Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
d264c2fe2679dd963f2df63e1b22206b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d264c2fe2679dd963f2df63e1b22206b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d264c2fe2679dd963f2df63e1b22206b_JaffaCakes118.html
-
Size
50KB
-
MD5
d264c2fe2679dd963f2df63e1b22206b
-
SHA1
c536f89f00b2918011ea065fcf4fc82f96ac1731
-
SHA256
61902649815816ce477315aac2bd48ebbd2a587a41c41ea2871e3e10150a3bfd
-
SHA512
6be0d9b72a07c71e1f37e096280b64581be92505d5334e65a72013c329031c81cb86c02f8982cac6dad3ecdcdc0ef574949a387cffbe4cbd4c795e4d292e1e43
-
SSDEEP
768:ZInCdrpNxRXTBtf/0OW6sJE64+5e6eJCcr:ZICppNxRXTBp/0OWr6Ot0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b02562084601db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431889639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{276AC1B1-6D39-11EF-B439-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000024a5cf814072bfae33689ddf434a548457adf4ee848a230bec11c444e3c561d5000000000e800000000200002000000072989eb1087e89983794ada5043b8f6701bfe9ee36ec15688a6fc5279e4bfdcf20000000c8d163335194d3ed1c0595af5350092c7dc3e7a2fd83466199c54fe710d8e9ac400000002ec2563ca9e79b0423599c5fc2568e0def36bdb10ce882edbc89e6b30ae1fb0a849761b4e3ef40520a90a592cd7192539092fb46248351fe778a1ec9651a0727 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 828 IEXPLORE.EXE 828 IEXPLORE.EXE 828 IEXPLORE.EXE 828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 828 2156 iexplore.exe 30 PID 2156 wrote to memory of 828 2156 iexplore.exe 30 PID 2156 wrote to memory of 828 2156 iexplore.exe 30 PID 2156 wrote to memory of 828 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d264c2fe2679dd963f2df63e1b22206b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc592f62a8ac7dd06fbec32e3f4cba0
SHA16f714c018ad6916c28edfd0780c77a24605b5840
SHA256c0df2404f8ddbaf1012b0516ad6a816eace973e3b2fb31a37319ff99596555f7
SHA512569cd5635931f0a1a68007aa3877737575c34ff3afd2a3dd041945000d2c9850b8fbca8e88339d9a4d9af4f4af72f5b5fdbe94fe043904601b8b656a2ba90eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c14e36c4a646896166a51dce5bb10d
SHA1410d3c597021d12da0548df582f20d633c96bd00
SHA2565920b6d269fe3e19311b07322f5bd624b62c804fafb6165a48589d31ca4ffeaa
SHA512ad5668e5a6f04d5c9fde15ca53b05029a6a8ee9b3d246293568aed422eaf2e2fc9c5d23a80bee24fe9d0677865cfb3da26222a9af3bdf75dacac78387f8105de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cbecd84d74cd73b29e10bab483179de
SHA1be0be044515f0ef0b884da1bca2858f70ed0e847
SHA256d1efb2a95e068777cb0b2671a706454eea7bbe28334dffdae0046f23162ef0b4
SHA512e4e24a33e0e88a1cf33e20a6c4a56f56f1ca084f4e56b461aad88bbf842cf436b59456ac7607f084fa774ae5f8f1f4333ccf3c540bdf7695d1b138c3841b73a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48cb9aad3331f99029280e82d4e256c
SHA1335463bd3c7dbc8c2256aa52856c673b70fda5ab
SHA2561704154bb9ace85e2da5020b5517e3f42fd7cd05ae00efaca57b97e5d308fe03
SHA512112f33e810c57c2a224cfbde1cd5917164cbdd314df2bd93e87ae4fd0cd45cbda7c14d3a78bb88d62f99409943ee06f4eb987d6db243fdd9bbeb21a8c4eeae17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574356761c065afbc3e84ae79a7b38a73
SHA1d028185c7d59330c90af3e83ddca1698a832ccd9
SHA256f920bdfe79b0742ddc64877e3679a1a011736b25d17ec6b8f9b51c617c480a1d
SHA5129ec63f170702c993779bf21667067bfc38284ae6d1ad672ec282751d8b0a249246a97593bd73d2eb981ca142b981acb6646c3b0051ca02e1b24adba9670374ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738f951785225e7cb7b16bdb92d75518
SHA151e28f057ac9a74d17abe56d9849131ca033bc3e
SHA2564f14d36f3857061515d3d1f9039ba784f5dbfbdcebb79a2daf38c184823aea6a
SHA512bacc10adf6e40a303eea90918625016a2c929a55261d85c361577c29af011e3583b9d321837b760000af38e485d6c3dcde6b5d11522b567a5615e846f7c4ff17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6c0ec2c2250448e4192107eae5402a
SHA196b80e9492e03679862deac61d4398f891593963
SHA256189a9635b5338b68fd1970c28a2e6be60c67a45dc8dc867ad9e75944edd0041c
SHA51227b08a8de9c4bccc4b41cf59f964a6dce51d659914f60f6277fb155fb7a620e5e872532ba1e3468d74bb2d110eed921d79b378d3cc0e3a60117fecd08c648918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52504e95a3eabf1bece9a8e745a9f1902
