Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
d5500198b0fc2abce8f98e1bd105f187_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d5500198b0fc2abce8f98e1bd105f187_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5500198b0fc2abce8f98e1bd105f187_JaffaCakes118.html
-
Size
116KB
-
MD5
d5500198b0fc2abce8f98e1bd105f187
-
SHA1
160b19488693137ebfa61831589b74bab0908b92
-
SHA256
e0132a4deb3afa4b516733fcf9259fceebb391b82fd9417572d3222a93513edb
-
SHA512
7f40ea2525b1752dfcf828a66d1a8b133dfd38323df8eccd9560a9370ded3d56522a548def0b61399e6beb75cbeae0448e7c4711b67a13d43bfd259353e4a990
-
SSDEEP
1536:SVyFUF6lyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:S4yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505cd9834902db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC9108F1-6E3C-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432001104" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d88a333a81a0dfc60f02050d5130eab01f7cd54873ff97f49a050b64227a71b9000000000e8000000002000020000000d5c1ecc7bb19eab0c1ce4d9f5db613fbb00cf45a0c329a232f4ade47ec620d3320000000aebec473dfd6b05d2004c582ce5ee247d387e93cf390ccb796d3a40b49bc457040000000d54b3c0f22819fc4d4fe84411c46e11da32bf59744a2b19ed88ce1d0eedb2a50fced2cce81c3dcba7e22ffc2897203700724aa847166bbd40cecb15a6fc29b2f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2088 2344 iexplore.exe 30 PID 2344 wrote to memory of 2088 2344 iexplore.exe 30 PID 2344 wrote to memory of 2088 2344 iexplore.exe 30 PID 2344 wrote to memory of 2088 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5500198b0fc2abce8f98e1bd105f187_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b0b561a3d0c92bb84cf25f92edc6a8
SHA143408a9f34eb0efacfe74b74117f89c70dee42c7
SHA2567a9fb455680703a013173c7f9a7072d4c056712c4c8f584d8e1457cdc671ee36
SHA512b5d48a925102334f3f2de9a6300078279eba59205aa54be09759d963110f8b26e0a7d92b9b917753f3d717d12a0cc42e9e4045a4770b90fad51db50eef124a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c281d2c21c4740f5286764a5fd1e5e8
SHA1a99a9336ebad9682e9e49204523577bb1e5d7206
SHA256ed9f1e9366ab3f056973e9a31c566a536519701af2c514831bbd5bfb4edccc14
SHA51267c645059b3442dbb4dfe40384f2c4f66e9a0bf5ceb819f7c4225794be50d9af3ee8ceb9659108593e5368581e247c8ec9621dffaf0768d7f3391a736bb93588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db658c1e180cd6df126dc0ba39a76446
SHA1950e8a9d4c783ecc63645dc7db328fc0e122958a
SHA2569e57512e5d33970b859fea2a9d3b10b4d03ca040899f0f7554eabff5c070e75f
SHA512625a82d3a6b9bb71485d041ef1f274045863f926d7d2d9c5d39b334aa870ef2de1ad917789c404b91e4c06defc841fe2ff7da2778dda85b6ee3d3ca02b6d10cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd2c49c7891472be694d82c3a872ff0
SHA129b1a6ab7eac89fbf30926bfd2e5f109e4ed0fcf
SHA2567ff63662879622a1a6f36df7520e81dd6822e58a70a4920c51936fb34e1c926f
SHA512826cf0b9b10c9ff684cb419f89a4ca8e09839e68311332c27209e514fa295f720957458a486c9bf32dc918b2024c54b8bd028ebdd8ab1c32f1822582d94bbb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0d868b109562befa86acbdf2097510
SHA16405646a6573924186318c9eed7951cd43bb67c6
SHA25617415a6acae72a964a9cb272c43cc30b921f1674cdf142ed97f9a9ae41682136
SHA512beb34b8aa76789e6dbfdcdeb5760d154c600966a5d626de79893b6d08d784562c7e75b8d55460bf79c5fe78c7f9cb59ab5d37881af9d88db1c38dac3172e1433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54178fb89a1340136e13d8c91b95b03ce
SHA182694dd9139cd5ca3a2b5369dd2c935a6af2a877
SHA25607033a7a46c19d060e132c4c08b85b7d26c9da2b1089341c14af8ff36277a130
SHA512b4db09eb6dba2277d1bdbba75146e665b77fee28d8114cccc5ba442888d24949bd9fa4feaa04f24c58cf927bb03c4418b0268fb71e3a2c080b13980255cf3743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1efae2139ca498eefe8c3e57179fa86
SHA16b7a649c1dc7b517a6c5ad6cacd84d9b87ef827b
SHA256a7ed5ed1588d209a1d0d22c6841a36c5f1698d39f87a3b1e75d2f91690e9284f
