Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
d5314381d8902b054150d16198cda574_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5314381d8902b054150d16198cda574_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5314381d8902b054150d16198cda574_JaffaCakes118.html
-
Size
4KB
-
MD5
d5314381d8902b054150d16198cda574
-
SHA1
59f247e7de301b9b8cc42c91c54cd257241cfd91
-
SHA256
0dc1fa0fee06fe32a0b23a236bea04b2b1b14ba9b517f3979bd0792b51cd61f9
-
SHA512
eb8997d87952997caeb1ac95986feb0ba20d9e96cbda6e91a75c23db0e17101d14cffc911788fc99627922d0818c55629ef823b25c65e2210754170b3f5d5d6e
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oFu6d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000003aace90733dafaa34b8c3cd5ab88bc26a8635d6815ce2f5f20028a30fed5355a000000000e800000000200002000000028ff27ba1ffb89fe4528ef134c6ce9f9e24c5d4a2ed91b920074563c509b130220000000b0671e1e8370a70c8200da0cdfdcd4a89932f278a8c301197bc4be3bcaffae4640000000920ddae83cef3a542262a6e5b8b165e15d2910a2433579ea19aab28d812c79c9a5cbb3c37fe492a024af9fd16e3e9163975c4dd1ecb488e5aab5e181f71b33aa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431996147" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308549f83d02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23BF86B1-6E31-11EF-8F2E-E67A421F41DB} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2700 2144 iexplore.exe 30 PID 2144 wrote to memory of 2700 2144 iexplore.exe 30 PID 2144 wrote to memory of 2700 2144 iexplore.exe 30 PID 2144 wrote to memory of 2700 2144 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5314381d8902b054150d16198cda574_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a456fb696cc7b51ab993d39502bf0b58
SHA1739a3900699a16ce8e8f67273f6a52489f449763
SHA25677107e82670a89686d8e5df365ea983af0f9cc317ed5d4a0c3342f72f631541d
SHA5122ad7d74cbbef3381c48c9bd8164bcf63f49939826eac47cdd8a05ec25c953e2a4986d9d9867c2c28b506cec1c1e506179996432395336ed406d07f211e98b4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59693b0690d9f2837d7c4fd83e7d5b8dc
SHA149f14ac6f9c78bae767a6bf5d96f1a327639cc2f
SHA25652bfbbfbf4a7e7882721135f719c13cf00014c7d79998aa1dc1f511be941edc3
SHA5120267c7223c99bff3c19f09f0734399d0e540793e39880933a990e50199da520bd93bd7234ef0b58cc0302fa16306895ef77255a8af9047dd788e4c942e61262e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538bb12e5e3452cf494dd8f90fdae236a
SHA108924fad535aceb508203ec461e0dbb8f6e9133b
SHA256fcb9576e786e1da00b310b453fc775955de5d6db8d97172bfd5e4fdd7c53fd3a
SHA5125bfd47d64e669a9a98dcd5c3b5d3fb10cbe86101ce0deaf05cd6a0017334b1d086c83df928a2c9d2e278e44cb700846d85e7e1b02334dddcc759e0f40da5adc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a827be91717a9bd049b754d3dacb5c54
SHA1146280c2db300f3e9f155f8b126e2e68342458e2
SHA256822c577d4f94e64557c5390ce327dc28e756a23ff59fa6cabfd83e3a20f69644
SHA5123a2e5216a21319d09cc5181f492393ef571db292d3cef86687e5833b834d3eb40fc191148e4925eda491c97e645c709d7b1359416c7db0d1c6eb7b44e9eab5b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545fbb1d0737d23e2c3588cfb9930a928
SHA1fc68c3eecd91f76c5ff0b7a85274604b0120a51e
SHA2568a42d89763513eb88e62e310326cf6a1fe7ef9d104d821c14ff8ac26619d96ec
SHA512e842da4dd07101484da845d805f568402889438c52c1f725d53c1da2d2545ab205d215cf422b3f1caf59957f0060539f38178ea84ba795e8dd79ca70a3948fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a397efc1dcef4c497512bf43133f78fb
SHA16e2b3756998f49701ce38250a47c2fc494734483
SHA2565cb66f0019f069d23bf96b99befb23ce602054aed14bb3fa03c54febfb66e23e
SHA512e06fdbc1b82249222787a264d590b8692085743b2ba07b9845db89a21ace60580456bfa0f16e8b466fe6682dce3fe2b0459aa11ae0414a38fc1172536b7f2277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57779690a69c5e21256525973b68affd5
SHA1d5702407825518cd187e3791f030652dde8652ed
SHA25646afac27c37cfc9955f39c3af95bf898acc38bee4b47e72df77be607644dc67b
