Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
d3940ad4d42d5ffd2f123022b251fef1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3940ad4d42d5ffd2f123022b251fef1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3940ad4d42d5ffd2f123022b251fef1_JaffaCakes118.html
-
Size
53KB
-
MD5
d3940ad4d42d5ffd2f123022b251fef1
-
SHA1
f77efb3624fada518004e8197527e762c7dd71db
-
SHA256
92a299773e1a7db0dc67bdbff75a23303e79965406bbf75263917bc12dc61063
-
SHA512
3c1e7a9fe9ac4b279d31abe18fd05f1cee272c239e5ccbd098113480e6100c9d1892f563cc281c7908388da0d8abe9287e03717e66bde12e53511728a3f588ac
-
SSDEEP
1536:CkgUiIakTqGivi+PyUMrunlYh63Nj+q5VyvR0w2AzTICbbOom/t9M/dNwIUTDmDU:CkgUiIakTqGivi+PyUMrunlYh63Nj+qv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431932983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12777E01-6D9E-11EF-9452-E2BC28E7E786} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000009962f9b9036b9fc1403d8ffd7e31e2e1cc6e646f9ba52f146d0814491244e8f3000000000e800000000200002000000046424b1f80039f5f880850f894084939403ab859338202ddf03e385ea402db3420000000488377416d679b2b2005c7e52f9e9d6e0d792d23f4603681e9d489c75551c5a740000000788eea80d93167365453c4250125336536e1a9f7eabc96e03e36c078310b7a652719fc9bd52af9ee2c46345ee28900dba149696089bc073eb2164d1b85499f48 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a007d1e9aa01db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2340 2480 iexplore.exe 30 PID 2480 wrote to memory of 2340 2480 iexplore.exe 30 PID 2480 wrote to memory of 2340 2480 iexplore.exe 30 PID 2480 wrote to memory of 2340 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3940ad4d42d5ffd2f123022b251fef1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37b847fa45dff350f8cd6bfa161bbf6
SHA1afde420b239be3db136b9e93d1d6c6633b94ae32
SHA2562f4bca25eb9848d64a2c0a7fc56766d2fdbff6faa1d8006452473139a9d41819
SHA512062c2d037bef5d1c721234a477781fffcfc7883964e99b395f2f0873872b94f7a8174a0a22756e9cbf0c55980f477549f05b20a74d1ccf9fc7ec373a1d75bc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b65bb3ad010a66371fa052c61b8676
SHA155432a828192c4eca30b95697402ecc7bba74e43
SHA256b75ed6bc0c3b8293907ef4183be5fcdefb4c604df9e733ef378067b822020abf
SHA512578878249c84ac52d5e61da3289a6b5de61abd93b62c166a0345858099676461dad62dad487432ecae9e3917c1fa9abb620bceef24bd9510b2fe1152e9e20f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb72c11b6d6e432ece883a3152f8c5a6
SHA13dc4a05f30b16cacf4a748b7a410d071426e563e
SHA2567cbc7d38614a0bffc1867adde0c87b2630dce4d25d2b40124f09732b3efe5481
SHA51269fcbaa5dd541ed20056673d20b35f5826d93597dce0d50cda9d9ad2b9a9f3e9311de155de35dadcda36123ba6794f4b94ab5ec4eeee6efddc29e387a07634ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d0c7fca6da1839c9648f13c8952404
SHA1db88d3a95240208a1378dc2a96e99d51d5413ff0
SHA256295bc71cbd71de7b0e3615a3acb42a756b5c42f4857c8db0875c9dfff76bee8d
SHA512270e9f25de716e80969bb965fc391c88618c181bb87c153c1e75433d3aee51b7fb80a6d69a91f647d963d9c33004dfd4f278d65b93d14ed8f5a2969c2f3a4754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bcaa72238c1d54ce3dd31fa1512dfa8
SHA1e84fa2ad45b24c8ae73f8bcbd5c6a33cfd60b1cd
SHA256bf71a128a5d6f4715bc18a1f73992540093e4cbed5583cf1d6be9483e35a94ca
SHA5124013705e180a181d5118a1a50ece1e475b3783931d87c5f66515893553c856d32d4c6ccfb53ed3097db7185d5485cb4d5e663d5de4b34f97aa89037268e3fe25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b80dd6136fbe7c1e410ec5a15acd7b
SHA1d50ea0ea0d37fdb782058952e528ece113acca41
SHA256d997a5b2b748c673bec00b61b8c33d836c5ee8fa46db72c7d9d72f3f34b4155e
