Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
d3f49e6546936e70bedb8a07375fd077_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3f49e6546936e70bedb8a07375fd077_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3f49e6546936e70bedb8a07375fd077_JaffaCakes118.html
-
Size
338KB
-
MD5
d3f49e6546936e70bedb8a07375fd077
-
SHA1
af2ce4ecde7667eab4c3aad178309d87ac277ee2
-
SHA256
d1da52f682ebbda469d48399c52277f49f71dd2a28cddd7aeb1ef1d769765ade
-
SHA512
489859e4db9b66e9fcfbf9d10b3cb82ebb1daf24c11b376cf88c892745603367ce063e56a8e1239a71ab34f8b21b790f98c6c40c65b8310905f7c6ef3fe86301
-
SSDEEP
6144:FsMYod+X3oI+YJsMYod+X3oI+YisMYod+X3oI+YQ:x5d+X3n5d+X3O5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f89075ef2fcf6a33ac32fbb37928aec32f9466c36e91d7f37111e4a6b064c61b000000000e8000000002000020000000d162c5fd82dd354515942746a524bc6a51975ce0bc3295ce0cbec2820b59cbc72000000070ec68f1333214aa0bef3fc8df03c50f43010612debf4af97e022fa905bc81d440000000c5ebe8cc8e3323bbd1450b3a259558ec93da4e4d24637e42c0acc5199fb783fc8b4a03be21fe956eb7db9f54e55c376eb54360c13c9251d15b704afcecebe492 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{253C2581-6DBD-11EF-AE26-F245C6AC432F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431946329" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f097c1f9c901db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2856 1960 iexplore.exe 30 PID 1960 wrote to memory of 2856 1960 iexplore.exe 30 PID 1960 wrote to memory of 2856 1960 iexplore.exe 30 PID 1960 wrote to memory of 2856 1960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3f49e6546936e70bedb8a07375fd077_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55002a05214fb2c9de73dd5bede031c70
SHA1e075affe523e19fe28f46edcb894148c5cd60723
SHA25640ea75b6205304619ae7b8756a8a4ee6817c6e3ddfd11bd88e970b9fdefb4555
SHA512df82899dfc9d2f688a1a938902f82b57ffcf558e3c142c7ff00f89701ed7316f526bba2f21078680ba5383e4ab003eb19e9a1f20db6d75c7cabe8ced59b3e0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027211e93711f50b9b065ec9f5752d20
SHA149ad1b5ca53052f592c93271800edbeb169b9163
SHA25692ad42b224ae5f920a94afab180a66206bff2415679f98cc02ea34aa45c9758c
SHA512d261c77becbb7f91605c1911c41aa21dd057ffa65a18b82dc611c2db1b3f95c8da53a207b28028e372186e77f72c71dd68fbee506bb3768ff2fdc60723499de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da2b9b4280b1ca8a9eaff9fa47820f90
SHA1086545b3062b772a43a7333dffa9d63a0962e3d5
SHA2568676e0834e09c4c605f065b25c4db0caee4c63488de5c23fb15cffef044c2b88
SHA512c1ea32de91b9fd4c97a227c5fd08fe608a9de07543ce82d298b3b9a0a29cecd1b65b4a2a25c164ca80d25f89456425d635ea8e0e4d9d930bceb3dd3bfb1dc8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b576e807b882b83522225a7be17907c
SHA1ad1e09b9d82229cc34f355d1e6bd87afabd2d233
SHA2567d7a8fb6e9d79bff694f8f9c8e65193f604a5ea47acecb4017acc1595d6d0067
SHA512bd180f855f1c5fc3829a1e2ab4c8c2291aacb59bb2b8ed3aae98f9e139ed734dc644c1b5cc86cae039fdf9e26530f42e99c85f29e101471e9de464ee931d9fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547211aebf2ddcd1e02fa36db79de7e5b
SHA1558120c0e3f070bc45483cb903f88b98e855b640
SHA256df62c59b4428b3dc5e26d97353094f7ebf0e7be5735250e287049a1985b8ef42
SHA5128e3764f506ef53873eda30f290491da513a867df867f129a063c92fc46f8280d0eeb9dfee0f2e1e9075bd6848052dac3065d97e513b1a88be96fa8a80d97296b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57798b78de884d3267efecb7d46797e1a
SHA1e276677c4a375ebb95dcd400c48d450a7f5b99be
SHA256f0b0fa77efd486bd27f90668c105774a76a9de4f0cbae04414f27aca85b678c1
SHA5127b02645858e0fb24b43b489cfab8ee59bcdb26d4b954d5dee54aa41f7989c4f19902e19d54db93c178d3acd24c888ad0c04bdf5bfca5eded454879fc56fcbaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052479652950810ecf4ca33872375eec
SHA1da1bd296e5ed7c4bb1f94abe9942372f063db57e
SHA256412533677804864ab6df121a1d626526cd35f037d550fedd8252f6a4d21a5798
SHA512419a74853c1548f8b3d1b692dd2dbb4bcaaf8065c5b8053ecd01a64840697438433b78405b6acbb08fc81ecf4b2682ce0875febaa99e175f7ce575fede421d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518983db663f2e60bb506c4a521ac7655
