Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
d383e26df31e7bd4c02360edb31e5d73_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d383e26df31e7bd4c02360edb31e5d73_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d383e26df31e7bd4c02360edb31e5d73_JaffaCakes118.html
-
Size
30KB
-
MD5
d383e26df31e7bd4c02360edb31e5d73
-
SHA1
65255fc111657a762e1f83b022b7a7f2c756f48b
-
SHA256
dbaac2cdedd0b547b882ceef67fec9a84f553312ca2be954d7069756898760a8
-
SHA512
fdec5a3a169a880dd09aede0200b60ec0cf71d477cf1e299c7377795c419dcb8bd8c6e415d5055a5d30a0d6008e7c6b76f26e1212fc103eaa409b7c71bb13eed
-
SSDEEP
192:uw7D1b5nPI8onQjxn5Q/XnQie+NnfnQOkEntxlnQTbnlnQmSHxMI4rmV2qLklP3k:/Q/KQxMI4O2qE9C5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E438F001-6D98-11EF-9917-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03ea0b9a501db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000256179690eaa7d16657eff7dc31ea0924e4dd6f7c93e445e3d0d68fa65b7260c000000000e8000000002000020000000aae4e80e99f0458fbc809952f4fe6f429c57eeeedb524a25762c551b016ea9a02000000083c491cca881d06c21db2482cc9746f7c247649cc0469e0a3a2016d70839a41240000000029f059af112c2238e21b3aeb8aa8944178ed139562ed90d74058ed4cbe1962e8a807caeb96f57b7ee61aa4807300733cc37fa54cd82abcfd61505ca9be96ad6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431930758" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2940 2400 iexplore.exe 30 PID 2400 wrote to memory of 2940 2400 iexplore.exe 30 PID 2400 wrote to memory of 2940 2400 iexplore.exe 30 PID 2400 wrote to memory of 2940 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d383e26df31e7bd4c02360edb31e5d73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7aa2eb950a1e3a9a145393e3ece6beb
SHA1805b01a4d8a898b2377cbddc7e2585a897956e0f
SHA256a7358a1aa8c6e79c96b232ae335e61f5ddb161dab1736edbee79de1097a741e8
SHA51249cefbd5714633c01247cfd62573f3be35b847bab13b47c966ad2dd9a676b4f3cf7b22412241240e03cb28fd11d73edd73b1415124e794a780273cfd551a021a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bfcb78dd30f9a54c117c2e93c22c829
SHA1d13cdb48e66f471afc2dcb7272deb8e38c286781
SHA2569bd26a372f006c2a12586425cf5112485efbe8f4f7fc409f797e3f0aff59e07b
SHA51299efb7c7b03a0cfdea34867fa5dcf54b136800433224a3f2cdaefd0d28e280d3af4103fe878cc7902be255833cc7db64ae1d965d87a7afc149c9f703f1ffd45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e4cebb2be894f13a7497feb037aae7
SHA1ea9781c5b7ee60f88b1f6877d522329beaa31362
SHA2563a523e0d5a6c2bf32fc3ca8ec5352f17217effdd48774dc5dc01856f7e5d5376
SHA5124b7149b4d04def253bc6c6e295eea14e7c11657df2afa1abda1e877f8dd8c07ee77e8842d97d6f5d32a89c7c9264bc40643dca768040299f9617dfda8a71bd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efae84d9e8d081610709f247793415e2
SHA1ab2aadab31d2aeb5931400a14839221eea6317d4
SHA256caf9981242c269924572699d898f55d948f36bd5a3a4058843d4c8ef5f4f1597
SHA5120dae0a2f681024a87fc2abfba61add6427b587c7c973ae9397b6827adf0759561b9f1295308e04b33dcf7575a53bc4e0538aa0b9a5e44bc2e758c22a97840600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593af9f1e0a93e5eeb2675972db1874bf
SHA1cdb50f1d26d51dab054bb2e595742d499e085a3c
SHA256beabf32e1fae61907a97996088abe924fb577486baa5280934a05a0f5b535328
SHA5121c5777753e29fc15ab91be2a461a85826b6aab52bc5ff9b36c09ef9ab8dd95dfda843813103cbe976a74f41faac284b5614d2f3997c658f409ae8426cb446737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50924a67a9389b83e33d2a6051ebd6608
SHA10d0f2fa2f24f17927ab177332eed65916cdad480
SHA25614ad8cbc2bf844a01f98a410a5d607d318a425d6a1f972e3bc735666ea56f358
SHA512bf78465eee0ad2ea6aa17d33117c8dbf0cb8b3d554888e744f010abafe18b0e3bf4cca6d12af76ebf9188ad6abb753ccd7b44bcc751753b92d6ff722842d1711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad560d3975d45143ce31d55007e6dd5b
SHA1f9a8f9a6ace9709dcc11911944fc70b0e399a2de
SHA2565fd6effaccc8f1cf0612173a672b3733d831cd1ed9316a3b39c876969983a597