SHA16c431e90b3d641816a6c0e130da1c061331c396c
SHA25634a37918be1a166f260828444dae34739583d3648b85e6fe2a156904df73343b
SHA51293fcb8e8e843b5d0913a8e3f89e9cb9117fade0d2e93d0e1d8ff11b1f2668dd791d962119a3447a2eb9cfc26f29ff2231414587849b35e24e74959365eee7adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e52e4a1a60141015ee77f08b3d78709f
SHA1a6dbb8d69d3d8a4ace84e2d82c15d0e88517a2e0
SHA2560e0a3cd4f2239b1d6f8fbb0af72a2a99c360e38b6a7bb87808eaba8f07c5168f
SHA512887e784685541835d82cbd28945946f96bac0f27c5f529506e38518a9ab119fdb77dd46b8dac60e99bdbed0ee19c07bf5ce56cfecf73ada6407082221d40e2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528aa45539772b78a4fea471b1eabaa60
SHA1b3ea4ee7828d8e18479520028c4f7b47da72de01
SHA25620cc0878bbb3d5c1c538f732c9a5fdcd524dcc0663600380696e9408dff21d4e
SHA512fdb9f6210a5de130e91a8a6526b4ea6743b2c2cbc12366b003daa7fc8ba5e171b6a9cb14097bdeebb9d3692caf2835a0bfdc6e0296df9f34efc8ac5a1c41ae16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1730367df98f8c637ed42c471930359
SHA18344b9c33129ece754b19301819dc6f5189d1d69
SHA256ad274b46b4e28901db962d169730e1ee1b7599effd8575da337c9de018ea885d
SHA5126addfc94156bd95b5ba590cebbddc4fd015a8e1bde4b16192ba8d99f5d4761dcbf689e69053d2b5e243c06eec9c022edeabbfae6edb6bfd457ddc4fc389ad0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071e9b503bb1abdeb5cb17136c2cfde5
SHA1a2743110d18872ae2307019c0217ba6c18c92bac
SHA256763d6e894578573eb888cfac802477c3d9b3cdde62c1d3eccdd1b4ee1aa63618
SHA51297c8d7ab6616fe3ff6e472a4c31217c443737dcf5cb1fe82df01ff37f15705e10fc4937b93835ab6af214a2ca4c54a0cc387136e9f150332e521bdd132427b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd142441d111bbee52612075e862c5ae
SHA10b1a0225c97275637973df77e747cf9b971badfc
SHA25636a2cd289f964f5fa3bb9dafad6d5d883427b90f2de4586e0bc81a4dc3b06b0d
SHA51286dc84600f3a1b7cbe4281fdf4b4cd716357acf80ae9d45f1d93fa2f3aca67fb23b3f1343b3bdc23be5678dbee234bc704077fb171149af17d40d9c8eb5538c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8af7fff1339c0ada1c44d9e8cc4fc30
SHA1e84c78100ec789ea6686775e2c851a9d00efae9c
SHA2561f7c244335672f9be60c329ef17d1baf5ac0e78adb278840dec8bf4aaab40fc1
SHA5123c987d2721d4b20eab297c8052685921b8b8eda4e548b245759216c353f6be54ccdd40b17d04d810ed1fa1028a67ef2f7742ca88af8f24a2fd2680f7510dedb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54732493e149b6211064ff6d6770bb879
SHA17878a30950f5c41938afc96f981be19dc5f87eb1
SHA256636d24b5fcdef10b199ac3d68822644a2387b820177dc4991a2df05d7a7e1c82
SHA51227e52439ff8c8dabb6f71d9dd2f8f2004762d04b416b15647fd1d13d209b75d7a18a16d5d5d46f7d1e4db7c108cbdb4e6104bae67ea4b398468ac55b46132e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931057bb55db7df6af6452ea38bf3762
SHA1d753de8fb8f0e0ede66077599cca055d72a570d1
SHA256f579f541be864dc95604541aebf0dd8c69cece074f30ed273efc041f407b7fa9
SHA512b65640d5a26bd597fb16a2f0628de95255430592abf7e22ade4a80c20cdff0d722bd7eeaf31d22ecf1d64906e953ba9f6d13797ffaf614d47edc0344927c906c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581031be472f3300ed6380ce5dcb58c53
SHA154e3c55a124ef9ff4699276b9ab84d4ea4723c14
SHA25620633427dc55af6aa60daa6aa0695554637ce7a37412ac56625f0c099b0ebfe9
SHA512f397c9ee5f80d56bd2f9aedfbe1686908f07a6e243aeedb7d1ab71b78465e47b5d62394562a3b5d6f4922e43642aec8c866daeddbbf6e5149fa7f6a7a3952203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b61dca23b9f0e61c2858b70dde15c5b
SHA1d1e51996330bd228ffc4dcf72b308fcbadf01900
SHA25682f12a142ae214bf1eaa9805768d110352d3372b37b179a4abde0e646619064c
SHA51232368e45728398693a8047ae88d0935dd8589e9b1ad81d849289fdec2f11aa4f78858a593ca236fc2471136e5154466e6f5ca75be69a702838931149e123f809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231b212970bd55f2c378c015b5909098
SHA12642360da3363397c9d4a51a2650a30af77a958b
SHA25605bbba7cdd8f919ab0cfe983040ff2a57d6025fac43db573c242bedcf676cdaa
SHA5120af6d0112fdb07176e486649cbb174ea6ae44189d3372e73f5da6c4489a4099806e03817ea2e2a374bf286c8e5978c5c0990117b59f7988a38569cbbb6149608
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b