Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 08:32
Static task
static1
Behavioral task
behavioral1
Sample
d3f3fb5e4044c9ac8de9ecb462ad0fe4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3f3fb5e4044c9ac8de9ecb462ad0fe4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3f3fb5e4044c9ac8de9ecb462ad0fe4_JaffaCakes118.html
-
Size
209KB
-
MD5
d3f3fb5e4044c9ac8de9ecb462ad0fe4
-
SHA1
656b812f626aefd9b1006395d37fbe167719f621
-
SHA256
fcd9b5ee58a30ccf1bfc7f6c765a53b9f3d4b914970382cb12af20ecf4934129
-
SHA512
1477337d9a8e1e146660930b3ff42446d791d2edb1af18a2b353ddfe3609cbf3864d182c62f0ef13ceff8bb97d5f5941fc9833655505555eb69926ba2ea0215b
-
SSDEEP
1536:cW6p9lAirrn3t4N+ks0BA/qveHq3FBF9CegM/RDVY6ihWENFz4IpfZC8KNXHjaMT:i/Aiv3t4Ni/9deff65DfnLO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB6AC141-6DBC-11EF-81FA-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d064e0bfc901db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000fb142276aa55f035cea31b0ed57540663de60699e3c265d9c3426b2ee982ce0f000000000e80000000020000200000008d9c5eee92c3a2f4aa66c498ae4b01372bd9a5182be97a49e31bca935bedeaf42000000027e48be3a46b21d313b44ac8f020210e0b1083e4a34543a6ad2dcafe222b37d040000000f75ffaa48cb8e2e4578a2b55112e7dc82a60e002ce9be2f6f5533f9dcad5908f7d7a97cb026ce656699955c6f85f5e0b181e935db7f1e2b4c53bd96553ded9b6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431946233" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2824 1508 iexplore.exe 30 PID 1508 wrote to memory of 2824 1508 iexplore.exe 30 PID 1508 wrote to memory of 2824 1508 iexplore.exe 30 PID 1508 wrote to memory of 2824 1508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3f3fb5e4044c9ac8de9ecb462ad0fe4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540194cb9a36416b0ac5106cab1d4155f
SHA169a4b23f0949602ad7f79c68104ca95ec9158b7b
SHA25602122c573faf76ef99070f1abc0b72bd6f019a7086a1e6de9b39be2db45ad948
SHA512a32b1de869697131e03cd3aceef56a2f18bb10d0cdca6e84fbd35c654e1f2d302cf77f0f834e110c3b2201afd377cb518fa3d32705866eacb4c391a8c8f72cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ea7fac3ba087e28963654b11624517
SHA13526c9d1963d67fd182a134a548d90cce35b4269
SHA2564f1bc61af03f5270eb966a647310b315fae69a8aed94f785831989032cfb51c6
SHA5121a4d96bdfcaeffb51c29754d88d61777f069dc84cf9a3a56c727e07719015ce7bccf4294b1974f6d0e5073af9d2db04424c173ff66361f6119be33f30a72a817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2215956dc3ae07e419cff72607beae3
SHA18ff11483f903e44bfbfbff4b68ac76d0c1340c57
SHA256fac8715699ed4abda29b668bec635ce02e45e1f7c8148477a2db2aea216acc18
SHA512c67491825046cc6fbcd4000b77cf42863450ac8eb0f8e1756a025efb600885b184e2cfcbb1a81d6d4dcd0909b621a050de2db45432df07268b3abb6c2d82711f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c40a8bbe12f3a42e54e34aee72edae8
SHA145fd64473718e7836fb83e3d731d3bdd3e7d06a4
SHA256c854e66f407a09244e3472cd4dc6fd286e601cb13d0e9cbf7184f7db7e274488
SHA5129a7e0a48e5e212c4278aa5a2b7003cc13a34a728a5320a2ef52069d82476cf773d7bd9abbe51cac214fe21d72748d7007f7af87835f17f1395952c5d6775b995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d24835d9aa9c95f866409e8be10c62
SHA1b91b64ce679faf4713ede38f08caaf7e0273b05d
SHA25633e154de479630ecbb0d378f95092a92315f09233172340988a20f7fedae5376
SHA512eb3ca52db27d33622070364b36f754facb1f2a786e2711759efe604736feb2d1e0068051e15946ac78e450cacd34349709b3cce8f5651330e62c2a12696820f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57664fbc11ee9af1990844832475721be
SHA1571cc44fd3fa90eab8d9995afbb645efcefae876
SHA25654a3549208365c943f0f9e9717ec40d0297309b81d7bda71540acaeca59446a0
SHA512b45bb19611a0d291cc08515d3a9cc08281c2db9b2e59de3e47fe615834a52960b38499d10b2880497fac9c99830bad34afabd9d498aa6ecf9049d936d256c1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4832c2a51a1b7fb30ca3a4f9c658e0
SHA1245f300414382cb6741d7337432b71ad54e03e0d
SHA25626cfe80aa295278c4b0f5cfb4b0b26131d6e19de73e7b97f8e5c572e910e58ff
SHA512d1594cfb6d06ec2135d9880410e1a70b5682720ff00bcd5148598dea9b96fa1680e9305ca9f2e2b280e8badbb078e1855511e4668495eb86b2604fed7a536fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00be60b6aba260c7f85915c611b7175
