Analysis
-
max time kernel
117s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
d254fa38a15ee62b7d0bcf9162b04876_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d254fa38a15ee62b7d0bcf9162b04876_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d254fa38a15ee62b7d0bcf9162b04876_JaffaCakes118.html
-
Size
189KB
-
MD5
d254fa38a15ee62b7d0bcf9162b04876
-
SHA1
ebf09a4cf7f28a8eb3d92904766b8357e1eee32e
-
SHA256
62e83db53c6c9517491117079fca00cce5d23f70bec8e5d605d596685510a1ec
-
SHA512
96254ab07417019a7d4abd505a7b3edff551dfc0d351001bc292eebee4be77f8c13643b93f8fa87d3ded0bfd64c292e560226bab775ffdc2870acf2110dbb8d5
-
SSDEEP
1536:dEmNGZqnIYnyRZWS5ogpuz4fQpp1dVWHGZ4srV2ERZTxAHBLcZ3xt3VSmFgN:1FkyZ0KNKLcZ3xt3VSmFc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0af6f374101db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32632CB1-6D34-11EF-9FA9-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431887510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f2159b37ac9f3cfe93e4d283941012bdcf97832cd39de482a92681b7e4f2202c000000000e8000000002000020000000741b01039a625b2944f477498b6601986b9ae17b64af94832d5a5a6b079c8611200000005395d7f626488f92ac44aca9a53a9485f3d487ac8695add339134b4d9cc2abf0400000002b9638df8b3070d57175b55e85c3bedca352652b6590ab16543c675c2d1a0b4fb2951376b78bc2ecbd40ef4bebffd743c66f0f54165f14cda450e0c53c4976af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 604 2324 iexplore.exe 31 PID 2324 wrote to memory of 604 2324 iexplore.exe 31 PID 2324 wrote to memory of 604 2324 iexplore.exe 31 PID 2324 wrote to memory of 604 2324 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d254fa38a15ee62b7d0bcf9162b04876_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ab8920f4a80cb03b9d8dc54ae5a2c4
SHA1ed612c078d1d91b79d725a34c7310772d4711f10
SHA256e1a42107cbd506c9ec4515dfd61669b009b8de3e237e2be2172e0a18f36e9dd3
SHA5121eb37a03cdde909afcbe8ba76bee8eef9aac9d318b26d3ef2acad94afa8c6eeb466d96f4c4e9c90b5c91d20db28c7e6efe1e521e87b9c5074974af2cf4624627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d370071dbf4e8ebdd8ec39cb3433be
SHA1d16a24589f0cb6665bfd1d63563f56718463d05e
SHA256d64ac4baa84d1c9320fa760e73406a032bbe240c06c9c1ef5ef5792c3ef085b0
SHA512449b5e34ed8e5fa126d052dcb1e149c3209a2944a5683fa808602bcabf76dbe4b677506ad4b49df07093814016b80fd62f46e8abecd49e66c1b49ec3d268c88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d939ceb2312ff177cdb0e3e7394a4d9e
SHA1584832bb7835e0391bde043e0329615043dac0e8
SHA256b5d68a8c560704971b332608ca319fe743f3dca0c57e1a3006671ab664cefa8b
SHA5120e02118762da6309b4d58cf97be65d35dc5fc53e184bacf0f1f979b504569e88d356f0b912c3367a7ccc64c3a4433dede68c9bef824c707b724e66b7a5ac0d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5418f05e7b2f47676ac2ca567b8dc6237
SHA15d347c60207ce09b9ee5c7641eb24b7f2683d52b
SHA2565945dca7888624aae98fbd3b48cfb1ba61da6765f04f67e3a487e65de3ef5805
SHA51257f3be2007f8fd233d1d5d91fc820d85ebe807dc638e10a004cbbdc55311a038c938cddf463bf6a34d8ca9ca51fa3284fad2cb77dab3e44459c315bcd50243cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe4f51c1b6e9a1ce39f98c606e5b60f
SHA1509b97db4ce6b24cf71da32610909f926324fd64
SHA256dcd13b7c16f0d2be4895f3db76c5bd06c7c95355f8bdecc2f8d53ddc4441996b
SHA512ba5907c32300db5d1a4a3d7fa3ef3559b56d5e888cce47885ec917c4f822f19636406e43c4cf7b543daf80101fc9db7972f5844b94abf89456eb0d1c92768cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5b3761ca6d69b9168728c7e7204708
SHA1db9dada65117a920839479deccd4ffed31417d91
SHA256146c196305e7fff7a71c723be3ec999a55507b90192904786f20785743deac5f
SHA51277b1d68331e1abd901ae979acb30c87095e6a25d3d117a59fd406e8543326e33728f6d0b475303dffa1e251520dd89077a6cdb9dd6c803c588ba1809744a7271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5600c9badfc8768b0fb002f101cffc395
SHA1a7947253641d25f403ed08f31a9d83de0ca964a5
SHA256e3712f51f508377b00ad81b95e02ddda1b55fe5a484deef5e2c28dbdc2727014
SHA5121bfd232db85fe6bfcb7e6c5d5c96072d4af6afd475ce0d50db2ba50e9cb94f6c1b0cff051aa5f625b6c7c0825a27a5646899c85e5af9353e8f50b4fabc8dee2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707c8049cb62026dc44eee67ffaf9b4a
