Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
d34d2e26e105305318ccb6e457e0e2fd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d34d2e26e105305318ccb6e457e0e2fd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d34d2e26e105305318ccb6e457e0e2fd_JaffaCakes118.html
-
Size
460KB
-
MD5
d34d2e26e105305318ccb6e457e0e2fd
-
SHA1
7c199fb87dd3a741d745349c6ed66f2a8109fe27
-
SHA256
9035bdf9c38b20d35239d9585d3f98fb70751ca14d404a65fb9c4bacd8c437ce
-
SHA512
c331a9049f485f60a6873d446d1338c6f9f4d6aef9f590b192332fa245b55f670ce6a0e0a8abaa15121541117d2ff651c975c4d4243df59dbded4f8e6680ae18
-
SSDEEP
6144:SfsMYod+X3oI+YsisMYod+X3oI+YOsMYod+X3oI+YLsMYod+X3oI+YQ:45d+X3ug5d+X3S5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000036a612ed5b9cb2d33a97bb473175dc879702de69bd17ec493100700383541d6e000000000e80000000020000200000002da6833e1b84ffcf2b51b95c22d3b192f51301b31ecb75e2162fcb91f4d4f7ac2000000044805382c1105a1997896a719067e9bc0992abd7fb619b0e9a246d80bd797b2940000000b6b1e6ceb10f9885c55d3dea0104c9dde458962cb258ebf2d55d353bec0dc17492c657d372facdf532b67a5f96d3995e9fe861fe9c23010ff8175975aed5fef9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07ef76f9401db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431923324" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95D76AB1-6D87-11EF-A8AB-EA7747D117E6} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2156 2860 iexplore.exe 30 PID 2860 wrote to memory of 2156 2860 iexplore.exe 30 PID 2860 wrote to memory of 2156 2860 iexplore.exe 30 PID 2860 wrote to memory of 2156 2860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d34d2e26e105305318ccb6e457e0e2fd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f95d932f8961589fbf894f85326895b
SHA1c468eb88f405eb3c81999b359ad325d699e908a3
SHA256dd0bc4b286c6e26a62c336ee0c6961eee68018b6543380d8fea0ee28fe3e3bba
SHA512e00ac5ef847152a649544ce2d6190b67213ce6ef036b567448bc681c0eedc4ac4c8570b7f7245585a5b802fafe71a834482a1b83d00f1ea92e4e5ece7cd4d6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523086cf100f2a941affce20a9301a380
SHA170f58bb99d45b329e79165d49af3e420e3975daa
SHA256f5d97ffbe44865eef6d4c5e6780fe23df337c3ca39193a44460e783d3ae6e42f
SHA5121fd4e2c9dfbd08d80f3b37cd65a4bbcd38226fabd638f54d7d6755e9d812b9d1a5f7bb627d798b975b93dd1c77812d5474e21dc187b0bfedc36341a51b728462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e52aa33e695a9d3e657d5b862e2ffa
SHA13c79b70ee2a914ccda5e35dcaee4fb416985598d
SHA256f977273e5d9e2516bf62919241a126ae9cea3c672c294f8847f4136d2716f626
SHA5123782ec333ed652352e6c98fdc7e6518ba0c42ce712c998894cae7087f415ed376448edcc90acc6a207e1c591b777c6e83ba31d6a2ee92d98ec9f839f7d5208dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba626b89d30661c4ffb39925e337e29
SHA15371eb22d1944525e15ccc88ef94434862c5cb82
SHA256d6267d4c0ffc0ce4467f779725a1509cf59ad138725a6d0ed0fbcf5bc6157edd
SHA512ffc1e2255970d7c72373afea682794562a1b6437aa2f4cd76596fd8a5f05b8c972fe4f65825773db49fda5f8dcf2a32aec10722021e1411ffa2edc9d587cf849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f073a4990dac5018134987e796ef2df
SHA10512e80e6a54cc4beadcd3a9ca56584f63f6cc15
SHA256b50c41bd725fec6a8755466eae50d0ad770cbbb869054eda34c343ed6224e579
SHA5123e7dab2d51be7671b9bfd2ff4c0020f294e9bb1b4818eab229e2ff4bedd3f8871279b45c0cbf51afda6c059553852830e07349ce56737b771bfa3f0bf64a6d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18eb23ea1bcfa937b626b79402651e4
SHA13b8da24ff35e9e488e5ec213fc52acaebe5da2c0
SHA256f3297b932af5603487ec64f23fd60dbaf0e0255975fdeb290711e4f043980f74
SHA5128963f356e66deb847a10e3981e779ee91b6e19ec87002ba708bcd9df24019409a16426b49b36e4fca2357e4503429c9b90c42f3ec79ef271a8ee242400bf5e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b20606b1524bbcda90a9a1bd583a1f5
SHA1de0a70b305fee365deac7cf67c124f6af74c74d2
SHA2568047ec5fcd85015edac44099cc1806d0140d4057aa9aa58d27cefeb23a67cc07
SHA51228eeaa1ac1bb07980730d65f5136c693fb6fbfe3a066a852ba66ee65812b4ec0f8c35d3eee4dd492a71f16f5ad9bf989fdaae6cccd03fb8d44e560dd0cf43e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7117b4792c6186e30e0e31295cb276
