Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
d25be88eee94e7a567494cf1dd2ec46d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d25be88eee94e7a567494cf1dd2ec46d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d25be88eee94e7a567494cf1dd2ec46d_JaffaCakes118.html
-
Size
111KB
-
MD5
d25be88eee94e7a567494cf1dd2ec46d
-
SHA1
ad7110811b96af61c14d5fee41b7831171f8a452
-
SHA256
9f6c1b2441622ba2488ab42e45444d2114afa7b5dc9c88a491d0efb639e4a635
-
SHA512
73edae12edb0b90d7150195b4a9716f2cf90bad52c049a94d7d450501a76091c9b06dfa9cf665bfc9262332833aa0a7ffd869d57df55d7c52f91d799ac1c441d
-
SSDEEP
1536:kvWLmZLuy+Eaowu5tGuKy4XSHsvqK1mTMSEDigqClh6WH+ti+U2sb/KitcFAGOoW:OWqZL5i/+ti+U2sb/KitcFAG7pEeO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40B0D131-6D36-11EF-A51B-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431888394" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 988 2672 iexplore.exe 31 PID 2672 wrote to memory of 988 2672 iexplore.exe 31 PID 2672 wrote to memory of 988 2672 iexplore.exe 31 PID 2672 wrote to memory of 988 2672 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d25be88eee94e7a567494cf1dd2ec46d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize1KB
MD57d91c88126c70dc9565c911978538144
SHA1cf60fd2999685542b417c10f64e70def65b2a012
SHA256b2ae0a833a31cac552d8077e99fdc92a9f61272d8cfe7616b26b4c2299d7bd89
SHA512c00b7f92b4c4f2ced132c50d8c74d7b39b54d67d8e898fceb29dd4e4b0c798f1298aa2a02f4b23795f6dfd70a09ba1a84cfc0c2c176fc87bd34a610624ca29fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize979B
MD52120db7b97245e396790235dbf17f21f
SHA137d19bff7ab45fb290964eb972cd876b5a2e28cc
SHA256e68621eb60b9de93c163355942461f80a120f2ac8ec73e1a74e5484e32f6ce0d
SHA51263c0088b98521758d527c9211556a8602613e7623b003050fae054c2fbddc055bb411f8db3801abe82e687ce66ccddc8a02c01892f5c07f2d725d6cbd3844a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dea9cb1a8e15ee0ed1e63c0ea42635a
SHA1bd8ba816a9b656b237db6b39f555540c1813523b
SHA256c8c09c3c5fcc79e6a2b0d612abe554b9c62d5fd357a1c295adb9f4e5c6fe936c
SHA512edc49b2ae9918022643d6d24fd9fd22f70b83d32337a863ecad60264f2b617c7a66c4afb1472ba4e149a09f30cb8df5682f5e977986163350db4221d57847ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552ef4ed3a85fdf046f70d1d393eca94
SHA1fc59b42d0068e8a7f6b417e843199e798abe5712
SHA2560a074f38dcd7976142546fe98e05343748bca4819ebfa4ec82301aa04c0f3fad
SHA5120ad48012c03084cdfce5fe30b19e219e0b113b1d460773085e707d8da54a82156c22bcdef0d6f71022c54a6afb65098a23eb72bb5a4c66b9637a5e69ce0af9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b42d2dc2a2dd14f1899be5322c4f3e7
SHA1b32db39a64bf417a511d42754ee110fb4a5a516f
SHA25604660e53b948d4670b2f6b9192e7a6a81d151ef7154920bb9c62cd75c8236338
SHA512af341613e39030ccef1b5984fbe601d1e05426439409e878da9b29ce1f5414b8b9b8bd813a0f76d606c66617255855a96b4a99db1027be1e2c830d2947f458e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e654b8f373ff7cc98f2ce203b5948a8
SHA16b177017311b1d94958bc93122dad7bbeaa40204
