Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
d3b4dcefa98e2e435099b51f58d122a0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d3b4dcefa98e2e435099b51f58d122a0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3b4dcefa98e2e435099b51f58d122a0_JaffaCakes118.html
-
Size
6KB
-
MD5
d3b4dcefa98e2e435099b51f58d122a0
-
SHA1
429a6ca51bb68cc3e7547f655d370cdc79cd53eb
-
SHA256
197067729005a89bd4ae829865c37bb89df521fae0fe25ba163cf1b3b0a11551
-
SHA512
fb305047427689da29131ab3d6d66362cc313457361e7e3d1a0fc11a9c51c82900fb80f6e540159c89469f2ac70ac6feeaf159806ff8426598370ddee4afd19b
-
SSDEEP
96:uzVs+ux78HLLY1k9o84d12ef7CSTUr7aYcEZ7ru7f:csz78HAYS/gaYb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000be44668868ccb26122bc441215b5556e4caf5c39f21ccda7f9fda766b4760e97000000000e800000000200002000000055db43c45f4da7e1784c7506b37c879639af09b39940485ade565b188404761a200000003b4b29d1533b5aed305e32551a97518b669af32286d79bc27733a7f5c80b239840000000735a0b32fd493b78b65fa295c936460bc1d9dccd5d416bfa2129ee4ce6ddd5e28e6edd6a8875230c46db30ed18cbfd1e575aaef5286450b17b8bfa6048b42667 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4941A191-6DA8-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00554e1eb501db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431937370" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2776 2060 iexplore.exe 30 PID 2060 wrote to memory of 2776 2060 iexplore.exe 30 PID 2060 wrote to memory of 2776 2060 iexplore.exe 30 PID 2060 wrote to memory of 2776 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3b4dcefa98e2e435099b51f58d122a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9512ce8651d00af3ea65aca927aef4
SHA18d256f2eac136adb32ba3a9087692f4956e484e4
SHA25696ac9b25fb588f66356612aa07c50cfb7f5046a6d84de15fcd0053c467081d0c
SHA5126cda2cec5104541c97daa5aa0cf6dc5b2490cd5dd6aa1c0b902e5cb7b40b2416e51538c23a82ba5e886548b908566664fc5ae9503dc98e22c9408fb9d7af4400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89ff002238f41d0a09d65b5a1c17843
SHA12bde95fbf63622785ae997fd3433b59ce958d5c8
SHA256ace9c3ce6db9ad27ecf800c62b605b389f2df26b111a8cb186f6385f6d3d2bb1
SHA51222eefcaf99fcff524f60477dae0f9813e879071f693af3d2a46b4f76ff1ce738fde577ef90430dd28046d1f2243bc44654ac973d7acf4669e955a2b76f0d2e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e8923b5f205b2f6f130fc0f9d2eba3
SHA161ca55a37668543cdd035ee92d10eb1324d4d1d6
SHA256c269bf1c8aed2a7b6223d8ca0faf2c3c17866a6f2da9169cfd7ec00f506a1114
SHA5128065606b728ac4880627ff979f8349e0d95ac17e1e19548bcf80c634fea38c83ba484efbe1c769018770d05ac2690bdf9f92a520f6c21cc989332282254aaaca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205b2b7594763a60313781d08a4ece4a
SHA18fad748bee6e847efd173c5455291ee66c8ebc5e
SHA2564b0119a24610c6e7712f0d5e15a06d8c5cf33cca26ad06d8f9d597824f436aa8
SHA51248859df735afbae01b0f26ca22bfa6990e98373a153f61b0806bb908bb13b8c87fcfe3c4279d897f5a30f6d515f49e5b1b64992ff6dcf2310dd8da77dd9a0e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724df9d1e7c2a137082cbfa8552fe6a2
SHA14239bedf8a918b8b8dbac122c91409480f07014a
SHA2569111981bc65f63ed923cf1f1e2d95b30f0dad6ccbd60924cc15a3a6155349a98
SHA5120a5af99cf59c056a35d450c3c08e9f128d1e9ff8f5fe3bae152b258d9dd349e0ff159531afc4d5c12982b31cf778555930989eb8d6444663650959718c93fd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9eb9cdfb256f60bbac019a4b0b284d4
SHA1f5e13abade2c550f5bc5deb321ec6cc20f846350
SHA25695e6ca4e0c252efd81472ee44a77d8f8d0bfa5ff009bb3e59fc46b3b71814a05
SHA51253a72750ecf23183d782988891e0964f80706d74a2cc1810e997c35772a692d22f1a1f123eb1d88ae786af29c7575b010de8df17cc07ce7fd278531e726e45f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50683a607ec8a74d65cb05a4a70402bf7
SHA1d7d6588833131c1c0f065fc6ecab1e150d8df873
SHA2568ea8d1ad33e48a7813713f0f2e69b3ced2ed9829e9b53a160b0e9dd28fd45ba7
SHA512bdcbc78d39417ed19b1fd05fe3e158b788a4310e8b7330ce8de2bc8a1a1f9745e7322f1389ec31a791202af1e3f786917f1b7325e47f18499a4be3e4d056fbd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512006e703abb1248e0375294e64545d2
