Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
d391c8870100035cc6bd49f9ee32d9e8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d391c8870100035cc6bd49f9ee32d9e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d391c8870100035cc6bd49f9ee32d9e8_JaffaCakes118.html
-
Size
22KB
-
MD5
d391c8870100035cc6bd49f9ee32d9e8
-
SHA1
2b735d66aef01701058a9a7e892398024a9311c3
-
SHA256
d056fbf6bd3ee345583795a23f88c79555e091252c88a1c23613cb84a32c7bd8
-
SHA512
4e5bf54a26c17bdcf10740fe9dc129444f8c7dc8ac63fe591504435f00f972064d7068a91d9a2b85097726dd694db18f9a5688eccf68f516a3127e04adaecb4d
-
SSDEEP
384:RpUIv5QkNbmyefMBI6q6GacMlmVvzjeJ1PaAcO:RpU85Q6bNefII6q6zcmmh3Sas
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431932693" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65933531-6D9D-11EF-9438-E643F72B7232} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000001d086f85e5f310f0956c74da00683d3fe8e1e2507e687e2865ebe1c5d02fbb4f000000000e80000000020000200000001f9deace82cf4cb41f19c29efc5fcbe816741403aa5aecf2e0726daf1ee862b520000000e410de40edfa54a7d6c45dc88c1142665181ce2fd518c7461a67f5310d65c95440000000e581092cab6700f487e5221c65f76299cf4cd83c4df87a6d1a3646aebb186f4ac844f7dd60253e83cc4fdbf4555a78ebae6d3d0ccaf1b6241b49c2ba6b71c492 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e32c3aaa01db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1968 2436 iexplore.exe 31 PID 2436 wrote to memory of 1968 2436 iexplore.exe 31 PID 2436 wrote to memory of 1968 2436 iexplore.exe 31 PID 2436 wrote to memory of 1968 2436 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d391c8870100035cc6bd49f9ee32d9e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfa21fbff0b9427d11fdad6e906eee8
SHA1e748e329353abe7c7fca3cb04a32de4637cdf19a
SHA256e03355b74f9caf7055c292a6bed73f76a42077f72df7750bcd778dc7715f7ca1
SHA512edaddd05b10e1fa6fd1fab52dffc18328a9ebc8d55241f4f70ec4209fadc1a65e81f800f89dc41a0be079f1d3ca3b135f6207657cb9181b7b31974210fecf932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc89a78f670a3876d898914d678e8c73
SHA1f5f0a6d3651762ea7f4e415bf9a58011f6ed5aee
SHA2563184b55215e9dcbe38b3f5f3af1f9b0d8ab2cad3220265a1b14ffd0977c33e2b
SHA51277f503bbd892781850a7b69c82122e6c558a0cddd97ab863e92afc13b48be24825c53ed29d4ac199ea48936cf784ea9ea4b686b4df461a902103975402f2be8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d48a8962121fcec8424a4589c1f3685
SHA1d86a2f3d8853cf2978fe1064c0a78faa96e204f8
SHA25670b1ac2a383ab25d6f50ab8c52fc0616e7481896984e4ff4db837de4952a9247
SHA51280e47af649bf14121466255f56d84910c74ea7c127d5f89a033d552dc478ebacd1d477909c4ad223230249d91188418235be6a5d4285beb0ffd6d3967a3324f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ec012f836b2621c2f4eef568e7b262
SHA1c8156536aabf442d432204d425dd86648fae5b1d
SHA256096a908cf79faa13eb830a65d2a1305f9f05ea6016db2a5e50d24680f9e2d961
SHA512c478e4ea4794f64fff031151e62981d51103141ac801fe627d92f14d6f17551b7b73381876806838c0f10fc957bc77dad617da27202ac126cc3be2917d1c501f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68cfcdd3def1d7ac6a58d65fc0e32c9
SHA1122026be10edadc277d2acecf3e6c6d837db5da0
SHA256a314a12208eb134544da93da05de8476d8ec3d1ad635cc16ce8a7301cd2cdb0a
SHA512f00bd19b071584b7b69f1f6f7c701f468ec465cf349ce4b8348d2b79cd8e152ae3b0c1a27a3084f2f7f25a10f5bba1317ff5394f8ecc117beb42205f26911c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a641bef962ce9c589fa1285f1678148d
SHA1ec8137ea22e97bd3fc38abf69fedd53f0721a608
SHA256548dd2d85844e4bed8a2c9632f7a7f06e8d9d42ae0a959d34d0cf475eb32ed44
SHA5126f74fa9b13d2cfba64bea66dcba14a786e7a486ec6aa7fd8cb4879ebc669f73b0e3a186602dd7abeb8c77d8ea94a4ea19bd3259085c8df4bb2050d449e3c12ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec77297c8cd24814d4e91d60fe15428
SHA1c1beb656095cc4858136399ca39211a3d0480035
SHA256f59547ca879d71405efedd8ce3d2e121a611e25e68b52a3e227626b4785e9dfc
SHA5124361912997e2e5a6dc016799b77d8abdf3387807fa1bcd504d3b5560b223b848444d1e1fb7b85de0b812fc68bd8d3d02c0405f6023050fea96ab042dcbf86bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1fdea48f6c40e6c3839787b916444d5
