Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
d2a7ea5f7daa1f2008dae4dfae212768_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2a7ea5f7daa1f2008dae4dfae212768_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2a7ea5f7daa1f2008dae4dfae212768_JaffaCakes118.html
-
Size
67KB
-
MD5
d2a7ea5f7daa1f2008dae4dfae212768
-
SHA1
0ea064b2c711576516b98cac049c83e41e32029d
-
SHA256
093801892f26038e8c7adb96e8330510d61237826d8d126de4039e863dade302
-
SHA512
89796ef9922dc6b4a5f7bdba71573185404399d738031df601ade86b4e79481e1c7354175eb0d08205675584b0654545d4cfb0e31e9ccc72b5cb1eea52267c42
-
SSDEEP
768:JiegcMiR3sI2PDDnX0g6sTltsoTyS1wCZkofyMdtbBnfBgN8/lboi2hcpQFVG8sM:JaLhTzNeD0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7AA7E01-6D4D-11EF-B120-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000049d6e64498956a167acc4c6992d606f6bbcdb86641c7aa1b127fbcd90721e3f9000000000e800000000200002000000085092c13f4810f562d8fd409476e052155b2af61fce203e9fd1c46db5eb770e720000000d1b7b414adb65153fcc45b8162e4d05439a41e4764cde31abf1f1d1a3678761540000000672d0846755d02289a91997aa388d1dc7a47fbaceed833820f236cb086d99ded3550b505627b89291792640d82f28a9386baeeca0087add1670eba0ab9716f90 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ca458c5a01db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431898472" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2744 3004 iexplore.exe 30 PID 3004 wrote to memory of 2744 3004 iexplore.exe 30 PID 3004 wrote to memory of 2744 3004 iexplore.exe 30 PID 3004 wrote to memory of 2744 3004 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2a7ea5f7daa1f2008dae4dfae212768_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5282f10cd4795e48c9efb4336a30adb01
SHA1a6d106e0968cba4e2b9c05b6ed2f0675c99ea4c6
SHA256827dd810f30ee972e8e68b9a21fe72c6167b4c0d5de7c9a745a5b83cf3672bed
SHA5129f5bcf0365d89c81ac4dfa1b78434803e511cb507e78ac3dcda3588db1bab9f2498c13c2c1e7910ad2bd0024193979226a64a864fc677fd0cfc6a9eff2f1c561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a7f11620b776c537ff9565bc91bbf29
SHA1a0c58bcef2ef94e561c67d835752abfa530dfdea
SHA2567445c92d2c6b964b5d11639b6382ef125f9da22eb65a4d2de6c47325c4d579fc
SHA512e3d57b2379dd8d6bb1cd4030ae7114978dd95c79be2418c3d2ea2c4af5c5581255b5ea23f1936538e8e54a5468f9cdcc44903e5919ee2c1976f60696aaf5fe31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54621324d79df62c1137287987145a22e
SHA143fc1cd4d4d896ce5e79ed3e97526ab33cad8249
SHA256f457d0e476f369306e63aa89ce52cd0f7be6521018e2a29d215e8b1c661aad37
SHA512f73275f6d8e06aff9827cc0d0bd7fdc10ae38f29cfb30f011095a7d574b2bed91797575d770171d36e53b74c1257438b3ed7c6b469ac01b6a3f9bb468b25ac9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c0020c0e13ac65ee43c88be1bb76d9
SHA1447e4f07b7ca6ff5fcb76959606da3c407454bfe
SHA2568923c6c4a2c8659043d9da7ead685996d5b5e3a270cb1ccb88156afa643b7603
SHA512696fa0d04eee6e1b68708d64135f44dccd2ec4fa09c7e126de25e5a4f2965969c40f6f75756b7b7088417d741f646ac56a5b885ab81b4774c770f2f9e9d8aea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efde50eb88bb10ab9d1c50d325a72614
SHA1d78dd48f2801052f241b55605a34e0602a743a26
SHA2569b873de5096612ed78061efcc6757848007b76c5a0eb55a14edf57fc514b71d6
SHA51294460180b2216f5e732c7076eecc3a3ab0d439a73a0297cbc2d377cd4e113aebcebcb03f0320ed6238284ba38da92ffd6c587e15bd9652532de921146debc070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646a39ceb1c4f6c0129b0431fa52d4f8
SHA10a1aeeef64cd258a45997d61d86d20b626e9b82a
SHA25658fa401fa1390ac14330ebd97f30922b291e0c2c2089a10e1c38e2d6d62c64a2
SHA5121546700406e3781090a83944f89033b2c2d1d12298c771c0778457bb1fb3d60f69536547dbfb607353da5c8a602999653c7d873877c51e4b372c697ffe2f510b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1d74be12f2ad2b9205eb38ccbc904b
SHA1367f7a0c144bbf137f7740d0c59f78044c99e385
SHA256a583eba67e89e4acfeb1f7bb364a63cc82f679dcf9504fa63bc71d2811fe1f05
SHA51230361b688377d24082d7c7b882fd565f9cf6809c54692711b045544b630ef22cb30586c675db0a6ee314e1632fb0e59ea3c3ef262b547edf46335e88fa0d9937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea606b73fbd5f99040c89e7931d2854c
