Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
d29cfe6a9ff72e909111f6f35d58a549_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d29cfe6a9ff72e909111f6f35d58a549_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d29cfe6a9ff72e909111f6f35d58a549_JaffaCakes118.html
-
Size
6KB
-
MD5
d29cfe6a9ff72e909111f6f35d58a549
-
SHA1
1a47d8557aea064aebd978bb20258c741d003600
-
SHA256
469c1a997973c8b018fbc4decd4d59c3a81c1359840a1ff91795bf1d24f30fd5
-
SHA512
c189df6769b22f20a6bd2be8ba35899d1de2b46c2b840c00195682e00dedcb54c1bccae92ffc64f36c5b4cab6f1bfd3d115f9e2e4e065553223afe2a5621df12
-
SSDEEP
96:uzVs+ux7XWLLY1k9o84d12ef7CSTUHp/6/NcEZ7ru7f:csz7XWAYS/W4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d3298b3be29119f1edc1132e219af0b93f2068209a7b7128501b0358553bca31000000000e8000000002000020000000dea8c6745397d8895693d4e9437b05ea8fc8394e5e57dd924720bea7f74827ef20000000780132328184acacb20ef8a277af21b9b2abbd9e9e0b5b62b5bff3d523f81057400000003c1271cf29e7b1b1d5d7e14fff893e1ccaf38c00a09ce59d73da2c9567b470aa20f774ae6769db7e9828d2c65def72bb80a743230789a2c8b36d561cd571722d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431896905" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e559025701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11114A41-6D4A-11EF-94A4-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1880 iexplore.exe 1880 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1528 1880 iexplore.exe 30 PID 1880 wrote to memory of 1528 1880 iexplore.exe 30 PID 1880 wrote to memory of 1528 1880 iexplore.exe 30 PID 1880 wrote to memory of 1528 1880 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d29cfe6a9ff72e909111f6f35d58a549_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033e732aa54a44b3a6c577554caff2af
SHA115308096bb1aa4a5a35933b0eb8b42989c036cc2
SHA25631022c10c37590ed5df29806313d46f1aa21f22355dce342d43ea1fcc70349b1
SHA512f655ca5bb0b05591fbfe5a910ebbf42ef799378ee33d5d3fef219a83dd03ab995759fad45074f214da738456f3d8b2f8f8a41a5979a8e530951d594c9b1836e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf68c5cb16078db0035d2bdbb1923e6
SHA164cc3fdc1a63cf376c70e8bfc9202959bc62d19d
SHA256f3918b93e268f17b4b3b6daa7ed8824bec01f9f2e74328485570e80938a0bbda
SHA51255dbc2972a7234b69345c82b7539a4538f0d6cb2ce8b5d4265053b6b445cfd60e197cfaa365a6f488d3e64ad9a3f97dce0a49e4283b30006086158a003874e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ea015842217a8d67da40281616d298
SHA1afdd6cd09ac590f476a8a52efe5e5ddea21132f2
SHA2561c712a88ae61385079bd3e9e9325ddcf810c412a0a5ad38ce452cb7164523e0e
SHA5123367d7f0b9d3eecc71344fecd9dc6700bc5d5f91eb5fd901c3037f31856deb2ba6e4499e7fe2ed5c340080d33642a53809e0bff3200eb7b0f76ed11a7032324c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ceadff5cdb79352ff42010e234937c
SHA183adb294fc5c6765d68e39ebeb22b3fe62bec343
SHA256ee065e2ea5b6e161a72307f5b0398e1d32281b1ffc46ce0179de148b00518f5a
SHA5129b3f92a946414c18706896e707f962218ecff9c9bef125efdae3b22e8408aad1e4827c8ac33e34d4b7a5d8860aa2ca257cc2497eb832df6f8bb3e5a72e4dd6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c662745d08473e18288e5d6048bd21
SHA14dbfafb365b917d02ef56e32b21497c12de9d1f3
SHA2564e4fbd9b24832cd27c7492f0e880dabe25a1b1c22cbd987a00477e0ba71f79c5
SHA512029ad4697a1081662d828c1bace4e9c6a9b59e018aa31add03211f44d011eee84e1a4975e4333ef5acabbdca44bdeb5d354397e7aeb242fe3890a78839f2e258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbf464cdfeafaf0b30d80075b7e4ebd
SHA1b7212c48b22ac9c79eab355c5a961b42e7125bc7
SHA256896d04cceef10ba2fa8a97e7b16317436bb473493a3890545eb16bc27db3006a
SHA512083b684ae15c4d15d34e7fa2844c8b6e89c922b764426d92b9e63dd36739f96467d4a91655af2c43f46276a81b630b4c1d1b248c4073164056028b55b61b8ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57595cbf8db0717b4d5b3a872082d33de
SHA11a365f647578ff311baebbfbf0145de3995a8e82
SHA2561bba76f345f50d033f138abff15fd13f6452be42ec591bb1e3d67de839b2da14
SHA512d38c8978075c1db0016ee20d70b2837076070a906d9463afdeb3e3def0bf4a6e51307fcc11c3b4c8ffbda982df213a9865f41810576061dd3dc1c61b0280a71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a34efb05e59fc59c0b35dec23dcca8
