Analysis
-
max time kernel
137s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
d3eb68e6bfb96d683596a8bf267c31eb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3eb68e6bfb96d683596a8bf267c31eb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3eb68e6bfb96d683596a8bf267c31eb_JaffaCakes118.html
-
Size
139KB
-
MD5
d3eb68e6bfb96d683596a8bf267c31eb
-
SHA1
a4c932d9cd16ef9b744acb9a1ba91982f9078f91
-
SHA256
0cd449e413e2cb2a9e5b428c5414ec1d62138ac8f391be027f67e9412c674ed4
-
SHA512
308a8463d5ae3c3f6a43b878bb440d2fd89e8feecc95a8be09da43b831ab1d5e3c5b7c8f1967408015135265a65e5477fa89ddc0fe551cbdd8938e6799f62b30
-
SSDEEP
3072:SU36YR4T4yfkMY+BES09JXAnyrZalI+YQ:SU3osMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3334BE71-6DBA-11EF-9584-DA9ECB958399} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a76d47c701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000090467cfc8600919abe44581058bcb68fc5acee811fc9add7bfeaed7a6ecdeb40000000000e8000000002000020000000cf8b11580fda57b35820c011d1189d65bfef5973ee9017217c335f7cbdbd2fb52000000061f211c5aad54b2340119edd3c1e4a4d80be97ef836b62a597dd159064f8d27a400000005d0abbbe2cfe89126878d9068738bb88876ba00e533c2f33988d759948ea640104622991d8d2182d652e448190efbdc6109f179fcd955ea19fd3c336eebbaaf5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431945066" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2940 2744 iexplore.exe 30 PID 2744 wrote to memory of 2940 2744 iexplore.exe 30 PID 2744 wrote to memory of 2940 2744 iexplore.exe 30 PID 2744 wrote to memory of 2940 2744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3eb68e6bfb96d683596a8bf267c31eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5dffa58797f0357688ad2d8f6fdc02
SHA140a3ad9fbb9c3d306a4f3f50c92d4e28e0aa6e67
SHA256cd8d640e7bdbeb8f61d567e52bb7e7c628de321d19332026b542740965c65051
SHA5125adbc4ca18d262f65c0994d7f9526486d8b6ef659a40a24cbee77794da92367615a322b32b5cb58c560f7c0cea21a3014fa1e2ea5f971280ad5a8f7edce628ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa200af080a439024fba56cbf17b339a
SHA13377bf35f79dfe67e12c59872340bb04fc39a530
SHA2567f65522d4ecdd93911516b5b7772de439dade90475843891776efe3977113d11
SHA512cccd3f3edba40b93a49cdc6bd0312edbd98886119215a4ce10b58ca917478fdbd9fb92c5d739fa25d24a26bc1ce3fd2d53072bb119d5c4f4671cb60406013d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f56df15e1f1dc14c4e3a0ca3078460
SHA18f8b0ea03baf1cd31c12306ef667524722c09ab3
SHA2565fd7498c475a33d23b8df84793918d4300ed3a3a4501f086f64cb01c9027ea3a
SHA512b8647daeb6482876c2333fb5c3c2f5be1c2d39e23cf7ed1580173c887cf6e13ddb06300d2df34358d32e352b36ae89bdf6b3b777a8b25b7a681a425a532d37c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4a9fc456bdf47fa0aa1f62200c4b0f
SHA1daba3acc9616d827f95abad471e31069135c1ec9
SHA2562689c44726e6dca57f00553a73bbeccd2a5aafbab35d55d8211b3e7bdbec8efd
SHA5126fd0d3eb4557d5742a876b02a83f45c87e17d79be4f7148f0411e624688bd4b12fad47aed2cab55ae0f6c9f240fd1f1c2f59657ee4bbc04b89046bc5582e7357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55685395f6f15ed10c0e4ed57e8e28cac
SHA1c45241a8e46c39346a865298cd6a5da7492eb6ec
SHA256a45b34d9960a33ea01b1282875146036f77ee626d5696a14507d9a4dd1997567
SHA512ebb7c12a3f06009c3ff06f6a479e0e0a58108a391237c8bea0893fdafcc47c3aa6ab8a6815585a20d0b4ad140d7a3b1e0230c499ba24671d80877fec83ced23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d483e3241e00025f5f75da358dd3b58c
SHA1162356079d663b124d58dab407cc4c09c14c96a4
SHA2564505f5e98dd0ebc52abbe11952a819124f8167c75d40b145e37f8636333cc2eb
SHA512b38bf9afa566195b59ba9602814d0a159902441e5563fcd20677707405c49e6f403906c2b251002a3fc6bedbd4e93d67fe5a1d1837954cdeb890fc14efa01fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e10a01bbacf0066a48d71b7f8043f4c
SHA1ae6279397d98be8082663113cd3d80f98c41d1a1
SHA256ef58e1f8bf317240ab08fa65515f7fb28089bded529182dc4aa4bfaa5ca47eaa
