Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
d3aa54f5a5e346edef1e04b4efce5aa6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3aa54f5a5e346edef1e04b4efce5aa6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3aa54f5a5e346edef1e04b4efce5aa6_JaffaCakes118.html
-
Size
6KB
-
MD5
d3aa54f5a5e346edef1e04b4efce5aa6
-
SHA1
f7b47d864800d57ac4d5829378f064a962267d02
-
SHA256
a0dfc405ce7dfed9f4aa1149965e6198c1cb383c974af44d13e4ba0d1b46b3fb
-
SHA512
d818b3a61bbc4cc116bb65547b96a3d02e14886d95407eeef265247e09d6a046b0ca2aa731d5a609b39743cb36aa5a4179fdacdc96dc0648e7b7d876df4a6f64
-
SSDEEP
96:uzVs+ux7BlXLLY1k9o84d12ef7CSTU3wIhcEZ7ru7f:csz7BFAYS/u3b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ada313c0194f89da18fe3ec3abad8c7f01d6806e09892b97f1367469e6030537000000000e800000000200002000000039722b50b87d4d7a301e693f88e67ab6cb8013ba3dc97289d201197a23c69ccb20000000dd82c3482aee36e2da56794e04e0e58193c0277893c3e1d47801606846d25eb740000000a6c6ee1d6113c55233f4bf5d071cfa52f6daba33736bceb5385a1cb5efcad4347daf24873967cbccd76d6abd971747c602fe9b31d8d977f20894493a59ccd292 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7041bc52b101db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DBF7451-6DA4-11EF-8C8A-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431935740" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2928 1688 iexplore.exe 30 PID 1688 wrote to memory of 2928 1688 iexplore.exe 30 PID 1688 wrote to memory of 2928 1688 iexplore.exe 30 PID 1688 wrote to memory of 2928 1688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3aa54f5a5e346edef1e04b4efce5aa6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af59b7c4daf6e57b3ad0272132953d18
SHA12850c5375b7c232a37d071c427c5b17dc3f395ea
SHA2567c6c71a800cda46e9bc8109355c9a090136a7b7ba20e657799e149063689e7bd
SHA512e7eb73b3826b2ef4e617c17567cda7779fd4aa90964481f67a284ee0371e51e9e868fae90a981fbbe6215185e5aa3eadc61cb8aa013bf8df5adce4645ed3aca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5031f5c68664faf5c65459a0ff0dd02
SHA11dc250ba4170aec819b1471a00caf05185e5a38e
SHA2564809f88b1386f0b07e5cbf5690fdd767e281eb8cfc4fe3e61927f4e3a53156cf
SHA512c7b9963fdf77dbd4a7207dfffc8ea908def40cdce624c3d9f8630f55c641cafb067d651c140f26d8a2bdbd9e27955ca047a4e90d8957d901839baa6908a39dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59189bdac1af22cca7e695e0948b99bb3
SHA136f44560bd18b176be1eb459f7d4a6d612e76bf0
SHA256ee654893e3a88344e8e1c13a70d55d2fc0173a9ab55c7ab6b8bfd388f8a56dc6
SHA512d76149440366108c517dbb76adf9de2196b9589422e922568206016960df1d29e55ae3ad85970c05500d3acc70635185409754c4a86ea8015515eb6537ce36e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c114c26fefd2692e329b0c8f92cecd
SHA12817e17f81753da2d0e0be6710860784c411c2a7
SHA256982513fd3dcce313b32568368d669fa1dd0589d4870e35deb46107167cbb6470
SHA512a6b6a9bf11723d554e8b63164f5acf4ebd352c1c8406c75306ccb59bba0abe82b1fc33007c67bf22397f7e3c210279d294c9017799b48b071600495c96b6832c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a165a4fac24bb1137757c56300569906
SHA16cc34af4cd43616a5cd1c54e9f31fa1c358a127c
SHA256266e59270736a43d5497e18194c99c33f0f350dc80fdea908feb1256222ceb6b
SHA5125cda00d04d243d79b83155bf324002a95c8d539927339464ea8366c5648ba7684ff90f435dbca9b37f8bf85ee85f6397d25e67b0628782cc67db2fe1863f8e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30df73752bc8cd693bd789c8d4d723c
SHA1b61135992ca2ebc8e4afcd6a55a6ebf969ae6f84
SHA25689dfd4272abbf4fae7943c26dd3bd831ddcb74f5bf6684c2eba7a7d81b85f993
SHA512126381049c2c5d0c80b5baa4e7d309b097f63b4105efc6035474e5a3e8b1193390a0f6c9ca0527c06b4594cbdf7acdda5730cc469d8d7b133b8cffe79351c637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceadb1d679232263086d045626f3e4fd
SHA173064b3601cd41fc5bcbe06ef2e54a24f600d263
SHA25645a3b16e49aa79b7501854873bfd1ec56bb915bd3a50ddc4d524de5311fcacfd
SHA51258b7b163682f197b008ca9c58387f32e69cf38c5014ced91f7d4fcc6d59ff09a05646b86846195997f46dca926553576e0e818a35cd7fddb23a7038aeecb2b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ad5d21126722e9c2dc182f9b21cf90