SHA512c329eff74a5ec94cbc5595e2796100ba76122fe053079c70e26bfe31709d877a17a3c2fe99aa70ddccbddf98fe6184db7b2d23effa66f3b65639c8fb15e58b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f110c648e7fac899a3a15dea7c00cc08
SHA1a75a4082b0238a74a979461f0e7f40e242a14555
SHA25668d9bfdebcfbbf7c0b3f2d209ef86ac6cf064d804eaa88aaadd07961abdb4cbd
SHA512ce23176be155f45ac2b6e93467f71a370470f8986f77276c8b38e673d04d6c4a24b6ab18b03469a365132dec3bb1971c7ed64d009fb379d90826710946e1b9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952d66547351de8b117cba59b13a8b64
SHA1ed8b45df6c61d0cd115fb900aff9034061351420
SHA256a7ee1544820d09daf26e9cdb3ef5ae7ba136fd7d0d391184e73c678f779ae556
SHA5120d2f78520bcfd1c81db57fe9a226e78932b53767ef0cf56a57743856de59526ae3bfe6967c26ec5054b1b12730b554bff454700955cc0cc551f7df6ed758f022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b153a4b9646c7a26f5b89e77ab01f5c4
SHA16b78b2eab27179f438ef2f219468a3a2e01e5c87
SHA256a7e63fb279a0b0816daa1ebbfff091d6dfe9721cdef5b977f008e456e66162ba
SHA512dd9366a8617b31bc9924d952ae1880e2ff61741229962f7b956f2b17d838fe7f61c845e4fc559c75f46c4a886941e1e1685738e530826eead75fa30fc94c9b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d875c766c47612cdbdbfd356cffe99b
SHA19de8b640f2337d5bcf14823cf6b0f2c285099024
SHA25645e64d98fc2290687e66323f027926662ec8c0f957a8b88ab91f38268967bb48
SHA5123f4799fc7816677959955853d9e5056143660a1cb617489dbf362e15552ad77e2e6b70ea64f35fce19f57ed89ba4cc190ae72ca4101417481e26f4c807da2d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56881dfb566ea2e99bfc4f271a8813967
SHA162754d701bcefbe0237ad9116c517ab344d41147
SHA256de6338624f9e476529c52231194efc07486475d5aee28de0253a35972fe9635a
SHA512d5b9fc75f0eec8bb7622d29e861287acf1336985a4f6d0346b016ffef72f73334a294dd92fc2a6ccbacf26fb94c3ac341607a2f83475dc72f8434502f3996abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3b37ebd6dcdf716fe5e4018db738f0
SHA15a9370d5599f9a7dd9ccce1a447e56414d53e418
SHA256c12e86515713f0a2357201e93558258bb55ce6f70af7be31b96aae96ea47fcd9
SHA5123833f0b7096c92991cdf114da68749b9f09b70b9f331fb80656a9730ac3eef647e352fea1b60021335031177af2a3f16ca201e43307458ad4b692116a490a1bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ea02316efca076041f8a9c795a7a49
SHA11804f66eb862eb226d62ed6b77ae9b7b52278426
SHA2562c04b0f57f0d2f6316d711693e901b37aa1d52205eea356fd31be602fc86fa8d
SHA5123a7f1ba637cbb579badf6ebc40bbf91b7a73d2dc312bc990a4e64c34fdb70c7beb62a4523e4c7e32d1463803425d743e80b93c2bef03002cb2d1175b4edfaf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea5f881b284b43853464f95ae5508f0e
SHA14a2a3fab1a52e7c37665fe6269f0ffff7e85b028
SHA256775cbd0aba3f322c7b67cb075668411397248864c107a260190d06090adaf58c
SHA512ed1f8a64f97d934147300a23581238f7e68026b78dc23da577f49eaf7a95e88710863f59b6a116de331e3ebfa8fc34bacfd36f06f78be21e27deb095320eea46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149b3d1cd88162c0c07078a9928c127e
SHA122da8ed8f61edba3d77c7cac8f01d47365569134
SHA256d1662194c34f626ae7d6c104942abe1e4e600f3c5e971dfedd4afd8c23f2572d
SHA5120aa5e98135e371cf45b91c24de4a03af34418dca6f92187e2060c2be80f72cefe47eadadbb870f2abcce348677579d2dd23ddf35933668a5ae0a7442efe53dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520908f24188a0847e587339fffb012f0
SHA188d6406846446b94f0e003d12c66c74ef409af4a
SHA25660e55a5a5372ac8e6ee4439c1f5cddaf47876251be765575441818d7f409aac8
SHA5128dabd1aeb1392d999b503ac4b0ec3ed9429a803d742e5b06540f8c958d40c0f3a84e47f5e6d390e452c732bb5cef6c4d3c5e0f46cca7af963c111af996ea0949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7601029f8950c40bc35439624b29404
SHA1f7150356a7584364f1b0673f1fd0fce5ec7feaec
SHA2560a28496330c2922de625b165674db19eb1db43e6912fe15f1d07054554068ea6
SHA5121bcfb7b5f06d35fddd9af959ff493e54ff5d74101c11c3027820714d454b17f6444bca608fecf85c1e25395bd3fa95d329c335b271b70d4a77263190df56d09f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b