Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
d3b4dead09f9947d26b125bbec10822b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3b4dead09f9947d26b125bbec10822b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3b4dead09f9947d26b125bbec10822b_JaffaCakes118.html
-
Size
53KB
-
MD5
d3b4dead09f9947d26b125bbec10822b
-
SHA1
3196fe2f77302337f01f18ef46724af564b269dc
-
SHA256
506d87ed97e2b03673cf591ebebfae1b2c94f099f6a11d8d00e6e6f0da75ff0b
-
SHA512
323047a25fd479a29304dac5bbd24fd2f680bdfdae9e485bc1de746e01ff358eb3eacb6ec5c43552b08d3a0b32f63125235cebcf5917181567abd00c49eab67f
-
SSDEEP
768:0bMeGuQkGmnJf52rVUgV3X74sL5OOZYKtQd2j59siZ7lZch3hSwBc8Qcb:sB52rVU7AbJK2VqElQ3xQW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431937373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60fb7d1fb501db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000078e0350b49df60cab67734a5678bea420c28785f3d8f8e03127fd2f48e1cee4b000000000e80000000020000200000001fc932b68ee5ed89e8d335cffb68407aa656a2fd5d1d8aa175d53acc4b8390a1900000003ad2540688854b049611907b6f0e5b5e369a2da15bb50c1ceb28e3b69bbbc0df9384d136288cd255df19cdb0ec2869a890e1e7ad82be41c2690288da991cd9faae2647db900bc40920954b94b63f0f45914d8971acfd38b27a924e683e151dd1e3ed23d0b5923894b39b630d3775da7e151dce74d0c65250521099bc4c4050168f23d2f4e436a07d60bb7eba0c3d3ac1400000001bd2780e4886bccb666e2a6d62bcc906fe3ff6eb98dcfd566ac2bee2293e382325ae1367b56d34467a54e96f3c2f2e4d52d4f3296d6daa208abec0719a3935e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f3cdcec09d918825bbada5e36f00762821532a73ded2d3d4af30499a78ed28d7000000000e8000000002000020000000bb84e0845a8f261745c4f2f2aa4f345bebca83c84d53c4366811577028f4d9412000000016ad149a3442d49791ac755c3d61aafd6b918d28cdad08d15b0dd220cb8ccda04000000091a3f42d8c3842346facf8df8ab47a8565516d76e2a08110d44bf5b0d92900edc3429585fdc4ae87e30a744a53c97cfe3660b971d6fe6b039a0d97295413d0fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B0951D1-6DA8-11EF-B25F-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2288 2336 iexplore.exe 30 PID 2336 wrote to memory of 2288 2336 iexplore.exe 30 PID 2336 wrote to memory of 2288 2336 iexplore.exe 30 PID 2336 wrote to memory of 2288 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3b4dead09f9947d26b125bbec10822b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9d2fa1e965e4ff504f8ebf9f3bf1542
SHA15c6c795d266a1a5e0d3ada2453ddc9da8ff20349
SHA256675a18e9bb9bd36410d480f05027616d39e8b81fb7c9dcde8249bda85fa3ee08
SHA5122f32266defaf4bc5043f54190337291e2add811ceba03757c94dfceca90767bc572d943d69625d80cdd9366b07ea46d3fb714d9bd2ed414d27ca9e33ac7b16b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e2d3507d6b688c913a4be03bb47a86
SHA1773ff2d03f03aef11f60ce33bf56b4162e0d7038
SHA2561ea653a9583f243ecd151ceb9c5daf8161bda82e27e25416ff7220d98510110c
SHA512aff5ab48c32187718dab35975e462996661b75194f81e60fcefd5908cd1b0fbff1b069e5b88b0c5447071f1a183814a74edaf228c94c4aa6cff7717b289b4297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8af64ca5c475d0cff80b31e736fb2cd
SHA1b7a4effc4d1b197b4ada200c251aede86f5c7d81
SHA256d68dc5a848931d540adff948430e34599aa20290ce14fda77b79421a4ef22fe5
SHA512893cdc38e733aa278ae962058161a021f151f8fd3ab1ed4ca16df0462758b834b72e0157c3fec2f3af717f628cd4f5471270d7c9f2b84c342086164d4a489035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e9d63ff3465824d0eb5e19f2f48bb4
SHA1e3b397beb260e97211062b0297e2b41325f8d442
SHA256e7eee416606732bf95d7743227630ff17149d6716510ac0521f3a04a9a741889
SHA51241525b9ad5b38758ce601e7ffacb1863ab45cc9df4f87835683c7ca27ce74bb5da6690a8cdbe1ee324cf6872b3cb8adc47d02b1abb6902fef5828b0324d36dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bff97db8d698003c9bba98d9cd7ec14
SHA1d2e5a05bb0d5335b5f6c1fa32c383bfa0a484fe3
SHA256f870418943edd6c7a8b247b3724414cad0e26fba813df59aeb1c71b42a4155c7
SHA512f436d5094ae84e3aa9cb0412ddcf81bb2a3abb93a88532a9faf7cc5e0a1e8631d88bde86d14370c97748d39ee4d9622080820a47f6208d90dc5a65994056ab9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531490f8baab615802ef47b7b82967635
SHA11d1bf33ab5ad8101dcf32e6f4776347df72cdab7
SHA25632ae0215cff5fffa68b60326292c5144f88ae424449ae2ca97eb25909903c396