SHA10e84e61bcfb075e5c7081e72149f07ba39a0dc11
SHA256452f6c7fef070a31101d271cd63bdc131dd89391fb5aba155d8d7313c3cfd24d
SHA512af26be6cfd6c43141b4dd160707730ec8be4a05fd5a63593773275dddf4df193880f17434c0107b72b34a5bc228e451670efc2ba8c50a8512d87b0d8ac56d164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540cb7abf37cbdadd6221b2dd402e2d8b
SHA199458e3c5723fef9a656f7ec5703c01b1b85cfc0
SHA25623707ac697991cdd908f1b187660dd23c78c17c065e9140c43194efc98c8b7a2
SHA512c43d766da71dc4e9af6071cf862ef82194b06d70634d5ed38754365c3abc0db78d1357d5ae503eed303fa172ac1f8d419db6baf6f46ca3f72974d008f6fd3ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a403b5fa0a8f36f386a7b4adb1e9c72d
SHA1341893d3918d184517780bca7e1c8ac4e58960cc
SHA2567c63508476841dcaf394865534b183c8c6e3c90b322b5f8a9f5c9d3a771365d9
SHA512126b7f4a9fb7efc9de82e03629520eccf305edd481358be5eedf0010c1a4f4da7d02a79c371c488bd76ade925157bd9968b0f388de8fc940766310453be2971b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5909cda3e6338a80eba75a7b28a95501b
SHA1f950d527c1201707ad8d4ca63e87e07de3b728cf
SHA256786ecfe3f38b0c6808532134ee60fe49471690888a62fd71be6d4efde10bbcd9
SHA51288b36438312993b65e93290209f328f7f7127781592bad623e02110cc9c085396bf7ee4f945c8669d65c17872f1fcabded3e2e6e4039cf688aa0619426f9fb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50a5099d695c22aa170f0111cbc639a
SHA14979562e9b3bc34d9e188a9590af1a7e2073970e
SHA25687f8e8d572679d6d628f2d4a62219a395d3e36bea9abd8653450e2d34927b60a
SHA512d1dcad1250abbfbc4964dce310ff025f256fc35ffb40a425ffff156cc44993d2cb3df00bf0109ffb6780472e4e9b820b611ee48eacfb49c922ecd00197543db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aceb7f4347b28b72d97b3397948ed8d6
SHA1c3eff992ecd32b2f4c73bb16917e883eeed9eb58
SHA2569737ad61bb6649d10062ec66a54aa965e924ead562538bb0ebda49ecdb94f285
SHA512d2b6291d3f19a46d8227ee82026932516aaf75a28656abb24ef4ebb2ef933edb7800be1042e5f2d3cf13f0954cf8fc86b31d2cb1d7c2e94aaf9f8e87a78ed013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c5473f88823cb837b558d56a6b0424
SHA1f4861b81f792bf6bbb09440a537d33422fdbc1f4
SHA256f940ea080da88b7ad2d2b3f9263befc124310b9006555daa98ffc58ea72797c5
SHA512af528ae6f164b720c3118087e8909b2b7ce60f058cf906dfd92dd24f0e0e7aa8ccba644d9e4ac09be5707aa384eb4256f07eed3f4774b190744b3a4f55cff806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192b7e0c661ee86896a97423f33be080
SHA1002851fc7dd0b599ea324faebc307b5020886fe6
SHA256db3c2c6a35e2c1f7d5cabdaf2790f9dac0a32ae4585ae202a55757ac537f0037
SHA512311dedffa4368f93fdb1538046ce573302eb8444769bbc9f4d5569ffb7a46e2e742e671ef4ece92e291e9ec5dae62a1020c3d3ad266723b8dbd0cc6497249bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74768e80f41a5a6eb9e64bb03893112
SHA1971aa8a2357222af53be73caaceac916c4d76ba8
SHA256f871fb04f7d1e0d983a0daaea3af96c827e39172d8ea9d832cfac44ffe80304d
SHA512d9e4ca893df49d42fc33c24001101ca21ff2051afb6774771c74372b799fa42f71b1c1b0224b25216e9829a77ff28d62b7ed548cdf5a7e7f17f9849c2fd1ab39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a1028abd81dd6b6fb1ae6bb6d17d964
SHA1db25941fa7161fdef27c8479828664ff531f3fe6
SHA25609f3af875dbf75072559bbd5472763812d7cfc3737d0388004b26e97e4e30ff6
SHA5126b03b30cec125d29ad86785470c4f175906c83b6bd3a36b5d9fb41ce00de098887ef8f340ae29d2441d0f0eda9ebebc3651aa372280fc2d2ef4b2daa6aac8b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba85c94ae20cfac141b24c41d67c81d
SHA1231c5877df580167d92b946833d12f7f0d629377
SHA256c74d5224c5ab61b2ac8ba25b5a2659678bc19029168fe220b5f72b21bff6d7fe
SHA512d08737aacd343d34154ba38213deeaf8fd72744afef683f07ea6bd98481c29f6f7f34e175a075034a361f0d06a6eb0bad0760663753da418f8909d27230fb565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aaee6e7a0c8b65c7ed3388601c89bd0
SHA139537cfd46a469cfaaa811e16fc67315dd97db23
SHA256ed6506fffdfc0b5a30ebcae1eefd392b4a9e31c671f4d9e7787e04507093090b
SHA512c5d9e1b60642d06d3ac8a531309926de445108e48c72ccc172d543bd492ac2c1c2cf347a74f7cc1dd59f40ad3a582eb524d91a4abcd57a424652c4e6d5935582
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b