SHA12638c3c66919cda114142a611fe1fb7bb88dbcf8
SHA2567e318550db35849729ea75f999408ea980b9655b600f747ffed3e5597aa81690
SHA512d9af3967ce493dcd3f8361cfdf5c43f5ff8f0d26ea4d1e5def1d02e29650ff2f296b383d4ac1d13f24a9d128df77b4c7ac54ee279775ccc1b42c3dbf907cb822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604c5ad7562cb271fdef29c291e4c0bb
SHA1364e2bc67350dfa216341d24d7c1b1dd20993fa2
SHA25605fe5239cf4326bbd779ae9c9421a2d6c4458ed2aafb4e2d76011400ab750d53
SHA5121b04b84f879f54a49643def3c6b39c22f9d95811d4b2df17368f11f8c9c8875154f64a2e4dff7259f62c388bf27ca2fb20fd70bf9f154794bd40b891dc61535f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4803e4ea8740475cc2c61a97835bbba
SHA1270934c58fbf947743d01c06b106a6ca3bfb6b8d
SHA256697db011a6cef664f5adabd95ddc390cb84b7b50af1ea211d5634744b47dd2c8
SHA512ab26cd487f218bae78cf4547f7120a4a7ff791a20cd148a53dcfa4ea9a027aaf58e04f9f452d22ac18d4f920b56ddc68eb25f34b5a6a950bfd373266d0bf6e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06c00c8be5a1ea6f47ea2b20905f3d3
SHA16233c5723d64002d57646cfd3073c37a3470f32b
SHA2567c2adfc0a4dd807d8730d5c976d3358e02ce2f7217e5cd40109be63199763661
SHA512190f0ef37f601810e543d79704f3b4dabc7a2a3074a568895a324e83288ae75f3e0bf2820a372af808ef8d16896a45ee401d297ca47726218d7e0ee59acde5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253e75520ff41ca1fe09337f2609d3a6
SHA1a0777e94f76b1ea87d20ff1573a019102b574b54
SHA256f6ac9bf24f0f285de8744d6994f729c53cda9bdce9e6e7546a307a42dbb3e08a
SHA512ebad1a364bfb2a350d5b1aea81ad8cf03377856213ac3e8571c53478e74bed66a2b7e74fb1dbcd843107de162a85934514946464fca04fdf947023813fe6b4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a06d39daf923f87cdc60eccbc7e2c92
SHA137b4f9f69cd5baabd4d4ca0d9a937aae8cd0259c
SHA256d1fd9ece7c93e9a15e819a8d7fb8f828d71a648cfd4e9ff8a803395085876765
SHA512a1ed129b3ca1e8c747e40758f807eaaf31caaae2241b2e8adfd7da051e6066dff711afad995652be233a68722a948be441b74e196064b69b5fc30b90b0eb9ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be21a33d8564b08e2b9662de7fae233
SHA17e203ffeddd0ee19201e7a66b2b2837a697206c5
SHA256231ea8e4a39323d2c8a6ab472b26f6527069cf8f81979c77793ed4bf7912a1ea
SHA512e3bf3d970c0d7468515d6677995d0ab4580b5c2e892a5931159837d34c252893e88d36f4c0c0681d674b07ab9654f6c7602dd3fdb44bd7ddb44d7fd13dc0e250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4f4db21568db117f39d19ecc7a562a
SHA121ddea90ef9ade176beaf7f152490373a2f484eb
SHA256c485793c458de646c5af06824bf41499c53a0a523246b44e213d011eab83205e
SHA5120557c8b3f3ae17a3fa52123c3d896c027d3a67ce7e472b58540e0b54fdebb5afcdb1fc0bf601ad72aad5cb59efcb6d5dd527c6366c6a906557eba9f6f6575c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21f91168eb399f03a65162619610526
SHA1db1bce229b2a964c19148b25a65ff7972f1dd0f1
SHA2569ebc8149dfca1280a5f2846206da838b60a378d08ffbab600f40ee4d48f21204
SHA51295c0664af1a05756abfb53164f3fcb9b88d9278f4e989adcdc56e933705dea099467ba54e00be5e8dcaf4d096d17db05cce3373d1c7a2711ac5f0028023647e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c0787c0063b89f03e30c9442f6e835
SHA1667ba5716a7fafdbcfd69fd149ee96c5b5b6e766
SHA2564948267e55bca75384d555c9f8092bda0ebd8ef761afd0dec776434da7557ba4
SHA5127751575df50a08a3b574892cf1046b45a93a7452e37d67d58ff43ba19b25ba647504498dd60883acc17969338cc7b44a3ac4762139398477c3f062e5a03a74b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d241b6dce44fb4c8dd36c3699a39474a
SHA154bbd1a4fc48c65d5fe2f8abb88b96ef78963cf8
SHA256729b8efad2cab3cbfbad8a05df1d8e4e3b3dcdfd3fab7aa55d269b295131c698
SHA512184199e9029ad95bb7ae2f62253487fbb08c0cc535faa28cc2b97320513993992d2d4f0b083df020fb22332b8d2a60993a551f9326eaa36f16ce7d02b6b940da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0767af8c995aeff85be5f9c16797f1
SHA1af6e583275988d387058932e89c7d5cf8f2dcb83
SHA256a45feeacb4070f88e28bec3cfb6498b20ea4ede2251c14a43696821529671f60
SHA512d61d7603260341d033b0df8118b5284e4684c45a2c9f11e8a1f43f119cae77fff93235f7e20ebb12956322fa24ee71bb12919d5a3cdfce6dfcf4790606be249c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b