SHA10d352a715708e03f31cabff0673301a1545ebe9c
SHA2566cc9171b7e51e37f8cd02ff0cbb8bf6885c28605db9701d355dc2f17ee8675ab
SHA5127032a9b8d33ad509115382c660636891d293c3a344f1e2a907a48070a09009c932b978ddc3726a4b31ad76777416f87d2659b47ca638031c4d7ba6e60b6aeb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982cccd2f08dce09e65f6dbd229b69d0
SHA1c16ecbb28039954713a3864ec1488e9136ea0e1a
SHA256c6a3dffcdfcbc63d5bb7570385b8335a7c06414a7bbdbdfdf9132492573d68f7
SHA512ac53e7cad19330380c299902b47c6b0dc0628c9fe16c28a06dc324da50d7db566ae7277c740d9ce17711d02b6900bbf340ce87a9e103177ce82c13733d89f360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a894b7e9cec8651472901aa448ab6c3
SHA12d6cb225be69ae2f5cdfedd6b0b64e94f1d8f5e4
SHA2562ee1ed404dc1e15b1f9a7d3ce2d64997bf612adee8f79001966643542c7fe4af
SHA512886c893bbbe89dea73a55bad803a0ef3cfc56eb1f29ac7dd1ca590ca0d0848d8d782f4d3a4ebe14c2fbab26f0053b0aead6e524ce0aa22bdefbbc810a67b1bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554521b2c198b303aa23160ca72d13844
SHA1dc249d29ce644a92ff845b6e174cf68f0b62df94
SHA256bb454143ebedf6ccd4508678159ce14bf145748ea5a6776e9fa5beb0d5bc200a
SHA51215f192bc08ba676fcbcb77155a9f242a8ce85db099cf560919001a0f47fd0596f7e9751f91c224621df5695bdc6b86e96e52c2bb9075ed455ae5488525770967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56adb7dfe5266039be0d7a34309581da1
SHA1173318b08821ce13a7ce9431f5d862973cbb986c
SHA25647639962337336a8f6787a31640f51038dc95352e6dd46e4353d869184903fb0
SHA512129c46323d39cb90d5821943c02948b46cb2df53a49be60f651144ef77ab2dca58cd8add1e8b1be54d84f480cc3970800a90ee7edf6a47ac895b2161d157a094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f246ed081c7a32dc86f069dd90ff9a8f
SHA1a7cd1767a1e0cf58d0ea6d1f96b4cdc8d67fc732
SHA256f1935cb92f57b29484cc9c140252f5a330430135a6b99054001bae0c1d46474e
SHA5120001694a35924e19aa04891cf61e79f7f7d4c9607bdaeb9528b59adcc8c822199bfc9ff128fd5a1a5f5d76f8cd7fb3023e1b454d82daca56be3b2683575324f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea872a5c9a61e0efbadf6b61a15b43eb
SHA141f506aa16187b7c8868532240d99f93940d0682
SHA25692c0e2cb94db2b2570879b16de5a9ead11ee0456e281863676ae6742b78410e7
SHA51270c656c1e7e0b9d566c8cac8dc56184755dfb874bf33c3cc795357df0b4332bdb98582e99ecb0ceed8c729b44087084c8f2a32a2d2373f4bf3094b316bb136e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db303363c1fca47c76857527e19aaae
SHA1de91e6292d2909d78c976548eb7a874fe6a09263
SHA2568e54e1cd409d32a33b0277539f535f6e6234503dab820a08661a420a612d12d1
SHA5120e323a94e4ad08fda87792815d9a345592d6e96ba368ea42375773a2a2b45db2593673c224660b6102fae12e5e8c7a2dc0ec29d81c768c41d34e358530b53463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5eb48683254c1d598937ad8afd82858
SHA13b174881dc6633c15a13ef9ad6923cbd4d284256
SHA256587aa0b337a088b94e5eb2ac9faeb6b43058afbc740eccab6011a575aad7e885
SHA512a1e16d751261df8068afdd33d2b923fdf086b04b60c1f08f60b7c97ed862c89b6a2fe69484ab83f72f5cf7dd181d5f87dfcbdcb0cc372b29ad01ce568a69edb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59002333fbe82accb8f4e7ae940fa9e17
SHA1695c83d07cc81afec47188e4a7c5c6ef6bf17af9
SHA256aa77c6f807d91d930b3e86cbd351e3f9e797b0fa364bddd461e7360856fc35b0
SHA512072161d7a976b96d93f1d87c21b634f2231cd80a2bed38111a53e1e81bcea129f8a029acf6bdc6865ee1dd9468b4169d7f325059c3d187ff235af15bfa5872bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5884b9c6d9975eaf90792e4fe06d33fc4
SHA1899b8abfe0658b900ca265a7793afcf56c6f4cf0
SHA2564d15a0e88be33d0b0106c2828128cc2751ae8f70171fbc308fa93f6b47ba6f9d
SHA51200f19d237e794e9bb2b178cd9163aed2bddd9bb19dc2b76028d1c4fe43625e3b3f812dac3eeb0538452af69e1a62ec46bc82605b38dff47a70b37a812ef079cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d141fed8b7602ff8b724e2d5137bad
SHA11a33df4c8abec219dffd465d67628b3a34ed91f4
SHA2567e69f1e90a9229bb694a800e2518488702aa136c7fcb2e309467ff7d7b45510f
SHA51240659e8398a6c2a4205ee983c6a14e4efbbcb36d2c03a749a284a855c170d328444c1cfda5c578f5a63a68934ecefb73b5a797b314472a4fc53da26ac453f34a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b