Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
d3ea361e8dc979d8d1a3f89a3b762f47_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3ea361e8dc979d8d1a3f89a3b762f47_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3ea361e8dc979d8d1a3f89a3b762f47_JaffaCakes118.html
-
Size
9KB
-
MD5
d3ea361e8dc979d8d1a3f89a3b762f47
-
SHA1
fb92973ee692d77c740cbc4acf7e9a3a25aa0bdd
-
SHA256
d0f00314125a51a70c24734cbe37125de383d28d48474a1f7ea15154c878b760
-
SHA512
0ae2f34f3c3bcc77b479e81957882df43d76e7bfc3ec917916178bff83355cef440a5ca4d5354ae7dd2cd2adbca2cc4e88051991cce98297d9dc39d1b6ffe9d5
-
SSDEEP
96:uzVs+ux7TzLLY1k9o84d12ef7CSTUOGT/kIIhOp0okHlVHcEZ7ru7f:csz7TzAYS/TLhUjIPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000019d4105e1a4d9b0a745043970a1dcf5c6412f6a310218585d04b77a2463ff314000000000e8000000002000020000000baebce647019b9041d9605ec5640e08116154d96737b182fc6e4862831397dff20000000e6b581d7fea2ab4116329899f0ee9bb6618b1c5ef84f08f026e8e04d7abf12b4400000001c25e0066d1219a6f9e65b99f3dd5d3c6fefb25ed9d58deed7f7755d0f6d4564edfb475f049d1230f5f804b92981cd964c5ec749e5b895aaf66c1cf22ec57111 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431944857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a0678ec601db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000025c7c218ca8d019426e47ec5ff3ced162dae4962eaf964219c81bbdfd4312305000000000e8000000002000020000000f0979cfc7672c3b0a90e6bbfde0b53ebe6d1ad8dc66dcc1958a90e2efa14bba490000000efb06ba208efe2f03a421b6d93b99df9ad260a9d1b3de478c66ca1fbd79c1ef2268117cef2abc38dd364a7318eade855388d918422c2a3d7e2376257beca796d45be660dd1dbb2793e7c008522e0647c6b492bd744b84c21734e5f65349bfac6a2bc13fe95597524f70f60f410948d67ca1505edb22db4232f38cb9ad8000558f8c8111e7bdd588f30cbd5da23c73ba440000000a227418c465688ce3cbe2dc7fd21a873dbea2dbfdb1f1d7e3aef9afd42e5e3145f4b3e7eb3211478b0a5fcf9c126c32353750cd1bb9d22896282053b79e53947 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7E404B1-6DB9-11EF-A7A5-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1872 iexplore.exe 1872 iexplore.exe 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1628 1872 iexplore.exe 30 PID 1872 wrote to memory of 1628 1872 iexplore.exe 30 PID 1872 wrote to memory of 1628 1872 iexplore.exe 30 PID 1872 wrote to memory of 1628 1872 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3ea361e8dc979d8d1a3f89a3b762f47_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa8ec4dfc7c88dac817325f1a8807cc
SHA132b2305a834ff12e7a6aa75286470a570cda0046
SHA2568542358ad8f275d4f3cf4eed0f36752280faec9f4c38aa238bf0f5f4e612b816
SHA512992e10618a31ddcea27b18b888a022e420ac34ebf5021797d061102935d03d8cc8b88244ab9dcfb382fc1a6519777ed50dbbf7e17ca1b26595fbd1ade6cf41ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd2b8a1d12a5954c8974012366696a9
SHA139b1b443972e5923932b6a9e80d972bceab78226
SHA256c7abe48a33a868328bc5b3ed846a287752dbb7f41155120a0a9d2f0e4ba39a6c
SHA512cdfcf1327679c3aed0d8d9671cf50b0c1cad2205a9e37363e1e36bd18bbf0eb9e65aa4bd37130c679286dd179f629b720d0de67015259d5731c5d66ef99ac819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e532444d400ffb85b435021a4375ba
SHA1f6dd6f7ff4157e167a78b2c25e1242025ba5cda0
SHA256c6fa9155c239b1acb06d94ee0b3c67c8da864bc2f5e1b68a08795c661abfbbf0
SHA512b5886ba4c51124cdc045654f8dad142f6c7d7e7c2e48aa6a59a8da56be4793d7cb7e0dcd4d1779569ef7c2ea68fcb648334e33779a45fd353a64fc1401f43bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc2102ddfe62a35490590720b710f6e0
SHA1072a9b9854a279294ff08a0f430099b1651cf580
SHA256ac1818a6c3f277ac1d39845192fab897b19f5ecc293e76d2fef0f0e1f0336d26
SHA51280541a28eee43b076bd2b99be9822ab9e0827a3136c9773c298b57a7a397988c481b0080bdda56a57da6f92cc66f7bb93400391b9a22c0e5cf0416cb1f89085a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a6dead169dd98cd6e88cf1e4541e08
SHA159464dbd8f4a295ded8b645909129c923177f47b
SHA25603f7e58f6151a1092dc89f31da6d71e809abd7aa50ac210b5cd483f44f2d14bc
SHA512f2f77b1ad621c3f6a8145270c65c0c12c82d822f52ecf9993fa84a825107c512b7a2fe76db2c73b41e535cdca299eea6c0ecc14d3b0222bba2ce22ef6aa20c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e7817be1c18ffce76a2e2f8465f9551
SHA103d8e9416fe6f58ef191699c475b86fef29ccb7d
SHA256aec266b16e1c9597590f3e2a8081a855138a085b21b0d74b6e87a66130d69c69
