Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
d2d87614582205210942cf79a4688823_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2d87614582205210942cf79a4688823_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2d87614582205210942cf79a4688823_JaffaCakes118.html
-
Size
13KB
-
MD5
d2d87614582205210942cf79a4688823
-
SHA1
aea17708127b0887c35a7f0b774845f29a8a7c51
-
SHA256
60a1bd8406d1f01883f6cbaa09b90a7a4044e8d962facce0d6901ce3851dbaf1
-
SHA512
ba5986be319596bfe3b80cbc47e544cd46e417d57d0085baed42e1f3d9608f185f7dd54e0ab6eecca3fea5ee36c9cbe0ad134dd98bf61d2661a7d3ceb1c20697
-
SSDEEP
384:ln8uqnGDnW0qJUkqXE3h80ZbwF3WJfUJu21G0L6uaZ1jxczq/YqLH7h4wNkN9AwN:ln8vGDnsB3RKgTcwk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004af6cb58f293674ddcc6b4f44e1341b36fe3d58a6b46fe1c8e4016157a91d155000000000e80000000020000200000003490ea518ee4fe7848c7e996c31faafc9a341a5e6ce2ffb4ba11a6ae9c0874922000000026d81e102a46d46deb323a54b1499fe199bc4b087de6a7f3bda0e97247559f7c40000000377a1057165929bc8172b4714a0953a2b2316a4a122896c6a0c521474ac16713483374f9ac7e1089a4c16166e53324a941bece07655963bfe102860acabc1f02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DAE7A901-6D5D-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431905404" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300ed5b26a01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1652 1636 iexplore.exe 28 PID 1636 wrote to memory of 1652 1636 iexplore.exe 28 PID 1636 wrote to memory of 1652 1636 iexplore.exe 28 PID 1636 wrote to memory of 1652 1636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2d87614582205210942cf79a4688823_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c11b294ada2d991fb13eef28c2a46c
SHA1a8ac47516d421e54a44af0f5b0fc97edb99a30a2
SHA2563476b2b763f98f5cc55dd541cbfd23615628ba7c2cc4c5a85ce456703d5e4a82
SHA51293f2daa7511e834bd1e26e06158ab0d094ef3dee840d61d834418ed67f31a2c843ae963dd3838c94e641b2fa13496dacd421c743cc204b31173d12fff7a620c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c076eb606cb5210ff92e5e305949b4
SHA1be01435ce53efe3a024d882665a44ea126b9c1fc
SHA2566beec502f595154e4ebeee4feda01dc79352697ef923ed7d1bbb6b8a708ec7fe
SHA5124be3ad53213d5efa2c591ee9413dd0a12682c2e3e20e7f47354c6c744ecd8468929c2fdcc176135115cbf5945cab45b6514a3b3570be0db8fb86cfa856ca2739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c83d1121909ac61ea8fe9ea32ba2e7af
SHA1bb8989a9299ff176a8ef220eda77ee4d4688f3b7
SHA256a6fd75a90772f375426e6e0b8805731910cfade6de96d7c1c1344f9e83bc5308
SHA5128c2a2e5ce3d13931b66648c0e1dbfae8f0ea1dd6ce4bafcadf02c937bda74df15ed5727004b8ed4789eeb5f78a2418b78a4501de7c3164960c73ab55855eb06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f9c3dc4fdf0136d3ed140ad4de8a1e
SHA13bc638dd89eef53daaa86a6be70b66e3553a2be3
SHA256cc6a5a77124a7be0c5c367eef1024ff54344359c826601eb5787ab7e1b25a8e9
SHA5122b60fd8a795052c54d0d0ba4fb97ec96c860c60b370933f8c8a436f4b9576cd5246625b1c06d01e62e2d902652c36f0bf2ef73f17ce896a6c71787a57c9091e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526eddc8a0e934f16f3690c0dbeaa6729
SHA18596ae1c1aec27a0468609046ff1bbb003c730da
SHA256bb38c8923f9b03a4d086ef2cd94709807226c99cf112f6618885f8411fd10df2
SHA5126b8435dee04a8dda132a355e33ad65788bf63a2505b1eaa60b21929399e57a057dc16ddfa66acd6437186ee2049391dfdb5820a3e7309485da3e2b5671f7c4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94db752e3350a5d17a67034bd48dbae
SHA13d9c94e45de6921d0f7ed43217b25996f6023699
SHA25667581c714d7b0492c4e83f3e253deca23dfbcf9f88d6157d94c2b323ea52d9ac
SHA512ee331e6138eb84a8d1cec07d9fa79bf6d50b90c2f86e3522b61025a1fbf944fdf4e12516f35e77cdba6643d1b9f4ce752acddf3263d6b169d89ccc529e2ec6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda32d4860f86c62c4416d859be8f340
SHA1a2f967739000fb75d4a5591c230b9ab45a681141
SHA2568bf14508930933f0bb01e5c8eecb8fd233e8f4993aabc4bdc5f71be30d99d11c
