Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
d3451e4638ec0492a78fc8e443dbee03_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3451e4638ec0492a78fc8e443dbee03_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3451e4638ec0492a78fc8e443dbee03_JaffaCakes118.html
-
Size
57KB
-
MD5
d3451e4638ec0492a78fc8e443dbee03
-
SHA1
f464dcfe2db9ff428e648cd61d637bbf7e497fee
-
SHA256
c064f64423e1bd51b0ccedf3f440d2eb5e00cc7129a7cecc157e01b6b725731d
-
SHA512
d2d1b8bf1567bd58c865bfce10490682f0a523ada5de98320c7a4f635bfd3d26e0b47ac9be6f6b9900f975f2191641b2aef98dd3b9e522bc90e03b11eaf418b2
-
SSDEEP
1536:ijEQvK8OPHdFA/o2vgyHJv0owbd6zKD6CDK2RVroHEwpDK2RVy:ijnOPHdFL2vgyHJutDK2RVroHEwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431922133" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e1b8069496a485d2472fd4033fc8d8a7417495953c2b4ef9a13a4fd24ae7e7df000000000e8000000002000020000000fbeaae3cdfa7c834d7c6a7d4dac9714be85224772908b401596a6c58979cbb6020000000c8f7fb060d6a1921c3a891dfb6a1f49108d56bbbfd200b5a53876a37b341e4ad400000001e6234548cf8b2a7515e1e03b7336ac6a5d3488119a4de64532b19f4b30270b69721150e9f019e320b69c28880ff9994c9c34447b2b3bf9396ea800c687aa916 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF552871-6D84-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b92bc39101db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2632 2216 iexplore.exe 30 PID 2216 wrote to memory of 2632 2216 iexplore.exe 30 PID 2216 wrote to memory of 2632 2216 iexplore.exe 30 PID 2216 wrote to memory of 2632 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3451e4638ec0492a78fc8e443dbee03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508467c618ffda5dbfb094b0a8b1d5a21
SHA1f41a90b76412d34b618879ceedb129d4dba21017
SHA2562ddc1769d6e45193093d7aa38d6fe9c2a45eb3672e1986f554ecbbac81cd3d84
SHA5126d84df02fad88ab018466599221d387669b7c2a71c571ad9eada64400dc0f9e4515b6b0226779d68a853199e0d5170972b13c2dbe0db203e226794bd11ea585a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d795d56a7e5e28093a9051e01c5457
SHA192f951d9bd33e745efd59fda7e751c495f0d4a8f
SHA256a7efb7c9983adcc3c15a35d0ed3fd5332d95e3e36116d9ef06f77bd391f7c3c0
SHA512e6122c80aaeffa1ede70d20c2ff8b0e9a3e6fc04496842d39078c5223b756f32b071a3eefcff8fbdd93b86c5beb4efca61652cb24106d857e9c86d3229a75f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888bc2316edaefbb57d0bbd98237e37a
SHA1062bb055d6a3b52c7a363dbb96c6472aecc161f7
SHA256fb81d29d02c502f410abeca71dd663d6018d61e828c1356a6c617c20af3f1b10
SHA512175a238a3a8db68d6c1f72a3dfcb1ffcae2d58ce11b858eb4d9cbb5512f70167f2eecb3c64b45b493288e61d03bcc7fa007744ac130da2e268a85334d14ab099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e643d1232a0f16dde9213c849f120fa9
SHA19f550918c3ea293f21427676e2c464ebe26e811f
SHA25614596688889041509b7ffe2b235139dab5672e5183f7706526090138cd38befd
SHA51227efde766d5114ca1f08aac37764669197f07dae3cefe75b9a584e8fe529b9fe51bcc48b1066108f0cb37dfa2e673548191fd0e5d4bc574dc996a776cb829e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51776cf61bfaaeae6583d889f841a6c68
SHA103710bc457bcd664152777ecd1c86aefce2990a9
SHA25606c0c1cd008d987d2033a8e9cd5966d04c081fd6c5a4600df4ae3e8b27ec2497
SHA512544399940aba43658ec0b7a9b98264815d0c2be003c347b35b3cb6ba7c63f9b7b99575c0c3f9f7dbb848d3a36e4593cf0f7628ee5a810bd46fd4e5c65a55f31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d9cbad1f47803dfe99a8f1877783ef
SHA1c35192318c8ad7ab86a6aee8ade198bddd2e5f09
SHA256767eac99b05091e32a67ec51f7aec31b3a993d4623d5a3f76a4581d806e652d0
SHA512c5b69ed6b7f09e624260360d08f3e2e0f5551b70897e69adcb6862d5e8a1a916e46513f481aa20a55de70896faad3f3eaad1489a96bfe65aa722c54b78861fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1abf2ce6ceffeaf288a7b9b06d06551
SHA161d2ef8dc14ba23e750711bd0dbfbbb84a7c14af
SHA256f59cb81394101272e5c7e4bae4187f011a8cafe28b40594cbcf435d6aec5d410
SHA51208a41c7440e897ade5c75afeafc366f12afc929506bce0f5dad36eb8b1b9d26f60d9372a40c21b2e984a78d0c2725b40ee98fcfed0a87cf294e7b35730590758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d6d2c91e200eb60e31956e23d156de
SHA107ad28fa332a764c1532d4e68256aaf9090a9345
SHA256aed3450a7e34434725ea183a72682f6585d7f414ffc2c67f3008333f80a4fa5a