SHA1f70106c455a97c0c7b500f76796f23c1ad499e4a
SHA25602f4f3b59a1478288ef7593fbab1d692e405b8260047a585c7f3a1604fe72a4d
SHA512df250229c38a3fb7e3531959ace0acfc1838a25f72ef7af34fbc678a173704425ab5ba305c2d6dedcaa228460c3e2402a4e84523103f038d502afd95d319cfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643f639de3e7418db85bcdc0b6dc6136
SHA1b78f6fd7def92953ef9192752ad807a11cd273e9
SHA256c33bcf4c2b129cf585803dbe1cc05475dfb28a5b263fa55f39622b2e36390255
SHA51202fa8a2495683db127164f412b2a139597d2aca30c7237d2463901293dd9af4bb8d472099f02e21f4f03ff16c135aa12d358e3126d3a60a369898a50574adf7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572922d9bbb9b661405158dba76bb50f6
SHA14e3df6028be32deea32737a7e0416903b50fa0f4
SHA256c0a895c252271f4dcb1898a70e7b1ae96a6ab216f20e9408bdabd1383bd75bbb
SHA51266c7546725b99698d0383724d3c8b74469277fff6b91204a5fcc9d0ee84c0419af82c1c1a4aa484ce36a6f080c8eb62779f34fe5702d9bb293cc8fdc1a0c8048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6d118114ffe31a5461758a583b1d21
SHA1d3f0e96de2477f2df258e33c804a88c7ea593108
SHA2563736e89272f87ff36c65113108a7b0f000b9fd09fac66d27c1ac9632f722718a
SHA512f7cc861e13bdeaff42371c8fb56d42774117870ea784752db7bfa35c25820ee2d46648c3a68a14e0aec625305b2e0f5d9864c181af1bf2bcbb4b297fc9261d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb3dc76c95a3e4e881fae3bef4b722ff
SHA1bc5ea9c9d0a687e65e191e52351fc7f7385e8321
SHA256837e9cf62845fe90427108f85ce64946636532ff5d629571381e3a5c351f175b
SHA512144cfd731b2e50546fb8c75c86e216e9b5a0a9ce9fda1345482942fc6ec2ebaa7d552b68f1e42f8c87223c3ab5a47a123749858c2e8f17a1b3f712cbef8cfd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6994990e75cd403b90b601bb00c0d56
SHA176a2fc9f0e3ffe24db388cd8c76b7ad1088cb1eb
SHA25697df9bef9019ed21d3984a182366678b94c6a29aa5eb0d691bda269a9945f94b
SHA512c22f9b427799c30195e49f55946ca4818eed36b5e59d349faff341f0c05ad6389cc575ce994c27c1734c9c365a6d581b380a894b99836d364b3277d6769a8203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4bea3e61b73c2d56036201d6ba293c
SHA15ceb0cf2ef7752ef7f013c0a1ec7d9b67184b490
SHA25627d00bf373a4f2ac673cd626aaffaca90511a8bf5460d59f0cd994c0e51d5c09
SHA5121392ac6c032969d7d9bbf9a08eed6e64112340b7c9bf4ca75c7b7d43b3cc6833a49ff607fc8f97fd919445e3a5b93b828b5fe3287fcb930adc3286ffde0a0841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f7754f51e8f849391556d4595dddc4
SHA16c9b5d47cb286d26a6eaf8d03f63f31aacda4b48
SHA256916f4af9291ab986c17dc728e3144ee6fdfa68ef9666fecbafdd7f2669267abd
SHA512e7d5310ea42b1468e7b06ad73fdb775b75bf9b35ca13871f790887d257bde2c0a69b641233b6636274b039b8ec6f4c6d4c7a0b886e3fc8de396d76a584a63b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acaf9e4e8abee2fe34d5846a4ade6f79
SHA1bdb7a1168f0bcd122f5cf12a242f038170f2b4ae
SHA256ed65f192fe23fd13d5e15c7be865d28dbfcb9d5c4688b160111c5f4fa6a854fc
SHA5126e8b8d562fe54eaee7545d3bd74543194f61722ca708f2f84705a8306b918ae905d6ed6384046c3660e99bb0a96a268c2079577b189c17c46f8838d7d288d810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a5e510d2dfc0c79f89c8d92ef3ecab
SHA1fd4e565c5982bbfcb0d8f52d2363a3a5ade20f3c
SHA256d1949700ee07706d4d939707ba761b8ab1d85076a6e1a48c8b30cf2ea7fd8fc2
SHA5123f1fdd237e0fe4c5e65b8a16353a48bc3a9aff2df4811a319cf51292de70f4c6624b96eef19473ad770740b89647803787d69f4d99bd2a1d17cfa8be509a4cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084882b51434d6207d01cc6add1e92c6
SHA161db15b9ee093663a423fcaa717259d0f9e6eb64
SHA256a33c4d9f0f1a3ac8d6ea4cac7589f9668e0a9c8e8bc7d29163078b56b2c0b4fa
SHA51242b73f92dab9d41581fde26ba6af39664e90db57e59d9283df372d2381d0b9d003621a6b01a6d4fb6d5a236580b14dbc5dace85ab67d65046beb90fe26622481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec563cf9f1549c5efc45fd3a7a894639
SHA18690ad22fe3adab1121859b98daf54042cc812b9
SHA25673e466ed22ce246a382400a65b6231256413a61c2b7b368bfec7157af300c141
SHA512dbf9e89850fab3241a7a7d1dc838f0cf5961a1fe16314681713dec8f9fb84b8508ac03f4943baeecaed5d29ae537ced35f124699629d725df8b994326c7ab413
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b