Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 15:31
Static task
static1
Behavioral task
behavioral1
Sample
d24190c9884df26eb12445ac95611a5c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d24190c9884df26eb12445ac95611a5c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d24190c9884df26eb12445ac95611a5c_JaffaCakes118.html
-
Size
462KB
-
MD5
d24190c9884df26eb12445ac95611a5c
-
SHA1
9bee6a20cc2d7d15eb4794e6f2831a05f5a95836
-
SHA256
4e4c5c8b160f07c8c04d998bfdf15e57315c696e44f8eda80736118c1fcae038
-
SHA512
2e2dc2f02d961507f450b3146d684556117630c9f62efb41895faae4271bc06863e9806ec5cba873c2a46524b6b0af4a18f677cc8958da741b8310c51b217885
-
SSDEEP
6144:SJsMYod+X3oI+YNFsMYod+X3oI+Y5kNsMYod+X3oI+YLsMYod+X3oI+YQ:c5d+X3F5d+X3K5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431884953" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00773153b01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000093d7510632496a63dca0f064a80c853e44cbc3820f9961a9561aae8cf52faae6000000000e80000000020000200000009bd3fc4c5310acf684e7aed549a7e7d85ed2fbc5842e73f6d98ed435569cce8f200000000ac83682e5575323b44572f28b87c38ae3aa3650365a60ac536534e77b0bc22f40000000be271f2b259bf668480ea240110e20eecaaa5f8a66df1728e7a3f15a7ec7ad28f3dce16c19772b3ccc610a2799fdebc448514e40e19c3c55d62c62602f09521c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A24BC81-6D2E-11EF-8320-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2092 1636 iexplore.exe 30 PID 1636 wrote to memory of 2092 1636 iexplore.exe 30 PID 1636 wrote to memory of 2092 1636 iexplore.exe 30 PID 1636 wrote to memory of 2092 1636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d24190c9884df26eb12445ac95611a5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec85ec541bf49c507677ff1734717e6d
SHA1ab2a7a3e95cd43fbad8adf33357b1d4ea5288495
SHA256ac108a1a092c063b7c61e785acdc75d89f4cd1444a187b43d20f1aab0114c3e1
SHA512d726da7b9cb65e80af230e5dc0af4b7f0291f46af80012049170ff173ed0e8b8140fd801b79506d6ce6ec6f38b8ce7e67537357ad652b626c3192d854ecd892a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1d6bd2341a715a8f74826fc6687d58
SHA1d6b04efcff0457d48160820073c238579848beb9
SHA256c6f697228208647a703c836676df433e3df9a4fde0940e09eee84de91e946f35
SHA5123b08267810eae8fb13eaa857e6d5e778c7327864313d2d1aa9408cc84879308f97f1cbe90eaf55e039c2c88149014f3b0d2faa14ccf16b555a51aa213d82dae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d231ee1d4a5975b6d73ec0ba4da92e1a
SHA16439bba63b7b92e09821d1b347576291ea5f0a80
SHA2561353fe74df076d2b34e2e21f4531998cab82e8e835ec5342e03ce4ad33a50533
SHA51263369bb7e3b25be3fd730d225463d695a1a54075a37542a0a988a6ac52da826f98a5393ea9bc6b88dd8a976aa7eb95df55351918352f84a968dd7b82e11df658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d5a066966bae94a76b9215b99bdf86f
SHA1a4e0a67d356622199910c5db96654a1e053dc879
SHA25660eb5d89b90eadfd085f122ac5a0690055a6221b09704e2056e9748467f4f3aa
SHA512d160ee405e97de9019ae5dabc9eb08599f494a61c08086367d425ae70ae7d7d8cbb60419350a2d8c8f1cb06ab1e0f7257f8a48471fbf494628a7325d87a38dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970888908b87774e256efdf2560fc21d
SHA1706c2d8d52f9035a7741fa7e7419d72b0b0edd5b
SHA2563ffbe7eb0311e78d9d00906e186bdfe6963cf756db24acf01effc228f193a670
SHA512c40e3385fc06b76953c30caf9e5a09c2b928e8887db8f7d5c14a6b3099ba93474ce5a48916f8b79d5afeeb60efc6abab7a67b93851cc54a3fd65fbacc6152c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a1c34a78f9175bdf2ae46c92b8c8351
SHA16cbd291165d254af18b24dd1e1f3f75d0248ae19
SHA2560bdc1b60c996a04e2a9ba40ddbc93d554b84296b3d46d827344951a16a530bda
SHA512cda51a1accfe01d2a4b97e65d560df2bd5e6416843cfacab671a15125e277d306fbba9e01c8cdaefd0d1ec1564966c0e77a4e9948244c81c5ca93edafe4fc341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcc66989ac9292ba6bc6b825b4586a9
SHA19279c77553f89c1bb089c1b10a008e13842a255c
SHA256dd89766afd0f22254b6fb467bb03be19ba7f7de609ea2c2cc6c934206b5f90e3
SHA512e0c69c682c0c501268637475b94721cb81531ebbca9b24d0e8a2e185f4c99f13a68523088869ad6f3b8fbd692cff454cac937cb9e11c223e5102e14e6162ce33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1226b1e6aa65831dbf18a0d6d6418f
