Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
d3ca7b27ee5242b03c2dfef3648eb564_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3ca7b27ee5242b03c2dfef3648eb564_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3ca7b27ee5242b03c2dfef3648eb564_JaffaCakes118.html
-
Size
220KB
-
MD5
d3ca7b27ee5242b03c2dfef3648eb564
-
SHA1
ee44ec9d064a2e52dd16628a655da07455e8adfc
-
SHA256
76c244f735be1a1a1014723fc1497c8d8f01a4246025bc47fc561d3efc147202
-
SHA512
e27ef3baa7f4f7afab19a7cc27edbd337a112ddca3290aefbdbae6946fb078e2d97889d7b5208ec309acc1b5779ff98717bc6fb895b7c57331a22341ca5a83d7
-
SSDEEP
3072:Sq5pEQSOKq3YGeyfkMY+BES09JXAnyrZalI+YQ:Sq8TYsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{473C6721-6DAF-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431940372" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1652 2136 iexplore.exe 28 PID 2136 wrote to memory of 1652 2136 iexplore.exe 28 PID 2136 wrote to memory of 1652 2136 iexplore.exe 28 PID 2136 wrote to memory of 1652 2136 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3ca7b27ee5242b03c2dfef3648eb564_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996c1a846dc9cdf545b0ab3fc5f6040e
SHA1a3e349ccf215700bc8f33cb0f99a1278559d5b25
SHA256f89cabb8469bb09d49c65de7d9a0caefa8dff02f3f38b077937659566ebbb691
SHA512167c0c1ba6ddf1c33ffcc7fd795ec6185b2f2c48bfeb46e08f63c9102b5360db47b9b99d4bd374cf7754b8b74514e99b2c569df381fa36b1925e99b2a95e3915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59679e14ccc2b061ad0d5c778b87f0daf
SHA14d327fa5a15f6784702d72e956c2e7d1b3b6d22b
SHA2565530095247c0f65e9197acf8a81ef6576fa45672cbc6cb3e27bd3bd54eb444fc
SHA5123c6c380306d6523d4d60fee849c25d5def2c82c68a694010f07fdbe50224232f0463ff91bad9f1723693aca1cd73cc982bddeea970cb7aa6a9ae2960fdfd45f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0e200085fbae8a9f71d8fad742b273
SHA1f0618345bf4c10d752d98011dbb9b99b9d715909
SHA256712c8cff66f76fa492b08878539476ae201a229e5ea4a858269770536fb85022
SHA512279b71c253e1d9452d4ced91af42cf5821e0bb2235510827d63e78c6b3db5ce0119a07a04e91feab925dd735f20208c2135e0e66b17099244fbe7150b3f00047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eec16c2762f03c0e0b9adeb37f0b621
SHA1136380afb30d6d055c2749416909c233d10f944f
SHA25668947398a94971dca61c49699b06fa6b6cd484c2b62506f957d96d32d280ca6b
SHA512196fd55e53cb9d8dd36127dc282bb8fadec5e981e2ea9bb66a9c3d470c5bedca52ad4dc3278bbe27cfc8f9de0a5ca135f69def6e014e67d14f2c0861dd53f2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3e952a91c909fc6b12f23881c3d312
SHA173c2c165c0d486f30a65e9ac9f414c3b32c666e9
SHA25683bb0a991558b135cce999d1a1ddf991e39361c2924874c3c7c9182f2d83bf9a
SHA51271c4f0262c11878fe1716fa9f41674adcb12421efc5c4ad9232ea04da4c4750a1cd3f6a9ddc112e6ff58e302cfd71ffebfa8b67292b912521ccd2b0e3116588e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a957853ed767fd9f4097ceddee3223
SHA1b8a173eba424a778ff7f7a14cd0883e5e4c2436d
SHA25682eb6e31ae66816ef20c5eeab8904fce79e0b1006d67f4cac4fe9fd6ee592535
SHA5129ba1ed1eabf714ccb7d805f9bc4d8a7aeb2b4bfdd1e6028b5e65d429b247d8a798d3950a59bd17ebdbec94476b4e5b44a8972c0a8b318f1a9a5b748a74ad1665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c752aee136e24981d6464a5e3eae8f34
SHA171187cb0f9296ca1c353312fe640e42826ac91e3
SHA256a4f638e36c76a8fd89b9f500508121a351c63f09dc7e1305b69fbddb73efcc7a
SHA512f104f0bc3803df4d5ff40ea7756015d4b12229274102b324cc609b50e847f3358c9f03afd0866168a6ccfddd738ee1e075c0d9a8012bd8357b99c1fb8d4be41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07d3dc6e44f8f350dbd05bc28e13287
SHA19c12cfa7842ec32e5ad11e5f9a9c9de2bdf3ff3f
SHA256892829758e11c032774955a4c089ef688626ce4083b40afac5163c08d0ccc3b6
SHA512e1e130ba5f7750e8efd4df279bca736baf289dd331d5ce1c62bf3620efb6f54b09f337927d8d7e242cc67b15d4dc8990a369eb6c22ac454deb5a6d135b416931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d155e88fe05ef1b40c72bc4c49bdc2a
SHA12261cfc41ee12ed2e15440fa7bef1b312ae210a4
