Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
d38500c4ada5ebc6cfe7c9a92124d62f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d38500c4ada5ebc6cfe7c9a92124d62f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d38500c4ada5ebc6cfe7c9a92124d62f_JaffaCakes118.html
-
Size
23KB
-
MD5
d38500c4ada5ebc6cfe7c9a92124d62f
-
SHA1
b9ba7d80a69217b28ff5f171c99c665e69b9dc66
-
SHA256
df6a346e50294075eb8820b7eaa28f6b009694f623cb8abd98c9094e65e6d1e1
-
SHA512
59c4115796402476658b95d04d5f640b7008db0cce2f2554005877c6b854f007c0ecdf1619a7dc644f39cd2da4230c33876f7861fc636606e0d83192bc4e46d3
-
SSDEEP
192:uWzEb5nfSnQjxn5Q/2nQieVNnbnQOkEntu4nQTbn1nQnCnQtxwMB1qnYnQ7tnUY5:6Q/Nb2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f31610a601db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431930904" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B4164E1-6D99-11EF-B44F-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000066a8c8b1b89fa6495a712a8d9dab71635aaba7d28a711115ec63856400a30bb000000000e80000000020000200000003e2b9806d9c0b224d1619a9f2ae1c4c59f2abd8672aeecdd2d2f8690889c86d220000000982f3a20cca6bc3dadb80cd298b71c3c25e050bad6a6493d8dabbf938eb0d95840000000c2689aed688d500302f132bd96d3c8d0a355204df5d05b757bb76d97d5a4833ee12e7c601ab5b2e28f6dad5695f6e2f09e33f52616229b520b382c4e094a4a7f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2724 2360 iexplore.exe 30 PID 2360 wrote to memory of 2724 2360 iexplore.exe 30 PID 2360 wrote to memory of 2724 2360 iexplore.exe 30 PID 2360 wrote to memory of 2724 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d38500c4ada5ebc6cfe7c9a92124d62f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566417bbce7254aa5792131598359faf0
SHA14f88b5c93c0d0f3fb88521b03e8d565196423a07
SHA25689bc2ec82b3f6f5a1346373462c4fc11633d3fca3b639a46bd803703cbcf98a3
SHA512ab504240d8cbc8a2259a1a2ac9f6fa32e7a0b08e45766f09e7588d2913336d5b7f19be74a4a64c3b841cb9cec2a98e7fec77d99e355c5e81bb9cf15ea43d9a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59511081299037f574b4716894910a524
SHA158a3df5c02daf407b11d279179ac9b0edc2f35bc
SHA2563a65e42fed43fd346feaa8bff458ce6dbaa585af5f9ca25a31b8168a9cae9a44
SHA51281b156e059f8c81a3c7989152ce988577c3aec954acb77e65183d88cbed2703e9a3fa7e3fe90263d1cac2bd5247f2b4c820c85a0e77551ddb325f40529ae249b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542cd4f66b790d4dac012528e588c5b88
SHA1ecb10de89a688720e327ac2054efbbdb578612dc
SHA256766ede43bed989859f9207f246c0841ced58e932cefcedfc76d5741d822133d5
SHA5126a38398ff56dfba2e784ac8885af956939d76ef61b59269c64611ee556cf8e705b4aa0df5ff817dfa7ccfd39b20510414f95edfc8f1be792a869e245a1cfcff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534908fd3b1d4d62ee3b77b4d8128e60c
SHA1c46ae2ac76455b5d9043c0d2910095d3c637ea94
SHA256502305f5c1f2e1610730aec64bb9991e045853347f20c012f484b2bd1178b051
SHA51277c2aec26e56e64374ae76e821144c59b153505e073f0e0c4bd2066eba314516f85fbf874b8fd190a128470516fb2a0d3997f74f62466fac63ed89a246cae6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5fb39adc488aeabf64edb238b5979d
SHA10ae681924d33478229fabf8da600cebf0468b36e
SHA2567a09a21ceec189a33b81d88b755c9e729de563ae20f18bd97c983c8ca502f72e
SHA51222282b515e9751e43db2f6695c5fcd277ff99011122eb5c6f2b0f58dd68270900fdc9cfd3ae281062eaede752da0e96bc504b42cccce490f3ef32640d55ee833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a2205f02d6d32a701c15c2de1002920
SHA12b96b6a9d44ccc0b9d05b4430a928202cb0815d9
SHA256c86cbf9a89ace61e79245d09fa1ebd6901361d4ee3ce19ce37a0f44448b06742
SHA5123d3ce4280611b2a5080a3753ccf4576cc8604f81c3880a79c4eb472da56ce4e08981d3fd9bdb2bc36b603a480d7b7130b2de771df81d889baaded8725425b5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90219f86dc783c9bbc9bcb8189e7990
SHA19fcb309c0c1521dab2af77b932251bba339cf8cd
SHA256f5526aa87b9c0b3944825180aab54382c69ff1822bd1b308696176e5d9c7411f