SHA25677e86d46f0826b4068f1fb8e42aa5204623ce4f4090b70d0b2139d5c5b11a111
SHA5124ea607ef3d7fc2263ba9c74b717bcc64fafa378a4eaf2329f18be0f6143daaa644410df89a7dfd57c400a78f4086626cb2f5bdf043fd784ea234f181b4ea0bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244ff3f8330332cc2c72f5b01fa39699
SHA1e068a0aea89d287144e4825b84696db45bca15dc
SHA256c6f1e5e10244cca8a408b94fde77d38211c1c03bd43a17885ebe3d7f52f02d83
SHA5122922759505a3f50987670950471bc54e318b4ef208dc3a6f264c60cb92cb00b90aaf2e0260df524b33958171348c9421ea6903e27898e4b6e08053ab48598d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98cdd165e8396b9e5862fc3b8266c23
SHA1b27a52bf8bdf3e44a2ef38defc11ba7b3a0f2732
SHA25623998e616b3eefa454532b27dcb7cc2a58e28f25493a1ad0abae99551f598998
SHA5123e5c7315fda2e041da00f1673ce8e6b3b89f13be8c5cee6d2f4646dbfb7dc0d99e1c78ab5a97434941df1ef27285340f36883b1e5e37ba1daf0111a2d166b495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534508393014d0d999f1914b535d456ed
SHA129a212e6e5641585b71d4fcf84ed5bf6e40058d3
SHA256846b35d9a0df32c35c6ec1dc3a5ed91f21e931629409134b5046abb091c4d804
SHA5124c5c5a92f53ac28e8daf8c74eece90723523cc14ffd58ae2e844c1183c69e7ce831460fab97effa4d43d8d1785a6b1b08c45b8a4064c3967c7f4ff6465b84e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c64432be2eea598c641cefafa9f1830
SHA1b56b1356bba4969f003d3bf3cd8271f883f3c1cd
SHA2560bf90d0ce04dc20ee6495bca33f056a27ef6dc6453ed9c7f77729e135702cf8f
SHA5124f018cd98a5e96ac71d68f2e5d1a7aa3a02a74db5420d59926fad9511b19c428d2008a42baf4ea2c45c6bfa4a5bb1d430f577fa247531d3b4f97478f0cd1b36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d34fefd13b8c1104115de9dd7319d3
SHA182c9d71393b85be74d31bf1e3ee32c2c29adfa5b
SHA256357ef58883a464a835cf6e1f78aa6d0d4557d96f2689593baea9dc22be56189c
SHA5122e09c5de4953ef683e596932d380d4329e638755f5cfbf46aa4f3c9645a98d4d16a8bbe2f9e4699b95baa3f91c9e76a90dfad01b52446a041f92397298335991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ad0e122380984e4ce4b9ed5197cacd
SHA1e42640d1910eeccba42f3dc87fc2296146650f6d
SHA25656f79fd4595aa6819d1e23e965e6ebfb935d88b1eb1827e6e245e953d90af260
SHA5122ea8326cf9a016f59df4367c05d1c37ce610fb9818261c8d118136d01fab2315d67dc5f1a1ee3e10d1119f539ab52118b84b56c240f07d341176f36de8f5d66a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254a45970cfed07d35c9178d66eac13e
SHA19469c78c3bdc6f0da55ed0db08945a895aef9917
SHA256e509548b26be9cfb501964c9b3f1569c288705e13c550fdfb0fef14a9c974691
SHA51250949a8a6ed90ebd255f46d7b9155f6533649e77e10d8666699a9b5d939b0b092fd970464d34da11ae4ad7c9b9098057ae0d809d84f0931db17904b49cd02f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aa07b7d9cd426c80b513e8d03d6ea4c
SHA19a5b44701b46f39674d89aa401e2bf8deb450274
SHA2561f1fe015bf2989f6893b297d0723881766af07bcb0256b6f757665afb1be5e03
SHA5128bbd4342ec51fda4246d3eadd3b35ce99eba1913144b8c223065472f7d029f62c850ca5294ed2b3b15016fec90bae290eebc5fb080111ec5ce7b20fa98a14ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a635ab679e23556c155e1642a9c543f
SHA10cf5b15a4ab43bcb98f21804df258493a32aa876
