Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
d2a725124e0b947b078d32d5d4290bfa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2a725124e0b947b078d32d5d4290bfa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2a725124e0b947b078d32d5d4290bfa_JaffaCakes118.html
-
Size
14KB
-
MD5
d2a725124e0b947b078d32d5d4290bfa
-
SHA1
b2f270b984f9173418105366ef87065edbfc9adb
-
SHA256
48538e6c0ad7c7d702b995e7254c6794d35bea15ad8584923c157cc32b7c2aa8
-
SHA512
5a85d63eab8ea11d1a027baa6a755f8b44975514e7cfc0db0f360bee07bd7604088a768e9a7eaf44404448f71ecfed1538c3f4a71b66a6f5937a50aa1ed604c8
-
SSDEEP
192:JuU5tMEs3Ze6S7ns7g72w6Wg+zBv18/dXiuqos/gzUYienNF1rM6T36t2tG4Jwtp:ZDsMSuqe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431898363" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77E35801-6D4D-11EF-B0B3-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000def6b2b2c847192aa547b9b511ba9fc13bdaa05fd7cbb5407806b522d742a3c0000000000e8000000002000020000000e8d876a9aa47374abbf114f8b49794911c0209497254701a07efa1b9e435f06520000000b2b9ea04064dfb317d3646477b5ee656b3971750b8eb9c45592ee69f9f19685a40000000d3d1513eae1c07a62d1a75e0d0cf2f5128204ad22c0e50da58e80e4431fbe799310f5ba33b753b6f96ea8507140b11bc213ecf080434d4deddd068e6d3c4cdf1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50526f4c5a01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2672 3024 iexplore.exe 31 PID 3024 wrote to memory of 2672 3024 iexplore.exe 31 PID 3024 wrote to memory of 2672 3024 iexplore.exe 31 PID 3024 wrote to memory of 2672 3024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2a725124e0b947b078d32d5d4290bfa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506923ddad20b86d41af63722ca6cf82d
SHA1d4964ca0629ea68c05312d2048d815774df596cf
SHA256bb1f838a831a030980dcf4dba5786cdd5eb72745b5913907639b91db1c2b4410
SHA51251ac92b10e591d3bb1b4743dde9b253423f5ad95101f2d9e2d8870c4b47403834fe2e6c182150dbcc1fb52877b355ea274b5f80f06590bd9f1cc77bcabab0070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d205dc9276b5b4fdd0cbfe2631ce9af
SHA148464c171fba25f94e27d1c7f6077b418cc14c5b
SHA2565f6db3026fdde145d1fb366f3b0ad0b985b97036e10563dd6684704c80ea70bc
SHA512ed4f93a4ac3275a9fc4662e6907faf94ad502cf3942d511567ae0fc7f1b537fa3444d7257df9c1a0b5badf0bfebef07acacaec489bcb6549ddfdca86deca9264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f197d73d70cab2d4d1ce3180fa3fc3b8
SHA18e6ab0da81c1d5d3f4cfa81dc1c898671f4d49f9
SHA2569793e6f64dc4685d889944da8be2e0ab9e8f658f0d64d65eef92a875e5959f72
SHA512e3855b32c1d50e117bfc863451664060792c57f25054292f1c8fa1796d5481ec9d64452b14c6611a026bbf1e92c756fc00e223420cbfab64088ef7f38f1a5868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576939ef705874e9699888ec888c344f5
SHA194b60ddb17cd07c846754823ac1bf7bbb4d63571
SHA2564777cd4f307a14e046e139472afbba9dc04666edf9a86e7a2591b58f1c0965bc
SHA512dbb7e3956e1674144e22da69173fcca75e1910ec8c0cb5d78bb5841729b2145efd6f86da2d9619749fe02794a6c0f282d29d96892979f42afbcd14c0c316a23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68bf0443a0288faa94accdf0fac5fb6
SHA129462b443576b24b03fea2dded7f33aa2d0fd02e
SHA256abc80c6008eb5ecb6cf2cedb8dd21f614b1bd2a178307acb7e6e8ea1deae555a
SHA51279756677e5f031070ff5f62ddb5d49062d2fdb260e141ae6df4bea7e20d5a0d003fae7724028c8bb689e371fe6a2d5bff42abfd378f140e76f2ba462d1a5517b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d1eccad0714e1a1158f0d6960c4bb2
SHA1ebbfc72b295c9a69c2d425946f54ab864446a3c2
SHA25676e0e501a298e81a94c48a69426f9f630f059fb7f95483c325733e98916895d6
SHA512defa787f0d57ef2514437422c68cfd9467f11a567356c779f4793619e0a57fb49a354f725a1031f51c35af8d5b53d4282630bca967ebc20f371f3828f93fc31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd11910695cc3020a24c49c48a85677
SHA15d19a04bbeb95c6e46e6ba30bdd81368f7396104
SHA2560a2005e159b1bb99b55851bad79cbfa2af2b1c9af158daf229b5617b32735774
SHA5128aa1621041795129a5445608f64ac05752c28d0049a756586f9e5cea4ee2d0fbad3a262e50a7419f87020fc945479332d943357f71a5a54a8440a9d89bc3a9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5948aed7fda49855b3b7d53a66f06d2f8