SHA51263cd3354b08b59fce65c585249b5ab486b9361c7e7825477339fa3fc59888dcb0a763de947adb4e3db34df2c56cb4fddb6f21a0eb880ac308a9e4b31a3cd9b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d75c5b1817e2a522d7add936899d655
SHA1313f35084f09d1da0d93a7d39d3933eeaad286ab
SHA256c4757ad1b946c11b986476d5e239f8b1bfbe742684803921bdbb875f8b433193
SHA512798b02d313ae63a7a1e9500cf52d8bf5167f088845b224692a3db8065870ed798798b05fc9a7de07a1b3c524de6e52ddb03dc66fef79d780df898aa528fcef5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c951feba4d49ba1e6a4cf83e087b23c
SHA1f2067d9be3b50e01b00aa8785687ba678e650426
SHA256147568e5bc054d71528f5fdb27a4952737eba909b9aea2eeb334d116fbcc9865
SHA512457e084f350436f15a82d836f33ff77c96e61b3bbd43f7254b26168ec132c9d839709b3081d336411152967dd07438f1e0056b45b8f38fe003c9209a913dd483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54165da1759188bdf270c6a6b93f99185
SHA1c1cd81eba889c97bfbba94b1f4b4ac4971720ce4
SHA2566fdb9e74368f8a18284c8ea496b00013d4671eea6ec0b58b6dd829d8a8b8a78c
SHA512e919617b21c47f7639753908571e3a8c1e54753290f3c7cd28eccdc8219ce46f4618ad85009e268b7c65ca91c7d9408940d8c4dae60df5a7bbd5204f80d917b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57006de2ae6559aeba368ce43a3b5a650
SHA1ac55e77ad3a2b9941d02890f876639d80de6d332
SHA256047a59cdb680d243599e343e0ba03377f88b0ec019ffbce1544c1237d4270512
SHA5127eb1962db8e385d69cd6097b180bc5adfc899f8b49017ee93f2be869c097555cf8eab467ddf6b5dafa0a34512e849a76c689f4eeac2b7752816fcf5ec6b35914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b015ce149bfd90b2fe18aa0665d0d1
SHA144ae642c36eab4eb86c37c05ec05a19ad7bd7327
SHA2562d9d43a2083adc42bd4ee8e4f31c640f10186238c4bc931279e32c7d08ed9936
SHA51253aeebb2c030fb339d50038fb39db5e7b161c04245ee86bf8f73fc49bc21d32238bbc174bb1708957376e7b8aa37b547e55ae93cc086c52c5a56d78cf154238e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1be4836a8c636551c80b9ef49826e7
SHA1d27b5223a14159b50ff41ab44e6582a6be2c9e44
SHA2565c779c43d401d0836327082d7743f4c65809bd0af6662712b6404b480eabb6cf
SHA51284c35d664c63269e0a687bc9873c49cb46b0793b8a3d34343c826b7f922137bf21c206e37205984e9e396515f45d2ef600235675f1bc2bd198a9444592fbdd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0ccc6b4c1aa923e71d76f9c16ad975
SHA1f52c7021720604d099bdd8e23214d3d29cc15914
SHA256550d9799ce25e26441ea1a9b812d09a0c0cd01dde8bacce2240bdc258073b570
SHA5122b18794788374c51d3ca0be64e1bb39bcd5ebea58d5bfd61eccda44ce6cdd3a0fd51105ba6cc79c517d7ea26a97600d0909b4db542b09caa4e4959a12fab7c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b564926be9511b456e055018c4a492
SHA1341387beeb14b0ba822c1308802410894384b36b
SHA2560a02ba7f9c52e0e790ea2e19ace6f9ec32d5b93443592e5bd63b2a1939519272
SHA5129239a9dabdd9c9a9a8c1ac1aaa74f37fd55f6d3b13f8b5ece13f4ab6e7221d2b51eea46dfa0ec612dee7eec04de588e1bf8fdf052569564afaeb808c0cd5a91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391e0813e4fb796ca48c953fd3d9d46b
SHA1fe0f27dc25bd89ab83c970172c3edeb24c8f89f2
SHA2566f508c8f3bf08a56fb7b60fce711802bcd8baa9a0e07a76f3f551e3c25d41f02
SHA5122037416690f9e3cf5033c673c951f2e96c12fc107ad4bc597210a2b253091d1429c8b786eb9bda2fdc55eb2360f75bc51e71922f0eaa62973ba3c4bb3a95f548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569bf3314cab7efa520df6e5a09cff660
SHA1b0f93465b9ec8b35fd48564405ba7fa489428526
SHA2567a06020a28c42d648a28aa57e1e17b2d50ff0afc267e085b1057d6eafeebf248
SHA5127e069c5dbdd5d42d8e9cf16f743fc45aba6c8ec55c5bada494e4e30f7cea3afd0d70e09ba2e8bcb10be986dc679406766c1452eeba1659be842f30fc7ebb686a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa50821c3e32585b7db5c8aa359938bc
SHA1fd5dcdfd2989588ca60ed9fe13e3f736302ce680
SHA256dcea9605f1e3b9828d78829d7ac2b87457331d5719e359a7f2505580cef80add
SHA512f81e80a69e51f3fb8815322e68c49ce56c20faad8d38cb4efe2b222b6d7bd513c6de1f79cf1a5aeaacbc508ab9883c7992598df57a16ec4ec0f0e8d6c4e7309c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b