SHA182f0a37b527e4afa7b815efe7a736390d748d273
SHA2562a479313bc4e83391d6b90f12defd50cf0f90a2b3477eb844413db3bfc00c780
SHA512986ad29c3ff111731ab5fdb331913751d6a20057279b0e8f7f79a63e75a6ce23e5ea0874332b6f4fb7c8361ff22976ff6dd9956a2151111e9ea27c4c83d8aa0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576346baf0df525246f50dcd664d61285
SHA15fec6096f6df49cc93aca51af4f76d843e63212d
SHA256c0b4fbd5f373938949c142fd0a94cbdecdba89a828a3fa35a22411ece767df16
SHA5123ae6c38be1aafcb8d2c69a082950ae1e2a98a5eda81248f3df14f8285fa32ae3a82ebeb55603084110b38efa383f6f9a62bba745b19005d7c7222a1202e580df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58132a689d350b27c42faec061c09fc68
SHA1bc0be5bf40f2841b31af1ff846285cdf5a3dec96
SHA256b8956bd53f1bfaea902d12b3624b1411454d34ab2414af194bac99f75a774672
SHA512274a66948b6214e59049e5f585fe00d1f735370519ada9b10468820d0ed6b811c4c40fb5bdbdcd6facbc4cff449706bd932c6863c5a3fa991321afde0f40b64a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed13a1f63dad84a2bf9c35957018285
SHA1ae61bc91c8bfba405bbe45c6aed9c09e5b2fbb1f
SHA256af2cc2ab66f151950e3c5215ba649192522b456d3d70b17bc4a9df980403bbeb
SHA512219280b21eb53dcc303512d714b0ec938f8fe8bc2263f4d08da9a5e791c20c8ea15999b7098e7c6c9cee7b23026a1d3986da5d37674f5104d8f8427c114cce9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e638933b8ba42c46f1bc379dc2a6db
SHA1002ed5dbd0edb7d14e5cc65517b70aa84f1ccec4
SHA256308be541e676d7bc3cc53f1e16125713e9efdf5b13e8d95be56f0107cbc69e0c
SHA512e0ac7b6cb7a3823bf4ca038201d7cc4b8372a8b2c420954f23c3da48e3b177b46599c30f96817b5a29c9f72af9eef295c5e1c25d3561ecc55051200a4326c195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee6caa2708c264d35b887e4bb5198b3
SHA19c73591afbe1e7d46d143fd60509affc70be8223
SHA256d8419f00894f252f22f087c4db8b3bf26e6cfe666b12b1ec32d49f4723f4fc39
SHA5122e31f3e12cabe2c7ee522868fd00ab165f1919798022b7a7d1c7f6499a0d5982c7b08d076fc14a16a92e9a9381f8be7bc223aa4a1ec4649ab029e1a61bded9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc77476b801f2b4375cfd746cd3a688
SHA12aad3d094aae24746e0b36545a72e6a8f7bbce1d
SHA25658fc68accf0338282437a4d48442ba09cd8f21f3d857a29a7334994217855ef3
SHA512485084eb6691b27c8d0e789845c89421be68dd409833922c1f1ad8b128a52298f80572a9b4c0055830404cc91d5740e34dd7af508d4235c2a2d94793fcb4bca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0fb18b96f64e5e9202eba0ad74a60a
SHA1dbf9862433c3edd12accb847aecd3de78c18d707
SHA256f80bae72c6e7679f86e10107c24763b963a81cf1103e3caeea309deaa1a630ce
SHA5121e54b46003e3d07a1e3eacd1df48dd3e5f94e9cfd984fb1afac361553ce0d9db2adfbf4fd2fa2ad34d0734f513c1df66de2632572c0a38ac084a51353e513ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddbdee464a3030a61f1bfc9255e3f339
SHA1c65f3e6c03fbdf28972d37166775a406396494ad
SHA2569c16250ccd4e3d617ec9309d5f2c112df7ccf8dde326016679facb87f5df7895
SHA512edb3cc20d06c32dd1a0c61e45e92992ad0f8eb2ea2a0739893e0bcaa8dfb196e65aebb2edf4e104fd274326f7945b5f02b9a723e4a7110b89bb2d8312e192ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d36324f3e6e479eaad47c6af9099af
SHA1ba6b31d53f2089cb24b10296ef0cee2510f3a228
SHA2564f1abc092b560e0980070a65df3bc42dd66fe7e031ddf764210f30797f965507
SHA5128d5b7a33288130b757a4ea32d3864f0a8a91a0edd412caad1fd51c5ab1465eea377625d3101077355ae62ef308904147c46487e5b1c5a4b990cdbf18c2df5483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b779a75c8565e20e5d302f549c7f9af2
SHA1edafdd819a20774981027df3da0b4d2823597c2d
SHA256b5425b10f862647d93fd56279b10632df7086d4a561e20c7a6a4e3d470f800ac
SHA5122c1e876f11e0fe1a7db6c260b3a4abb66e4ca5fb96340d7c66ea4c8162c05db26b5aef70ffaecbba9ab0133794ebc56b92e3d13938a95310b0dbf9d4b17a1543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4194da21d866b74bb3a4481189432ed
SHA138383f6e1a7dc63d9ea617e022c7ef01fb420d53
SHA25677220857128855a78dffb82ac0056c0b9008c9bba076591e87fd6ba69aa2ac7c
SHA512a6a15905b9d0746094ac55f879a749600d3ee00f1710914db5942c2dd5500010dc8aa94dffb6a4dafa4812bc606abdbb813231be9d18cff620825adb0b7d3280
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b