Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
d531f08a235d615472d1b43ca9601fcb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d531f08a235d615472d1b43ca9601fcb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d531f08a235d615472d1b43ca9601fcb_JaffaCakes118.html
-
Size
30KB
-
MD5
d531f08a235d615472d1b43ca9601fcb
-
SHA1
7aa0f4ec70a8f34f33d1d9fb1d0d40d998d133fb
-
SHA256
d9f09adb2c33370541a3bbe50ddcd85dda5cf0c15d154176aa2a6c7813557e92
-
SHA512
a52d1540808615ea9539b35bf8dca77d9943f3ce0d30a20d8dd15d89e23251fb1b978728804c8ee1cad72a078a77b739fc1ed7be15d6acf18b1461651b352cbb
-
SSDEEP
768:ooPY5kJa0Jw8taj3MOuDpIWB9f0khZr63WymnQlukIR4S8uKUpDFHuX:ooPY5kJa0Jw8taj3MOypIWBPh4lukIR2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000022ccd99a445aaf8d39bd3f553986d4f2eff7973204fd8f81d4f060d2e6c8f96d000000000e80000000020000200000004a71e8c46bdd560a9981f41d777bd2b181654308e206b47ccb7d319bfa4b822720000000d95770992df5cf746d5bd236262a7ac43a97840d6fd15df61f7e68c98c3d929940000000fefdc19ed02bd839b30ed45bbfb98867c881a02b00dd80d040aaa1e4673acfe9a05a026977bdb5147f378cb916dc8c9506d4015739dc90cda23f53ff7424ef14 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{726DEBD1-6E31-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431996280" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e11d473e02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2556 2520 iexplore.exe 30 PID 2520 wrote to memory of 2556 2520 iexplore.exe 30 PID 2520 wrote to memory of 2556 2520 iexplore.exe 30 PID 2520 wrote to memory of 2556 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d531f08a235d615472d1b43ca9601fcb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad14fdd0d865a73defab48c2a89da970
SHA1dd1c2af4e99f348f3bbad7ccc92dd6d17c3f99e5
SHA256627fafd33e70f3e2523a5aca025dfd70bc0ac004da0db67b9e2e8869cdd81594
SHA512d83f85ddcc719d8d0ab19f32d3358859b245303ff62c09fc5d672713d333f6ead04914d40e56ba7c0811088d0432f3a6599dd9ec223e99dd899bb85fa7d5d394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5972fd4a9fbc5690bcc3c7bc7827eba
SHA171085396ac18724ee8170cf4ead91eeb07a9c5c9
SHA256b96707aa13c3fd44dc0373bfd4a13b7e4b8456905882e12ecbcd89e90d7b1d48
SHA512425d8783f6ae2f7def4eea914bb77d3675d1e3c004358d1452cd7f88b5f31991a48ace4d95ec2f3338c616ad596f3da986ce0bff144359e22ab552a70aa5deef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501236088e1517d4ed648613074e27d1d
SHA18b757c65ec539d3c551f977a10e041e349378661
SHA2560c9f2b6bf03879fa9d55d1f3fa27d87b254a8b4c940151e660e0c0037ab4b754
SHA5121743235d97d83196f9f6d53cae97292ac2ddc9a3135f975cb491e7cbef4c3ab329e9e50663b4f45f394d2965dd2637f27411e0cfaaaaa2ee61aebe62b7018c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbffedaf3bed7a95b3f5ec94164a9bb
SHA148fed2ae3bfbd78828417daa4fdf91cecdf931c6
SHA256dc684a4509e058660546bde1a7ddfce5b83cb201d874fec291617c5bce1509f1
SHA5122d662637049ced1c0328ef9feb51c75b7fca48b90e51e9298feb6d98807ef593ef6c3dae0f5ca62c56bdf6a173df38f08faa83beb7360c6438ac2e84f4c631ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab98d3bdadd8b42a4cfd9fcf67011fc8
SHA179063206730dfbd171f8426fade19946255b5a75
SHA256815b8a6451b38b501672e7efd06c0cc47ebc5d0884fe1a49624ed3cb185b4fe7
SHA51237fd1f81637eafa399805949a3e5ff1743de789a2b98578b7a130c88ff4c7bcfcdb0f418bef4e1e78149952c729cba9c398af49273a2cd227b154a56707b0447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5411c58fec2558cf7b7eb0bfaf6236b14
SHA12aa2164c4118de812c9c97a8c0e26088cc10a790
SHA2569e0ac040b92e63ee8538ade18d5b8c735b5054b2549e38a67fb76f20a3018c16
SHA512b015d7e4367368f9117f646f3c7ddbd6e56c96ef421ae945382e2ddf2f457727dea3ac027f3eb2879cb257b31751af8c0a686e51c208a42ae868283154c22e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2aad09f0d5d94eed0b648482fcf44de
SHA1f61d01122cebe4d3f2ee27bea55207bb42531653
SHA25639309575f29ec655254af2007a0a920c720081831b2a1685c21ef1853b0dda8e
SHA5128f85ec803269d72a560b3c280a6994e3d4039d3a9ca4abb789052442d55858b5727a5b8b64550e687783f930119dee3f75baa51f9f2f4aa760864ad3bd87dbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bebcebf37524bbb225dc15265eca3a50
