Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
d3a186ea76de9e8edbc80f1e91847379_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3a186ea76de9e8edbc80f1e91847379_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3a186ea76de9e8edbc80f1e91847379_JaffaCakes118.html
-
Size
11KB
-
MD5
d3a186ea76de9e8edbc80f1e91847379
-
SHA1
ff22cabde6b2ee5c59cfabd04e9520eb95c14ec0
-
SHA256
5a0796fc71b14e1de2f6c8d340be349d2559a799c53cba75569408d183c1cd90
-
SHA512
4d2a2983b24c98e39ae318787c221c33ba6c7cab0e0d67fa25181917827cdcc5507b92f5fb55f47136bcdb1d2577083a479a43fb609212b8d8f7d4989b83c95b
-
SSDEEP
192:f1QVUVqt1/kJrxvuiDOflWRleGWR/DceRbjmAA3crLUmN4tv8GkD8u2u0pVvoK1Z:f1QVUVqt1yxvuiqf4RleGW9fjM3SLQtJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF59BC81-6DA1-11EF-ADF1-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000a9d5464ce5b5f911f0cf27785749ebf233cbe6d857ee132baf238bba4c073b1c000000000e8000000002000020000000f807c4225039199059ef58245f05c26ab07ca42cd5672dbda3915da579b5909820000000cf82927714c4b2f76319d188719a5191be844643733601f5695487f637ac08f8400000004a0670cf75249e85d9a55bfa6289789527837881517c1be87f4187107285a77bcc3c388dfb094590365c09b9e5fb39d11adbaa252b223986d2974f0d4cbad868 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d067b3e1ae01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431934671" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2692 2664 iexplore.exe 31 PID 2664 wrote to memory of 2692 2664 iexplore.exe 31 PID 2664 wrote to memory of 2692 2664 iexplore.exe 31 PID 2664 wrote to memory of 2692 2664 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3a186ea76de9e8edbc80f1e91847379_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481d7bf5e9616eadb449752ca539900b
SHA1fbde355d4c296a210990744ccb91c4da7f4bd228
SHA256a41570b499f75c9b1e5c0b511a02aa0f5358477d72262056730ca12315780870
SHA512838f1a6d74df4e56c05a068f1e2dfed9ce12adff543dc5cac65f8efd5a1659928c2003d23d9ec0917dc3c4a3e53ccdb5c8784105e62ce096a2801a39dbd4f529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fe6c56a6acb204a4d7b60c6e739a12
SHA192a64377684e9daf561195053f319a7434e6c975
SHA2562a5bdae72b98073a289ba4a2eb8e4a1c2b9fa9f96fb9a956f4afcbaf2c564135
SHA512cdf0b67f963541f80ba392b6048537968f74d7f9f61f79a14d5c66c992c720ddc9a2e4fac02c4f3eb36e42e2b9362b82ac4f6f274ab72f46882af92b5714905f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf297cb6d89ea00b96c7e99c627c8bc3
SHA197e928a0ffa702caab3c5cfbc29baa0a9f887c95
SHA25604f9d3a2dd78123656b37f8c8f902c1e1309d57fa38b41b9584aee03c19dab6a
SHA51227ebe06a1c3837f8fec8c664f006d5ec475ed677b6593d1832b5f8cb028b3b39f157bef931b81d48abebbe320f64b08f480094288c5e4826a415384d8d7ae635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506fc02599298ed77fd999973452e1d5d
SHA1081611bc3dd847e9439f9e6d9949834ca6fb6435
SHA25692232b696f52b3991d861421965f53f8ff74154e7b1cb114f05a2f1e83f02791
SHA512781a499730472daead8ffcc54fe3c4430808d510ff6975f3549717b40639eda6c342f97b69f446d90bb2e4203bfa2d1793be8c1e75986c0af8e3d118df91f77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59218c4df59c07bcb162057fbb78c535d
SHA166dd3b9775332523f4507763bb905b4d253696b9
SHA256104ee9818894f5168ac84134fef1dc1e93d3dfd7873b3397ad559bf6f11c1386
SHA5120853de6118f88ea7d44bc79ab0b8b143acb94369aa0d0b8d17dc3ad1c3c16e29f7979fa40996ef33fa5baaae8ac7ebfd543913131f6ddf823d5478eaa81bb942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b694a9eda3787be1288b8257cf55da
SHA17cf81c3d075f7ce2d588d29158d4262080434888
SHA256bdbe7cc4f9345ee0a85e6c5b027787dd7441d58e8f1f20b942ab62aeddd1c112
SHA5129041caf86eb1db8016dc69e07b98a48400bc8e698e5ee64ffedf1fe4d09d45ba378590f5f0051e61540b2268a2b1081d3762b6d5e66945ca9b5ce011fa487014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3ea5138d8802f9098e269dcabff798
SHA1eb59e18fd3388da9b07fcf203473ab775f12824d
SHA256562b9cf36b86e92479f43b0d8453bc4f745081c63396877186b43fe1641aa7e7
SHA512129531ee8c66e171c9a3d2cb62dd07f9023c244a4d03dc81d05ed6ca3e13a9c1194b013c62ef119a1570c53d64a98b3388f024f137e90a05beea5f9351af84b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff076cfd6f04d9fb7d5f7638e983e791
SHA187016a1162e4afa13ceb5e19d8393595668731af
SHA256989827506bd38250166fbddf70b852b3fbc0af82f56fe4f1d3f4c7f4690f575c
