Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
d31bd2dba412f860c229675e0ac9409d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d31bd2dba412f860c229675e0ac9409d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d31bd2dba412f860c229675e0ac9409d_JaffaCakes118.html
-
Size
2KB
-
MD5
d31bd2dba412f860c229675e0ac9409d
-
SHA1
6677c746f1a0057bf090325589215d5e4131e084
-
SHA256
a6ea244020df28ce3fe446f9057bbb6a21e5824ad0e6efb5f3854b6d42a5125f
-
SHA512
4f98fabc30a1d869c8c31ab596a00fe6c6326c643405ee60d9dcc247bb5979663543bc79ad13509d39728e92e0d796c038a9a91804d4bdd6bc2ddc3d958c6333
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8B5BD61-6D75-11EF-8595-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000fe0b2381ce0ea205c663bef67d47f2a50459a86b242e699790ad4ae0d15203b5000000000e8000000002000020000000d815aff77a7bc711b72bcde866b7fc6e66f9f5857027b850ccb5ca1f5c4c3d3820000000e7e1af43bea0d0f6e3bb4d913a92866f5a22202c6c1b58855075a887ff486d4940000000b8b355c9b7ff22a8967cc0c12ca7198e7c703ad7bd96d3fa6a567e4c77babd1566d8bcd738ae8878502a950139a399e381d7f7d3fff415a0ee8af695a91bbb56 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e453d68201db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431915761" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2452 1424 iexplore.exe 29 PID 1424 wrote to memory of 2452 1424 iexplore.exe 29 PID 1424 wrote to memory of 2452 1424 iexplore.exe 29 PID 1424 wrote to memory of 2452 1424 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d31bd2dba412f860c229675e0ac9409d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a441d0d39bbcbaa6c539900ab03142c2
SHA15e730c9bdb5831fc6730c9fc54a08bda20be8a52
SHA25604734dc5d42f756926e4f9a4bbc8ee7e11b637ad7d03ec8a9de82d9382230be0
SHA512352de68bc506d0f32b3bb21b76aeadbded7cf7849d9fd0e64c46296f6f476ba0a103539c3bc4193cab37a0f0d42c6358605c8c3112e7af3d09f67abfa1a834cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf6f4834c21ad11691dd59e5de92f81
SHA1c8eba5a64d87b60eb6188cc963620b649e5141f4
SHA256e015648f1cf4ddfb4fcb5fe05555ef057a2904e1eb43a72ef07dfd150779697d
SHA5125daaf7fbef14ec8fd618acf691202c6ade284964dc3d0a8689388f938784686323f8f9166fb4acb6234b35c420b7724c1aa057b22f3669f01ea038267824bd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c54c7481332a062fe04c02006c8cc43
SHA1631b271687344a6ce3ae03ec882306f820484648
SHA256a000f67849d59475d89a91d89012398d9bf58f22f7320ab29a418736adef9ba3
SHA512c1d282037395cf609fffc3c7d407101e30e5401353a01564bfdb06a53750d266406719c3c7dd1df0b7c25b0189a3c23ce013a220664788cddb4e2fcba1cb83dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cefeae504e1bdc92967e46ba42dccae
SHA1c5b908602d6aa3e26aac7fcbb991a919b84e524a
SHA2563542456513977e87c91c07e8164af29f990e59fb24845f5ca625c0421f8c15ee
SHA512bd44730c7070aadfe314f951a3684ee0d3e94fb12b91f90633249c8353bb65d56cab758b1ee3746a95d1e8abeaba303d642aebda16728dca53b6011dcf614d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088583e03597da3e5f034c155cf5d35b
SHA14d9a96d0f1b66b8fd9a1da3a2ed8dd581ad0dda8
SHA2560cd304b47ad70339593731c74668f90a6c856ff05cbb324fd16520d6ec8637f3
SHA512c7624749ad6ca325b4c7dfe3ff164196480c5e0dc8141ea43037e3db3c11f5e063d6d37f4581ceaafe0c756cac610b4d1b00613a16968e6558f860a27c2554d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7abbc00f9b21b40fa1656f6d5b8807
SHA130adb93ea7557eecbfd5d4bbf4dc6b90b550c300
SHA256e05e4d8774bdbed330ba3f0b0e79e2703fb90f5ea8b3a31f509fea9fa766ec5f
SHA512de1cb64d34196368fefad0f0faa3ed6f8b1a6cb2e974f568cdfc53f94bfcc697ac970379fa3fc4867ba1316b201166b3b77dd352f72216fdc606f56e8930a259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558fc1c1e5e95f2f62c3fc6865e5771c4
SHA1ea641c98dd55f876cd7cdba2d6a7966a4191febf
