Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
d2629b54e69529d5bd8488cf8a093725_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2629b54e69529d5bd8488cf8a093725_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2629b54e69529d5bd8488cf8a093725_JaffaCakes118.html
-
Size
3KB
-
MD5
d2629b54e69529d5bd8488cf8a093725
-
SHA1
2fa4e3a51edd8e2a7a8a9ca5109a2eec2ad4bff1
-
SHA256
178c6119bf51bf8b552e14eac0c18d3e544e4854f70b63113ad8257245452756
-
SHA512
f75e989d359f18d3e64f0c270941eddb722b8c688ea1b016426fbba74d7000182149347f3bc57c21b4234e5f743b337b5800926f688d0666a2e4432bf6f8fe4f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{491006F1-6D38-11EF-BBB7-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431889267" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000065736e1f6c15763450f280c96850937afb01854e65fd9d25e0498061391de581000000000e80000000020000200000002f436592c3773064651e4cebc62f562ac44a2b167ca4c2139eb1849cd274902120000000fb04eac05f2c8cc5b24beac94d57d6db1e7f0cdbabb48f86f92fcc355683d0cf4000000042ac67a112307e610bff0b3512258335188593e5a4d77b656b2f46b58dcddfa69cb9d440375b3a3b8ceb4a314dc4c39181549d46a63a37b3c4afb428638d0e2c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207d981f4501db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2448 iexplore.exe 2448 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2080 2448 iexplore.exe 31 PID 2448 wrote to memory of 2080 2448 iexplore.exe 31 PID 2448 wrote to memory of 2080 2448 iexplore.exe 31 PID 2448 wrote to memory of 2080 2448 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2629b54e69529d5bd8488cf8a093725_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b068fda839b50ff690488aed0bafc38
SHA1b8afc11028e82d003c2d88d549e51744233f34d3
SHA25606c7393be5868bbd0399aa37f28c0868591a823d3ba43dfdc2615fa63dae203a
SHA51279a2af60f0b556ff5ec5200c9c0cc509df046dff1abdc23396bb3de300be5a147a9b441b13bb2f75e289259376376567669ca9e4abeae41813b7ca66c2d76871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd8d74fed8b72ae569ff4ace0c090e0
SHA1197bd19e89cfcb785642cef4aac4c3e31b980d0a
SHA2560108223787226853be2c8720b256e781c8287d28b601ee7e01238295c8567abb
SHA512316a9519744ab56d622699ebf91af36f1ffaf3d14b2731f838ab225585c2fb33e4b0dae456309613d3eac2cf7f3b8b8b806ae190f67b05a1d033fc2fec0e8fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f52256a6f318a1c88bfbac107b2442
SHA1d7dbafd29b4c486ca2e03fb81681a4879b950bfc
SHA256f431d71563049cdee00d3c2d59dfb21fbfc961606317668920dddc2ca7525a30
SHA512ff096ae06bc095c698b7ad03ca52321d8f88c06fa75fa321386ac270314d75878be047153aaef580daa64390b67f3440b1b7220819eb49d7a91ada073af04a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa38216e18c624bb825a730329e969d
SHA10e2312869b072285dfc5acf346761a2c42d39bbd
SHA25646c3142ebcb89ed979100f440f1c1b21a3ec18a8afaad51d573afc3dd5076ed3
SHA51230bb874a01d818d51bb6862ee80907774ba759f66f4e256261c6558118dc6fc87f7b59f4282f6fc919597aae804ea57ab378bbc8e97fd050f1a517570912c854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e002409f1d61a9f4928698d1d392ea3e
SHA1dff20095d00668da2a81ebcebebed38b8c096956
SHA2563df184caa508be673255d87bb709fb16737b5731f1f33ffa46f3d8f5a8a0eb96
SHA51281436da188d1c8a4e7f63f76e09bd5aa4677463ad367d383b8ef994d2a234abce646ab7fba5848616a4597f3d9864a172c7bbe8ec14a42bfe60a099e9439798d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57953965cc8270f72c72ba82b742a7259
SHA1d03321cb962f91d56cdcfac53e41c5371967965d
SHA25692a85781e6d5bf59551a6032ccba30c522747b6a4dd21d3696367a6924b8c39f
SHA5125428543bff3aa89af385b6591e13e6c9ef410904b7555e4ff71b27699efe97ea07cb41f4efcbf84e0e0be1d1f4125441bb2b26da778a2c76a3d1b504aa276a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adeb7a53ec59ad27f97bf7a133409c4e
SHA10c9acf90e491fc09621a7ff4bd1b6ac85c4f981a
SHA25633fe67c08b827b2fd0550ce7046bccb1a511797c31db52a465beccfab8a200f5
SHA512431b88a11a3b94b88a361fecb1aaced5bc11c079ea88eabbe4701b7aac9567fd345b1b33d4737aaf0804f340c87ed6757789829e8f6606bf36a5cb440ee46476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d7573e9252c0519d7e8a72b3b36b40
