Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 09:19
Static task
static1
Behavioral task
behavioral1
Sample
d4063a19484e45f2727d1c67f42a5211_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d4063a19484e45f2727d1c67f42a5211_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4063a19484e45f2727d1c67f42a5211_JaffaCakes118.html
-
Size
30KB
-
MD5
d4063a19484e45f2727d1c67f42a5211
-
SHA1
c907637dcf2704ba967b9fdc22a0c5d1da802080
-
SHA256
0eadb24f787305e1beb7952a2cf636ad0908fb7d99b463995d1c816cf924b866
-
SHA512
d7af75ea8a9f146618fd5da96367ef17bdcf9e286cae4d30f66ed3a1e30d5e5d9ef3e2a6e51f78e299484a9c5b9d5a761bb0e920b6e369b6db14e85ce3e12ec9
-
SSDEEP
192:uWbUb5nBXnQjxn5Q/8nQie/NnfunQOkEntQ6nQTbnJnQEMCpAgDn253gbiYxYJ/n:xQ/v7SQ9xYpyQ3ZbDNOz0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65A30ED1-6DC3-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000015c9aeed7726a8f20d9928cb856589e0e53512a77f1422bfd38f9e2129d3a23a000000000e80000000020000200000009212e0a20ca664d638939d10dd50a2dc7a1a229507a544f0c8ac0206c169764d200000002977d1fc31309de8371a888b52959bd55ca76b85196614511c73a691336d2817400000008c30d56038770c3aece5834b6afc10f7c21161adba1e4af5836006174b8b58f76c3fd7ca6e0464da8ee5b5e213b7426614e47b0029e058b2df3e291a2dfec7bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8089943ad001db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431949021" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2940 2216 iexplore.exe 30 PID 2216 wrote to memory of 2940 2216 iexplore.exe 30 PID 2216 wrote to memory of 2940 2216 iexplore.exe 30 PID 2216 wrote to memory of 2940 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4063a19484e45f2727d1c67f42a5211_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f29010638ad32f1c2507e140e11109
SHA1bc5f4e5917c657123c06cc26e4b2fb4d2e8d53f7
SHA256b0c763f771e67a55608b8b413bbd5649c52b09ef1b4d0ac9c40477438328be4f
SHA512b40aab8a17261eb0929f02ef358396a5235d32427d3d022e79b1b35c2d0ef63c0b2795da77a42125ef129ac5f4c383ffece5ddeff4912b0c291c4d794e0f603d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c88dc9250529dc110176e1dd57463b4c
SHA149f73e70bf949c394194fc7f7d1839fb3ae888d1
SHA256cac6328c9aa3909735deb266e1dd36ef9c272f0042d22a374eea4726915f3def
SHA51283418a45a843d6aa7ca2f00ebeb1631b48bfded7692e4bfc87c35d7d4ec173b96675ce48b5621efe874893fd6642ec31e3edaff4b786b6dc1a8a16ed42f9bbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c49a4625a974cfbe0406c5ee521fcbf
SHA1aebcd1ad7efa911e729c8ee2e4c29acb82f49429
SHA2561c8351c82d80f0ec67d5bf0a9352eb74bbd3efabd336924253bb184e72601397
SHA5126447bbc2596ddc1a5fa7927ba1b4f8b68179ec701a759fde2c78a954935331b593456148837e731eaeeee34f07a1931620288f8263ea56218a9f54a513d2cb1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60ef0d496397ec68c6468bb4fb31dd6
SHA119d0dfab63f635e173080e76c3b3a704df163735
SHA256b9d58b1c69bd95a8d459312bbbc97f8966803e9f0ea61d609dc2f8cc38c6ed26
SHA5120582fdcd4d5580389feeb670a6ab8ea336ef58f1b26e6826fcd69866f679b24d82e997a87fcb11fc01487ed0b62ee2be9e537cb34a1419f22bd3c1b78155a82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f3f97dd2370c526523e47b02276f61
SHA131449660e33ed0d8ce7ee175521299b752ae3970
SHA256650be4fbc66d55a6383bd0e8a58dfeee04372b9f85823fd172cc515b7ff5363c
SHA512c8009d2e54bd8c2672862dda73be72210acd27ae7a2ac8cf66c16f802b86bee9864a56d5034f7d9fefa611c85bb6207f751402cf4d697cbb73cafc57aba8687f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b59da21ef389743aa997ffaad856534
SHA19cf9fbbc2c508810eb2c1ac9f12fa3c018d9800d
SHA256e7677bbdcd3c7844d1389e1449698cfc1cda50a3236dc6013e8e8d2dd0e7642c
SHA51247b5dba362b06844aea1c1318bb52dc5212789e28349ffb517050ee19ec75854137625ce2f0a3a60325722cd7aeb6fbb2b4be4f7631b29109d7ff326a8e97a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd298b0b64cbf48970224d8a52b1917a