SHA512e5044c68d6d7cac4eec364ab3edc62157f1a1e1508310e8a9d17a19c488efd658a81b54a08534479f1ab617226ea19ddd0afec089bde2adb92ab41ecc09795f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d889ffd8e226f2c37f526200c5ec6cb
SHA115c0fd556f2e4bfa251991ab806590a6691b3f93
SHA2564616c54db390ec34aae752361fd69913af915f9851fbe4d80f2b64ee5f9ea0b4
SHA5128b531b1aa3f7935e5e4fccd6460e72bdb7ac8d1120d75049206749ea496ba05a8d99704d4c467d00b1a2234f7126b56a5c6866014ec06e71308d3e9b4d654533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684a95b98670cfe7b4982a80404df544
SHA1de3f8f0d1d6485334da61eb35d07f2113a38ff0b
SHA256d33a93d5d5f6b311d576681a2bbd9d0d34c28eec0fa499fcaab5221e37aa8e5f
SHA512c51e220e6a9f3563acca132a0dbad91f1d1ff6449883b0d274e922533b133c64468941515efb2ac05dc9871709b01c0f3efd50571a030321f868d1968c105cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc98e80b33088cf97377ea217cae5e0
SHA167eabe88892a0fa022a681085636a53b8c9a09f5
SHA256994b77d3fa8c496cc09147b531413745a1ee50948e8c903ec7b9cea273124ae9
SHA512f3e4cfc5f7e71fc4850b903322266dd56e09ee578ac373895aeadec907e94fb2a4f052d4083431099c95a92d5c3b3dac8759a31b178c1b5f23a0a1cbcb59c692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234167153dfe05841a98169ed772bbf8
SHA1d6e39f0db305857ceaa66d446805a03547e0d72c
SHA256ba5f3c80a8ced73c244375d5644b93026a5ff68018c48a61d6b7de09706d2cc3
SHA51287e627b6b58d7a12ddfa98b51118fa36244ffe98b115673a7629844d34d4bc8cd5c56d66180607ccd38ce355f19c14fbf5e1c587610c9b40bf9439ea7f20633a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f887467eab9adb39f67430da2152e1c
SHA156a67016427ee500d26a84bb9ade9576cff17692
SHA256a8ed44d4c48a630d7fbc3da5ae9a6838904e7196f27b92f134ef11127a11c8db
SHA5120db3d9197fea589335179245ccf0fa4c9e7bf3c50d04a75f7148f58695a5110e4ed17668b2cf5a685ec025deea08787ce9e7a9c9d5fd3a41b33914eac2e50fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59295a9c1f1ed4afc69f2c8c96e267f02
SHA1cdd986d4bc155ed3c78be6b7d64e989aa30fb05d
SHA25617401665e85c061616c63ce2cc0bae8f055e9e64f5ecb61556472306e0e8e71f
SHA5122ed052ff8873d2683c6056c3c808ea4934e748ef8945c74103ebcce11806c6bd252210570d0da1c479803b7ca97278cc217ce39ed35cc213a42a415e9efaf82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593394b263ff18ebb3e054b6256fcbf00
SHA156eb875252e93e2337b7e85cf7bf8f74b036394e
SHA2562b7872ade29459edc84e8246b8768e3bdc4498f15d39f23ffcce050ad271b7c5
SHA5121d3f2694de618b9d096a5b64f5cb74f804dbf8a3a1e4fb8dc39d3a5045b08518e0b7b981590fd4331fb34bf174af37c2009894d9db006603362f8c0108235c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8bbaf3c3e8046dbe699338c976d541
SHA1fe611b62a6a313baf7f94478724b72dcfaad8338
SHA256b0580ae90d398d7533b483bcf894449ac883c115d2c98579dd17030afaaefb70
SHA51280188e0893fb299053dd6ced1c118c97f536ca7407cb8d851fdffb2feb27c094696ad17f296bc81f39f252c87e3fb0a9a69e4da5bfa113898c845c8096e88b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57978ead101a3656e59139383f0db0bd8
SHA10589b6fedea7ffbb4b93c28f37cba814304a885f
SHA256570fe37b50e81cf3ba587f295ff406fb7e232b04919146e2af462c24a68020f2
SHA51231c9f5b0d7140964d94420c659d2bd8946026d257cf0e1ebe5ff28654e5c3da8ee072f7919a19b3fc529fec200cfbc3eaadd5bf9c3686f0ea418e44b4eeb6f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534bd27e4bb3dad31f1af5393e5e385fc
SHA16940500204e155d56e88436913a5c7a049d4c89e
SHA2567dbc1b84d07dfeb3853713f999bc3b3882fda9bb6d576a422184b9bef1de2de4
SHA512324e6b61a6238ee6bd95839ba22202abf1cdce5ea4106f1e1a515bcd97232b0c524dd73a17e1ea185c8e432c54f549c48b68d086e234635745fc3380884a1dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513aee13bca52df5c0cd665029859b51d
SHA1844a2389fe83d68e93b15a9abaf53788aaf87ca9
SHA2569cc17d4f65916d919e92f02b9ba19d70505a2fe93399de2335e1e5cfab2c8674
SHA512f4480b834fbb05effc98dc88b1df1a1b227d22e345a2fad80b27bdb712543c5e325ff8bd637ba79e2b0da335bf82b2c8b47f35dd6fef80042fbb23d9e03d2c02
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b