Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
d275d6542a956b94b06609da16cdd0b4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d275d6542a956b94b06609da16cdd0b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d275d6542a956b94b06609da16cdd0b4_JaffaCakes118.html
-
Size
6KB
-
MD5
d275d6542a956b94b06609da16cdd0b4
-
SHA1
48e2e63a796e82cbab10bee885c5a026e8e55075
-
SHA256
c9363d0963bdecb52176b5f62a8a556ee01ac9992599bf506f3910995ceedc12
-
SHA512
11ec2858f282b46816a3e5c68176a48c62c23087216a577da50a8691129f232424f2f935684347124bb826e850f94947c94591239354dc657d75aa6f428346f1
-
SSDEEP
96:uzVs+ux7s4LLY1k9o84d12ef7CSTUjwZcEZ7ru7f:csz7s4AYS/q0b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d22fa72bfb901f2fd1470aab498ecf4356d5790a909b7949b24fe82343070136000000000e8000000002000020000000e53854c7e45b097d1533a99b39fc9c512e3c3ee813c2388b4dfeee87f9ad9562200000003c0d55af91b12c55f0585c20ff9b6cda87ef696fabeb7e32c2dcca05b734a52240000000c4cfde1a448a6661e4dfd1fa94c5ff1fdc418f0b9936281dacb5ac849f621eb6dd16e6ce44eaee89e3da6690ba51275b3aae9d5e13ce72bcac55cfd2a7152322 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b4fb084b01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431891809" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{326D1401-6D3E-11EF-B961-D22B03723C32} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 388 iexplore.exe 388 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 388 wrote to memory of 2440 388 iexplore.exe 31 PID 388 wrote to memory of 2440 388 iexplore.exe 31 PID 388 wrote to memory of 2440 388 iexplore.exe 31 PID 388 wrote to memory of 2440 388 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d275d6542a956b94b06609da16cdd0b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543bd4c21912255366e2b601a7b8943e2
SHA19ac4dba86eaf5b476a24c611c2b6014294de2097
SHA25609830bf55808ac66b96c41db2b80170f8ecf20a9f31fb956d524944812820857
SHA512fb558e427bb83c5f7b23365ebb070a83eaa46242aadfaf164a7558e7bfa56eb4d3f4a52a3d9ff6e8ae72e362184aa91ef883f5d4d435e5490bc3e64d8eaab750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557ef32b622eccebf1dc3ba52cc87d6f
SHA1182e20412a5c280b86bc587c7aaa939490e40a37
SHA25656a556c16b76f1fa5ac99251856d673d8628c7d63edf964a2976abdd04ceddb2
SHA512c4f4915e3ab47e3566b9673e95e24d217fcece412a6c563f8d82d5b4faffe0d1056a246c462ae321924d029ca2bae3197ccf9acaebd30bf3ce308d6be78ea79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c43efb9097d9692fde5ba3faefebf4c
SHA1f6c01dce5d8341a03b30b057952b04cf18025f69
SHA256cc55b444b33ebfaf0bf7d6f330fea213b2f62f4d6c9a38226d391f9c62980135
SHA5122b9d4cd0cfc8a0e5e1bdf6ed7788b5b327ccef89b691ae224d48200eec96681fcd6423fe6b35e914a53f38192927c71b2ca6c35e728dd698107d6fcafc0d9ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9df877994345a915d89fb504d0b631
SHA17a76b44a1e0a32c540af95d6c527d6c5fd2015ec
SHA2563677d3a2a2d64a9476b58b8bce733381f2470662c2ce00826eab800fdd35c183
SHA512ba343eedae4b08bbca0e704ae688cda127a252d72f9322bbf4384f023e6bcb1a57849a6a16e67c2efa4cdf84ac47e5c18e8ed469f8fbea2e73c9245b5ed5c9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02575f35038e63b8e07c4d79bea4c0d
SHA10a57a7ed8ace7c208c20b4c8dcdb4f3ee2911521
SHA256fd66644819201c19780d119c4c29de184a55ff1233205f337fcd96e4f7c211e5
SHA512d897e3978cf2857090897cd80ff5e13901f944701b8e62ad83f7f0790f603f70d4ab04f1a328ba9f9df21bdab4240ca604d2bafb70d88c5e382442b1840a785f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ebae8bff70f41d028b3861b0b14f69