SHA512a4b315e9e3daa2a48afff4d8fe1c2486680235d925aae2f49c8c8a006a3b70c2d09622a4a99536d310ab7525111b2bd76e086695a5fc580fd05eb26f58216df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ddc49108f92d5e12bb11f6ccfe354b
SHA1ee301ec1ecfb914aa2143a9254adb408b37c9ee5
SHA25679f814f7384a84619b60ef1cfa42082fcfc87261c7de2aa312c55ed183b81d54
SHA512c2dc267fd3f7477f15f4afa5407c487c9cfa0a1aeaab906dc543638a941ca1d63960ce089ab363c21c0c0bc566b83dcd5aa9adad0ce11f78f15123af521d8060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e2aced454d10edfdd65b09b5df80fa
SHA1986b199b226c0fd2460ff3221823083f0fa9f202
SHA256a2c633c6e1d09cb6fee9bbe0fe60acc58c3a1060a679b46d38cba78980d34be3
SHA512a024ec9317382c5a4fca452cf4e926137caf1b74977af8228e0923ea3edbe5642b18245a75025acb9c5cfe417513e6f46e77c46b4730709bf31d0547b72e422d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14d6452c8316915a926542b04b43717
SHA168f703eb5bcef3009277ffdc746f43bae5b1635e
SHA2569a5b65eb36e3c49bc89d505ec76d11a1b36552f4c04af3f6335ca6548719577d
SHA512a29348bc5a24aa5eb9a1e4261c991b40cfc36272c9b48f71f1e3241b0bd5fbfe250636d54e70b6bfba5824b459eab7b927328bb474a156464b4df0204fd70baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff68f9698e371afb3deac5ef53056632
SHA11c714346e118cd166efc0590bc6aae32146292a6
SHA2563e245ad6211cb6a49eea84493376591b0daba341e7241bcb30c99f8d71c8d4ad
SHA512046835044dec7b3ca202f48a6e1790bc5d9bc68ceffba7c80920cb113ece2a0aebf214fa7cba7986ebe0853e6b3d32d71483964d4df7fb72292c5f55a0d2797f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738af883a566f9fd8413f4bb51f8cf78
SHA1b29ea1748e1212f1857c4f5e66ff916752c17b11
SHA256ed7fc965716bb9eafa78afa9a42ec20c0b65f1497da4fc0e75ea083229177bf2
SHA512595fca7821ccd8cd8366f32c1cb6c654504c20d2133a3000537acc3297a546c934112d77925c985c2af20cebdde6ecb1689a48fddeab58f254e24e014f019147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531131322b4df878d3d4c38e9cce1b35a
SHA156b3c9eda4aa12ce7097c63c77472b8f0da00f52
SHA256f4aab6841ca143208ca04a7d231602b37e2c3f588b00cd6d70d43677b2dc4d09
SHA512e87c3507c3603387dd1731de3fd2c91baaca142199289d03ebc86f0f4ff2606242266577a99a110a44f986c08bfa7db9d1d5c913e993c981570c1f27955fd260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5072f039f8c6804fc0dd4960729aefd8a
SHA177c274c9ae61607e15820897b2596378bd72aa97
SHA25679a14096cbd3987379577d18b023e21451d47d013cd5b6c4bbfb282732790291
SHA512643be8a1db35db166549c2fa3f3a578312d060702db9ae7c772178b7fe0a25ae5fefb9e52f8800cbdc4dd45972dca6fb57e13e25faa2a96961dd069ed74403ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584234c7ad67519eeb65997a93a0e65ba
SHA18594469bd2e68e74a7e2259f07ea716123c3b440
SHA2561d90327dea832b588cd1438f2c19fe9d0535993e6d833d8ac11af6e0e9ead610
SHA51204b76676aca33d58cc3188d1fd7244c7f7686cd5e96b00cab3eefe4d6223dd44358f93d6b5185165673a719b2c110703da7d79bf97c4823c6ee9ef97fa47901a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565dc97587145cf9d6d8819b598e44e7e
SHA159e4eaa2a280daa613c0783d06931f6b70ec7d35
SHA256690316da95d72d213b0827d17f9ad6c37afa86c26fb342cc35b79c87f25ac9dd
SHA5121428448ee8422e8d5247009d25e230d634b2937122709a431972edcb180006ba9332ebee8be9c755e1c0dea560e675fc0a297d5926e1b1dce0f68a6db5fdb65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da90bfa3192ed980734fb8f6cc02222
SHA1b4c5b99a2a483fa21fc88977cbc11230c7a5c954
SHA256dfd25f7a45846714a5258ca856fa06b1d9e343d04d92626fb81501f6605812b9
SHA51288addad2791ff1b763db94924e709fcfdd7463b849e577c8233ce529fb4ae230d58ef49d755388d26b606f5ece7d32f4ed0082cb118f471bbebc364acbd97d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59796a4fb81c89ab311ad45799284c4
SHA19092ee50afe84380cf73856eeaa059d5c782859a
SHA2564d474dfd85e49c5507e8cd995727fbda1be82b8d49b15fc2438cc86d083793db
SHA512989f0849a81ad26f7646a435ed9e9a1d7ad99f720865c5e91120781010bf31668cf6f3c13043ba51922c217df869a0176656dfef493909ac34ba58be6acb52b5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b