Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
d34f34debc84dd9541263389dd032ff1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d34f34debc84dd9541263389dd032ff1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d34f34debc84dd9541263389dd032ff1_JaffaCakes118.html
-
Size
109KB
-
MD5
d34f34debc84dd9541263389dd032ff1
-
SHA1
6ee77eb9e6c23412c816b3ddc87bd73b65da5925
-
SHA256
9a21aa5ccff08b0109035efc3eea99d0bfb7a722fc0a723833b7622acd6903c7
-
SHA512
960197b86c0572057cd9fb3c720e1db08c2e810a81d0d03776016ebb7c3d0e37dea04aa2d3b0de242b349089b5d3262edc3aad7c26ef82c8639d27051a331c07
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcgwgGXQsCHARIP3LvZx8cZQLnr1p:sNTfLEp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e8a41c69a42bb8ddf5b835dad7ee680bb73f877ed2bc88cc5f3191261dbbd81a000000000e80000000020000200000006ff75e854ee6f8e353b2ecaf2ecefc1c61b4941fe3e9c38053b25048ada166d820000000ff6d1efb05fcfd2c990852343565af2e99182e93943dbfc872b0814438c03d3e400000005e05ac9b6ddd2c31514ac2da97627f9a0b13f7a8647b4284c38b6250e930dbb8648a169f6bf4dabca244b531052b22801038572386729130e493e9ec71830341 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d026d20e9501db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20F29F71-6D88-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431923559" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2168 2368 iexplore.exe 29 PID 2368 wrote to memory of 2168 2368 iexplore.exe 29 PID 2368 wrote to memory of 2168 2368 iexplore.exe 29 PID 2368 wrote to memory of 2168 2368 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d34f34debc84dd9541263389dd032ff1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12f087805adac40d2c3ba23a7d6562e
SHA1e27dda5cb379ab8c9e03871d73dea9695d7f400f
SHA256af7f598c5d6d5abf1770f5ab55bfb721777c4df3e0c82e22e46848447a3d70c7
SHA51227e9e98182cbee106d6786097012a02eeb33e6f05880b703eae818510fb49b45c6d0793b6463636988dda063c4088563dcdeb0c1b945ccc46c9c453c6e1f8e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6c9f86ccbdff93cfd7e3049e95f1803
SHA117c0fcfb7de229579ea0f6e3effc44c22fa0844a
SHA25695b2e9a663b0d06f09fd7606138df2be594f42a2f52b8d6e7d9fe1ce9273e079
SHA512dd12233acae16daf7d631d1a0184fcd1d76b9558acb022d86357b2f8fd675facfed573a8a09777718f43fcf5c217e1f06f2cd4fcd11f29047e368f8774a79cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540303cbba7db815ffd0b41a2bca8304b
SHA1e0b85e7c1bcc3076e22081f94d351e20a253f0bd
SHA2568f4ea541daeee16cdf157533538b93fc4ab495d847c05084de67ec2e42598082
SHA512a014c76a51e8769a819ef4eb090a2656f180098e0925503846a73c5b5f8b2d0bfa12b4c6b3f3a316a40219cc58bd30908f1cbd901d347835406556274b02265c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e254f626376e4f890aa8a83f03653bc0
SHA1ee3d14106413ca440a868565a402d897cde8c2e6
SHA256f9092604f83e6220936b3f8e2bc12e5cc2d32669bbe9e2f29536a8236c5378fa
SHA512100d4982075a926a4ae373de534161df17f50ed4546063e64697b8b823708e7a65dcd689a1d07bc99098ab6d284063e806b76f2ae73d9163786bde1b88acdf3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5148c61cabcaa1091ea97cc2d55fdbc57
SHA19920da35bdbed947adf76214fa6cc27ab5fb21ce
SHA2569d9cc1e59746c041e4d5c7d8281c1cef3f2209f1dd4cfcb8b2b194deeed3fd7b
SHA5128e7c1f9923dc69d1c74f038c3cfb0f3ba1fd16e6ddeee92f7c090df17bc7275ef19e46c4c4c0c505dab45f385c0b6e3b1703e00ffec8254b8582e4ff110096c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7581106285a24084a13f59a47ea7c1d
SHA1e6bfc1b56c8b5735033b92fd36c1c2af93d538ca
SHA256498f0848851ada7ce31e7aa87159dc800f520ac7e1b1884189ccde4d984bb7fe
SHA51241ed6eb7dd2b20f5ff8059915193c55365b7eb8d033b094f0d94ab28c867dda88763eb43a648ceb8b2315ddba42db1e5cc6bf5a20a20afd2258f5dcf0cd137f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f76271e05f7c416abda0ea0442aeca
SHA13ee68e5a26ff31a4498bf53b3443952de9c8b90d
SHA25638983111d338084d480f9d7bb76ff450a2cc494a88f120e3c91c802e0c3e66ca
SHA512f23d38bec69edfc2d65bb3c5d68c37d31c80bb84e392b2bc5e7bdd40c36b0178d93e8a31c90af732a162204932b6eb254c473b8c9c8613710f6b81056e879ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565168d600a625640555d144de0295ef5
SHA1de0ea800316357246ca6e0de18988e12bb39d34b
SHA25617c6eff6c23fc483b0eb5036669b425e230513576f3f24aad51e3321c8047fc9
