Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
d38c13a1f4b421875834211de3b4670d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d38c13a1f4b421875834211de3b4670d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d38c13a1f4b421875834211de3b4670d_JaffaCakes118.html
-
Size
25KB
-
MD5
d38c13a1f4b421875834211de3b4670d
-
SHA1
15a13efbedde5cc86896495d9551ca1a740255aa
-
SHA256
3cd107c8a60c8b664dd64048f5b45e8036a898301aa5a2b8974e1d7f7e3a24c5
-
SHA512
59ca986f1dc1f87f951f4c4e1b5b0300cc2cb29fdf38e6a1668938c077f571a5cbd844d2474ffc83678943d81224a7e91964223e7e182429bd2a173d89f5a0d6
-
SSDEEP
192:uWToeb5nt+nQjxn5Q/QnQieDNnenQOkEnt8+nQTbnhnQ2YqCPAapdEO4cwqHXMBa:1Q/4LLrOa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62921511-6D9B-11EF-B4D5-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a92c82b185692d6dfabeb9b10103c11c37f196cf94853f9324ee9d71b6f2cf09000000000e8000000002000020000000d71dd8e399a8bbd7790201cf2ea811673f911501df14c513fa1b9a7e5feb6d32200000007d80969e512f254f81b7c6480dd1bb46f88b065e35243301b7f82c707d97d44040000000d282daa004e2209bc7d3c71fba68a89baa9efe5cc3613e774140d8d6a7e72b04aa9b75ac338d1a911f650f81c5f7b9d6f2facaf789a3e33bb88c724768d6b196 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431931829" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0058ca38a801db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1480 2528 iexplore.exe 31 PID 2528 wrote to memory of 1480 2528 iexplore.exe 31 PID 2528 wrote to memory of 1480 2528 iexplore.exe 31 PID 2528 wrote to memory of 1480 2528 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d38c13a1f4b421875834211de3b4670d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1f8c0d781b8235036e636ac94c543d
SHA1125602ae8e7b2f32747a26c2e333d0d4ee0c9616
SHA25696e660974b4c3ec4dab37c23fc2be086634e1fd3f1230a80777d55b527f9cd41
SHA51274701e16926da24da30103054022ff6b47ec1087f4a5e081a619618abdf0ac8a66b23d1f12806dca9d52db0defde657420d8cdc6a87ff02871f04289c72a7efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59309d67bc6d18b5ffe3dc6becd2d707a
SHA1a5dfdeace7e6c023e0c723e5b62949abb28322d5
SHA256a7f5d9ac8d089e692f5915631e682555e40de8622801d12c77efa4026144d89e
SHA512c58dabddd69c0fad375bce25cf1bff20e8c9f098b73098ccd6e4fe23c95f49ff8fcdd944e30170dda0a5640297f34c9a0c2c0eec8948b5751eb54c812e525491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c63a7b6d119d412103249cc73ba49d
SHA102792c5bcbab040840bcf59bd500cb082c995483
SHA25626d1bccab6e6cc83b5eea1127fb8ac1fb4fa91b66a35a227b7faff7c3b9e3c0b
SHA5128200749321b20733c261b46929dece33ee2c0ab3f6995a1cd11f83b7efa8f1c893675e71d5443c88140fe877f282b45af7f66d4b08bb82c60bf9b21c153af1f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6b970de0e5110892c9b038abfc3d1b
SHA1e938bc2fca90e9236a6af4bbf2879165d0357b9a
SHA256c41d7f64a1f153e942e29d9a424300da6f67b33dd4f0a182d52a13fe5489c8d0
SHA512bd9beed9c4516064544fb4e238a39d722cb794983d2d96f72d5cae28adb8dee9dfd58d46d09a4ad4ca6d888c34282dc5d42f3d3ff0491f8254d35df31e969b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599823e362959b6d62fc15f44a4c24572
SHA16e8fcdc3f5e46854696751a3ef0ec2daeeaef0bf
SHA25638a7c67f7e148d0d32270a70a07166b98d754027e11380d5f401173e6880d4c3
SHA5121f27ddd3bdadf2141831305f34cac3d9562c97926c9112ede4c1937455857f2a99e71bfd420bdf76a2817e7193200caa41b73615f5180ea9da74af4ceaea8456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa4589d133ffa8423be0820cf3777f3
SHA1e681f35959795b4344843e820f1322c1bf9ae667
SHA256d9397e53dab3326086718ef51b470a447565c1093c72474701d3b6b39f636bd4
SHA512106ca76bffb24cefed6d3d1177d60069f8e8640fa504a85e075782818ae82c13046807b4bcb853cc6226da87b0a50965d89c80950ab1d6cfe615c8e7236e6cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec45a7aabefb91c77f1675381f3d25d2
SHA1e01cf21277ed0056d397c37474df25982e9144cc
SHA25624d4deb931295fee4271860d6626be608ef717d154648bbc386efe95fb8aae41