SHA1400da0b17bf6bbdb12e970a1d35525874edb576a
SHA2568e36a02417f72422b534ed580fbad735cfdca065cb8ba47a1b6b69490e0a9780
SHA512dae74ed4d876490c944f6224f2af773a9dea1be5fdd5b7d170b094bf9255e9e65f8cc1d04fc7c2add960b61f1a9398c67bf9644c3a1b404e0bdf617f4975eda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27ad30da24d9279070d4458c94e9e4c
SHA16f711738eec2c087f5af6dd336ffd5ef3abef843
SHA2568678a22b9e973be992c67c2bf65005410fc051b01f0e8e4b5ac00ee2b8ca85bb
SHA512fb54772c30eb68611336631f9e35dd4115caea145cfba369b213f242babd993fe8b9b7acce1beac7287d179a0bf84984c2f8bd5e60e5d97c47956e9ba6de5669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff42fc22baffaaa61e41d405bb71f80c
SHA16b184add13f327255769e67520b11fe2f4769558
SHA256797483909ecd740bf219265d232437145213dee92e391bf5e5a676fa65a8a624
SHA512a36650159def594628e1b7ba98d198b77ff21f8dbc937f8411da105eabac641a8344766910d4e90a4aa8e29e86dd1423dee69771515b3fa1fac1b6147899490e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934d86d601770a5266afe2ccabea4405
SHA105d4c9478e0c12cf43b36c0c2289cce408965ca0
SHA256a80960312ecaf4cfaec3310b61444d87fa3db12751120c0ad9e1f40ea02fa8e4
SHA512071ae735bedb78ca34dd144850a786f5206a9053f18fb3daa3b8291f40fd3751cde68a2d3bcd213a1bb66f8f17f77ee519fd46841e4bbfc34b66425058feecd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51267150c691a17823c890b68622e1316
SHA1996a7cf65d6b140b8bec3566456414a954132f04
SHA2567750190f3265538175b61dce4479d9e0e724584cd26a952052198b6e9386b4e9
SHA512e90d4feefc7af6da4db75a69ef0a29bdeb39718f124ff54cd5e6cba219037ba980d669fb7b9682e92dcfff419018e04dbcd0334883eaa28deeb8f58b51eb8390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53299adb25901d8283ad2b5844a09ce5a
SHA125f1e04d2bafd8ca0b7b3f4f32f6c319faf09173
SHA2564b8d6192d4edb72207807da92fe88017e7df03f423b4bc633c4d87f03a00baa3
SHA5129c5d684c5fcdf8fa669fb032428a092d550fe7d1498f06c6402dac7030cbea76156db410822aea29bf0fc6de63e4dba0919f5d1507ffbf5725e2e8f8a07e9571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a7603694ddeed7cf249463587c1da5
SHA10afab98b638e177f6fe35fa093932ab406748004
SHA25685dbcc326f1c24207c4429d0b99c8987ffdb22dad5ad3cf21b0132dc93ff78cd
SHA5125f55aacd2c6203985ea3cc7404d829c27d6d3d0b51fae200a6bc7e77d48dcacabeababfdc7834c869dfbdb3171fea2b46ffd3c1e6e18330702008b6fc3524a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573abfd8661556ab1c0d05b2274c1b093
SHA1b16eb7f7a952c427e6f04f2bf0925f6e98da9bb4
SHA256b6ad18e8db19bb9d3525d3f23afe687c5db83105f67498ce026230ace39696fb
SHA512a867e5bc44965f476e4cb301345c0f18d002db030d116e3177aa5e770f2ee8b0a4fb516c075311c3bd431289e15a7908b2d670157d47efff64b9e240d7bcd37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626e747807d18037654eb2ac28ac3354
SHA1dcebb1a2f40cad0c6213d914e426d78f4a4284c1
SHA2568adbf9b70b76b9da869d847b57553827457b2c214e84129a3ba47c922c516d87
SHA512875c87e155b0f7d3b12b30bca58419ab0cc648e89eb4f508601221980424afa600d679e604696f90712f2746b6226efa0e34ac6e43216d2241b9c44b07254204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b7e7bd6483808cf9d443e43fbb93ff
SHA1b757c94e7dc86da9a60998615fd88d44f7dd04a0
SHA256de6f677fb84ca7887c57716b82f88c81dab9972ef2723bddec46df31c12c6e68
SHA512251079b221e153fc1756517d5bb5bb32fa347379d616286b9be0d2be75c11df187f1ae03d840702c9a8e4e426413c5437110ec70983fb56b4cf10c63243e9d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe245929630311d0295f142206337ab
SHA1ae652a2f97f84b6d3af4a1195b8726ca490359f8
SHA256406b0bfd4d201c3b99677bb45620cc268eb69a75d4c68bd7f8df2ec48b66a8cc
SHA5126e287b5e16773390285023ec5ac2a215d24f7d28e133f8f3d55e1584449f3650310b484bee54de5a1efb9efa919564d34387a24c7b9306ab4a88aff9649db983
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b