SHA2569bc11a79505cdb6d15bb1d8b93ed365e0849d59182a6039f1d6e26e4d914f265
SHA512b442f2cf2f38a1eab6328623a22e2eeabda26feb7b7987c88dd5c0e02fa6cc1e69078d4cfd4107bd547dff218285122cd42cdfebd4f18e762dadf02c86a98f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e769acefce9aca29fc662d4ededc36
SHA127eda0746d1392978236ef6658508910b428cc45
SHA256cca4786525861438399bd2efa4d4376c14e10df881fb1e865375514acce0b0d5
SHA512d42394dbc06628d25f08a5fbd8eab26ca82f9eea5aa3c1208b94821e699caec708a350691a6c542e59a27e7493ef1649de5fec4e0842a1da0ebf35f0b1a506ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543bb95ebdd7e6af6d8e5ee91e293e67
SHA1338730623b0e935df6b63c95d25126db6f5bd730
SHA25603423de31ad5f4b541a2f74509da27bfe8cea34a66e77e055eda703c51ba74c8
SHA512bb0492fe8f45388ba7870f5e8252ba94c974dfb94b6bef9abee471cb75a4f3c23e552148fc77f3b84388bdcf4a5db206c02ef62a0da19ede53249b2086cc9c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545d4c35ce8e839f6ed2925fd978fff9a
SHA1527d7c4d9d5797c656b81eeb1b2b218ba8fe1e42
SHA25698d38eee196718d32c70ab66145a4ae6a4110a23a5bf91039e73484421d59a2b
SHA5125a10a8f44b585f6ddc6a15ced1fc617f0f6aea4a4ae3012ee693f807e33dd9bfa79653145cc0132c6a12ed45bb35071f50decf5a4417232b668f2e22427b61bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228da2949f6bb728a69714e7f76bb844
SHA1830e14c574b64ae398c67abf630d97e4179d55e8
SHA2562c9dbeeb35875e307ad223a9d37254450cb7350625aefb8357a1c4b7c2bf415a
SHA512cf47b8463cf58724ab337fa4612346456665f845ff61d280389897753399844fcc66c284838f34f4d6cc4816aec80ba1f5bf23b74330896d2c88915d4431dab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6315d6f696b2a13e38fc728e29ea78
SHA19e0390a5c94dc964b9665d5302ffe5fe5188ee37
SHA256507be93dd3363937c2388bf600a8f1518cb0051cc7ca7bad730dfa639f6e4001
SHA5128a3a42e84cfc7d69d95525a0fbed495a0bd7cd6a953428d8d3a0d1162575257cd549b34f6eeabc1050d9bd8f9fcebecb1e964580bc22d879b1351e045beb9bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a885dd2ba910b9bb43498af52f18ab6
SHA19dd739c9411203238c118a5d4833b924363ca8ef
SHA256cb006d20f89d2d09d1e92b92a7868161cac3507e1cf54a6e5a53570d461000ca
SHA5124f0bc9a84c4a28d639eb46d706e0a58fa7ae9da3bc07f8137f6aed8474a741f30b00f4cb59b1154353bff439d585b87eb2c917bf0b1e0eb565dec8895987dc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c604ec9978726f07b1d4fd96e1740c50
SHA1cba075599aeae65b32c59fac4de343cc19747d56
SHA25658b3ede254dc9642440d20e44df9e27526e4db483e818645cda3031832446c9a
SHA512cd37b7a76d0a881edd1a6cdcf49ab382c6294fa2ca3ee3a8bf5c2dd88448b45d0ced56ba060795797dc69e104f0977e72cbc04ee1b19508a5b10de79db27f0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52924c09464ecee1b2ec045212db06f59
SHA1ad3e69546c39f81c1dc77649912590f3e837e11f
SHA2561c5098192d67def1ac0401a8271a1fa3d3ef3222ab66486479c7a6671f7f6eed
SHA512bc376b387fe712b021429bcc6749ee947c21e98ba226a13b74b32c3f3bc6b9d246b20f4f1eb3731c013382fe3631996ad143a5400e51c92ebc5d3084a8ac476d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528eca511604a7c9c24eb4455675d1643
SHA146aec0f5a72dc810398cf6f9ecf9be3a9f52c58c
SHA2567b439051e3a852c3ac55ba050a596b25142ef141f217a0694bd4defcde5e76b7
SHA51227d7bde985b2c6278584d3c27425a3d365cb587e179660021e7c2d02ee8673783c6e6de9896d75e6e25b3a718d190be61086f957d40d71914da8dd491f610278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d94c94b6a3370e88c4279f688393497
SHA1d832cd06534eb89c40602b85696ce14efb8a7de1
SHA256ed0377be0af0b0d507045480cb0420e92a5b9a58471dff5e31fae219f6bddbfe
SHA512e65b742c3fcb71e1c6d8e31f9a7787a68af37da85b14e557189327aa0b084afbd1d820e7416825d8d7230a014ac8025ad3e4f7958491f78e149be2f22aadfae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d168e0d7d3db8e2e6f84b8d5bd127672
SHA19bccb0198bb0a944b50659a0d10eaa14da6469d9
SHA2568885198b35db03ff2c8e139045f1a8284e38d225e19b75775cfe59b47394cd38
SHA512b3b8eb9fb32ffbe0cc2baabfeb9c485244ad542a5a147d300784220b1d89dd6b9c088aabecb3937ab13648a005774daca49bceb6e181d7588ad27b6e2c118786
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b