Analysis
-
max time kernel
104s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
d25ce55c8bb878ce0e703dc87c74ba22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d25ce55c8bb878ce0e703dc87c74ba22_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d25ce55c8bb878ce0e703dc87c74ba22_JaffaCakes118.html
-
Size
27KB
-
MD5
d25ce55c8bb878ce0e703dc87c74ba22
-
SHA1
90bf4fbd044024a1de95be10b5d25eb67aca66d6
-
SHA256
e5a34687047602bd8d176d3b20259e8650ac010135d34bd39f06200381b42739
-
SHA512
bc765e8e7f84e2a348e0f3668de1a444ffcbfe2f8275cf2e9e5ca8530f63454ceece8fcc21caee1994f57bd087ec972d1af18328be825714fc83b757f41b3ee5
-
SSDEEP
192:uw7Ab5n6WnQjxn5Q/NnQie4NntnQOkEntH7nQTbn6cnQ9eeQm6utmAkeQl7MBYqP:rQ/f3IIk5SydRw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006f34a6b566255bc55751b1907dd1177fbdaa1c7142d118636971836ff5701025000000000e800000000200002000000062db10de0cd26e7e181e97f70b1a5098d1302f681cd49bb422b79607d163c715200000007d8109b9ecfa75482f8f7a4e971f1fbe8b22a43d404537f65a2967dcae8593ea40000000e5c0048ebc8465790e7c34e2a8776497a9cf2b8928a14ec2f7633f416ef0dc7493432f86ef31349dabc94456c4afadb6f9234571b1fb9329349e0712c23c7b5a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208570694301db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431888536" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93E21E91-6D36-11EF-9704-E62D5E492327} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2332 1640 iexplore.exe 30 PID 1640 wrote to memory of 2332 1640 iexplore.exe 30 PID 1640 wrote to memory of 2332 1640 iexplore.exe 30 PID 1640 wrote to memory of 2332 1640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d25ce55c8bb878ce0e703dc87c74ba22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d07cbb7a786ada957f476d1bd66ee4
SHA166dba552ebd380686b74fb7af2b7d04f9c2ad7a4
SHA256887056c3ff968078298f1e50ae2bb6cb4f79e02ed6d1caa2715c4c431dfcf5ff
SHA5129dc4bcd3487a79ef1ab8ce9f226ce2ff2abee89e2be9e2131511e8d9ac245670aa306d070f9f3f525886dc6144d2d227d25468ce21e4b0bf32efb6e2a567d112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56063fba42d9bb67c02eaacdc683637a9
SHA1863abe57f20c87ad103760df7a7bf929ca079159
SHA2564224ba8c6eb49c3308beefd6226fe7303a3b680edb8bbc2044ad65044fcf14d3
SHA512de5af00037a5d87048ef0b39a78cae920e4f3e8a0819e3a1b8ce07808b72e9ed8fbbfbc5fe205b833bfed349e6a80dccb46e035df8b9b156d051504147b22588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f93a09440093628e3c0f0b55db0171d3
SHA1921de63e1537b5bd48b7287ca3f9250fb4f51bb6
SHA2566ec420842e713d18876a62c55ee9f07bb6c1dd5d78aac73f2d550920408a0b5b
SHA51248cd775bbb08cef0170b18e944ae88a9f8b9bc7e209eb2607cb75eb102d904e580e1ac76180168a5fe19ad07f455385db03d8c16415e3b695960da6b574f4786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5987f5191517f3c7322c9db0698821852
SHA1d878456f993523e93efbc94add8d4be10bbdc9e6
SHA2564ff99fcdc5761ec09f46586d60cbb3020c97e48908c4d00760d2c1ff3b17a7c5
SHA5125749d8aba640137900cf63a017a4d9c16d66d2d4715468567c92a7f7c45dd211222b941c2558ec05fbbe4f6719a7d1573228fde08f647b01aaa33cce0b458e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ff42ffa8582aa69e453aacd2e54104
SHA19723e376de0b7d26b6a81f55af0593068710d25c
SHA25680b667ef5b3176701a35785abb26f9472bd8e7b5a62db36d677ea2ad683f3091
SHA512d463ec895a7248a6ecda3affd720bf4db0116816a7b969268cda901c64a33b227919419a254801cee9d58e97643e78bdb1fd0707a5d6e55af6006dc6bf0dc138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2c66b15d79f90c6d3b6cc78177b00b
SHA1be05d43fc09951bb955522c6ffef3e3fe84bf2dd
SHA256786e43b9fcd4d8211490573407ffed34a86d0c653a331765992ae9c548f8b647
SHA512d5f832a3bc65bd53ea1a2f04bf08807443724b8ceaa71d5d97d7baa5c10da851b8dde007cf7f4c1f12f223600209c213613fb777e28047178b88124fb1a62baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4ecdca914b67f1050f1dd176b213c3
SHA1f241856f90901324a28d0a77bc1d17188bb5d880
SHA256607043427095cc2043922e7ee78f1a56caa578fcdd7b69d785b555017d11cfbf
