Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 03:28
Static task
static1
Behavioral task
behavioral1
Sample
d36e580d7bca64d937b561c6df47a46e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d36e580d7bca64d937b561c6df47a46e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d36e580d7bca64d937b561c6df47a46e_JaffaCakes118.html
-
Size
16KB
-
MD5
d36e580d7bca64d937b561c6df47a46e
-
SHA1
9f0644b44026323b0536dd3e9919375ad174c6e3
-
SHA256
b0cf682bec363e7d418e221b809c621cb189826de5e2d739f2f4e51baa9380ab
-
SHA512
0c2e691f7952b8ff6e3e41e91e641ec503fe86bb41dc8e1a2397bd2f0abd8d9941cc1b581007b49441d6ca5cc857b7b45445f362de833adf7e4ee76b729e670c
-
SSDEEP
192:ChMgBEOks1QTxE6av//X7/p2U+y0smtYVm6YVtKYVGpkYVJwYVSqYV/MYVRszYVg:CuOkjHav/T/UUr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40acf63f9f01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{670730C1-6D92-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431927971" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000745212da5036d19165fcbb43f968c53ced99d1200c2ca30b4a8e79618986dcc4000000000e8000000002000020000000feed61b28f9e783f2aec130ed42f9f93fbdd732167917e551d8ef94cfdaac2302000000028bf828a7bed08ef5ead95a2b70de055d74f2de04d0e15e1deb92f38a79dcbdf400000002f4cba74e9cfdc52e57824ac4065a0683daef85fb9a20edeb2e838ee7f6cf4935a2ca30730155b581ee4e8cd7c1358b0e408b8989be13906f84a4a562431eb7b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2392 1916 iexplore.exe 30 PID 1916 wrote to memory of 2392 1916 iexplore.exe 30 PID 1916 wrote to memory of 2392 1916 iexplore.exe 30 PID 1916 wrote to memory of 2392 1916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d36e580d7bca64d937b561c6df47a46e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80097f34373cadcdf722a023af5966e
SHA17e882778a8a503f6a2366a2c6ae9d4bbf23fa535
SHA25698c4b6e39aeb3298986488ba98063615420bb0e632cc5b392e2ad40c086ca6b2
SHA512c9c10cdf9606779b1d9c0e6ee11fb4e1d99f0b57ebf99ce75da6b865f9f698dc6ce4ac739be5a7fd01a3c9a601f21e1a6d7d6295eabd0d1b2f29f4d7e5f79d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8514422c678d815d734f001574c768d
SHA11a82f43c75e541479938e599fb76f8fb9339933a
SHA256fb9baffbd5be34cad37e434b991e5eb639b993ddc2f0e3934750b5400c7570bd
SHA51283fb3af24f1d38a4fa75491946bb89735c6e32bb93fadec83742b7129807e84a024daebcedff9b856d3ade90cbb2c2c0645ca4c96c3c70b5b95d9cc818639e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a96c5b465a7acc09708e6a8033e9a2
SHA1b4c0efc9bc2e1ed675a088d20a760af520fd9051
SHA25618df0ad1ecd2a57944f286dd7f9dfe7095a76c1fbd18c5d59562c5c299f774d9
SHA5120ceac082691fb7e14c62a863842fb5dd64e7a6d8fbe3c47f6b02776112e60f860fa775d2cf8bab8e8657641b83497062236e201b45566c984a53f61c8c54ccbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53421ee480061b19ae080cbd7f1224e3c
SHA1330b9f5ab6a8ed4ade8161f13a7fd007fa3425fc
SHA256609753e6ba8ad8f340526fccaf27781b936ef53fa0e6b0b885d5afd555809c61
SHA512e2b3ea45f7849551b0036b09fd1802b92ae452366bb507129b673717221aff609dd03e624724eb444be09c714b4736ac207f902e7e79f2caa9d40d903ee4521c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433d081c7f5827c306be2d939bdba491
SHA1aaf30a54164d43fbd81d94384ba1258df7d4a537
SHA256b4f1fd588b39967456e2c6afbd4257461ee2600fc723dfb26a9324f231d1c6b3
SHA512ddf2894a49598d4d6322032cfe1b0ed1dcffa3d62a435eb90883e92a2a9070ff943aa68a11a2f9f7f36f30fb293d200a55e21fb8c7a4b4f803ef8f27f71bae8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4b8bc1120419674430910d477b8c58
SHA122f5665a5db01729be4c62a3316b82431893b0b3
SHA256ccbc025f3131ab350e31f32dcc4103fae6db321e00f22b7ac3ea16109004546b
SHA512f9dad3944a499498e089a75fc28cd35142c9cbbdb6a95a8e637e5610b1a845bc5ac4c2edc423574c52de0927ce79378bf407581f54a7fd9c5be44e4fe68082ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723f406596092a1b4ceebd932441a1f9
SHA146550e1fd7e7ceb29f489ab359338987d1a21d8a
SHA2569d446e2f0fa7a32eee384bab9aa5614a32be57fb4e8aa98cf6f3fd9ec15b71c1
SHA5128e6fcba3ac489c7a4a9e5efb5ec8743c0a35bb7c32b350084ec340d3f78c9809b7d2bdfa177eaa62c7e8a53e276a04dbb26e19fa1008575a4f7362b8f433a84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e8d787f42ef0a88679c6bbb06117d4