SHA1865e94552149d002d5b85ffb5673eea0a878b53a
SHA256a72df59899f8e5979f9ba61ace083dcd833f835da2168f3df5de84493f4ee1d6
SHA512adb52f4793fd498472cf27674f587ea230887883f7931d342d702aa0e0c9572f296aa83c3764ceddf1d970398f161e01a6d203ac85edba91242c973cff63e114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4b1e06ae3fa62a74cd616988feb04e
SHA1bd766332bd95381805e9337477861c38471c9816
SHA2567da899867f0bbaa59eb286d1d0b709ecd43db0d9136ff579a6cb5fdf8abeecc8
SHA51249926b054e60f0f6ddeb3cec421b2e4015f3d15afc0982611c26e8d06ec9b7b1b63a4e74f0138a72f112d69e5ce0ed6c3b11b68e80a6dc5c3d2698817616d79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584bc13de2d7ac4f65aac854c9828be5a
SHA11a364bfa10e99206072e455318b8dbb23da6d5d3
SHA256117e3e70ade4d0cbefaabf1309c43a61927ded869f72e99f5eb13fa09a574802
SHA512b2bbc63cbe8017025b7e9bbfc019a737a80ad06183168143d954175cc795a4b5a27aec6f821ec8fbb35a49b8f0b25ffade04de79b4e7ebcba3f59ab9920392b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59579da61ac79729f92274cc8e5a426bd
SHA10e63c17de60fcdd141d5ada15893aa8c1c137f37
SHA2567a20bdb94ac15abecbf80d905ad063e29e4aeb4a1d970e7b333c967593d53db9
SHA5125c6552280c66c3550651cebd6ab60900e1a505da3042ca3c09fa08a75a201f985e7b6a958ace4f8b81ac4f0606e66710d3196a70f4db9cb0ea44322308d6e797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b03e2cacaf431b5363148d4f7c3311f
SHA12d105911b4b0f523a5ac7e31baf6804d2c56aee9
SHA25631f5a52e216320c481046a6ab21eb469d9c60dd2b1ee6c8bddb5518bab6f7bf9
SHA51227a1bd757c9fed2af28b9e7bed9a4dd8e4097a87d2e3539b638de2e954055deed7d2d45fa04a5c67667a6a32f67c091ae4a4a5f6155efec718d87d92e5fe3bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4ea8177d10a53a5a9877be7a036bf0
SHA12d818969fd7cf33db6453b5f0b29c40df4bf969c
SHA256fac15070f7cb913ddd84bdf0aa94272e4c4fa3d7acba83b883f147e4bf54da39
SHA512853d67c11f4c035f23aad76403f0017325d4804517e4368ca37acb199d14e2620cb7cd87b8a23c7a037557ae21c4f0409ac752996b5284049398552b367dd9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe2848d43bb14565657f47eb541e4d0
SHA15c93e6f09d520172a59ef090a33a41a5df169020
SHA256bd21b999d98d8b0d8a0f422cdc3461b8b03a32db5ddf4c1bfc890f1419639bf8
SHA512e864e2358030a4db4d2821e5e061280ab5cf37a611366f7670ede536651e7fa3edfe3fc04a201f90f09e984e31cff5467ff82ef00153807ad390040692a851da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff4b679debbde6eca9b032558567948
SHA14ff586eeba11e45212f37f6f8a0c7cf805ca05f1
SHA25653b6fde1d5fea675f6672cf53fdeda22b605aaf3ed595caa96b68304c744e8b9
SHA5128cf13868d42d780ef7cc1880c52166ec4ed66cdba782e9da1a303ddf621b1f29917682dcb5806ae60b791085a099d065010fc879504059fbd0130041c58bc70a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4704e28a6efb45c4c21fc9734c0ac4
SHA1580f3867ca338a1fa6ac1846403d2674679472d9
SHA25687adbc7828bd1adeab9057ff0be3d8eacb10b5e39ab3ae3dac5d43bd1976a9dd
SHA512c7f90ef64ae7a5a299221b8a33b0934c38afb7045cccdc7b88c1b4c7156639959e2198111947da990b2124a3becdecb5304c8859c4ef8e5ef00ae5bcdaf3f0c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b04af833afcdf67c590f3d32b827a3f
SHA1598153fc2e330f97a12da58c690eb25c55dded62
SHA256ae26a532ec52f1c555580c505229221db2f4163d8d53630e7dddd2c5e43fb63f
SHA5121d4fc2babe24b859c4e91b03f94473aec77b607273e7e39a9ea217ddd26e2a4932db7c4973f9589d4686f8b86871768fc402f942d91592e80133cc5bbdc8b6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3bd418ddecb61aa06816de6de8e3950
SHA1cac2b20e777e2b55d366f6e2e71d130bfee0376f
SHA256bec69f3bacd78796c293fad9b440af8b25aa6b018e6683050e0fb9d36a69df72
SHA512ab94f44c3a03bfaaa4ff46037df9c8ef1e34cf4d6e45255bfbd5a77da14ac7885dcd7aeddbb58a41a322bcead2e3911971f7645d1d7477206ac45c1fa51d25f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ed55c06fb87b412a9eba3bc230f590
SHA1c6a7b54bccc8155d35117fb94066c5d5ae026373
SHA256107cac129bb42a754effaa7d97ba8ec7a6c7c0a613ba908c9570030961b1acc4
SHA5122eee94c45fdc53f31df768e97f099f922674628e29848617f051d24cdcaec58a88d07eaeb50e6bf654dd2c8e0a6a61e58486f18ecd93f6ad6216706ed5e96e7b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b