Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
d3a1480b38206d9f111ff366dca56e19_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3a1480b38206d9f111ff366dca56e19_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3a1480b38206d9f111ff366dca56e19_JaffaCakes118.html
-
Size
4KB
-
MD5
d3a1480b38206d9f111ff366dca56e19
-
SHA1
76ed0e9455f68e05574284cc10ff44bb880aa755
-
SHA256
8fa3c7e12264d4e07e58f0b4912af9cf78307a3f476a0a8ab0d7ef5fee33e2c1
-
SHA512
cd7ac2a441555f6153d4313c863b282480859ce84c1d6604ed052578892ace13f4b1c9788b9d49efd1726458a90f8dedbd57738db334ef1a577ac20dfe3b6033
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oyMAm9Gf:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD5E3661-6DA1-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a087d5b1ae01db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431934613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000441c37211e68b1d7ea2f68ca125900cef5706173ae82367d26008d0ba1f1c305000000000e80000000020000200000007667029af06fa8a0b46de7dea85070758393d83a9af1f202a641636c125138292000000029fa6fc107dbd18267273bcb30b3778647309cab2127bc56cba6d4ac17f3ed1240000000e18efa9d536e64485ab18e7a36409da7b88d836c0052bbff88468f141539f8fb15f8fcb2c2a146e81f3f827b1f7e11f496195a04d0067081cecb86ce4020f194 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2844 2280 iexplore.exe 31 PID 2280 wrote to memory of 2844 2280 iexplore.exe 31 PID 2280 wrote to memory of 2844 2280 iexplore.exe 31 PID 2280 wrote to memory of 2844 2280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3a1480b38206d9f111ff366dca56e19_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18f5f73ea90715b26085d94070bcdeb
SHA1045e09f45a5bdacd6408bd051445d4dc2f67c2b9
SHA25664651a6fa618e299be6123a77bcf5c0b561f3fd3a185a54e68f449f8dd1f329b
SHA5124138745128398e272dc85f6b9c3e93289dcd93dd99bd5276a8a5b150c6a9fd51276e3e92e3bd02f09df3d18aa925c3133c4503d0cf7ccd88662aabfb9b74db05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504d9e35203165fc00e605f9fbc1803b
SHA182731c8bb6255f9235582a1981d94de2d7d7b7f3
SHA25646a1a551a55ed5bc821c8aeab732d732728245853fcaa847a8ffb86b008274a2
SHA51213a6e9076079a17695dcd319b8edb952321f865a9800858514dee5857faba56bb655f4a5b55d1404ea21efc9711e8c2edee2d33721f45cf3f092d88579cbd046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06705c96efa0295b57e77c0f98f9d5a
SHA1bba2227cf668de1f9d9d032db8798e62d668220b
SHA256ef90cca67a513f904d23e2dec6fcb451b93985f50b0e87f51f5851a00dcc20c6
SHA5126e2e7f865bb6272d95524cd7a16ec61576a6a98f5d7b68b149a3da742fef65a2f9ad5517c374b9d136b18766521d81788e25e6723e7ea4e14cb1ebc5516d98d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28f7b173598597ac305df77ade5f8a9
SHA12b8de8077861b73c4f6c7b8bf38d7e3a956ae713
SHA2568fe5084e45eae2cd78708066cc65401ab1188a243eb7821db9969c6ef62b2938
SHA512aa2860e72d972570c76b79b202b1504a7079dcc7cbfaceae1db8d0fdbd8c63d4fb6d855ad0b7e106681172fe9ed400b83c6962e807a4d0cfac9e23e98acdcc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570512bd03cdb71bc9baa10a575bcec74
SHA1836291ab76e8e021e696879c11e1994e5f1fe72e
SHA256d32997e002eec4683192b8a6be0fe323380c7c5037533f4ad4d30ec70fa61d7f
SHA512f6256964e6e9e983f6f63ebfe5a8c850bb195a3c9850c4d836bd26554eb76ff60cea91c50bab24ae0e9dac575839d1d0595fa6e4259163c759b740246885fed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc27c3b6f5eb9eac68d1524d9eaffb6a
SHA1cdd9179e7d3ec67a352d8f55ae9c982d0c43cda7
SHA2563a9ac40e9aee33fe9f5a3d18ff6aef604402618c3cd9885a575fdc7c8081defb
SHA5122599b050177547854268664a6c26913e31e167c90967ddaa13f207c179bf12a9371dcb774f213883769d56f6ac7f72b4fe8c7a483958296d1193c5f6902d33a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291dd364b5f6d2d38e059e34f2fa0644
SHA17b811d11b9f3b2b0d762532a5eb309a9f36b30db
SHA256dcc8f380a35e6829000e021b1a8c4c02cc21ddb3c9f11f0b8be4a03d4b09453f
SHA512bedb7bb308da926a04883c3796458a2d374307538d69b61e9df8e07bc495f0f5f7d61428fd345a92e0af417eb85b0346c06aea5f13f4d02b3a60ec9e1b2aeca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc5267eef3fa922fb1e53b769c66488