SHA157213e0d282b78b99384bc5c2ace777eb38ab517
SHA256c7672cf2a7ed5de1fecd0bbc5d773bd53a5ecf4d130e9d40c2838b680e867f80
SHA512e17a084169decbaa9bda8ccef4d84ed1f164096578b9b6e7d90d3b41cb5e16bea7d57d5a82ec4de3cbd1d13e751f6f7a3b4e025c77936eca3a1d66c112271beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f526317234aa015420858a46efb322a6
SHA11211a17f5e2678bfb436b9ac9b16228cc30f951b
SHA256e9ebe2d2e4fe430fcbd817c400718f4148a1320ddbe4d6c15e7b82b40f4b4ee2
SHA512baefe9ccc9961859ea17002cbc557f03eb6636de91a3afc991cc233ae077f39193f4a93a562a4fec74ed361cd5912d545840cfb59961083a9689076ed5adee44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e9d47254358fe5558a105b918e4599
SHA1d757126b837939114a3e095765208a3166d9c753
SHA256544e88f76e7a069d1d3c630428060c188c50246cf67e46f430b1eebe47f839db
SHA512660f56e36575c1c78973ac34145fbb7b1d5d4364870cc84ae2a029dd05017f13e478eb67ad2ccccab1b228a8ec5dfd95708d09dc1719f1bbcfaeaf838afcd474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5212ab1bcf83cfed5c75fcd5a84980c
SHA198b78362aab03f81b539c77aeef40c14a21bdf71
SHA256526f3240f9ffe60b18ac0287de3e63a5e06cddbd78206f5f39a559753def8f45
SHA512247d3248dde50716b464d0847ebd7ec3eb3c0d183264251d6e862876b11d3f7664bb165cb61f17152a967b2d70d445cd51abef4c6b045ce043b032eba24c0479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf463f5a373c9be84a2b3ad12916f7b
SHA13d07a150f2bfe1f3170e8b25b80e42d2b7ce6683
SHA256df1aa0feb8713911cb2ae138bdc44ccfb16416e1aedc0b026e1fd11c7ca58c9e
SHA512928637f22c164deb376151af6dc9f3a25c3fe7d2e56a07624cc0948fb685a5c97b26456d1df45c03753bf5255cc69b95ae80fd4471bf071ccf01d72a4a4cf99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1929d1a5740f8f0508f8bc7a386915
SHA195508988ddb9b206a0eefd6526ea12187cb265aa
SHA256eaecb07b7e4adb183e916cd1ee43c26a12060dc5dae0a81f8058e4c25a3694b2
SHA5125224c564260e7fcfd05e0309da72b4809f4851dc32c9ba473d91cd3fa9e7c262275d7e4b736f3f4d155bc0c33483f36f9b604361978631471cd781b0f070ce95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2841a1bd1c10457e82577a6c76e808
SHA1fbcd8109d3a8018f2e6967b67a7b0dbdccb054ea
SHA256356e3192cfd4b3eeba65ce834960c0b4c29a77ea12fa8f6eeb567181b680ba90
SHA5121581ed0a8c242efd872aeb60171401cd10c88328c314dd9602d8cd3d16152ecf0dfe49a1e958e2c96b48bf4663c31f6672ae6e3de6b9f4154401a470c7063e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0bc5d5039a0ba6bb3b11db8b68a8fc
SHA121e9b1fd07af19e33274bbdbe676959af7182122
SHA2565cb2fe1fa3104da71fb3ebcca256c134535695a7790048ff63fdee1b57d9753f
SHA512b6d28f58bdd4b17bb5918f0eb2c56c58b9b46ee9d479537be2d2d9c43e4f2f9a286b6e1b8d7b5f7860fea90c3ee3593dce6e3844e312f64169993c110bde9642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56861cff12bbd2ac9cb309bb6c276a27f
SHA1b2c734a78214c8692b2e9128b30ac17c24927195
SHA256f17b6747559253985997bad408571dc23bdff4858cc984d02b015af9ce0534bd
SHA512373f070c3ad06898d150baf3f0176a7c606c98436bad8846c4c18a69d35cd04d6d07eea4da048287b3dd1e9cfa3286f12c4adb4ed56923d8908dde2d8254e987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2375614b0c482c1e572a321a743574b
SHA1e164f927ccd3873aca80f29dc2d2068520594381
SHA2560dcb699e9eea43fdb8775a81ea535a0ffe6fe7c93249a19253aa692513697a99
SHA5126828113b805020b99a4883700ac7c3b1975fdecafce3e54d36edd9786725f52341d9f1efb8a135ac22e2bdd24f1e9ad7ad8f73a13af0a012c9bd9859b94a4079
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b