SHA256ffb8893ec709ac5c659421d4b47d5f9b7a0bb4857fa46d21b609e0ebf964219c
SHA512b520d79a918d36da0fdb652b26294a067864ada4823a1ad76db905df0768c64e50247881ddaa79f0c605652e253fb7275ee9eefbccd45891862b1421bb8088f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56801bf2e35054450405614ae1e34b672
SHA113d0aff7bd44f580b3eea514ff7d692a9fff3a9d
SHA256092772b6466c14eee10dc65f9a97837d0aee94f4fa073c7f246d2334da381c64
SHA512d01a9122d3bc8f97789e295ffe85bcf3669ba71c66f1c57c301fbe9881465984f89081eb3bfd6671d3fbc314cc71d4368a8c0d12269fb51b5b6145c24c767b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15a16bbb059d8e5ef88cf91b188263f
SHA1aa6a41eee71631bf2570265499ddd6651aae4107
SHA256463b7ad167c03820be76b32832206ac70d0075074b21b8fa789087a0d62e03ea
SHA512d08d40660262e64d904d4e4f35cefb2011546e3b91bd538c4116dff76db8b60bdd7a39a8fe76cb6ae1f91b550e62a19a69a6e285ef78334d7ad1af60475f2287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476e8a4da2dfeef84fb79a93768ee495
SHA197e31314f260d09711cf0e0f8e9d2d8445fd3448
SHA2563ea6446fd65517e0c79acaf59e9efdbae197838131ef2f19037eeaa4cf33dbbc
SHA5120f274199f7c8d8c88016921297e1962c147fdb1439de6151ea4b955ad9d9cd38f1dad33b8aa409c2cefc06b765e76ab22cc6508f0c464be4b7931b1426dd07c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6fca453436afc97bba6d147a2de2baf
SHA19479c5a6293295bff0b5c96f78b908fe46b1336c
SHA25670ad6da9cd98fcdbb7a2c7250ce8808c446a6cafbc365dd824f6a85c0135d6fc
SHA5125694e946540974fc2ecfbfb88d3b21640c2d08053db15c3c0122f1c87588b567a73c7b00a688b4382bb6bef941189c0cd9d038e7b20544dc99f7868041bc8a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e999404a6f8316ee2a1f7570f67da55f
SHA18f9d7c7ec79d25c2cc6ad7afb98a21c2837e76dc
SHA2564ad1e3a9bf1ad38ff360fe0743be43270e734c0a3eab696f4b1a457c790d5092
SHA5128ef10f29b191c974bc2a82da8b9c05755961e81492527739b978797bdd1cf452c51fb845aa3af814fc91da084d0ed5bf2cb466c9142c64e2531fc7b7337de631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5284bcf74a8029412ed8e222c486f0ca6
SHA1a84122af0c364c7ef1f8e82733f986def97888fb
SHA2564be7d1accd578ab6bb871a909f0044c25fca51658107e9611a064aa6d1271f7a
SHA5127b3928cb01673d3606a8b564c682df4fac33520bbdaca7e3f9ea67795df5032ea4496a004ebe78686f7b5948a75beb1e7c0b60f1630ec3c3f807314f93eb4f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a59c13b8bfe1555a87ec291824c423
SHA1e7ef408a5496d0834c8e3c3a94e13fd7931a26c7
SHA256aa51988593bfcc13e93fb10130767b25fabcc5d5fc9b77c1b49384e2dae36a08
SHA512be4701ca7bdf6ae117ff9d536f57ee72d5566f9bb70d30ac669a092becdc8f2f6e6809a00e9732008ec81bc9a21820986d446ee713252868495d164390eb419c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb875cb048a1106a048c18f49cd91ff
SHA1c43fc2da66c95aa5a67aaa3d1dbb5aedd04adcf2
SHA25600a18df57d3957a29fd8027adf6d955d02a4e5fb305b228cc5e69daf0366a219
SHA512c325be657936273e01d387519a6cf5eaa7b1f4b89c17a44fc8c0e124772b03fa435c3e407fb1406b3ab7eac17fb8a87cb02389ba915bcf2a98a696c311c1a3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ddaadbc105aa5d27518ac3bcf665e7a
SHA14662e65acefa9bdd9d84bae64cefb2c2d60463a2
SHA256f739678dc6e5851f2f97cb9f41daa49b73a1b5bf10f9d454eedd671fb75978be
SHA512e0e84ce739e0f376cd5841e1e5edcf54cbef211d8ac37e39c10c8f7eb95c837222350ea6c05766f9e24c619a586a8655931ce56bc552383857b502a321f333eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591b413d90d9d50bf909870410e18697
SHA1e4736ac485ddc8e104b615dc55f8d84fd4bca6ad
SHA256a8abfb92e11ad6cc09978662adb862fd3743982eb375bf68c90a9804c87ec149
SHA51208dd81ffac4a5c89bc750106895945491613d65977cd6ddf0912aefbd70862c5e82b992e7f2ed7ed9462d0f0760b47f16e1c4f30cd28269b4a847132a21a2058
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8H7UVK5L\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQU8S4LJ\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b