SHA1b8c14b597fbb6beeb8f49a7235b4b80acc17eaa2
SHA256b138a1abaf4f6aa6baf91ce2764aceef45a87f2a04ff5cdde5638a4832bb8813
SHA512609474da5e198ccd1fb58799bfbdbbbc893294a648d51d6ef96efeabbbdc4e6dc2834d37ec403e2153ff7c6c013f2e82ced652b4e4c2d17b57715ab5447235c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4efd6c9fb28fdfe465f522a0f52f60a
SHA1ef67d7688cc11f135c458c9d3e917bb113747503
SHA256c7f41d317480228516ca3ca89c8e5080dcc7c376ee81a20b491778f16c89494d
SHA512ce6e8c22d534c2799275d37070be180c4899a07eeaef049acdc6d72628d7f4e07a7adf5368270a5c617f0701d60b834e2bbe6b65f3a65d2c35b3147304f173c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bef1d07fae5304494e264de5d162f2b
SHA1d08526f5f46aff470b146cf41faa18038a899e2c
SHA2561708a0bd4200125bd288e196b3ab93544a43465429cfc93d0e11aaf90697a1bd
SHA512586dff48e058e556fdaec34f070c1de7fcac795e7357ef5320ecab4a25ef59524edc1312f355f2171fa42a9f547897eb7b5b3018f9d063581d5f4a8514d7972d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1bc0ae050c7a1225093973472b18a12
SHA1f60b2d268f68615c9c4dbf466d286d2cf7282b37
SHA2566e562b6358208cf781388b90ccaf49935e4a5de2ff6b7347a80795f478f133fa
SHA5128db4a09e92c806efd9d3589490a490590b9cc413d9e0e18af9d4821cce83e4145d92b9d281315e8851b65054ccb0e6a7ccb61677476ba609efe2db524a63ae22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d262332e9f22a0c04d2fcc7faeefb10e
SHA18754a1016291df58ac57aaa76efbd5954d8c13b1
SHA256035bdf18cc9d99d1434839a66ca539e7fa6b37afd64b5768cd963bd7db3f3074
SHA5126b1b81f6862f79d3069c5ee082d861ec15e16e6a1a90dd9263c824e390613e9f428cb645ac9b91548fca920ff379eaaa61ba78ea1306a9d2dc917991e9b5d445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5613f600f0d00537ba0913cc258cce453
SHA17dfddd90588ece8eaa58a9f5d07699b03c99ea7f
SHA2567e61ae9e207ad594297a2c593bd1be13764b280b5be651712e17d105ab92ebfd
SHA51269a87b03975b964ec0d892eae137377fc61d58a937b44a69f8c2bfcdea4a30efc78cdda72459a930d5a66993f7647cf7d4d954bc57431ac7e79139ed55b252e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149f193878f4c497f2d7665078ac7276
SHA1a2d69af22cddff8c8289a5a5de49f0e7d49e49b3
SHA25611eadfed2522b9bbe4a3e8b2fdf46cdf507bf38593915643444d4df873855817
SHA512b54e9e372c305f630ccbd5f606109d7a64bc7e657da238567b3961c06891253e7e8c0e212e1fa2f9aa76b3e11a8b22e6a87f977bddcda4df9ddaf20dad18c55e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d92b5218390f9aeb5c94f15efb52d2
SHA1e7a0425897ae77836ee0f3db116d69de52efd7f0
SHA256350cbba8bce6c91b898d7f0fa9b5509b9b845c052096779c24f034082ea61511
SHA5123296751fa9659877b182e2b717a2b657d9585bf1c0bfdf14fc5bdcf11f1deb91e8fcfd1d77e0f7fae1f52b1046c2274c2347d993bf80941f0f47977dbfa9cedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59768c8178fa1ef70b7d6467b32cd69c0
SHA156492f907aa72cbfb1b4678ee5abd772ec93e537
SHA256a37c19ddd256dd3d19cdb9bd86923c3e1c1a519c87030ae1ee5f42a3d832d49c
SHA51246580cb437d9893c61fe9a6a4bad3253577a4ecd770ce6efa3cdda6b37a0869aa71e20a886c5453adcb2e8bcb2ad727d4a766c7c34854837a6a3cd2b18966651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f21ebe926fd19682437a5d7d7cf2ef0
SHA177870b782e2c2b9bd29a3dde454b654c07010914
SHA256b379977b37a16e123192c552e620a02017e7276dd627de1a24cb7631ec1c3814
SHA512c44557f32844456fb6a2342a708f3b4f5c9c8a75bd23e22f09f84c01c75cfd7ddb70046adc569fe24f57d32216b63571fe60659cbe5df7e09d5f4248a19e47b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26ff249b2f8adeda6b0150adba0705d
SHA1928cc76f4860ee62ba7ba69f52fedd77edddb4cf
SHA25661556e7dc992e567b7e5e61420f03918657887f247dd2eb7e39361df24dd6fda
SHA5128b950482020a1b45e9786c822168391671170333978b7e82e046dcd3203a5b42e5636fc1f24931bd03598a47d6e0cf808f70fae13e77aa4a323389fdd6a817ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4852016191645aaa6e0e94ae6e12896
SHA1d81da341eba5a5fcac97fcda77f600255d5a42f9
SHA25662f9a48e87f850fa2f1aa1c0658aaec36fd7f67c0fd0067dacd066ae77dc48ef
SHA512940014e00a285dab3feb5e8efb97518e38901afac9faed3bba662cdb625d73910ec90f64399fc02757c5dc8f428adda3538808d8796d1a738f238b3920f36210
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b