SHA256751bdeff909975167ea9078b3a955ed83a5dee3a56aac8e4b7d7742ae806ead6
SHA51299f4e0864f7b3fca476b422e1e0975aed5e0211fbfcf09f7e5fe00b317d29b3656ac31ef878f3a5dbc10ed105bc20589c47319c36551e4a1c39c37a209dd95ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdb00f0ab88352c57a6a83e2396d6b52
SHA11f9af7b73a654645001ce5edfd7e4264fd3974ca
SHA2561951213ce2a9aae15382543892e60c953fc3e06b86a6ed42d17757ed580ff862
SHA512d13911ed458692b8036398115ec7a88d423d935028b1666358de81e0a6e3f777bbe602ae1964d94d5b54d4f54a326964c17b140905e1992196322eca28c25013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5376f9cc87bed685528abaec1a75b0571
SHA1730173c2de31e5282d3948338798b85b0860b556
SHA25667220dfd30d84874acb322a1c6849a0cc1cd8f42082f4ce298c5c703bada3843
SHA512630c8eeb766c770cc2f11bbb16233a4829fcce1d0ed6bb75dccae533fba55d92ca87413b26a6fb2b042e1abcaee0b175ffeca84e0a10c64079d32c89ed65dfbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdb99552bb0e5bc31e3e3442e57fd60f
SHA1fb7b89284e2758751a4466c26a03a0d657026fab
SHA256da615dc0a45450cdad2ce2655dc1273b889454c15918f55e27bf12dbebc950fe
SHA512df440ea0f4e67af8e49c9db6edd1c86b0df42cc79a522d5b7a5e774cf41b8aa55b06bdfa22d80b49aedb21678663ca822b4b1123a18743b4dc8c5a3432caa62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6576332ac0582097b0541d14678bd4
SHA1b2366e9c3c4f43297b62ed5b8e7c64993fb0aae6
SHA2567d78fce8c4d154484f9dde94992906a559d638a979d01b7f8cfdaee9c370bea0
SHA5124c63f8e88b48e9b7b6c3bfe3039aada4281f734abe782dd18eca194bf2af5889f0f0767a53734ac4dfc61add2a954061be3804752994c7c0f685335b320a2407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD5695e7a1402ecf889e94c1ee2a719de3f
SHA1fc4ea88b705ea9d0a5068eacb37f4b1b9dc42999
SHA256fd930340dcfdeb8dcb2f3e6f496da51a4c592e0bb1f13ed0b720a696c1170662
SHA5120b3b8793fe037ccbabb02c137ebee1c77e3c8e27b9c781814644a5cae6349faa167c53f012a1709fa768a4645e6caa00b0d7466c4618ec79b437c2086492f2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD56d58672d658097f3333b99c81c3b117a
SHA1b9a1d7a6436fa49d07e3e24efd7f3aee2d464ed8
SHA2560299805017751151505a501b0753012efb51f262b0a7f4055ac3a031c6a38e54
SHA512a5f5ae642835c5809545a888ce0b87857b538e04efab2c3b792f7b23665d0e40d0027c1d7599922980b662399a3001424631933e9d2e324ea209e3d615e05a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD5dea080d8004b29dd2717ed854934089e
SHA13247eab2573390eeed1dc7be8ae6b72717731c17
SHA2568af02a58af6e9cea5d5cc9d4bfd1f81772e8ac86c0a09472d353fce8638834ea
SHA512a0d00cffb0fa7fecc7dba2d45f91aa6e8495ea6c11cf8321338f1e72c7fdd33daacef26e4da0748fbed312f72734e5072796610123f1ba8bcd5d27b9b7e81c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize480B
MD5b368a823405741b9af6b39cb95d63c9c
SHA1a1eb51c438a4eb074d6837ad74499acadb7a6c73
SHA256bcbf57d4c55200a3f9a79537d4e2ee4cf5c989cf3afd5b132d683b627d7ddede
SHA512b855e97bc6f1f84f7b00d197c6b914a1bf76404944b8af7a3335ad14e2560a4cce126b1530faffd1d75798cec41e48d17f0396ca51db164009f051ce6058c353
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b