SHA15fca566743b290a8a66a67aef0ccf28760183169
SHA2568ae0cfc586ceadb2836a5e2b0d6a666162a7ce9b93875511688cbf76ffd761e4
SHA51278ebbc11ef4bdc20dc663c95001e93a39fef9b6f7411a09adb558fd93755ee392a7c65a52b274d4871d62d05cc39aa490006f0b79a66bede2128c63312a1fe47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c135d1cf8ad5038ce32be0123995dcf3
SHA1f75b1ab1c04aab33692f49cecc485abc87420154
SHA25682501362447f76a501bb2386c1b73a213737b6ef05aaab363ac5d72b7a40f452
SHA512fe0d82acbf9e2f68189c7921104b855781900a8a337e5c2a7707919d1093054d6e10c38ff2f13c94387d84800caffd055b9dcb44e8386dafc538c55c8f7d5091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89e88c0404f2049445cc976ac2c3f07
SHA132ebdb9850463e59cee27343e03bf87851a2b5b8
SHA256f3c04d1eb58530c5253490c41f694ae1775e538eb1e15e696d49f808532ad13c
SHA512d005b51ceb20b98707da8f1bb905829be7ca583d398083c2311ef7f58f0e00adaa706d573011fa8998f29be01319d49eb683db863fd2fbb29058d7bb48ebd24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d29eb3da9863e71610f7646c245c7b9
SHA17a3e4f16bf999d555d0e54df76b5a7f023e2c90a
SHA2568d7ee052884b1d8c742b07e1ffaaa4384d84f7e79ef17b888b14cadee2abc12f
SHA512d6c3b0db78a1a1ddde7654f7d66a68218df762efcc49224484975a20e0e09ca7b7fd5fe5c4e478528a8bca0fb54307d371b16ab381481f95ea65413e42981159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560450d364addba5dc911d14356e579f1
SHA140963c3401507a41747eabddf90e50e4f1a597d2
SHA256bdbfe6f2fcc69a615b42ea9114d38986e2dceece03bab493f1629a47986c4fa1
SHA51280c1b817abe1abbe805139111de645b339da94933dde26d93f62ba9ef469a01c3b6267a4c3f3e15d652e2a2ad5d27c58c0371c771cadc66be62129b540b69431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b8be509f3303e8e8d2e0cafa253e93
SHA1e64109b4061272c9826f68e7a9a739c94795e158
SHA256d9f105ee3c35f69429a1449f3dd400f8079b9688589cd100e0c68ffed2cb6cc5
SHA512122637a3ebc8e7a48bebac66816fe5976e8d36907a2bcfde27f82f02716e525d78840ee6b7130fd6741e9f159df152546ebbd02c61d37c3fff9a17de738cfae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d496de65f97d2116700389671e395a
SHA17b560df0331b4465eac2ec8669461b9fb324ab93
SHA2568816a7fb01da16bf4021447c7989d6c0b83244b8447d07b86c734218df89229d
SHA5127497b40e4f722a5a24af98a090763ef1dabee103efb7c01cfc359aa579ba42de023f5a8401bbab663b246fa5c50d671615949468d4b4ce17e8680838d06289cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92def6b7cccd52486313738ae35829c
SHA12c5975ed3ee2aeccfaf1202ea030f22582c53fcc
SHA256c602db1b0bb7d12c06be87b11c9b0e1c73306c80b1368c096f830943c438d32c
SHA5121a9462c48f15a10986c6f9cfa105c9bc9c4d2befd078cf1478dbcef17b27579129a679c2234c3449be97cad6b64abd43e61888f269c9df36975cf7f4d9dcfce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6a38610c84b69ecd536a3874e922b0
SHA1012e8d7e78c80b99fb7f94cbcb5ff293345bc37b
SHA2565f5895ba8070e0599d4dee7ee6811e64c42cbd2ee09b1b1d140450817d145f89
SHA512550c18ebd67364fcc4a434d19aa4b8ace930c673e84b36c1b67a5a3bdb13fd15a1a31818924478b6bcaa128f0c17cf50be52713d1fc5ad3e6164298729a8c0a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586680c741b6da522d458fc5d907dfa88
SHA14353866087cbc46dc65c7790b55b385ec7e4ae6f
SHA2563c444c3b06af3955fe6553cd67eaa20ebf3cd3c40357eb40385f3f9baccbd196
SHA51214286871d588a68f2769fec1589c0b49fdd040c5b3331078f25cf1293e5e005f30d9c6f62a5840f2a182c1d3cb6a5c3f3cfd4ade6cd2340e3ee4f808c9475ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277274173640b7e8e4089fe1117b610d
SHA16cf2d3e61a4d2045f9fc2c1b1e7358925cd6fd62
SHA256d3e0ffc4be1b6c32c71c2f19a6179e2296ef879ff483ac230b631ccc64b979a5
SHA512094edd7533d3c44be74620d88cb242f2e820daa47bd6aa36ddd1bed760516a2db6c7131803228630c7b01e7c2f35dcda29416cbe18ed4ee04a47c29816eaeade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ca2cb206153089ac603dd227cd9602
SHA11c5a02f79e1fd7f270888c42aa0d9f199e1f1a10
SHA2568333abe7d5a36428ce623de73157620c05cb40ab0b73740206af830cfc08a6fc
SHA5123fb9a03d2e40a525496535f1b75f2d4f4404b2b5a9b7db75296881379601a7775182e409b1918f81575143bfe3c5a309f17e4af964859e8b2a1a09a06d1c60ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b