SHA5128687dda28204bbaf62bd770971ed33492c1fa7b80f441a819ad2c805f2f93b60fda95f1a3313a36027d1057d59f67f07637de53b29174ae10810951ac85680a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6e02bfd93685467ea8dc64e34dc322
SHA1b0001c181a8188bdbcc22c0b4dae427e4f70d4b1
SHA256d5d8b9d966a0faf048c9a3e9ab082c2bba9c574eff586e4afee38e0cdb084d60
SHA512efa89401400dd4a0a549cac8ff8c90b6f4489701ecf30ffef81841175dd2f535d6ab7587c17c8677a443df333fcf00c970b441e5abda4489b8e2b7bb4399bc66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba33a3fb318189028363bb02f815bfd2
SHA1e58783c1fbbfc55121c65514320fd90238cf881c
SHA2563fa4d95c6ac40f0214fce40b84d0037fa75f3a40c459e0cb6c5d4996297d7230
SHA5123451a0f7f74c1ead08d99cde79c8e928e82010f81f8d985ccfac47821024fd4e878c56ae97c0039adb8710da622fb97a0929bede1edd8eb0a13bfe5628f57a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54827461f41fd1c223a9acbbbbf6f39
SHA16c84c12f10a3d3d5087e3598d9093580291d3248
SHA25657cbe10e0805438319b5eb6892ba724af9243f206d3738c9f65b2c842bd332b1
SHA5121f8d647b0d5e355fccca359d3385285ad1ecdba451f62d25ed83c29ff31ea0e504fafb79e7695e5cd952334a41c5e137a7e766ae3c9de8ac28421763e4ea04ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556bab7ad4c62811ecdfbeef6a8119dc1
SHA1eb4b10dda3bb6a5e478856342519520ddf7bf1ac
SHA25630d1e74691cb7ecd0acfb404b845e53b3f97c9ee7556caf6988ecb0f999d334a
SHA51207a845a935d2783e3322df988268533248a29233c672b200ac531b5d4fd0dc76cbdf5dbad6e9449db9ff7a88531616f6702c2a8c48fb3c234a8c4e3f973a4e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e518ed4c1ac31c8dfe39e5b84ed84673
SHA1b875b82c848a1eddd11e7b8bd2f71dd27ab3a832
SHA25682a10b6c17571835aff2e8fd61b3eb76bd618c5417e581b083535ffddcef86b1
SHA512b94205ea9138147f1968135ab7540a7162f4b48f797351854d3c95e61c49ff8ed1618686d55d946583f711b49d9cb63d7743a14e4b3fde6018b99f210699c9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc5b0b54e886c32d980ce28b21663f2
SHA1bd274706507fac7140c623ea2d89d996db5a63e9
SHA2567028e832fd435df7fa3a934b29aabc4ee8564f900665d23d7fc934b15e54649a
SHA5120375dab6ad7f806e7693da63bb2d4cc57ec7abb41e0b289cdfc70c695f1f77610ad45790f7f95840ba0fe5df157a6a2d1d5c2cb8d3d0b7cebe656b6b9a759053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52456a4b91806395a48897292920ea364
SHA1e4623c4c13f8f21fa6534a6529cee01550a1d27e
SHA2566ca56c7d30ef1f30c05ae8a2bf60a982e10738e16d37f0d340e4ff0add665ef2
SHA5124d9226c9f7bbc96f3a09479856fec434f92f779a4ff7f98ab47de6885314c6cdf849236a55501f6931bca1abf063d640ff1eed2d9460acb11103edf4fe1db016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c30ce840590786bfca61d9e5d41ddc
SHA1239a3567503ff30bd1a78723f5c82df4051ac9f8
SHA256472c7fe79a652636ef315fec87f73dc628d0b17eefea2870d7790668c8103d15
SHA51262cc617e70fb8540d77d2d52980314d695a8fad92b7e4357a698f58e8dd48be9fc5538958b687a04ea4a1bf97be803fd57017f14976c620871c93dd6e891ff8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c202393dcf9ad5db5f75c27f2bc6e15a
SHA1e99ddba5c260839dfa2185a29ebaba4e76bbe5e1
SHA256502aa73cefa122c7c94f77bafedbccff4e0d588fecbbf3483fba5013794e4126
SHA512f86abaf2ff1b6d360f57ae73b7e367502f1520893c460f823f933ac757ee4fe678ba8c2de2d651517c4c10fe7631d9b057c85b7f0806c8cd55a523de8a815b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f941394616b93d9ee90838f5a7721bb
SHA17d97e7c97fc316c4fb181a562372108d130d3409
SHA25696c881018f64b68b1c285d291b6de75e86d053532c540ba80961fec2d3804ca3
SHA5125362e1656462fee4149833edfe2119734c5980a4755234a8069ce1f248243787e5e3f8d9e9fb62ef5c84f12eda523b229bde1642523ae56bbefca980ad3afb29
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b