SHA18a39226f27e987c1b6874ddf167949f9076278d5
SHA25629c3cda48c9fec5d67944baf150ee2c87ee2ad31985850503bb53d948221bc35
SHA5124d9d1c0e3825ce0bdc66e2ea884f2c5a30a00482d6a3f783435d9cb20fec068f3c380d3f39ecec8e3fc7dc2b0f4dfccfadbfa7cbff3cfa8455a08c068f66d649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53febf08fa3eb22ab58e710cbfe951725
SHA1fe3557c5c49e1baa208463daf10e71ff43cc91dc
SHA2566452092866a4d66250aba4febaa0ab4a27aa4a9bed1c22dc60d5eace2bb120c9
SHA512c79afa708df1faf1b83897a78cbbdd801729220bd30821cc5f6173c95a6e5548bdbfb0ae22d22982b8f7ef33679ae2bf94a938ee07806ce81ab616cf76cd5f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1232274a55c2e7f3a5b130cd073cd93
SHA1097d797d70f0ed2d83b5b29e0090466f662116a7
SHA25601dd738191f2127aba2e8b15e3cc9f7180c0f042f71c62a186f1f411557975af
SHA512d09b9b234a5c20771289a90554baafe2e31eb8b2f390143c7ac8910bfe9455ef17075f726852bf25ea7196042151c9f2685157fb880e25e738faa098c885319a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515604f76d2be12664aa96b3e934bdad7
SHA10a435b8d9108c76c8b533f32f1c1b70082e1fc3c
SHA25667a71ea37ac24396a9b54caff9cdb6b2c00744f166180c2382bbfdcea3735483
SHA512bba0e014e1109769c92448c95e40cfbf021a73eb39a447bb348096246a8a77ede95e0056cf10f3ca77ff5285e9f0962ba918dc26205c7d6e69ef3a39a683cff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4965f966fe05417f56a3747944a85d9
SHA143c96684cec33c5a6f1d5dd9b62c7ba5b3bb541b
SHA256048d4ff4c482bd293163b42d1a04ee332d7347209657ba57b2e9b5b202c49d71
SHA512b736c592726ce1d24db22cf56a557a882f8b57a3740616e1163d156af3fbefa3f6a3b03945ac85f3d873614a4c14e138828a060f82d070d6c6feb2a4e7a25cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50108e595e16a74468bbee1015fe68613
SHA170dd93798b15abeea2478dca4813ad2185c96a55
SHA2561ede1bf59c26ec4b48996779d378b8e6569bfa2620d4188fc09f8581db16b9f7
SHA512834b0ca63c328bc7ae2d9c9c89d2e32bd67e638c979ed18a608eefbdd36794d87fb756ccdf2df99739caec14277dd2f32bbbfb0607893b5f0b8327e02af9cfa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a546b2f9d8a674f08ff5ce7b4b15715f
SHA151161431905b7afbf3ec26294f1e509814ed5730
SHA2560418b8d8301165240533fb019f7847b7d1f15c2e05dcd80b41d4151615e981f9
SHA512bd56fe0a4c988c810901debbb398ffabb8f84391b52a0ba3654e050d4e1064f9aec51d674aee9e3e6613d916be278a05191791c8773ff8528daa67ad0bd01607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52817980cc1646af4c692450bace5b2e5
SHA11bc65a03a764311b41a5e15eef4c0ddad1e5e648
SHA256be2a9d8dce08ee1cacd6c192b77f1f481fc0414c9e3355b86c441b79067456d8
SHA512ee75d3688cba2491c038d2d0176bbfe5ab1a2fcf72ad13dbccdc6d146b3c6313b7f19da138683fa3f82c03ca341aa07f02eeded4a1ab762433c52d35dae0cf7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58163066ee3fc9e85c903c8441af30207
SHA15cefe82dce7f8010c13a31f899fc6e4b040d8ba3
SHA2561b7a614f0617935c00f8c621dd16d143fe6196d423a8c4f9f4d73a0a439eb71c
SHA5120dec1c677ce563496bba8416b744fea8b219a1ef3cf21c6fe32c9cc11e8c937e1133905130ceb86437c39bfd71c015fd3ed081a44de9f01005cb0945d6484e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5514a6fea6f0a7181b98f965c5fd8f7b0
SHA189b32179f2faa82cbb53a898a23586b8a2aa3d4f
SHA256cbb70abebefd03c5196c083291e830fed2c05ad18a3fb477706b1b0c3e075ca3
SHA51275cc30800505c8e39d8f1791ed78e613d6763fb13a10eadb11883e23a21a467bd1f9828714dba58ea92c5abd7a4d48f390c600531a43ab2d870f1916a5e7a6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee7f97e1bd3c576c50ca84ea4fa3ad1d
SHA1c823b174064f24ac79b0c49d8a8ab8336eeffc71
SHA256f1597204280d131699b47407a2012969c5f58092b134c470edd3b43e501b3c29
SHA512361e0ded164d6d73052c77a8a4de1e947d28ef0b6c9f4d6cb7784ddc54dac408f5b432d5f007303792d3ccf8442f7b5c1fc8acc2fd26159f8aa7f769431ca142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5529820c6364d3ce27e4cafa3c8e57483
SHA1572c86722a9f4376e23cdbb927f1496b3d5ca042
SHA25637fcc9b103aa96c74b518f0991e053b8bfc4b95847c10982b653d39b4f1aca60
SHA5126fde9fdde06bbc4a91bae46117664b1da75db2165fdef23a3104917edc8b87cad9cef18d5f315ebd839d0d7de532c150321e6a49b7b7aaf10121dac17097130a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b