcbc9b7dbffe11b764dbfee4d24798241b1fd723755d2a7d9c5fb6c031cda9fa236623bfb7f1b48a1d6bcccaf8049bf2958b24b9ffb5b525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dcd1455af25459ed05c0794b5b25896
SHA1f227512488536b685e0e10f34a525b60192a6ac1
SHA256bc2bb726df3aaafe37867cf99b0cc865d3082d486548636fc12fda10a4865764
SHA5129bd912b5e78c61ff793a78689f1e87e0d50683f06e87d8ec696ffa572e2c39f658e2fbbd6da886189a4f7ddbd2a40365984e7715b75669aee294904718790571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b753f799ce5b264d5e1b4ed2bde39c9f
SHA1454ccfee6d620d12a19ca70f39fc55303694f49a
SHA256ad7dbc1f10e99dcf562885fdfe5c318d2de65b6eae56a3bccb13c8585378f4fb
SHA5125007f7b3fc72fd78cb039bdbb50c568f9d228cf514c38c9475c378325875c4c424356c7bf9546d31d25795f6ff820c33b83f2a653ed3597725238c17a6f2c505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52656a058f0503d9e372c5fb3feabbb21
SHA1fe14022a7b491aba0c07ee87adab85459bc22c2e
SHA25623c2e0320aaa58c4f4924794863a37f8e4ac54a925f21f46262b4245fb999909
SHA512cb2b397be8d5485f51c88af5e86d9ab73100295cb9ecaf60286d3520dc7e555e68ed3abf760d54c80858eeff186cb8bb320b0fd2a9565c58084e3a8707487196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f188bb10d5437e318b4d8d375b7e1f5a
SHA1f28c251b4c66664ab3c0a455d8ab6b5583bd376d
SHA256a03e4ea80c05b5923dba89c94121ede818506bb006ef624ec59c322899e0626d
SHA5120500d23bb38f93c687e8d30214fb36fd4b2aa216c28366f52527da8e52d9f79062389141d21ae014d0d8f9fd742b438ab82c3e956409d22117d866446c804075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b404f23b330e84c9c64b3debecc3e6c
SHA10a606868f4c02983da0c5cac2bbad4542a155c34
SHA256cb716872b92e7cc0116161835361169bf5b1ba69c3c6cabbac691fece7e9a2fb
SHA5124bfd4f44de98b2c32d759e2a52d35eb691d26ee9a61d91dbecd84fd1796349d2f9ea4c1a6dc70732f83b59da76c7afe03aebedcf4aca36ca7152747641a13398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273f56054af3d77187330acd328c92ff
SHA119bc469bf366c0d5a2fde366e17a160e12ca574c
SHA256ec4a1ebddfacb15ead6e3a817c2c322ca4d9a77511a4f1f3d8f6b70d7f135010
SHA512ff6abdf7eb2e05cc7b282855a38c1c2d461542252643f19d65e7a394543ba82f52be77484b9309e966792362e5bbfb4fcfd53c5eff84e46c0dfc432103ea5db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48373edef6d34972267bd082502cda8
SHA1459080a0cc830aeecc90fe20c92f14a003bcc07d
SHA256c5c58bcaea91d4dc773f6a6c4f261800e9ed8717df6dd74c11f1498b3744f64a
SHA5122b1304537bdd5b1842af8dd1bc84d182c64634129419856d166ffe8590a4f4d499f16b96789a419e4534a09bf7dbc313b0da95b41a335fa200261422af607351
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b