Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
d34cf08d681a20881cea46b2dbea58e8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d34cf08d681a20881cea46b2dbea58e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d34cf08d681a20881cea46b2dbea58e8_JaffaCakes118.html
-
Size
35KB
-
MD5
d34cf08d681a20881cea46b2dbea58e8
-
SHA1
4b4149eee83755d51f4f6f87be820266bf3f0ce9
-
SHA256
bc994e8f80a9d744ceaec38cee5f5de6160fed61a7c4351fd467df6c0c827610
-
SHA512
a55a7a944d4f4baf68f3e5f15b746ad9e599f395d224c3bd5c3c2a02ae6e4f200646b088bd5be26d995cceeaa30c8b9af9083f70552717aa9fb01a9bb3d23aa8
-
SSDEEP
384:uUDoCQM1HGG184zIESrSEpgzo9JQqOK0Mp6pLs+0PdY:toSn9SrSEpgzo9JQqOK0Mp6pLs+0PdY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7637FD01-6D87-11EF-9DFD-D67B43388B6B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000051c9f21017e91118a720916ff862d4d5cf5c067cd09f42c2e8b1606c076d29e4000000000e800000000200002000000089efea5cd7e976c3af3b9ddb3b8d94fa8c8577cf54eed4bd0942532eeb1b8a1b200000000c7a31812133497e7b1380dea3db719395f790e80b896a8fcc60b4737f48a0824000000053d7ba7c610b0cd49e2461bf56eb266797d75ae6cdeedc53022e3116ea5aab39bf8f7d2d7408ba3c54f6abbabec05c9a73ecfc97de8dd91a2f23ea8cb5099dcb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b037386d9401db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431923271" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2752 2320 iexplore.exe 29 PID 2320 wrote to memory of 2752 2320 iexplore.exe 29 PID 2320 wrote to memory of 2752 2320 iexplore.exe 29 PID 2320 wrote to memory of 2752 2320 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d34cf08d681a20881cea46b2dbea58e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5987ec4a66efc625917ba42ccb4be44fc
SHA1036d999e36c45a613eb4559e38222560134a917a
SHA256687ec0f67f3670aee95386a6a9e2d94a3669eb1c6a2e9e423627b182ee6f18f0
SHA512ee29a958271eecff3a5025264f0f097e4706f653c0cec87f4c92f79f20541a4845a44d8021d04af079aeb2700984d4fc40dab65fd0920f23524de88077b41336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588250c97c28b41eafb17bf6c2c4be4e5
SHA14f380cff9db771ccf7a6503d8e35e7753f55be1d
SHA2567c82e2e62612e1dc33704048dfda535badf97eabc7b24c58b4f629972b96fa0a
SHA512935d956cdb5792314461b8c9333b56c150a6bb5c4dd806d9ef0edcebc16afb988b0446235b285285a17f348822c6cee9ed3986283902a012ee21768e90a85520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52036ba71e2d81824bce652342b715c48
SHA1f93139bb4e831c79b3ce4dcafab23af20e605692
SHA2566de95fa53d2e898e28974d7e780640875327a53a40865bca5fca772df46dbb3f
SHA512e0b9a0ef443cda2825d639bf41e63c41461475242d2c8e1ccfb7392328cfb586b04781893b643a0b57918e8bcf7f024c3ab93dd7a425eb2d99e5297ca49dcb73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520039f4104a40d55937caabda8df6162
SHA12800f865d515b38dddd34678eb28d68987bbaa46
SHA256461b03e5da6d4ba27ebeac6c4ef9c9dd4b7b1334a125e02fe39b47d112f39e91
SHA5127248fe0a60bb26d5eb9e73d33ffc6e02258a9422e84ba952ccb8bce59c1848d73d8473589915386a563b3d754bf22b12cc83eecda751f5073f15b02d0825f2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594941256e5d1d46021523639c4368a86
SHA1d24aa128ec015ce01639b46c2295d01cb2e0b531
SHA25664db96305945a02071c80236740b74b4ceaa65f8942cf00519cc6069f5ded672
SHA5127c287952db65c9e433922d9321aa751d2eebac13b22ef07b9b4f6449e0ed5c14829862c346cd9c978272b3fd6196304bff272098770b6bb338d5a17e9b492e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551068a32281279914cfcfbad6373df67
SHA1214813b10bef0a134d80b500763c31d19fd00b8c
SHA256528ab9e5213bab920b13b9bba0825ddfaccfb5988951b49aae4e7dc67fa89f88
SHA5121171ff21f0f62bce84449cb312273e6cc6066a6d7cd7fd60a2adeeab7302c606e1d65126a34a7e4a9ae239a800ddd5042baf798bbef722448239ad2d3fde5b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee8c0985bb5e67a960c45b91a337db5
SHA1a1928cb20d135ece804f96004707b9baeac83e72
SHA2568972b5ba7a96fecddf1710b87890e44e1f485d2c354cdd93f875454548386691
SHA512e76cd55c51d77757e0614b9a02e2371192f2c3fa15f0ddc427857d4c3bc353c6f37e6aead291a8278d3c8d5bd22608853df52bd7134f841e0ff052d230a22d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af625184c0dada854494a2e14bdd273