SHA512def4e2016aa8c83cf8420b5a7714b87b5c5eb4569d78aa99a822d26518f78894d0f7951d178819ebae1ef63be0dc7939465fd09a042f2f2dc126f629c54739b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723a0f9bb16d28cc2cdf98b12d52e0f8
SHA16a1dab2272a81831b422de41e75b42a1be9ca355
SHA256199ffbba11056a9e4528590e00b167d7c8955b327b5b8ce3795ce074a39180e8
SHA512ee935fb0adb0d5a6248a55e3ccbee30dda42985d11e4e435fb847db509206672d4682fec60ca43583dc83693ac531eade28bab73a44f81490ed5413b12c4e465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41dcf0c9a3f6cfa084ab0efd65ff5c5
SHA19d7cbd686813afc91986b78205940dc1e57ed9df
SHA25635b1ad42da05fd0f79991ae7f07ef4a47e81f5510ffbc2f2917d1c5ee1055ba0
SHA5125cc49486c97a57ec4abed57285e9bdebd5b58e3bef5a9bd081b36e612c47f95e29f30e55a6471346794258b03d6b2c1ea42afc1e043865c6bc8aaa925f9b29d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a65121e83ad45b8cc8b11db3ecae79
SHA1dad24933bbef31fa6c60e57d3df36f72f4d3bf38
SHA2563d721720ab212469cf6cf970dda7d28ba1f9d0a68cff8a444868ef6a866e8fba
SHA51273766e072e2304ca07cea07f43e5777d46f91f099c9fc48c66ca6e7b9b8c1c6c8243c213eff3f50c1b47d77fe0376df6308e9791797b00b1c39161fc5e3ed305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58982e3c6d90060608b3af6e9e71ec4e0
SHA12ad22558b99d734a12356ce344a0ec85ef1b4246
SHA2568c5df665a97b8909d7a6fea60a9e3827465afc00a3b497b95d28aeace249b246
SHA512669722ae6455237b486a3c84f885ef979f80bba481de89d15ac1767e2e39f209fdf77061350031e7439869685e035f417774a90f587d8fbb3970e1f3f423f1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522958f5e59d27afd8ed3f9f60814cb6e
SHA18704fec7ce5be55b8fadc73459272d9849e95859
SHA2565c111fdad8c3574f4025f38b077a3cdfedd101bb6587000cab325fc68d3ca9e5
SHA5122b735de2d137134e75940eac0786bdf9ea424e9c65ee5b70f7bb79d637a82ec56207e99786e4897cb4439cd37496fcea5a9ba3afc3a121d6783dd21be72a2d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ec399c5305a9415085ee1c8d469893
SHA1835c5dae5e05b84325e2b4fd49ebc6c2ae28b342
SHA256fd9152945e0405e637e330464cae042e7ed7cf7d6779540af052447597f39062
SHA512453aec24d0b8d3b67c4c055811e8cbaf39c5971f03a879722843a4d85dde9d2bb4eda8c071071c53587441a1bfe77611f4476f746fa355d1c4f503ca2eb445ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e11f4d94a3e674c5dd5e3c1197410b
SHA1afd48e44d8731faae2cda2d2b04efb99e7276a29
SHA256c277c9569df0a40f22ec8a3d36ad91e366c10cf2370e51869df887cfb3a3719d
SHA512a1c2f1c7e92b8acbe904de160f60ed94f61204d621c71d715d2aacc2bafd86305602107f51b0d9056ff229b9e521c9406d165341dc53628b844ad114bcb904d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cba0312715a30f19de6e7e772a38ec4
SHA1431ffc83f668c899b46689d27e0198d9a8da7007
SHA256462957600bbd3f433e10d9c67db12d9468d6078f9aaf23e3da901384a8d365d1
SHA51276af25af3a31bd2b964f11f3f12319e350cc86e44acab2bf82a4cea54a6c4b81104d0f7941289e61924cc37d5905589ad0d267cb56e9db012b51c59846a271ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6997c54c87cf66b55b484fb0b7eccf
SHA1bf7abc99200e1d7178622a0d3406561496bbea39
SHA256a7d6c36f0fbf3f725c23a6d86b7884f6d184424adfb97368f926fbe9dedaabbb
SHA512774f0661269244546b2db1b3a6d3470b7979747b2ef8119bf9fdb36c4c12a6eeec6947def6af7cbbb17dc7a890588d666813b906bacd1f92c671cd362b1f6f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d820bc239f6a95db864488dd9a751b24
SHA10177fd840132216932510fd8a21079420f8a3202
SHA25650b9cdecd3a25769dc6d8cf3fdb28afbc87dcc49a241f65d41a8163617f8b6ba
SHA5126f195509dcae81df5a0b4aa17c0abce3a306d6ea45a745db287ea5fe60725a9042b65a1a70466b28daaf5d9a5e7097778ad07d19046552482aa21cab0ac6156c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b723ad5cf3949510e1a7edaac0d1b36f
SHA11637d5035ed5e5ab05e307fbe1a3581f0425ce88
SHA256925ade445aad287aa5d32218a40e3abe9470e217c9433365b3ed9d77ab9595bc
SHA5122f301e056b61b7b26a03a251e29153ef4c9c2aa13b6005f7ce37402f363c1896ca3b567d677f6605dd15165d826544da14de0cb47514f71531caa7ef0d25d946
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b