SHA16f6293bb6363049306bd5a9cb04fd727fab98921
SHA2569d9c046b9e707563b97b943b6e962142320c221f0e224a9e29654f9ce48c0355
SHA5128142359788ab5bc781ada6af5d2bc7da01228d47cfb9e8e97777058ecb8a4936dca924c696c4b306d7de6b9206df7f8d99c22bf0a47ba8978aa6239fc8d5a989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56533ddd31e7f2c021e83ecf81ccafb0d
SHA1ec664332d48bc850059c6bf092d3fc34f1f2ed2f
SHA256e6bac7263c8ed190f163fc47394a13b07861dba2d4a1a3a679cbbac1f68a92b7
SHA512e0391efbe76c4f6cf3980ec8bc6b6d14e4b5427b7bb7e64c835cbc248da71039d3efef96ba5e1b5f04182326a850d196965ff148b72439ee7d472d87358ff199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523173711339ca7b92f9801666d2fdcfb
SHA1fc8a8ece133d137a3662cef53b42ecf7d250563e
SHA25607fce46be867e4569e41cdb0975bcf3d1ef45a953c770beb38134aeb55ab6b9b
SHA512edf533778ed0543a3a8cfd7094128f03e3d7ae69becd6d40da5713b198168a4319d89456f981054ce80783b41231debbd9595f3be8d844bebc9538bd22eb5896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58acc2b6074fddd2b6258efa6ce9019a5
SHA1c4732281f2e198916342ddf9f286329a4d7073cb
SHA256dc954347e4723cdffc13e6d439112a10627c46d33c118ae164fee81be49f64b5
SHA512c7eef0d319530f0a2a9f5e8ea4054d528245e925b8e4fd1390907916271fcccc68531cbae2fd5cddcf93458fda3a611288750411a84deed6e7f795b2267d5d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2840573319b6ff187d6163e73d6c6c
SHA1cb5a4656cbdd80e2dd2901e854510db700a3551c
SHA256853dccc01d37be6ce893ebea3f1e35fe0385f97ba03c839a95feb8c5a9ec5975
SHA512b5675e015c55abad4367bd359b8813b42e42f190b896c593ba10a33ceef4652343e50d61d8676bca35bd2b689269d35e88c89a01b00a060e55531f805b8a9b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000a009e8303e3281e2c239c8b911c59
SHA1c443783c1c7437dd41ca36e4c4a5544e90a52196
SHA2560579bb9a6f7493f434707a8507279cafdb9ad4de72c70bee18ab70588656806e
SHA512fc85d5147d2c86b45cb660fd2c61c4e65baecba570d353485d753eb350b01bd21a58c3bbf0fde293da246f28cba150a823065d9829957c596fb82ed0307b39c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc97a1993cfc5f175da4cf94d38c9823
SHA1b63c1ded24a5df36474ca956cca874547eb14e79
SHA256b2f7a6a5c705462ef7be1b36e34dfd124c49f3ccfbebf2f516e79eb419b560a0
SHA51243c9ea6e38e135b0608a8c22b723a53c267e3deb4661d900bc24aa0cb05e52a63b3c4eb1a52b862345a3d33c123acbeca16729278c9c1cf57603509b2ef0cc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed75b3e526d4665edc165fc300c91de3
SHA13f90492bb926f982bd132d9c6eb23692fc7d3def
SHA256cf63382a4b0f66770d53ac8969cf993e340c6681008a7432befe7baccca7fa11
SHA512bad25feed3fae814b0eacab47ff25b5b7f0022319d9fda03b1bcbf749eb86170ecec208ae971b131ca05baaad2f04e9c3b56ca76c7ab01bb61c4d36828fa52f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e134eefdbfe549c7e9c17ae9285910
SHA13b240b5b17bb4825922632f5c2f7c7697e4fe50e
SHA25652e108606dae4715605cd8faae19eef3811177e92b44e760e7fd4023fec65627
SHA512f1a235db686c1a8c33f5cad938e8015c0ae8af864068f414b2e58dbc882f494ba90aae1ab9432942d04812afc18f718a19ff04591582742798e8e94da552e8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f31bd8f1c2a41a9925b981d518e7b8
SHA1b0ecd2df4a30d73087eb30079c91919226a68ed6
SHA256e28c894e849a4536cb1c6d20b901ec955fdf221b6388194ea3968b783e68aee0
SHA5126fed2972f2ecfae619858e4a34bf7808154f78f2c6019837ebac005fd1b0a6307c4d4f282ab1893d9f071b231c25e046c1d7bcd7ea64ede4c5622c7edd9e4ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531753784337a11c44656203660c3fc7d
SHA1c7be91022b39362c3551f4cfabbd38a6750404e8
SHA2560186f9c5d0fb329fd69be65588f7bbd7c74c22612a119cf88ed222cbe4ad68ab
SHA5126fb185d99c61de72309f56d789c3f4d2f1f2ee9c401519241077c0aaff2faf32de4ba2df15ff1b98275cef348ad4c54bad2e07306faaffb1ffd837c5423f3373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a65deb46e4fa524c72ac2811a4c432c
SHA1ab1f4b08635d6569e8180a3e39f945610edb6d8e
SHA256e1fa5e9dca1655fc25b622b26c96f1d206739f97ab91a40359f6cbdc71fa13d6
SHA5124279580b53fd5c4b88299f3a0fe7571e75f81b1899a0b3fa21527263c7022b030f3a89093ef4c2047b644e23c0aa848831821945b3dc228743827e8a599b5045
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b