SHA51221a9f116a5b669a8f6e3ef076edd6a3f70c83a8b0db856152564f85a252cad6f6ca3de5bc72fbd669de6a108abe5a12e4099ef68d2ade06e52372730b8d04c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31b905df639456045863e4a4422e211
SHA120b1952657bed06bbc541c60781f99d1042247b2
SHA256a3680e888bf26acbcf7166192426a58eb5ec5b41910411ad791b65039d48e2f4
SHA5126bf968e9ced9f1e85e9a2aecdd21c05a04cec835cc2e476d5a04e5d77d9eff959b537ed0a5b1efc049141c9b61c7c0f3ed24628590a5214464950af5918c39e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d526f8cf0f4ebb02b535d2a84197275
SHA1bd79d4ba1ac7d25f5fd5f85251f59bb55572b612
SHA2560dec12a365cd933fb8a8a9c9d49f5a4d9aeba17d0884e867c2622626bb10487b
SHA512fa91e7fcf67e99e5ce88828d7f81b9c880d39d550de04b8b618d04d2649617cdf386898da1a36e3bfce56b8a4214607557e87fa884e1528cb476584bd13c5d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf402eb501524469258382301d53373
SHA157a9d3735c4eee2ace5d16bb74ebda759d40f3df
SHA256021580c1d1e44a9cd8a00dc2495865d04b3fd43479594303b2564b27d804e9d9
SHA512589153a1543b04b41dacbc9273860393559d3a8969d0b9892440b6dfe94ef514f26b23505d833b4211a2aa52e1f0e1cc7e08536d7fb074a29252c137bdfa5cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69985b28da355c5b19b5d8c68d3e804
SHA17d8a792d766d98d52373ee61af92d105a6dca03a
SHA256dd656fe6067f409de905b29cb170a0a05d9140ffb244bbd3d491748e39e0c18c
SHA512af118d105715df2f3e5db87da6de4cec33d15660aff6dd361b9b98cbcfca338dbbdf066808bc7776459e9013ac80155f308ff862a4ede611ad6a6d4185e2f086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfbf412e71a8b0909c1b31d5f558720
SHA16add45a55cf5d6f89176dc86d33257b454aa6783
SHA25682e7f7011dd92d4a95dbaf9b177cf6c83ad552ce03ca4a58ac91d05e30745048
SHA51247f576d6a540fd5f6916b9792761995e4d164ec7b6dc2bb0892d9cce2f1ff9be96e7acdb711ce09c2ef49c3dfc146a6a7d3f9220ea252e36c31c581988c21036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faaba20217cba8170405d592559977aa
SHA1229616b7c74b26d176c5331cbd5467f806bf8929
SHA2562ccbdc324b32a5f07ceb9138587617a7c45955a03e60f1d18ee27ca0e2201377
SHA512bc5853cbcb768db084e14cd00d64942536cad0b89e8ffd2f49785e54633d7558bf1142950e2d259d82f07931b52e46911a14b6d0ad6bb8f39f40c037fb630371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841581d4030508135818a52f8b5435e4
SHA1c26233c6fec65f1e365807481b8546ac818897a1
SHA2568775c67fe09029e53ec8f082b855c2317768f180376bebc6bdbaee22122338fa
SHA5128a57f82ce01a3aa50ab1dc44540ddf062400de415b30bacda344befbc430950718b7b2096aac2e57dfcdde23b63c843d44f783f1a3a031c6850c372428ca6285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd49a5a12a37c03e71f76dc978f39f8
SHA19d2566bc22b06c624a1f0b4439807e21902f241b
SHA25696bcafc715d11f491d12b384d46edd48d273a94453ca9695e35b88a2907b8c6f
SHA5126183ecdeb36253f6eb0e5f48a806af6932c5c1844c26c177683f5837800e120227b40d4fdbe6fde794ced1b54fa63fe54ad0b3ba1c410b2035d12467e2e711fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a128aca9f33489705975b37a5dca72a
SHA14a400131d3f924d854c949f4d952caf25c6dd323
SHA25628aefebb3616cb78ff69bf3c0d584e99fc63c915681754d133d4fcf2f059ed9b
SHA512baaff08f02817c5c59021a111c5a09ca87398dc756ac797b63252df35fbd26e29e41efade0ca8b3e7348db8792c6d87f7db4eed449677a65f5de6f8e4ed13771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49081f19a356f8277e872b8942ccdc9
SHA18d096b2c64f98a1374c90344ebc148beb3a4710e
SHA256b1328e833a713c37d3dc110f10f076f6f96d0a87d56ee97867b2496a80d2a444
SHA5129a1383c532356bf2eefabdfb77df04c60045ca4f1c47a9ac4d548cacd7e49550b595a6bfe57ca7b30a52bc30fae3d9e5a22b03721cf4ca1202b6d15c897e5f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095eecb333c8b2a478058b91d0f3fa4b
SHA1a61ac9cf51a19693edba5afa3727ff24f340cb6f
SHA2565290b30e9929afb7b8d1a3ce1ebb991be5f775e507b310c2ea359874ffbd7ed1
SHA51219c810cd49b2b31df47181411cc28113b48f63db2d894d861597d57f919b2248c03c746735428b9a803217713c1f72983fe7279ae95539313fb04fce0b685362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c430d7ad58b9bdcf3734c8e5bc7b3524
SHA1a4ab8fb320876c762fa1063a664c7446a6b7329f
SHA2567b2852ef8bc204c4153422ea38ea900bb045689fcb5d517df85d900498f4bd29
SHA512366a50a4203d97b35139eac743d7ad03e08cc80d0d6eafe2a6d32f3976eaf8cbbdc73ef9fabe3b230c34d945b3823b86cb1db6a2bd16c3c16911b8f9f0a2c9d2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b