SHA5123c498dd6f31374beff9801eca46bed416fe0fe22a732f8219e8e05aea6b98d931df054417d48555b78b1fa4c7ea816c62717a676668779aa66d52c2a436ffa68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc7d4aff9d53b69261df40174950c6e
SHA1ebca146ae8205eb552e4e4e3071a05271577de33
SHA25664092bb0a398a794cdc5a123bf5468cb4ccc625b4f9208c1d53c7b6d6279cd6c
SHA5121c414c86e4c0533dc3ae96cfecebc8d296e94c9bb56407031d760071fb20e7e9e9d09a675b949da3ea6bd6296949baf45c0339667ef01a32cc80bd13188a5a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240c9df43bbc93d55662f8def6e69fa0
SHA1798cab5338f2185a29f211e5d1e12ce32c7c0ea2
SHA2565b6167673780936a20a53e3c96d2a655a4923a8f2f414df7be57c05ebcfd8c0b
SHA512fa1c8ed904929033321face18610c9f8416cec788ad6f3c22062ec3e76219848a78e7295cf4c327e763b1fca3b5b94dfa86f17f9d620e3d5f36825f027736f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef92fa32f9fdbbd4bf399bb9a3c6715
SHA17716605c9b281df052024833ff91b50a8cf50e83
SHA256301b23b46ff984036cea92e6a99e16613e6349ac9c2cc0b8520e51dea2d761bf
SHA51208fd105c27c14bb039c1e543567b0e276e2ae9724672aa06fe5326799b49620509c6c607f64f82b0751a9aac5376f514d808a07bbb25478381f050b749a9c6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c859714e8ecf6d79781450d5109edc6a
SHA168c5650507e48a22bd9f54078b38ec33784415c0
SHA2561a3f6509aed10d00817458e05f45cced52e7e1ca32d78be58eb498da079cf1ea
SHA512216a1a869b014fb395de23e21e264fd8b4e8d3ca488f6b467802edc389a3a731af9ea322b3354db2b26fe246b2a601dbfa077c7007566c0b743f4947a4124b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7934a0093aafd2871629c2f4a8e01fd
SHA1ec72f7101d9d1428ac4cf92658594e7d66510d1d
SHA2560884212580dd4246fcd66e74d742e8063e3d4c92968b5fd7b14bd39d4002b4ef
SHA51279ca9da764e4739de1a6593bcd9ab5cab07228028efff38c848ca66394a06ed3a0336859e5e00ff50323d6b23ae84933a2954eac2a19731486dada3c1a0596cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560536304587d691fd61a0726c293ea2f
SHA1fccd5f13519378485b3df3cf8ccdd5357bf3a257
SHA256795d28587a075a9d6c6afa08359943ba4dba7ac65fd833254faa635e34feb7a9
SHA5128d9b60e44137b17f169449facdb53f48680b43aec56426f8f465ada1abb5c97761d64e8822b70204bb81220a3e444abb917547985d425c6cb16bc0efb01ff31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfcd43eec9b913dea527de00564cb84d
SHA16c5839e505e4dea0cc7e8cc20ba249ae90677257
SHA2563cf2f52149c5b7b39cac070c28db8dff84e2fa81b8c9d54f225219d2d00dfa5c
SHA5126a5c66d889de5f7da940ccc62d55a4d6160fa4798f4c90b59503b1fa32c65c9324c88fe48cc5d2f368504932915397c0ecd71f14b410661fc1e490c804cda254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27a3e40c36bfab7ede562b9074dc95d
SHA1fd07bb23695b839f8026b6308d667cacfa2530ab
SHA2568f6828d9259f75eaf22abfb08e86ae977f65fb78e663706206383b9a5da92211
SHA5121c52881230b80c1cda7637a991b947ed5f5906791e7202cf5c168488af5cf5d3fdced91f7943ba023c3c403d31861389f53a93a2a06df6e705a4fc0cc73e264b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b214d8178642aa8564d8f55b27d8e3ca
SHA1b5546fb86c0775c03538c9823a697a8d34d337a3
SHA256ea0de771bb9dc238dec0a64880f22d5956114037070cc67f3e7d7c21ff33fd0f
SHA512be4df2052ea847ae1e5a44b8e6ec6939789b9b100de44c429733b9b8ebda29ae9565133c245559d0b0faa39309adea6b514cf4e9ab7975602ec5eba04cd21894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd26d62499de6d9c2d7621de5e284c4
SHA1f41cdfa07ca74a5bf194f1024a7d075b31bc3a61
SHA2562e90df201aefe8b7b6f4b8f67011210bf8389ba54f88965926a910181e1cdedc
SHA512b12631a70ff6ccbbb11367f130ab321bb902bbe52261ab5b4cfee3d1a6cc39f2feb774497e0d0a53b30ea275215c4f4c2c3ef249d4e2301e04288ae0dd366dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54987ec95b97b890b0afa175ea8c66142
SHA126a198bbd627e9b77ca0afe7d101af9982eb0658
SHA256496af9704079011b774debaee12926a102779d4e5655a6da224da2523ea7ddf7
SHA512b742691adfbab26060b2258b85b9f3a8e385195ac3be28720da9b8e51699e92b2ab4c978e11ed572e0cea22e28fdb82ff98df77ed0a8f17712b78677f2f13bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ca4f994b1d031140c0b2792db6c677
SHA1ebe197b4e66e3e21059942b2a9c0e4ef64b600da
SHA256d407be8280ad028d5758a694e743c436e081257b1a44c948e69fbf2806f7d7e5
SHA5126eecb0930b0b41238d3c1a41fd8ab7bc1b44d54a360b74e45cab47b72e68c11c2de4f4508a38bd0702f9ce53406f66f183f3dcb536dc0bf68f41c710b767489e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b