Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
d383a4301c04f8d665bc6702b73c3a27_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d383a4301c04f8d665bc6702b73c3a27_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d383a4301c04f8d665bc6702b73c3a27_JaffaCakes118.html
-
Size
11KB
-
MD5
d383a4301c04f8d665bc6702b73c3a27
-
SHA1
d9401402af9d81cb00f5756aef4af9cae6ca97c0
-
SHA256
c065d6eb5575049a9862c34bb51a6266d31c303ad39cec556dd832c30900bd76
-
SHA512
7aa09ca5a751fe5b2a56a1ee7e2822622c33b077e4096efd1926df0144eb854f8547dfad150b663db142d8a0743127b7b4272ff60dd4fbab5fc93b7fe42ffc66
-
SSDEEP
96:uzVs+ux7M1LLY1k9o84d12ef7CSTUGGT/kmDp6PU+85WuI+BBmmTiyuIBBB/RuIf:csz7M1AYS/PS3VMmOR2wE+P7PHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB320421-6D98-11EF-8A1D-72B582744574} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300faaa1a501db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431930715" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000004866bf2f2b8f2555be60d45bb823e870e9b95d170abcb3e5c37f1308fb54638f000000000e800000000200002000000070e2037a21cfcd414fe3c7a3decdac40d35e7002b85492ed1d6070ee55e466fe20000000d64cfb56f2026c82a50c80fdbe4d7774f227d7ed37a21ea1e643c2ae728658fc40000000a488d7e3d29c6faffec28a2c1e5b4ce81b02249f2520651ffe4d679665d1fac1dafb35510a6045e42baa7ba7becf4ecd78022adea5d549a096673407b58c5dae iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2592 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2592 iexplore.exe 2592 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1612 2592 iexplore.exe 30 PID 2592 wrote to memory of 1612 2592 iexplore.exe 30 PID 2592 wrote to memory of 1612 2592 iexplore.exe 30 PID 2592 wrote to memory of 1612 2592 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d383a4301c04f8d665bc6702b73c3a27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a39db0b656caff6a656a32440853f7
SHA1bf07bc3db9e90ff4e534e68908301d7feb7cd2e3
SHA256c7568a1646b22b8a37ef945acd6e4bc9a34686398a399664fcac1bb6d41d4f01
SHA512220e93412213697d2ccfc3f22cacda9c005a7a826e2ea920147931f5a06ea316fbff769f945de7ac097b08276224208b6aa3fa03567aaa96aed3b211f1a797ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58339106bb58566aef8f47928c9610116
SHA161a8381cc9e038682a89d3d6dca4b0d6d64e6818
SHA256e3fc7427b5d0d419dad32acd6ebac38090e796ded5499b79855334b600b5a950
SHA512ea41d1a929c7f8cdb1b0d7fcb65f9919dba0348f527dff85a6b1a8b1059d35fc5ffd0906803a14e1880809d45ddb8fb699e8fa32f824747e232fb610d7f0ebdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be137814ac446e65e7a4aa45612b4b17
SHA146f9c268b9ba1d97c27f0f1cdb97c88b2583b0fe
SHA2566d254724e1161f51906fd7d03e7901bf473d1c1e8e0157d2ade3eea6ad923e40
SHA5126ac54a9f53cbed8460acdd15e5e64dbd3d144b196433ed742b60aa71b790a08c3d76f78e95539fc0c82ba566a81dfd0d0a522e08682182744114ff8dc0ffe08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50880028a8dd9cb9d26ef8f87f22712f3
SHA1d32bcfaa83886c1952377410d0f732da5aad2c4c
SHA2563739d0968287c74c9f2b942b2892d1bb55be16cea9b66ffbbf52dcc5b250663a
SHA512ab6b47823566a951c0bc1138714d7e95ddd6c247ac29849a119b740f428e83d5bb5b3056365bac631b7c0cc836144d30051f5594ca293b473585e16d5d427bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1a4d30fe321813dc7e1c453c72ef15
SHA1842fca2b4bd558c321148c85dce05db169cf27f2
SHA256c535e45ca92a81fdccd589d3a7a196f5d1d99ae3de7e1f27b1685f71b3148a8d
SHA512af688f1eede131d6583e6079482a750b6fe52efa645bc354a505a282b5a2e6ad30b1425062ba5c6d82e15ea679b36936ffdb7ccd314bdbb7f1a202bdfd0e47ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e4a0349346891b6715f105033c5675a
SHA1ecb6babd73edb8ec654a1b0d1cecaa8cfda74d3e
SHA2568be83c5273b7be9303f6e7ed6891a4160b9bbd6d23bce3a093a9b671e5b9849a
SHA5121430c4fc91c1496284f775c560b8cea215c86832a5e94b509fe3db7d4fa499940ba018f1c2f1b110ca76be1968bf2b756b74f51e3bad81d1620190bb4f541c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f261d31958f1b8d2d8a1cb639955f8e
SHA169691bd30f5a9ae8900dd5b674dc0e494c75c02f
SHA2563302aa82f179b60dd0a98351cf97c9a95061c9548762dde6f04ea4a6627d4790