SHA512b053d954040d8d1fef15f6c1830a048583bac8c8f435df51ea878ff7574ce7ab9cbab37a83a8fdeffa3ee36787328b4ce6d744990d1de31553b21ece3fd8c105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d920a57c8225ec38ff1a968f4746cfb1
SHA1444a9ab269ff0be2c2a38ad4925a5a6110baf492
SHA25631dc4943e214444d8fe0e161936a28f1ed574980dfce04d2dd756888efbb0f54
SHA51252e642d6065bc6d8b00659ffc68925117ddc89ad03314face7cf2d49cf5a8bb2bc649e51204b99ee85738726114992b941fb85a4e1a063c6da5accaeb6c6d1bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8aaca60c0404cb7de8165f073b9849
SHA1d01b8f23ea514be5fc87210bd1badf88d51c3121
SHA256b0e4b37c8fb3b30feb277fcdcf84cb928e052c34de837a7dce40c833b3bf6753
SHA512b83f7aac415f56dd224c0227444c5ece79c6369fc7ee100893f71544e70f37df50058cf652228e9f820d87300a87a6e04e57112e6f3baf7847026da371f52026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b428b410be1fedfdd88748a47ba29bc7
SHA1af4eb997932d0cd39aaea531325063949113f86e
SHA2569d554e0961a47f1395ddd91cd3141ca8c8a5260e151d142a5708738842f01568
SHA51270c706ef166520868c2c7f43571287116dab77bc588f48f234247d602431975172947c9a57fc32ffce3341826300ce2612bb4629a83b334a19aaba2b4550b0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce34ecf2d3f531194e66a589862a1259
SHA18d0af78d7a35060dbb12fd21eee52e0bdaa407d9
SHA25630dc882915e5e2d8d4b47d152cbe9c172f7796e919c9dd78c9f03837d397ae67
SHA512981f11af3ef0a4abbc54ed4e2316c1a7b41913eee3daf42f95bf8776ca0f263f61ec61c6650a47fee7b302303e5f8e03f7f48c3ca1fcbf15d84da0aac84f5dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584512fc5be40b419dc931b213136d6ff
SHA1adfa52a332cb4d5d18dcdd284970f9ac7e2b5664
SHA25600c37dd007861297aacac7f74b8841c891bb649bd444bc09a7892cfe1dd93fa1
SHA512973f6a47ab3d3b82f7571649f9b885a92dc3d5f4e66f4d97fdcbe993f2968e01ce13f84199445c3da11824c75f6c39b1f3030ee2343156b7bc265e4246044d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df1cd8cb456a74b05f3a1dfdeb7d086
SHA18518625e09e7b1555515c23cec22a15be2923ff1
SHA2569444c2451f112e61141062665050482d699be01d1f5e7c29609bcf5a469db3f7
SHA512f1c7381576439000460bd43485d02d38f5e06ffbea295ba83ab71b78190d699bd181aa81d6ff67254c8b174bffedd9094235724358a91b9c6711dfea894781be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd98a986eeeed2e5e9f7225ce86294c
SHA1fa74f7daaf25463d00077fede761935c08b935c5
SHA256df8df06a41ec8ae8f0c84ca0ccf289cf2aabcdbe034385555f6f168239f3d822
SHA5127c5c1e7fa1c6e9f336890a8c9ea0be0e3bbcd65d114541931481f1eeed1e810cba4ca38e8555da52cd5e2d57cfbfcafffde72aee925f55ad9d4ee3552d2d1005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa25cc7a63fb29a1e1b8b8c5b39c199
SHA1b7ba84ff8c8c6b465ea667207a4e0af2b7a38ed9
SHA256b76976e26ecc43a7cd336cee7b10d36706880212f3a7aa72def7e7b24315c449
SHA512ac7bc5a1747b988b2e033ddb73db14a2276a983b982988d5888d4775ea57c4e1bc63904573cbe1714b9eebf32c5f09142205afd563adc71795dbc86adeaa12c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58582fce7e254b618758948ab964f5189
SHA1f8ec1e7649be0d45bee00a60cf15ed0cbdadaf89
SHA2560dfbc8e5c0307bab515d34453efb8f6f4ac0fc2cc87bd31689df80460e57b8f5
SHA5126dbdcaa762186b5767c50055d67ff19edbf03586a589828b95fbba7c6162e35837cf16a4fa20fb27f8e3ea8a0b6496ff48cc77f228763efc97b89272fe2d5a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516256b66c8384838adbc9dde06c84bab
SHA1b25e133c8a245b2c009d9af1e9794372a2bf96d4
SHA256d3282068407cc969e5654f8e7e58b08a82e3f125a5000e60992e133a5a0430f7
SHA51260d0b296d8644a6c134045ef4f4d4fd73e3400290e3cf0fb064ec982bd2c838d41a45210550d3d850640cc65c0179914f93795dfa828cc25d1de4a6c8aec7f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b2eb92730efd0b89f5b7cc5a0cec95
SHA17e394e6a869a60f9ec5085a1937fabab64d13c51
SHA256f8333c1fe45d34d05823a84ceb890268935eb86da521777a9d089918087f84a1
SHA512b4832b5a97c6e42c6358d0499b1bdebd6311de972cbb75204d431d54faca85e1c2c7b311f2300e55b73b4d2dbde5eb8e788882360e45d017ef5d41e67c5ef18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf62ca6c2c7ce21e1154993ad9e5209a
SHA153bf7132c0ff62e5a63b13d26b8472f4a2831f97
SHA25647e884b618724d80ef71896a7702855dca9bf4b9c576d34d806df24e105d959a
SHA512bd91406d407f21fbea1b618f9fbe78124f0cff903e870db13a78cd3de0eecdcd46c8371538bc8d1e86a03d6973ef32696451e6e0d8aede334a0d812494fc5ee7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b