SHA11284f9160c498700d42f951fd7ac870dcc8692e8
SHA25679b73b6f5e902ce4a6541799494807e695ee44882ef5b2497871295f411ac3e9
SHA51242db128d760d7df1d5714c8d4111cde576d85816d46274ed7aadbb1e1f57df02ca080aa9212ec8f9b27f66d6e958a6f6966886643810e54adceae2ac0e38e601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1033aae7e38a53449e2a4718c2ca4f
SHA1346f10fa3e8f3f476b9c8572d25c744009c645c7
SHA25622913a8863e49c47750c5a55df2b92298921321cc1530a8579554f14d1b5ccd2
SHA512187904098581585a59e62472fce0e94bc7ac14e75549f8b3e6dc0035942bfbd3d7d22fcc90fb3246de683a9b0dfba92b1a637bfe068bb9494e002b0bcb39307e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f9c60a4d65145a97004f2e66b7f5d72
SHA1fa1569a69a871b72165fb54adf39bd1950a7e7e5
SHA256df2190d09569c12f88325f30240185533d8f0b67b4c713d2c367c2458d729476
SHA5128eea4a45c358a154069df66c5a1cd011058cc6a4f8b1b99dd973858ab9f76d2ab3daac9e0c0e4adba6bf95efe530483e767a5b99f7bedf634cdb910612cda3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589063e6b111ce36ff54418837a52c7ea
SHA182f90c2a176e028a9e42841dfae04cfe3653f52d
SHA256b227c4570c31acf1be5de7be17f9376b5fdc0428b364c95f4991ce2c826b492f
SHA512bc48b747d5c02e7aa31c5f5cc4cf6f15027e8e0a4857904c6e94fd8b3f177f26f6ed8a06c9af50200cc587ebf0c0dc0af4a57dc55181850ab57b979c93938d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541cf1e7515675c42d00532c253fd02c9
SHA16f7b1319fdf913a5f14ae2da381b1e2a051a938a
SHA25650eddfb6f8f7a61ad2e5c6b4229bc4ee8649cf454b4ed2af837f2fc01b558a3f
SHA512a55405644425b17bc26479c309270ed3c85c8acb50ef06a1ded7e9150ff7b4e7359c7c892ea47e42e84f80353705f6e740d0cb73535b2195eb3f1887ac7f5020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b09f399cad8ab5866a7a0869da9746f
SHA1967e1c397033415953926d89e9b670dcefc00eac
SHA256da3ac6f9c4e6fcbbd1f57e9a57743db8a22c2c25b7635c5b9d8c0c660f30b411
SHA512d1bf299475a7f03ffea3f8a650993f4fc61351be43462e430a0686fe9a3097c5ba741406d03b3849d5fa48b37791ea448e55b73247eeb9df534b9f08f24ba11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4b75718ba23ae1232ddb1463469b16
SHA1e3d3d08c90e9d2e8aa6ef1ecd4b1d11cdfd5b2da
SHA256d731adee44aad6407b2808b6bd4badd47cc94fc593607ad00f28be2fc6686a7b
SHA512bebdb7dcff4332623e6d5dbce782ee8a40b8fbb506b07debff3f109a01cf1d752a78ef51697bd355c81349f55a73ed83a28fc72c04e7084e5ebaf49bbcac4942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52193b99dd4acd11e6cf8e3633614a5b3
SHA1605a98e56f53407e199f3d39e1cbf7b934e79577
SHA256a0921d2669243c2482404aa35f241686540265329e4a231a387174c2f1cc94b5
SHA512e5bc7d6b3acf03e50ffcfb1262bcd4378e245743ee27972acadc63776fead6a53f7974dd4db5a3870dc02b2a964faaf86052a2323627b936221cd55b244068c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ffd04ad5eb7b7b274b8d785ec84270
SHA1a7c9404589015db2a573cc48a84857d38da213b5
SHA256a51b0ff265d4be121345ccd4d0d7c7d63f5f316d4f8e99782f2b81c64d3264ee
SHA512730a06b2df48d5a329d8067bfdc947224fee78374dc1bd22b6397b1ad6fd2e2de2bd1f4fd0eeb54e72678ed840d1cee27ec224137dc29143a596929ae1bdeb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0375213d873019352a15dc4d3b10f9
SHA1122b04d7f8fd02879d9fb9b479087ef8d736ffde
SHA2567378710e678e2f89e7002915b033f841d99550d523fa5f0bb050f00a19d07e37
SHA5127241d74fb751bf1f4b707c266da650279ca6356e5023b2b0e1ea06c030f704ec95dd1a943c5826812c1b73084768214f3edb449de3e4ad72f59fed6f41fcbfc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b9d41686b49c5b6347ff233521aca4
SHA1ef3de7e53d512efab2f03c29db7e23de480b9594
SHA25628b0f2adfffef6c927c232b77d8cdfd062ff82cdd8a645483364ef3b35d1c520
SHA5126f8c6c81eecda0cdce2c2bc7c669b9d7b9b5973ec45da85137c4e4fb80babd119e1f9b9cbe16407aa23c22e221784d4df47a05ebe7ff41c467e2a0107cd5aa05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c685b3c1472607392b1e5ddadb37833a
SHA1eda54328cc4ec911aa8cd95f45c20de004a05530
SHA25610b147d9f60b1d07a026f72153c9146dc15c4330c29ccd04ba16c22d09cd6267
SHA5123d86a37e61a3ca891cf77bf4867f6edeea0edbcc8da4c5e6f784cf7c1c53b96b09b112032bcf0d01d5d1153a67746581568ac56ee6fc9095422d17394f860f22
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b