SHA512e6c78bdbfe1a3ad2a0fb0b1133472f043d94cbfff0255603c196516898601ffc563c78d9bfe67deeda34c4f12b2a5e4bc13d57ccf82c0b7606ce97cbb94322b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90d76fe5d0f3a1e7e0f074499b41843
SHA11886391b4c0bbb27f51227361b1b66470fb953b9
SHA2566a9561cda009ae61f71e2a69ec396618a8070d28a15fd5d97aea49f2c4525de3
SHA51226ef55bf1c65da0c393ffb895485d902537566a3528c9009738591d25cc0e42d996e69a7ad57b6fbd50d672e0cf70da1c8cb977a5910aab6c3ab0b44d74756a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cda2daf0a48d11dbb21ab8de89717d6
SHA1665b481add47d980b19905ea754b91c8573fd220
SHA2569e80785dcc9cfaad8a8b8ed537c4efc472eda857474c044b0159590f4d3f7850
SHA512bff5a9f8d3c2374d4725eae1b89cb22d80a3baf8b8b866f5713c78f240245cd979c6d49c3c86b840c26b50e6003ad6106cb3a070014021542dcfdbfb0cad3e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516978de17d0f8890d5dbdc477bcefdbe
SHA10dac934ebbb43623847dc1588f74ab9761133d1b
SHA256349639381ce4637382d0ed43c1db4d5fdcb817e3ca804c774cf97cbf8ab7577b
SHA512157f6ea73089cd6c45070ad09f1deb576d962a09241efa22df5118914711ec8eec1f5f98426ca2c331c5c924da7578b73f40e8dcdae0fe9a5331c2321ed2ac85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7bc0efd5f5a3093985688afd139a7f
SHA14b54d4b8dec6afffb7e5f050f1eaee90597f361b
SHA256aecbf9c03930e53d7999c6248c914a43a23f7cd87c541416e7287c84ad9d1a33
SHA512864bfb8ab78dd222332b4b89be03f16f311897b757016cbf3bcc524756c640efb65a14543147958450da444793e32177de15cf7aa55cc2371939616e8d1a88c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157b725c5bc430e3b1f0a8f122d62e74
SHA1dd92ddcd391d1578f1f1a065743c629f115d6907
SHA2564f2185ee75e5a311f61b1eec847c7c49ae32a066ec1dd98ebd63381d8e47e947
SHA512ee4fdf8dbeba1317b01191ab3fa06274335d22dce0fa41d4fa7aa7b26bffeb7705ffa9588515f8b1ebf0a977a367ce6bbfebfafb87b387695bad38214854691a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b7ec3f370c6da88f4b4f6411e7c5fb
SHA10a7b20aeb8e0b7ba1a6bf18906694727b4717f97
SHA256e2286b8ea0dd439d113ca341105bb4c0c29771c2af3e4c3fa71764e9e456c14d
SHA5124cb164a23a78cd3b0ee13d02c4139eb66ab6d74c004950260ab65875bfd9a0aa5131e7112b11fbf6f368b6f5b0a23642fc618fe8cda5c44f3fcae02ccb665aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dccca5586c437639ed04c7ad33a92202
SHA12f7b285a29fb1b6a3f45a49ea173246d2c1d2d69
SHA256f0087bd73dd343794ad219b3476485f6be13d3b19e550fd6c55a9c45a802b69b
SHA512768bfe7b99941e26678a38777245a48554586a95c478917a798e06d9454a06943897661c18bb90eb52125b2e7b595e3ebe20dc2f2ce3cd6718305902a3cceaf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c92f071904c9b0d7cfec2ee8bb5896b
SHA127b60ff0ccf83f206e7c63d9aa551e5cba671e41
SHA256ca95d51997dbe5504572b1a3dc3985aabf0ff381ca287c43db66669df80ddc44
SHA512aeaea00a05213fdd6040319c752a0d7deeec9e098bbe4832b777f112c71ff1f60c9a67e44ad7d06cd71484fe931af1df75bf8234b612edd9fcd9b6f582fdeb1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55095e90fdf3db39d99dac9e88aebf7ff
SHA10548a847bdf7755f4ba2c1fa953a093128028ee2
SHA2564818e5a5a1ebd53d50fc23a63f2ec77dd3fcf8981352d7fc2bbb5797f646a2ad
SHA5122667845ad23c9c87eb6c2b8eec7045ed23554e792042d1db11f771426461de1cde73e758c83510f565de638c1d7582153aa514b83a96f8fca3e848ba31475af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae61aee413c05d86321651fe63d57ed
SHA1765f9abf353c3271953be831b55a48a503a078d5
SHA25675b1cdaa69060035f6551320d2f564956aee356c4ef347df7a7c506babc607f0
SHA512b288cae899bd1807a93f984c2b4f8f48635ade36f9e5623f2ccfaa989f03d3efa3ff3b7389dcdd172cf662b0c0c001217b66075f143c54c9a553276fe792042c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918ef571efd8d160a38654142dbde0c1
SHA17bf88e7a4da61efee45f046e5af2cf98a62fafbd
SHA25699bde3901840d9f7edfddf5dcb17196f44359bd833f3f70df9c9255b54a8df76
SHA5124614ba42d1898666032feca06c034c9426931090a43bd0f823cb738ba364499eded235f2f6ee2bdba4413bf3cc985716ba8790ec6bfbafbab615d6a2e0819b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a472a5ea109b612f7e405058bd8a08
SHA18385892a5d4380424fc66b2bd53c3c4b4395d9ec
SHA256c3c619dcbc32b8878da15ceebc29000c47a6f50ec37e58b318604055156e05b7
SHA512612b84e01f942c4deffb0011ab30f03b820166fb006f6cee968a7223abcbe60f548ce87637503500c75c8c170ccc2912733040b2848398645e6d8482a581eed0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b