SHA188763e3ff0db90d8da86bc662e73ea4fd70a9dad
SHA256cc93fc2d4df29fa0c1f0282fe43513a134b5a26d1baa93647cc6b8a21e0e2479
SHA512f75db512de742495e10550e5df9a6187abedd5ea52c2f875bb9a7ed041f2f7cff1e68640381a1351e0a1d08311fae1c93a852613be02312e1fae446061885a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7c26f00691cb58985237948ab29815
SHA14bd2efbf95c4f1b10be26d06114a28bb43e6f75c
SHA25652bf83143d65834851148441b85eedca3ee73c26ae9c827d2fdd8d9d6d7f9cda
SHA512457946b0a0a728ad910ee8dec3cb823e22a7aa7a0b64fc3b358e14c9375c2adcbd240c1682dd7c05e8bb42ecfdcf3f35eff2e089c2dbc3604fbd859c5be30cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd9a103f0a8b7b38ab521715f02d7c6
SHA1b98e14f7a55dde50b92aec572a8cb0e504d4c74b
SHA2567cc0a4e6d40d8901bb2498703936b70c2630ac1856151b50775184eb805ad1df
SHA5125bf6c20c6cf0d63da0a41fc287e14d1f7bc7b4504626001b08323c72253fd3e23f91b9e01b5ae92842577449e3c306863c93ee22fea850b3e28dc05cd799036e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53431b0c52385eecb4c331db461e965
SHA1994a2e14aec187cca25c0f67233fa4d0247b5b50
SHA256bdaa9f768c92e048500deed31a2590f57ae2e5fcdeb4b7e68d5cabf6ba7dc489
SHA512b3f790af5289a3fbfc644f13a2199ca4c52108778154f265223528e443f84fabab1d3ec9fa4496faf9ed19cce42a0126d2c338358cac553e60cbc0ab6be38772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0bfe778639a863420b471e3cb8a220
SHA11bb4706a506ab5586f88216bbcd13c1fe1cd8dd3
SHA256354ac0fcef1b95beb0202fabf9c944e40c1c7b1ce14326acf202a6eb9219d6e6
SHA512ad76297c57ead1d2588e079c87b6feb776d1afdc753512b78e0326cfac8f93a78e5103d108c4958edd0f7f0c6b2d1ec8b1fa99fee579264a256ff55c12995c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cb4ca8231385b7647defbfd1856325
SHA1903dfc3b718cde3e252d5a1f4542d14f57ed6f92
SHA2560b19b33b83027361e4fc74c7d2507352d1983bf81c7c7f467b3ae8abc4406634
SHA51272899095973fe2ca44abfed410f87f19cb01ca4027c96cc2915c32cfefec2599adcfc36d49df2e7e1e1251ac8b46bc35b7cacfa631918bbe4eb2f356ce11ed29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9328111551fa7212333b62d2c17fcdf
SHA1d212cfa54feb78380f2194879201e1056aecf904
SHA256f55e80a72bc94405366f8e9c762454d8718c1279f0b71efe498d0ce3dbf3bc71
SHA5126144ac6b2d15cc16adaee3b4a95d3683f8a9556478f8db404248fea1f51d774538524537fa709ffba573df38debea48ff673b4d059efc3d1d5acc50cb3ffff82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae3b5ed1b1b9d8732ec4c92e3a7206b
SHA13469c030a41f7fa4d1cf0656644f676270fda889
SHA256f4d9aeba07b721327b7d7576cb66a0addafe110b84b834c6cbd9fa7105d5295b
SHA512a89cd7ea7bd7e12cabe03f7273de5b61585d571a75b88b71d792e487a307f693a41441f3e709ee5c328b723c3bced94c31b4d68e080df9a351d88ab397c27bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dca3cbe4e27131b24379b135e85de89
SHA1d8bbaffd774f4257493c9659bf2c042a13255bf7
SHA256ee80eab807290061a6c12bcab3d30dd9752c6fdc6ac9596bc9e6307ae1f602dc
SHA512c033cc99072287c810ae847496834d7a5bb76c8534995a520eff8a31b13a4bcd1eee3be77b31546ed60390ef07a22b99b87b747d785eb62e9c6595ca2ef9a6f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59877122b9a85eaca38923b191617b017
SHA1f49ab6f6d9973a17595161f566cc4583a26c77ff
SHA256f64782c23625b6cb18ba447d0f7d5560e2c937c64553b7d4416fc17ad1390a48
SHA5129518bf3cd57a1e8fccd9ff4076ca9efbd074a195199281e638d559eba8c09ceae7fc067e1cd603f6bb617fde0e821e44eb972c92e578bffecfb002e3e15ee3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e2e41fc887dd12b4d36a09df12e71e
SHA1d6bc9c6e53f5357b9c68d51a872cc6b369188163
SHA256c620b628e1949941bc727f1968dcfe4bd74e652c807ba58227a080ae68794447
SHA5123871aa298f0389e0ad9069d14c44e75acc1c5e819a30a59867e675af0a14739fe98781d3d55554540554d9bb2d54986512b7d8787fcb39306923a1bcd7a3ec5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5465cb4a7de9b6bbd4e7fc51f7c8f39fa
SHA1ebcc3f3946a774a0fd52d00346e5ab09c7bf3212
SHA2566cfa9c21d45ba25df02bd31e9e24214df08bdbd71a5fd778afd8482c8ab6089f
SHA51204a93035a7696c83960349a9980fc9fa02c6ea2751671fc4518b03d5c580c2da202e96e1aa800bb3aa5b9b566c78ab657017f0b0d3a605a089f3a562018a6054
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b