SHA11b1c5e2ae7c3914598c7854afa3ec508b3822d2f
SHA2567eb0daad5a2fc46ef64628c1f82ed92d25d100be5b7d5c516e08a4d8b23b329b
SHA512924a8f6017bfd7d7c7bb3f75372f54ba7f55c42cbc5ee715d409bcf791f40f7a4fe3f886eebdf8a749690c04a18e77fe5977d9140d18a0e1418bc91daaa80135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e212dbe92214d61e8359e4379c647adc
SHA173f0b17e66578a54f21f2f16b03ff8201321892e
SHA2567058111cad4398afdd5cfe2cc37aae99e3083950491a1bd87073729b0a8cf9c7
SHA5123b6f775c3620bc150257fa5cd3e04f97daa54d857299a17b1e1ef41465b26d6468485c2ca0808663b5c159de5b86848f0a0392c90480d8fe3fde133411d67877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc9846d6d4495cdbdbbf43d5e885dc4
SHA1ea76e7a0d36266a7e8477ce396ee40a8f26966e1
SHA256a13cba587490e459f790c1178614ed0217be750701b2515262ae4b3ac81bb686
SHA5125e7ec101aca8e5718a6b9c43c5f8c93481fc2c062f49bab96eb8ab2aa3b6ba7ef9c10150d59373d3dcc037997743fcb1592cf164e691bba6f1b0e674ee0a9c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bebf926d304a637b1080df8107df09
SHA1326c717e11de5a7e7d77f01db20f53cde42974f8
SHA256efe1fbde94e84ba1ab9f3acf2f9744477ac5ac94d38d1805ff4a99b8b1644f80
SHA51216420d64008dda9c673ef16d1090de3bee84bcc9f749d2648d1019ff1a3fb63e1b3ec1fee04e1486f7325241c1cc54d420c13b6007af826f2968b8e56d87ef6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f9742bd172693e09c0f9236f6bab29
SHA1c2453a6b00861ef2abe796b7b9c601e1f59ffb6a
SHA25630558ec40f585cd6dc00c2f0c6e8403e55234ecf34bf1d602380012ea6cbae96
SHA512a22577529a6450fdc992bfe737c8deb89b1c7839ade44dc56e5ebd3aa5dd5b6f1a2ead3f1e005966e26d5d858aa354323b2ed188533e5aaacc107c624c8692ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5803b4857185d192082397c3a89f3ac76
SHA176df1ac0b348036018c08a76bd71894cb29f00bc
SHA256298bdf03e45dfc4387208693ffb0695c79a2f9cc23e5f1dc0bfe4215b9b9921e
SHA512bc3843f82d10c2fe711f0369f87d7adc7c7a1c64c29dc1a54adb22b7929fa2a26b623ae269aad0fdc346e08ba1f1e286fff4d65eec4f6c9a7b8e3ccae6ce02d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27b47cc16d314133c68ca36062838c0
SHA1a7ccc8b4bf7f574a33a0c42e21460da39d3cfc77
SHA2568af8a253c3149e50540abf79cbf996336c9c476d9e1d1789d741b8a2974215f2
SHA512ddd121f24dd47b4122c239df93681d9d5e5fbe6f3f7f2c4533b7a8f1c692557edea03606658e93cd6e729a1226e64246029585bdee77c0a5a5a9d84e4db0a327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50e4a425dceb56f73021bfba6a065e0
SHA1524aa9bc23da85bd73f71d206b9b41bfcb7438a8
SHA256e71bcf9b851db876cae6b543e55e5d1f91769405d6b19907f05dc2937602a5d9
SHA5127248f12c74f9e8ea0d4d1454ad923edfda15efb2b7fe4901307333d7233569632011fabbad29a03de327f4e7ac644c58b743faef3552d4f4b8ab58505fb3858a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab8c4ea724b42e5363219afae4dc893
SHA11f2e6b2bd5575100df0d213bbac0c4c61264cf78
SHA2563541c1b3cfa5029340276568e57b4d72adb04107f6bfc3600e69648ddec1beae
SHA512e797246ef5da33cf75555f4e9ab556db56b6aaa96b015243030abb796b9d0def06030464aa7a66c8e18d8dfb8c2e8558d0590413271735f65153c3665c880bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1c048de001d2c4c2306b6763c5c388
SHA1d4e9aa6b5fed1c5203c0cd8eb035150011bc0f54
SHA256be77152db37b4fc23cea4e7c6d0b809fe8b79ccfda22222441a6a603596b7597
SHA51264ce9d11c8accdb6a6fb3635064e06629b93a55785d77e1171f189962b74e500b5a15acbb296dea22d0529a4558e474b3446efeab2a74e062be92767935b09ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae25c337b1e5948d7feca58dc7494bdf
SHA1543d45ff0e70a3201519a9ecfdd5159fb148e48e
SHA256da399323d77d91b4fd6152451df58cf3f9879b6308b681e1bd9a6e57a2c168c3
SHA512c319d8287125e9f070e00c3d9ca1273c216d4fb315adf4affcff6e9159170dda5f4b897e533af7e7b46dbafe85c9e296ccad8cd80ea86e88114845f097731b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372bcf006a898132cb6affb74891972f
SHA1471196cf3b1742ee3b1a05b0f5e9e44eaaa58927
SHA25694ab2a0477c41a509dd9f1bbb07049ac3f50dfc482e31266c028f558c2345eaa
SHA51241f71779dc111ee6bc646e7471e7591a85e4ee739da71366d598b8a9619173504561db6fa6eba3b80a6540987dde8c8f42a49f636fcf0d4f3dd2c6f563e030ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b