SHA5129f310a324370fa5bf810d4c0cb19b16616919f3a6f4b07c887b7cc3d518760f96ecb9a7a4d65c11fada4e1d349f5e083eee3377edb8f04fc71dffa057af389e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555dfaecfd9e6d9ab515a4c18de608066
SHA110454dd0b7d2fdf81d31a95f3bf5b1a45e68c105
SHA256eb86110e968ee92f8852cd902c8cd11a0b0e5246ca620446be7d03d7d73ea080
SHA512cc50ec0d53132ccec086bb2c9be18adedadb1e15d9b009d69c117ef9aadf7cb114f85e0676c3a3b2189c905b791ae92041ba2faef96d3083930e693c14f8be41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a9d94843ab86c9be6bf5c36e7e64a0
SHA1fde3fb24eb1dd018f92de52009048f2a4b3beb58
SHA25646fd3a13a4e49709c1e82b41f7803a87ef4698dd7bd6d26730d4532b64d0f515
SHA512743792d81f5850434ea9454557f117b9593b66f442d4cde3f8fa8f6f96cdcce76609a2a551a58e68a70abef3c1108b61663b8160b5eae376e8abf9db5bbd3eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3dabd925af911db7ad9099146be3948
SHA1ea1dfce6321516ea326230afb90744f145d588e7
SHA2567a9aeaa7b03d4e249ef454c3569eb497d84c17735c381caa03e8e3292f81eb87
SHA5123113c4393451435012c1ab2755782254b96351ddba3fcb0ff77d54ba9eb9d96ae195c76d569c24f96d4a5eca9830a6bda98f463eaa46c26be666bd4c0c2a0176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f2152641dd12351917ee959515028c
SHA177ae4281feec66dd3e68806e9ae3840ed11f1cbe
SHA25607fa4741ce5236de62d09acf53236cd9f387ca22f9aa8b45b9c200a89aaf88b3
SHA512b15b1a83dabd7142273ccc9301fb347ec09745821a21703f9f9f00f8f895ab63b230497544675a39c71e1204290e8b8a101bdf61e1a6ddbb69d7e161d3595171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527cd8ebe42926a1c7e6ba6c6d194c2c9
SHA1e56c8677ae68d2b3644f391966db38fd1c298ca9
SHA256eef7ca8cff37ec75f79de99d449814da249131e36ea370d098b8de0d3410dfeb
SHA512adedb2fdb70dee092b082fb4e6757e0193f54d84cc32f3f23809c7ec37a750a5205ae2ef2d50499ae86f75ddcd2ff73765548e4d1ad6f5e4759c1840a839803f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb607f20384a55d8d32e64417d1b5a85
SHA113d7ffb148038ccb320ec3c68e1fca4b7f41c983
SHA25673b711b02b10bbb0d4b111bef02e29f80b7d492191cb6451430084a9a04c30e7
SHA51230ed665812ad0b45da014b11ea66917a2a54070a5d9c2a32eab745a3fa8862a8b8854be609370f1bd7cb2ea1947090cd8c9ba07626d6dc1d4ab2578e9e190ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7527fb0e70bad85eac059709bedeaf0
SHA148f0cf76c2e4af87ab3c3a315721382a47c3b55b
SHA256934fda84a8dcacf5950c290356dadffac1da091dd6f222eafbd14adcfb4c5f71
SHA512b9b9fc527c576e374fcd1728c9639a8d23e02be582864440a5cddbd40583c139fdd8ba6bba4568290e28daf54103517b49ccdb721ddd11d68613235f15467faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58688bbd0c5534008e30e4dde4848209e
SHA1f9526eaf318110460646d2cc8ed49f71ee5a04aa
SHA256e876f49a8a0d153280dbb2d4d3b110385c986258bcbc9f6bf97ea8e30afe5a8e
SHA51254f7a3e0b4402b888f890cdbfc67136f375081df9755e33b7447bcc988f2a7ff5f43ddd03a3b461b90ddf88a9dd2dfcb55dd95acd81671a9115cbc7a08c3b098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca9ab38428c1d60c9c749130243dcb3
SHA1575c7a2ee6509d70086a0516bd8fb7b261525386
SHA256c629d75a72196a76f4e910ccf10f194b63689fc291c84fd5c9da08d1c1591d99
SHA5125063b34e5a900b2fdc93aa1f2f2c71cd4d0a593939f138b55870d9a674742683afede1c1d9745fce52b320341a600a98879ca70aa154adf443929e9ab72b9b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc1330dd21cf8bedcc4aa7e32aa7556
SHA14ae7028dcbbd34ad13b3d3174fb5eff361b4d6ec
SHA25644d0cb6ec420243d1b234e8e2b362c87430f814262f42942e73e6fe95551f083
SHA5122f86b22c56630e6b48e90cbc8da966cdf7f46e58ab9fab2eb51cddf2b8ddbd274205a5beccae19ea3cc9890805e370aac43d7702948e23414f0323c835fdc383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8dd3b55ed218d5b22a668ca30af8d80
SHA1718bfb52451fd4f684a23dc8961620a3f3c74a62
SHA2563f9acd21d35d20d0d81f25251bf1944e10581bccfc2097f9cea4c52e8859a520
SHA5120a07b4b574d9b9c7caccbd7a4d35fb2760d96fb98ae5da0223270c8d7c1fb9cc5c6a35cb75bf2ee9a4cde7fd0ab41418b5fac31f61cdd98ee29df18578c92b66
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b