SHA1f095d08bd3b8a5ab53c4265b7e890187da0c0888
SHA256a4fbb9985a978fab7553b2b23186bb8f6e6a427328c82bc6ccc2f47b3a41cd07
SHA51209b7c6b6973cb602a7511822bbac3fdec8dd214db6eef18cf3fb2328285e76444c5b3f8ae4b99ae89b18e0cb01261c1507f7c5031aa27a7a03b6ac6791bace68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b56ebbce11900fd27b8367b0cd60c6
SHA1e951d985ec9ead8a7152ac7708ca550dc23450e8
SHA256cbb02818ab3b647442e4a3b5c2afb42308b62b4cb5bd34ae2e21d1c1433dc83b
SHA512ffe449d75eced0be04adad3ff51d4a52a850b470e9364073f2452f52e3aff2fbc1606656be32247674c9071baba86e6b3aaf2b117eab901f29e05b39410be661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f73d57971ead04228fe7aff1b172e775
SHA1b224a0216049ec59945ca3c44ba29a27d11aa0c9
SHA256efe2e9423453bc1b29ab623315a3cc576fb2cdba0dce8cd9ce8f16f29b3819e4
SHA5129d3988785099f2da01950a6dc5a3bcd87091e39bf3d1828851bbe34871bbfa9ffc2428b1383fce8b68ef197b66a7e1508dc774cac2f0995eeb94eaca70cf1d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554be2ba1b73285563f8e2efd53f6a3e2
SHA115fbdc00f71ebd2ee575e84be1a224259844b1f1
SHA2563132ecef930b0434bf2ab38b6f14b333a72bb71cc30a96fe1095cc90b2ec1113
SHA5125aef41f9cebf5e51e9a172fa9c6ae4cc6c74ebfa730d51574e736d8d3a85396fdb49c5420a64bbb941462e715b6e86ac0ea4f703731aeff1f6df0da028fc2304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305bde67127eaa7abb73275f7467f824
SHA1b2f0833d24b27328bdc786bc9d29c139981857a2
SHA256dcb4c2800a210bd611117b4545d41695eee92438e7bbe0d492e3c957705b82e6
SHA512393ebe2eace5e4434d9c7a28ec0def4149e1d066d7cd5fd674a5a4da40618ee264c099bc1507ae8008725e92c2dd9f8bee11a1b6ef1a25e696d503896abea159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b5e505618ba8aa8ba734c3aab5726b
SHA192931b216696404a5843d99d4f7015b149a5db9c
SHA25609d5a5c479187d2feb7a0e465e67274cc14a461b576870526ee34b3efa1ddb99
SHA512c27dda41a8c6c7bb3f86b1e37b2081252f623ee66ae14eca540cd67d1cf304e8817a40e01faf981486f1684bf1d5ee12f8749dde9ec97169ca2a7a4f96e1f2f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21d215e22a8725494aecce99a1813f6
SHA1ef42fa0f5b0f7230fe0962e3e23b00051a7365dd
SHA256714a98833ed4d017316f882687f921b724d39a2c0e0d45aa2eb1b305bf149751
SHA5128143a22e43737d89173cf3ad0b5c2caeef76abd1194f02489fc1304832c84daf4cbb949c7033cc0a329a9730a458f9eac74e3731e44d3ea162946beb48716656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea4068ecd129e53a0de629e111fde22
SHA1d9283b40f18cf6eca743d4a9a086b99b36e28b72
SHA2562653469e3fd18d1539cfeed99439c5e7801735eefd1f750dd77ed097c42d7a83
SHA512a0ee7d39a3e40030c6f8356a4395292255c638b62afe372bdd8706672679662b524bd332ea49342e414feb8638cbc6f9e5f42f0c2e2a603c57502e4a5d1a1c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b296163ef24932763ebdde8704669177
SHA1911eaff990c06b3c01ad337855e6c9fcf359b91f
SHA256cada19d82b88a68e510c75fed0585792f880f937845a6ba6be2032457f98bd37
SHA512e28f2e018537881eb9581e8f4161b1c4bdbc3cc6fa6e874554cc6f4ccddfcf5ca1c0f2de7edad8b73a4703dc2042177b318e2fb1dd0d749c32f7844f763beb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c584321763a39bfbeb80093fa3831fd2
SHA11b8ac5e075fe6914530881f6bfd1409f9ae2c4dd
SHA2568c0f51345cfc475c21e8fb4b42417acd3f2201058e3f50e4bd0a5b9653b667bc
SHA512a78291b1f45301538b43bb2acf99f61468d91d05bd932fff758f81b64eeae424b41e09f7ae57d57c96d18e3f1e34e4cfd95371944c2744780c6abbef32e86b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710cea87e12b596401674809496bbeb4
SHA1132ffeef2e949be83b70164de1fdf91c02f72057
SHA256d9e61d20cc8c2fb5bca6b3f170bc3ab50a5b5a08a730ef564d95b3486d72c910
SHA512f965aa93314e43cd5e23745afc2cf7f36b7979f0b27470042208d33e286674b0c4cde43a9568c24b94f39d105b0b15234d806998573193a92fe8c2f69324a937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3e0fae8ced9e7fb78f96cb718876fa
SHA10d6bf263f59ccb4b68761b871032bc48929ca488
SHA256ee9dcc90ddccc874eca32b3b2b3d179d82aa0a58d93f403a7265fcfa0aa5c167
SHA51246a5705233338fb00d1741d8a75957a11ff739358f36a391154e03cc31dd18677d84ec56e9a76f439e0a9c8a7156e48a8ea96aaec42a8b67345e337dd104653f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b