SHA512c0e865a759b99002b2da246214b527f51d28ef0423991df8ba49ac3a568306a9aa84ee5ec0bde4c1ba8637ba1c9721f08f69eeb634bd75f0c9b14d95eb888933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653b67e56abea753908ec377631e2623
SHA146541f467494b1a9adc47fa450b14701868da1df
SHA2560e68a0029f93f80137179e34f217ed0ce5fccb2da57529437f4b9df257dc492b
SHA5126142ee1f5373ac101cecc4a0c1422f001807af1ff973276cd79d9d74668246d6fb02923c7f417cba21d55a36f1ac2f9eed94e2d9ef78a59030f030e383e674ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d5b7468aaa792a0e0bf131499b9d2e6
SHA16dbb3af9e684ab0fc97d377f7114b4343247be30
SHA256c85d0d165b3c7d0797dde3357ea616c5cd3be85f4703fdc1ff4ec74c30e4ae82
SHA51238b403d8c4f073fa25d667b6dec449b2a843813dc61cb84919e05c9314abc3c404f896fb22e36644cd997619f6728e2d8c494eab6f0c493f3239d72242dec7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce47a8664c5895538558cb3441b00f65
SHA1bca55426b787598815f8d8613c7d5a4a4d466abf
SHA256aa733d36f9f79ef77703d3de91ac270ace4542fc63bec9a347fc9ca5f1843e3e
SHA512bf8bc67df8c12708ac07a11415d3b8a2fe3aebb37c12da7c0f06d40186957437b97894c97a5c0c27e8499b7c296555451718247ab352c4fb014a574d039dcf30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8081f0e89e12df1551f462103df8089
SHA176224629160eb6f0c8e027b1fc7c89aac317a79d
SHA256ce1c4f744399579f0b76ec59603a92fbc9883b10d01db8454cb70d8394a89150
SHA5122ffd8aad84a606ec9e98234911ee364d5f4b58af43bc51eba8f2642eaafa9dec00c66148bf15f6210a739eb523fcaa79dd10c060d28ba2276078c1fad41e6b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1625478aa9218b03ae0e7a6a50a9bc
SHA157eb8d161f6cfe85d0ab3eaa55583868f6fbe9ea
SHA2562d263c771c263ff764295d03ffb693973174a1cfd08638c93fbb03bbb78d0ab3
SHA5124238cb035c8a89e788f878cb64f947ea51c7bd79c2003b42082d4ca97262554abcc6b75e68913a052e76eeb7867d8bcd318608a7b9ae4e60af20f1e8b4d8875e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56405165e8a8db0008acf2c233256d208
SHA130dca80aa0f11d0631fc6b38b293b4a3aba17b07
SHA2568ee17000b6842c0a8b3b54dda4dd09150eebc6da1dbff8fdf17f5636796cc559
SHA512323209d143b98dca075b42d0eb2442d5625046a0930bc3887b3858e6eae4e8d75b74d33f12396af04c3465af21022e006d1a751f4d1f557c7ec4bbd6deb929e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2c9fed7184088ac7375431536e4957
SHA1a6f2f080d0c7f2c1ccbaf27b086225d8f097b546
SHA256322ca5e3518a9cdb6e89893cd9c215f6b7321b5760f53c71a6f18a9cd4050aeb
SHA51230d67ca8fb187a3557da973115ba05e09c5af34c12ea7ca6bd1eb4020e8c4301d1b6577d830f32d007360cbfa1f1414d3e4809190488f8bbea5f7477f836759a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759e8e06d2a3870d8c6473caaa83a95b
SHA17c64ca29849d26cfd9d0fa91019eaedfb5ddf39a
SHA25628903795c18db38a4d1c2196b01e199b5c6dbada98354d3bfa38d22a79d370ed
SHA5127954e6ac0bef82e0397b2119cbdd9d4eab6de55ffdedfff5769813d52722f4e32bd65dd938aff85d0cd7bf674f48dcce632b37a4f71e002c85a85b885333dd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b798c6c692df9a5fe7765a7b15ad684d
SHA17677e64a15b273e0199616a5032ae0efd60dfa7d
SHA2568b07e34b88c8f23395b36b70cce96507a9ab236c0ac9bb918f2543ebb87da9f1
SHA5128222ba998f689be62176cf31f0a2edc82b2be6ec082f1b729b3886228e67e18b98146ef7827bc6fa63190cc1df5467fa30fa0785d155c9653c599dae6e1d0563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1987fcd3f8ac35755e6960aa29cb8b3
SHA1fb63e7acf63322500f5b9b00e815609ddf4292b4
SHA2568efae9fdcc4d6f81b34dc0e998a77485055c69c87f586b00b04659eda11a3987
SHA51263ebfbd5922f0177ce509bb4291dbcfcc5950ebebe7720c6b350df04a2987e1d8af3aed4feb91d512330fe900e33bdbdba15d1c55bad6fbaebcb98c581e3dd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527972f08a8dab88de2355e0cdabefeb1
SHA11f0e27ec0264170588db9910c7c4c201ecb36c7d
SHA25668d1295b0562f848481a842e8d27c67e92a88d6ed951e6f6880e4e6209dcf7a1
SHA5125b8abab9738fab0545ccafefd77563fc35ee1571f5bdf0b9fbbd6267f1f366307659f345a84f8c58bbddf77acfdca258ca7e9a32fe4e01c548feef5ccf116344
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b