SHA512a07c5bd7b21d3ec37fae88d267650f8b707089d5f17858f884e3b01b8a899f073f84a04aaf4afbe98dd551827cb06f0d016e703ae0a060907dd28a5213b15588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ca44253236819f61ae19793fbf644e8
SHA1fad98283b24aa5d2996f6e0888e9530d8ff43d01
SHA25644f4df3eb36f737aab5d95bdf53768006138485304ac90ee11ab4b7402e80287
SHA51209a40a6047a4bff50d53169a6c2599a827257e81cb412a40f7c8882cffa30ce235f7aa3eaf39fd4fbe24eab3ed64a40dbc8a9d391539ede861685bf5e925eb84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880a2b1ff07e9c1d10dd81f6b3be04ba
SHA17e7411ba26bdbd785caeb489289ef5684a6ae865
SHA25688fc6d6c68e00c0d6e41309267052aec662a912057e9ed3fd430bb4805d4e90e
SHA51225cbb7d5d54c767bd31ef7305802b9a1d6d534c009518f9068aab1ee6210d036b5bcb26f112f79e68366caae5d46f64dd6e4528ab18c044ac145b5d122adaad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f3b87fbf638944032f02914a508b27
SHA1d89ff5fab554e34c78db1df8f782ae9649145979
SHA25668c78503aedaec43278434ea1c9e560e930114229bb119b3c15351daadd94866
SHA5128674776c330362d610ffab56eb0424333ec896a2848e78f6ea01253e407a4c85dee4481aa660615d3cccea482ce4dbbf16ff99d04c94dc24bd46a4e87f0f3899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57672e82a45d50d0daf246e5c7e2dd818
SHA12b8ccc0efe859f5a3093741bf75a7e7ccbf0b434
SHA256a5bdf64f36ed9ff93f936da9ac6aac2d99ecc3f065ddb01b5080059ce3ee4dfc
SHA5123932940eec01c96b7078f8bd5f9a337678bbc58b863bee73a48d5515ebebf129bf624fb738c784dc4e35233eb8ca2b51f5e8333968dc66b6e00f43bb5499d363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14f5cffd918d2f5ffc5089971e7b71f
SHA1b308e822e9a76ed4880a12bfd1cb6d437f855952
SHA2568fc3600250b640f7e88a38218a16718070f2dcbb2c96b5ea1bae60e4219b1afd
SHA512b8bfc6b31bd4c7207825cd148e6affacab3c08b2333b603de547a21a9c7733ab83e104d6090a4febdb1ca1fe535fe3983ecdde94a352335b2589cc022a3d5480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef41d95b667b1a9e0606718f29d07c8
SHA19fd2ac6c2736ba73b977f27513b81682c046da8d
SHA256d9723442081b1c5e787cf437217689870c141d49049f2cab5e667755c43c5ff2
SHA512b11f4b8eb1a14a587d29449f04a64971f4fd7cae1ed3739f251d2fc4bf3ef7c5f3174be04dad6fd6fc3f6b82eeafb9f3751d19858357ddfb83d16af9b21538b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236e3af14f7849a9b47700704acfd90e
SHA14578be52e782997a5e8f9bbacc7b4a887cf3ab00
SHA256e8114720262e5fe06775501f7796d7b56d68b6b5931290c633c4d1a17a6ef180
SHA5123654b13e6dbc2c1467e5f448bbffebd7e1f77b79e5a6dc00daf080df93dd94ddc88a4de72e0deebca34efcebc1f3e96d145b5830e90cb5792b04ac7b38522f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1c408946f2a97074a1e8284caf598d
SHA10ab6cbc698c7a773e889ce609ed6f5099d19f3f2
SHA256d3f076b590ee7c3a82be7ea7b7abccac1d2e8f27844ad4609feba58643fd002a
SHA512ced43d9f8b3473533eecfa8cface94f07a2940ce4b326f20e59ddef4dee73d3695585f3f5b4052dcd5db451bb5e7238ce7abbe8868a823809a210b29d3d6acd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82e500bab8fd977efbf7700db3503c2
SHA1568764afde477b9146c0139119b77f56922b767b
SHA25658d07cb4c24102eb8bd844bf0ce2c6a116629e62e0eff99718d15298ba545828
SHA5126271a287fec3caefcb9f2511424d9426cdff05b531ccf9e999d865ac051b148875c2b90daf83ff7a29a4d93d5aed33badc139eda1417c5ca46a2377cc571b353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c260b389997afb9a7163a23c8b21adb5
SHA1e07feeb61d12e2d70fcc8040dec495e8684aa6b9
SHA256aa97af5933f979686aa7ea9420caac905fd66fa3ab7bc61042cbee580ae981d9
SHA51210fb1b8c17983ac7b07c1c264f1a129f3fe2f2559eb671cb28d9ed1602ce24c964a5950b6aebda1de6d482f16d4299d3431b2f20bf78b7790a587093d4ec328d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552871f172a031c2dc8e6bcae13f06752
SHA1b7939f9efa19b920d1940b2eccb70a3e91c601b8
SHA256187abc7b3bb177e7731c55df617c08f3bd92cb8f8d7c05147eb44b55761526d0
SHA5122309bd6c1b8f694431c8dc37c7df17dd837bc0f2d91747ebed41ee39e1ef7d84f1144289ff4831ecd2c97738eac6d2950f02b17c0bbb4023929cfd0767986551
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b