Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
d2b3a58d06a7f4c2318a32098af7b3bd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2b3a58d06a7f4c2318a32098af7b3bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2b3a58d06a7f4c2318a32098af7b3bd_JaffaCakes118.html
-
Size
122KB
-
MD5
d2b3a58d06a7f4c2318a32098af7b3bd
-
SHA1
f45e453c84c68360343d7d28426ddfa93029e895
-
SHA256
60b70a16a0b38451e2e094540e052cbbff6816c704dbb2f58fe0f20a30691148
-
SHA512
468a4c6fc3789040ebbf83a919146fc0c79b8f380527ffe679394609abfb461f27a03074cc9b12c9e0be3333eb742da57daf3df8d3688d50ea576ca070280ec6
-
SSDEEP
1536:ZAOHhs/5iSDLzIbmNZ8Rdo4FWO7G2LKV8ATQGQL:PHy/dLzIb9vFR62L7V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f622f35e01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0E7C391-6D51-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007bb0ada2eae329e13587d90d979ec2804600337331e52f8313419961d3571c21000000000e8000000002000020000000544b06e35fe5060e5889fec1cd157624ee32085c399f9df324c7c9c06c19912620000000ab6ca14b848b0505daa7747a8a95f43b49a67a59eb0f333e23ca8c8deab77d6d40000000f554b2a4506076b90d7847c147da8e81c967bde314be12a6c8a895fd08f12b1c83646c4f42ecee1830f56fcfa3a3226cc1b3de9c3df6d6d7b65fb65013f69d3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431900287" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2208 2764 iexplore.exe 30 PID 2764 wrote to memory of 2208 2764 iexplore.exe 30 PID 2764 wrote to memory of 2208 2764 iexplore.exe 30 PID 2764 wrote to memory of 2208 2764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2b3a58d06a7f4c2318a32098af7b3bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4163bcb8d1f8aebc1be508710ef558d
SHA122a5f2be1fedff5549e6b2f65fcc9d4d396d6b8a
SHA256510f50a2c081e2575ea874edd26be604f6260534c68c170932ec597c9183429f
SHA5123b8de7bcab1acb5af63139af3ab9316db368755fd3995846d0a31c07fee3253331bd8a92adf7069441f07705e9635b63e6952ba0cfc32472544423dbada3b27c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bde1839202c7bde92722b949d34fb6
SHA1b36020f390b209d8bd9b7f4dc6d13f822599611a
SHA256b324e67fe3c1fe9f7cc3e3fbac020dee8c8b970ccff835acd2d422dec7bff0c4
SHA5129259c259a3e5ceadc6b76913cc52229227084055343be1f52ed7ce60c72b8566897f5b08598083883d6d573bcd996724101749e8e016a445a4a12e42c987df98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef91227fa6557cded29c605dcd243917
SHA170d88b9c622faec054504474c2b2a77ded8f5754
SHA2568e1a3f6a972a2752e3355c90f15f35b0f4a3b37aa358af4e9dcf61eab852a2f6
SHA5127c7da3cf6b5f4f5c14f380d63906d20d8b1858b1e1caad3c3d5f67f9f98a21566121d79aef383518cace55ce3bffc39a54ec9412859bc4f6be9552a89cd23501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb84a73751d4bf09759f33efe2fb7548
SHA1aee01940fea899650a3056f897d47c732f9f6cab
SHA256ca2690a92457b020dc42e556d93461577eaa84876d197cfdcb00fa984f2d8427
SHA5126dcef2b7fc828aaa563cbcacdcdd2c8acab71a9e4216d9e4e1a3315558fd42e8b38897ebe78e9b2cef6b34e7bfc647228c12071ed0d4e20714c9ab37847f8ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e228b3c95e6fbdf16888166f3716329
SHA156b13ff252948b77d4762df6745c7cf250244f2b
SHA25688d53bea4c277e40e86f6004c244779d86f4faa5c553a1c000c6b038e6b83eeb
SHA512b8c7b3680fba0d7a8fe17eeb24c51ad66f261a591be1e9a1bb8ce3cca44a08cb0fa5ae79d82c4e85b8609157609e4d6e6d6fcd86c77b1204f74726d56f81c9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65803735ff0a36210a97936b38f4daa
SHA1f990e87f30da6918660cc34bf5fd7da8fcf7502d
SHA256da0b15bbaa5088d4e9c53d18607b5c5c9f7a0b1ae197778de46e2601271f2246
SHA512c0a03379740155869f09bbf5b6bf9f99b68e2e064b5c1a7b5e278d7c557a297a8627c7f8efb91f61cb15ac552c20164161b921537bd7c413d3c8a9c31b6b94fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac2adc84575d43fcc1033fa923a36091
SHA18918d07e2578649ac998119934b7e8985092594b
SHA2568d513acb8f2536e153931dbec7fa4853009cdc52d25efdb2d57eade0ab46c6f7
SHA5128db1f9dbc47bd2349e4734b66b8ad3ed76a5086c132dbb73f7b8c24a0a119740679582717236ca715ca7ed1cc4df2f778e2acf15168e104cdd1c7beae06689de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a6ac1469c9f5451ba7767ca28eac3a