SHA5120f449047ebc601568c147b8945d0c1f082e6f0fb59a5fce08721bee58fa27e1f492d3ef95c51a04dbc72c26042cbffe58b6c93d8d33584c7039a80c6df68cbfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eda2bdda83621d10297492320627c25
SHA182c54c245af8a4ababacc94e65907b558537c222
SHA256df00584a151bf02c57ef473e236cf7dcd03a466ad093e0c32c299cd0e66f9a56
SHA5129520955a2f77e3ca9e22881149cfc84bf75bfb963ca119b35f9da52901bf48417c91a860a262eaacb6681db2912fcd53c865c7c26ca41aa9f8ee89514ce0ed7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57974c67f97c6f5a9d3f819769e13405e
SHA1af1465bfcea0cde1d4620e8effc74637bb5dd3a0
SHA256ecbfd35ea8a464c0ebdca0241c274b8289a35ca63a07eba3e6aca555cbc57741
SHA5128466527324e5703dd8fd7435c4c78e13e8e9c7b77233307a0fbcea640dd92ec8e558cfbb83dd900928106dac8eb5c5e7787dbc64277105fca94b064678e6b5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c192d07392484aad26d0f1374d315094
SHA1c686eac8e2f99795a1ecc4711825ac51726f480f
SHA256e1b736a8a5f00237bb8cc4bf9e38b5d38e491ef6b6655a1f8b01b8f7baa39fbc
SHA512203b2d36bcabd689398a37889dfc06c45e53f55bb0e82b550e3dbab012a1c59fd8fb4a2494d384ad8cd533f222b1033af45d286c2e47041d82c9f3823dde9c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b6e5f401917decf30c2345d3681ab6
SHA103e2570215e8db229aa4da683e216bfa52d4151d
SHA256bf9d6f07e78a59782f8983b302518d1538c99bd07eb633f92b4aa369d6bf1647
SHA5124b3c1fa77cbac533f85099c55a2795212f56fe41d4e342a9eb49a7fa322eba0bde76dd76aa266d2edfa56ee769e3c3625da830768d86ba9dcadba35ea96b3bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb42f53e2b8d03dd6b8465b2d65ea4a
SHA173585c8cdfb20d599e61c4ca5ae85464623b799e
SHA256b11ffb295ab1a071996f4001d762ab97facb4d98e3215425082f6ab24134263b
SHA512bd86b11c640e6490aeec15d2ea9178b2b3a9176d8edd406baa2ee7a5b1e5657bc96419602dc57427078c6c6ffa967c5975b2b9d08a157879fe238262ece48b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085fdcc3b0c6796f5652a251206b826e
SHA1280f303a685c15f35694d570c09758f380d23104
SHA25628434b018f58d79c4b3f5c5ccbf596579c81a0177f1262758662308367ba99e5
SHA5124fe59691d1d15b688cfdd67b7f7cbbf5982f134c50aa9e0a300f746fa1087eb6f4c489d33df9452c8e6f0d4702d313b8a184538c8c54c43fd569aa1d9c081ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580da0825aea6b44bbff5b9d75953fad7
SHA1ee265cfca88d0a8ba6741953cd8e7b66441af0d1
SHA256f1c69678d195cec74cead060c45e3d78fd233195421d740cefcb0b8285505abc
SHA51240f3db9a5c8092fc0609deeb243bab1b6e7ab1930e0ca7edc510a1807a4f7e7870334b9e925d2b4aa1e6c3fcc5f68d2a5e8d9606501b1f7d9aa55fd00eed1aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294f82e0d6227ee1ee511c5883b8ed52
SHA11016ff7c9a79ad7024f95ebf8e4f8e091bcebe23
SHA25604291011ff519e5cc23a37f72fbea9bb847304e224368c984cda9e417b186c5c
SHA5129e985f67d5e6be160773b221e2883f383ecc1e8f4cf4eab330b3672f049561ecf3d9b9621354d5070786be92610d5e73ef6bb407780227361d5bf7ecae7e131d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f379e4ebd3d3a1b482332bb76cd3c66e
SHA1791168fa991968331c3811cc6c729befce870778
SHA256482314bed8d800245be89c9a279805bc6046f12ae1ff5ab433d9e7d926e1ca40
SHA512482e4565805f5714ca8686e6572e32b616317501ef3d42944592e7e7ba53cdc86c5c9a0e6d86e51068066d04dce194138b7973e40f6cc028f8c8dc738093dcb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd1d44ecba13b1e2b1045efeea3354e
SHA1e346179bdea8eadf70508a2d2bc7b330f3b39ead
SHA256b1b861d64d60572592d9c9f130dea598d8f77915dc1dea0fb9030d7092798e9d
SHA5123be8829d5233b64bc4bcee3acad98f79e38f99c1eba8355354a9f62d1d220ebbe004f7c0dd7baad6a9e9e06bc404e5b724d83a9e4beda6b3448d2d85bdb7b54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7508700bccdcd2441b37d82426501a5
SHA1dc5457324fd083bf27f8ae09fbbbb8bfe0e49d69
SHA256815803b128560f104fcad77966cdb165b424e6da64e63293a83f19b4448f78e1
SHA512f3e73b5ffacaec1bdfc929e668e358974af6e91287e67213cc36244b14dbbe6caeb80d48d43f5270a87c84a9d82b385c09ac3495965ffe0706c8d37784643fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464fb1caecf29e353027421058e16659
SHA163b56e1363170789adb808852d47ee98f4284552
SHA256381576c672ab1a039a7dac012b6fad47879bc89c3ba2b06b0708b78cac17aab6
SHA512b88b93520fb321a4b343187f6425f1b3b3393b1c80b79692c170d0f44880498f8a0c7b480ef990d572163eb1a0d89e7db2ca3b158312124cb4cbad6878869fb8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b