SHA12d233fd02cfd9d36c3682962ae89e6b76663668a
SHA256c910286fc38506201814e41946bbbc816e46ddcede2cceda1823e9454bf96a89
SHA5128385eebc23f3346887b9067ed5ca2a41b25dabb93c818bc52aee19a350bf2dda08207918a8c2de53c4d9f8f6f4cd22b98452fa7fe0ed064604bddaa8b9eb12b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543722a4db2f3a0e36ac52bd9941cb331
SHA1ec550e409dd3ca8a20d5130972a5a00a957849ee
SHA25606dd87f4e3011a2e1f5558716b4fcfd61443202b78c2cf2f1e34899e3fe18773
SHA512651a8448dbc5d4202e2754389f34042667e075e65c7ae53ed4923b31fe27f0acc2764e526c348fb28fec8a1d2b140aecdab4d387a28b4e53ec25b31dcf3ac1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57845e1d236aba1d40be11616bc1b5516
SHA1cdb94c4ee335c5b75b2dbcbbd788de5f8e6a867e
SHA2561b62b91d90dccf0db8bdc30bd9ee369979d7867dfc762746bac02e289a7f3c31
SHA5121cb0c02e96cf314758289fb774e5e52fb4eff0cfdd80d213bcecddcd0f83e571ec71e76f95bea7b774f1ffee880be83a723fd83fa1066887961c0080a549c2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f926dbe56de2671e39dbf72f25311708
SHA16c642cf7e04e47c002d2154ec1995447b264429d
SHA2562d3df93eb73dcab4b1467aa2cbc30eca20e8afc8bbf1c7456a8ef08cc2f3495f
SHA51285d29046550ee82a3b9beac7903de5b9fc5627077f1656eebfdc6811f0d805660920eae070944400e883c5b9e5edd81fdf1fe5c6e01c70fb0c082c4e4756dee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c7201c5ebac68ceb27afe99d6285cf
SHA151f6ea817d15fe48dcec0d77d1a70d292a66ed39
SHA2562aeb80393ed9dbe0823e4424e70ef99a684d6dc44bbafc35ee54e97fbd271ab5
SHA512e23fc38b551425e3665dab20c2a02d473b1172efc4aa4e00e37529fec26e6f235e8ca14125cf0d092052f931f86821f9f9ac602eaf2ee63c86ba0aed61c6b61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a322a42deadbb9d6c0d91d3913bc89
SHA1fccd6c3ee7edeb5f1a21b4b2db0a4cd60c8b9a80
SHA2566156fc98e3505bb747a3cb6b56912a4c490e4a2120048561d4c53bc7a1ae26e2
SHA51200b43d85f985827692597e3a46082a6f2e2edc18b0d713f031b3dff672b81909aff73aaf99ec064f3bdef33ca1137eb4f37fa884ab0874a6b6748c55f3994db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af90136179e9ebe9ed82ad4d19e78094
SHA1b325031f511f31ebc99449ca74e70c68dbd6c4af
SHA256dab8960ae9eba5fa31819a30a61706083418e7344586bc2b877bd2221ecec626
SHA512d23874607f9f2143dfc8a16c95ed08e613957e88cea54a6c4adda521327d83e3336ef37e6863b62a6f452f7be1a591cdcad973336c559e1e77469a1cef36069c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c458e5ff68f119108fb1aa67c19462af
SHA124a8b2084f70243921abc3512a7e128a58024074
SHA256b8815b5b195960d40d48684575e395a09de311837f6300743790e08691b4aaf4
SHA5124102da343d80754bea2e2a33196757fc2f66a4b3f3cae1cbde8420c4bb9dfc8d68895544d531dfe0f622311cba1726c2b5d7d5911b31eb946e6a1d94ee11d0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f630465b662838479e946374d2eb5481
SHA129e01b368143583ff8f79ee46540e2b5bcbfe9f0
SHA2565aa27d4d77ded44049e64365266f172f982cf94efda0935320c3602ed88690d4
SHA512908ba24b9fcb74514b044d5b463a64406f8d8eb82a70acf27a74db67912a3e1895a92fab6e54698d50289637f8097bd9728a89ec480ff0b89e6dd5dc45966fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a860e3dc8b75b29e6896c9d1b033d2
SHA175f9edb7765f393044abd0dcf2e3aba7599c0828
SHA25694d1c8a625b63f1db074f1bbbc31247b4fb28ab98123d779f0037b7ed5a1550b
SHA512e2617d42113c71b46ec9b7425a6d7c4f7f0cf89a26ee61bffd41e66cc3f941d0178c437b00f80cd0ba9280822717700f7e22b50c45ba098060d6605d8deec287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770a0a325a80b545f4b7f6d742fafc5c
SHA1d5ae1196da37e9bf95f0bd3f99d4521569bb54d6
SHA256de1ff839a4bc5c3f3ce90cef73f71de2668bfb815c20657246cf4aeb282574b3
SHA5127263aec8ceb78a9d46ce8e418fa50fa575397aaf61553c6ade48e3ce22240218952a1cc76e6d46374742a752a4869fb1f778f9ff4542ca4b4dc982fbee96c6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578c57962ee878ef40e6ba4e14f52eb57
SHA106a862a350fc0bbdcef7a3e707f20b483855e959
SHA256a900eda94bc88abce680b3058417ac4986a321a379d4bc128442441ba5a34f81
SHA5124432aee0125a213cd37c5cc10c0dfe165057131caf9e33f101125e50a1dd8b1fb05e176d9ef3a50c7714acf858523a36dd971fb873f31b5924a5b18eb00d767a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b