SHA1e381fea0d93c217c2f4a682f32dc8d0cc833d144
SHA2566738ed0d8ee884be5fcb93a9f8742c22cd64145dc1201e209a2f4995104fd377
SHA512fa7d98c6183a4215163a035e22e3e03be48a9df3c9a51708b9609b7d02517053230e5f9c1b3fb73627a1f74ec65255acc4e3e12f3ced69453222b230c48b2766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137a4354cbada6a536b7a6acf7908e48
SHA1a5890378226782dc56d28961b39d181e43604310
SHA256dec55008c00b439f4ebfa566a14bce6892896dc4f8862bf25c1b3dc12100a5c5
SHA51290cec3d660e21a4165c57ff9570535d00f020ac4f67f48fba9c0f67d56d15736b5d61b5024845f15c22a45b98dc13cd5e873dbc370dbcd998a099c55227a3630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51da99e6851d806f5a6cac6c2ad1fe9fd
SHA142722aca4d38df2579c8a57f54cf661298ec2f62
SHA2568a3d1f7ab503abbef23e30c7e44e1a26369b0817b377dc0e5e444294031b5b8d
SHA512993d388a191e3bd6e25398d01a92b11c9f0896e255279b9fd4a46a4eb6e17cfef5accd59c474d3e960be75ea188e9fc8b9b99c54d7243453731fffa5f89bdba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d581b7868e74f1bb480374dbf4e0cf8d
SHA1f35d22cd203181e56c34f0a4c86be95070413c01
SHA256b0c6d1833aed56917778bf73439ba10a0692f376051457fac77d8fe7ca4585bc
SHA51253e03161487c3ec6d4020e3479a57206fd876e247ac61b11524e38e6fbde78f9501ea9e004396e37b83b1c382ffaee5355452a741b5c1aa60c1f9c0167eb319e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807b169ec8def04902dea6546eb76294
SHA19386cfcdd163f68d39f06daff7718b9e8b84616e
SHA2563cb19bd3050ff9580a105585d919aa175aa8bbea725fff06eb4ba704c5e82ab4
SHA512192f67eca14af7fd77cdf9f85ce4a89ca4aed1e63d391ed44ee4b38f72159238f476f82d0caa775cc6baa9a43277bbb965335c72598079ddf6e8aa63d414278e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065524c1903442612cc19f17d86d8b7e
SHA16da0f2802ad776766809821c9b722931d7da88dc
SHA2568e57702e76c0cb98733522fcf39e70df05556c903d2a470c460ea947d6fa08fc
SHA512690bb14358bf99aa5f3c92d11dc4037c7dbaee54c7fe27dc0f5c2f9a4c76815e3e49a56ee360f2aa313015ed05c8d82720e0909d65f8be19620fe2daa4a8069c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9bbe20c317af0aa22e1cdf283c06f2
SHA1c097116305d2255b12760fc9872b1789d01a1bda
SHA25693124e67ebe913b79dfba5663b47ca489d1a99cd5567bd95aafc5da4f39accc2
SHA512a79d815371d080ea740fc301d36dd6be7a87672ecba5a3208ffe21e09d821e205f5b77c9bfed9ce7a0fb576886c95b21d56967a8dff1fc1088f703a6dc6685aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f8695cb815d48087fea82d223d995e0
SHA121442679dda57d7bce6fab46ed30eab9dcaea990
SHA2569dc80aa2d5fb2e3a0fa1a91dabb60bfa4bb28a40a258ce1de84b0761950c83d8
SHA5125b74d900585043ada441d9f5e3443287bf986262b736977a40cd9830061dab4a697e4d13d4a2c85d23610911242201d7a5b6a9552d546100addcc588f1034180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecdf08750a4bc00195f2d0d2e2437cad
SHA1373f5a580c4edc26a72d5f182ef04a62b0b9abbc
SHA256f69db825d7419b0e750f30e621238c53c6b3bca798a6ce1c81a4c924809f27b3
SHA5127b43104f83adb657a5843705ede07425e894fa628e8ef948ca55f3fc60e4dee1880394f8dde6f3b0c57a88a800e4c51bdacfe9efa16067280cc49dfba80923e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf31ba8b04449b048dbfe04d7953ce2
SHA1e44d450886c3880df781c4e084a8832644c8bc7a
SHA256a65825f5fec2af13fe11ca169839701a2f047c8f7854877c2f355856dbd55040
SHA51245ed6fec59745334d1e31668a5690c41b3bfacc05a21e8248e031d570d57016f1aaf8d4ff99c4d2d9f9740066f2ee97dee21b4828c54953a49cd548736591a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c411b033f4580447a3f2fac49b379f7
SHA18f6ff2cb818ee19cccee7fc9d87a648291478d22
SHA2563c439ec191903c6344ebb49de2243c7805f5d500ac4c6ffde0bd1ce092747565
SHA5124ba1bdeef8c4cdf51f5d98a0794a6cf7b1793d554e9e96ae63d9c9aa0e499755d9551f35573cb5875fbd345294cc714991b60655d74351436bfc17a096ec8506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295779e0dfc3078ca689b3b7a0d84e51
SHA1dde6bb8b12d559b40bf3a16bd9531c518ed9ea0d
SHA256bf89a6be42fbcbc8f4ccedafd3bd54c045e0fc59ec48b838dc24bcabfb48faf1
SHA5124f711dac3327f1bc32182b769b8c946497a13a87900af62226b759b3f6789546fd5a43af6faa16bee8c44389cf2aea500826e17e30ca2fbe75c85e13d0d68135
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b