SHA13208327ea26b589d3feb195bd83b69500a254623
SHA256ceee254e4513e2bfcd37df1c423897ff2ae7853027c031f8df1e942728e790d9
SHA5124c9c5a0a1e441ee2e058f7f8d564215e1e714bfd6f4b55b402dcfea6941629a57cabaa4623a90bcbe7509862267e8738f773436f33eaf528ba9f4fd75305e8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f52606a8ee7e600ae7a6ca8e36103aa
SHA1e49b3259889874530fb294fb17dfa1001a556898
SHA256e73a4f7c2b42bab7f31772999a663321e3cc62e6346df0ab3aef8050792dea6a
SHA512ba245fbb665c9f50afb2fbf21e578988ba99a3f54106a0bc07af4b38029855226ac6f556bda7d4122ea032fde5cff0fa3b4ec2bb3452ffc247fb70e21d901a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ad8ddf4c3e2383e01618ceee72c6a5
SHA1f6c0517c5681d4c83261c7638559b81e694158fb
SHA256844752dd99e0e0ca4e2c422053aad0b8827e99bcfc0cecfb42bd619160043366
SHA512ede234c8bd3472464177d98e4227563212ade5de20a05e860bd6b79afc3160a9c3a544bf2a812ab40877bd284c03c86b43d27a6e63d4313ee9b227718df52a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29236158668e14e764f1211118d2043
SHA1a4f3049ca3c949593eb880da5400baba2320140f
SHA25636cbeef67b42cdcf29313862f698a716f3c029d1a37a1965bc5e2e1b46c0d892
SHA512e0916981b2ff62592b1c135be92efb782d4b2bdb0cb04b221e1c1aa4c120c643dfe1ed65c04c79a4a5efd11254f9e56c88b7b078e0f9206a5f5a681cafc10a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0fc222cc1024a4e058ed27f9ea286d
SHA17bcdb3270ae25d060563f109f6bc7149561a36b6
SHA256eba87342905ea1099e3fa0f659795dfab85b618164f1ff81a74a115424d4d124
SHA512b7e300009fdf7453b3aa8c30cba8f99bc4cf78c35b61af23ea0eb14e07236be8e0a45d37e1146b7e0dade4c3580c72fe56f6f366e5c6e845e0daa61919051694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba4fa70a6e97fe32c26d5b5e1d545703
SHA16a8c8daff8b5f2085ba1bad07a4daf1aa1c7aac2
SHA256aea78a862da04d582f162ed8d10ed52133bafb5dd2bdec365049f353f4b76240
SHA512fef10bc9a3024338a68a3b70332f0862046294450577664a3c95eff92f15c379a3425d4fc93628cdafedb820e15f8b0a65a367e3d11fc30aba0771e02c249775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b46e9d0dadedb2a73a92286a5b891a8
SHA1da2adaed111f5720ff7645ac13a3851f72a53967
SHA25678f7bddcb12ab6048a840c0c1c9408a45abe196917647c1e3c799a52c340a887
SHA51220c4cceb6b98a24806a0e6b1461dcbd5a736fc9cb1e151fa48225b2570a396e725385cafd7628e2b782af5c862c33864d233c1e864269057b810185e39c484d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e02ec73bc176211095f5958a6c6c1c
SHA15aba7e82549f135c499541e48fb5f896550880a6
SHA256b90bac65c2ebb42cd7d5b175a87bd1585c3c3b9daaa354ea481f117dc9334c33
SHA51247ff9e5533dc2ae6f13dd552ce667880e9ee62ea0907a3484d802c1491b52a6ca89901c2e9cb1bc0bc53276bda71618a65445757b60e892a87e01bccd395ec83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076cfc9e4ec7ddde42538db10675e388
SHA1dfeb3979992bdd87b6aeb2036f8f6a0df6391ee1
SHA25694cdb442df23504f0ff1b542e2cee67a231e15aaab092b59829776f2054bac6a
SHA512aefdca74123a2e4e8a331f496e5fddfb21265893e3332d5fab22777f8452cbc5e2e98604ee08501b47d5507a5573607bb39f4f2706c8367b3bc682bc0741794d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56087df3e108b1420e48abd8b77d1125a
SHA1d1b7466cc4c82fa9ed3578b0b620d1c8e074b506
SHA2564274855c8ea67e27a9c889a9120c9944ecb7d127c6618d3ff7a8cdd55f5d859c
SHA512e2d05626234d2a9f5d03adc747ad023dee02b545eb31bbd195130df875612cbfb98dab052e473cf92abec71eb1c5a23a1b27fa0ac63144a4a7926e88a0148888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f91cfba1e7aad613dd95bfaa6fe6e7
SHA1ddc438d346b62bc4beeebf14cf3992c77c476f91
SHA256efcd0014b38b7e0b6263cdcad404b26c688c1ded12843f505cf2d62d52ffaf8c
SHA512c91033547ff15027e891465b5d526398702970cde360c62d9757ec0c539884b50cf22318bf4d615a3911505b00179b9b81f29f1d86ca02caab3618aa5ef4d585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f02f6272d5c517f72bc84fab7d2b00
SHA1931c4cea82c313da10974d0fd4359d8ad87553e2
SHA256f1062d3d98590fa146e962786addff4a3fa9b6fceb7be04f0d36e81d23d5f14b
SHA512c468e1bd343d353d3eb8e81f19d906dbb45c8dc91c662fb551f91416628acc86c130bdf15798ba9f3b2b535fb2abefa76477297998e5d9b82c63945f4789c76e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b