SHA512d1708b0c6b35bdc72818a6f2c52efa9e4c51b4d5573904549bef9de22b5d3512a39ae4acb2da83ef0029e366e23313783b2db9ae724c4c347254ba7eef091df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648acb996879132d27ad213d64c61694
SHA1be728b555669ce5027cd31f8dae3ab32a0c168b6
SHA256dec010934c0e5492d0c1c3180e6c6c2178be4dd5ebd04fb270e3fb9396cd58d6
SHA5129550768328f8b806ad770ff970b6900c336a3a5746a95365ca9b03c37bdc0e9dbb4db6b1091fb03d1e3d7597ce9b973ab48bb6e37bb8dc89022ef5d1a2bb2d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329e3da521571dae73d5073f6742a67d
SHA17f4942f355e3ae898663f1145851aff10180ff70
SHA256db13bdbc3092032cba11c04b15006841310bbf9c0307946399aaaf41992e29d4
SHA51238a5f09a8e2603bf53e541f06b09c4471b3d18d8397a27fa16f46b6ede2c421dd76fc0559ac996358f9fec40c74ca10e1a171a121cd7d4e6342f5d57b6e5a560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e743f14edb2a716b93e9e481f6880c24
SHA1e2f38193903ea5ce9c6942d3648b4afddaeda6be
SHA256b3a5b46f9035e51e6a647a0d55c75e94a83919a903c729267f4a3795b1fba789
SHA512bcb47ddf2df8a0a72207d9bf8e34302f63b7226abc5dc94a66f13c3e3525f2ab22fcedd7562aef484858f71a9db55acbdaaa34a893b26270eab1608ee199b473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215ee91e01c7bb36b6fdfdc95086b656
SHA1a8d887ca1cb1664ec34b29a8c2693dc993bd5ed1
SHA2568a63927845e923401455214bc14da05d755e9fd1b6255ad59ad19e15eac3ba70
SHA512719e460ee600be9dcff436d43619fe5cac928c87149e5a1c0b3d64e08bb913009de2495a8717990b9ca08cb3c0e666f3a921f95b18af358ef884c5bb8c35c64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e281e07b931392889366e0eb17c8245
SHA15a85aeaaa6f45d19f4a755bdba4f8387c30d7703
SHA256fa20b45af61cd65d32eec92eae9c2dd7eb9ba2b41471ef17e96e7c27f564999c
SHA512047b7a268695ba5b99591535aef947ae85ca18899df7737fefa06679b13a007ff90cd0326e99be83d7ce8bd67c8c3dc81a69284aed6a34cc5aa7b45dd6982854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158a70fcaf2fd9a7edeeef47cc618896
SHA1d94290f9307ce3232a2e1de2747d91fae5d11628
SHA2562b4f11d379aa391fd56d871122d1e2acabcb4c5c5571f543dd3c1b5efa2e871e
SHA51267623ae2c7d761d138a04956ccc7deb081347f1c180cbb5fef8175a6a186d4a71b6fe0514303bf4142dce5716e8815d0371644922982a619dc8310be26210ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7851fdf08029553a2e634a25d4ed73f
SHA11de030a76d604315426404b68702bbd9a648f264
SHA256eefec646a60cd29e5841470f699fc769560746a5ad2e99c6a567b0f9f64ab637
SHA5122425f40a05a5d591c0dd4be38504d78f9733f130eaad0ff71a3b8816bdabf6ff9a6b7c98d7891d4e21e61028f75d6c20054aff383d9e31681f436753ece62b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a550ffaca877de6a91ba30361a5990e
SHA167d7c99a14c451a5e31aa634ae0d8d97d0613001
SHA256a461cef6f6311a8d36723b27cf4d645ad07213eb36ab99377bce861c3dc99cfa
SHA512289659495c17d97debf23a390b7eda5bc2dd62a02b611dc75ddbf52f7e36facf475a384cc2e0ab25ec36f574299ce52fc56a0581f15bbf9a1e0cea3bb7a5cc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317d04d8581cd4bb7e62a01e344668c9
SHA10ca98ae86bf147be617fc5f3bda48387fb2ec7af
SHA2566254126b00f2610fb92d737f95e57e709747b775704cc725e5ea07a81f0a6127
SHA5129da1b388a59f2e72e255930a928b0f3dca7ac90223f35dbd3b14fedd34b3f8e84cfbd0e8999eb756ba244d31d192534a0e9cec15b3e046836127a9a34a7e0b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512e84297a115ef5f5ea2adb20d568116
SHA1d5186e496e445764abe1aa1b24150fd64b228763
SHA256fd510f555d536f56ebde08f17741af9b6c1eec9331f5e20be85919e25e5976c8
SHA51283648838f5f1fddf7b1f8ff9bb681c09bcdaf2f883fb33f0c5bcab598b8fca6ccc2dfe61ad3cb724b9dce32d1dde2c85c75cb42c735985d9f946ff2294444724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580aa8259cba305f4c3340e41ef24e198
SHA16fa9af99ecbab7dea7413632a1b6c5b5f554df8e
SHA256ebe5c9fb3e74f0c2616f008e386e0db8d0adfcf30e1ad90c396cf9a75b007b46
SHA51287f0e60f47859a3bf871a2b45d448afa0bba69af0ade34020eb7750a3c42775113538ee52985e2611225ab286d1775ff056edd7d13b6834e50ceb60b47f9863a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84c10c7b8f41c3ec0180e9264c4f3df
SHA11646ec1ec52ccedb78b9cf7ae38dabcd0d6832c7
SHA2562601e3414b4d7fc5741894fa08f91a78ebbfa462ed1693e6534b756141795c21
SHA51294218da1fedac29c9a483f94219d922c18982e11b178c5428c68aeb03eb4092fcdf4e02ac8af1410709fcea7623c6eedf9ff41420cdb800097b05adace8f62ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b