Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
d40bc752ea3c70c7503e8ba14e95db34_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d40bc752ea3c70c7503e8ba14e95db34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d40bc752ea3c70c7503e8ba14e95db34_JaffaCakes118.html
-
Size
72KB
-
MD5
d40bc752ea3c70c7503e8ba14e95db34
-
SHA1
c71a9dfc9916b5813a21fd68ec715f6b1cbeadfd
-
SHA256
78a566b65ba1725a8bf09d24801ff8fb108ae52fb13ee2f2c4bce92a3da4eae0
-
SHA512
a836206afe541a915e93698647ec6940a3808c6e07757baef82d7033ef2fc8f4659ce24aebb1546e576b7b62fcb7c8fbe5b0abcc9ac1ef05043e76c6cbba75f9
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sC6eVNidqsh8hIDoTyS1wCZkoTyMdtbBnfBgN8/lboii:J3ash8hIcTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000007e7161e591123f783a4ca623bbd99d3c949838ee3737da456a67677d9454006e000000000e80000000020000200000009e777d55499fb8753e7a670b73858ea776d305f8f26b3d7cd3c964286c757fcd20000000da7f81bd57211b345e433196442022a2ce2a91a178db3c067d38bc88b6c8a497400000008247eca2fadfd4f65daddf0b490ecb8975fe06a68f7dc7fcf9e034685ae74388ff6ad144c8a454f0d003caf070d722e6f6e674b4efb9d1c65c9071a80ea59235 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37246661-6DC5-11EF-999E-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431949794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f5c60bd201db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2768 2436 iexplore.exe 31 PID 2436 wrote to memory of 2768 2436 iexplore.exe 31 PID 2436 wrote to memory of 2768 2436 iexplore.exe 31 PID 2436 wrote to memory of 2768 2436 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d40bc752ea3c70c7503e8ba14e95db34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789ff532da1c7259beeb26efbf1b1804
SHA1da2c927624e5a885ccb53bcbed83fc6999a7d601
SHA2561e902ce562a0a69fdd46011a1fafd44c500ded0b372824eb46ec05c0e690431f
SHA512a706d9fc7683c6a720a12b936406b2199050b1f0348015da77418219d94a2603d14aeec46ab38efe9645d79a862e55c9026f5f0571b9fd023bb052b943c3787f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597103237ff84c45e656c195526cb9b6e
SHA11c5899643ce2eed2bf7b3ceeeb46283ae9d4f2db
SHA25638c4f15fbdbd96992cf10d7204c46792a015eb1465f7751b48d5f5cc6545c6cf
SHA51216bb85c1723357ff622824d55435d22dfbc215098c3eac9d7f2499f08763f48bcbe8173423b4dcd8e53a0090913951a83e1b9deda15c3e33154c007cd81723f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55436ab3a3447ba02bd479cca29b3c980
SHA1cf9222b03e1443cb93b85a86904cc80c1c104798
SHA25611bd695b3f3ae49ca2a22a6405f46849c4b719369922219b186c02d220f41792
SHA512e6246831b0cfe394c19bdc850d352f6b2090f007b25eb1a9e8469c991182d07769d27ba3b1ad79b8584e0b19a0ad4082b15d987bb42e41e0d7341e91f4050485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20f9178967bf002cda802db54599a1d
SHA1873f5ad755c6805c0300b017692c7d460d5b5361
SHA256aba568c68d39d4aaf10488dead51a90b585e20970ea9d1fa8f46c58fc09dcb3a
SHA512bf61c40b51115c2affb4c547bd70dbac5e1c74ff76b0cafd11343b6936479e4145bda8556c0b4c558e39e7374dc1a7a81691039eff628d3b93834e4cd5fe8247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53338587f167edd9219abc2fc77f44c9d
SHA1bb250d6c9a012d80c45e3be0fd3d7f7d4a36aebf
SHA2565d1261670bd6570acd1a2f7937b73e7a9bfe275040a939a20e789aefab9cbba6
SHA512b3207de2c1c739c8eb7fec47395b5b34f562c945d368a7b5be6c1961b628eea7bed7feebd0aa725fbd3353b47584388cde1e82289e3c6671d0d152079184b309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512470108558bd3b71ebe734a5df40a56
SHA1f9887486f73e58d6717e35da3de4e5b695379751
SHA256e3a8228cc060741fa856285f565a1488f897ec53ac77976f8da489bab6364756
SHA512164776e0f3c2de2bb9a3b4f2a3b8e2b5e9a39c497b211582e4c267071861e5531622e9f8f169f002a92cc6198794383eebe4336968d246218c93aeae66b9896e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3bfb51bde950a44e7089cfa37a7d1e
SHA16138338d38957f10f23d6fb29849e6384320102a
SHA256c3ae8394883a73792c7423fcd5c5e6b11c652cc6280e09067eaaed8014567a13
SHA512a30b741e7f5596147c1a99f3dad44ca942e9d6c4ba2a633970fbf255be202ec5284935e9182246171fc5e9be055dabd64c4e6d4267b49bcafe0e4673b4bd237c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b4d16fec9241ff77ec5192878389b2
SHA18da1e33ae9b0439097d1039beb597ca1c759469f
SHA2567a8e767114925b8161b1d007090bc557e18f86dc79a3c76357e02c681f8e15bb
SHA512a0a4b7a16d585f8031a7ce716d8637e10ff12663b83484bc7d40064804fe6cf2cd76c660cbf7614501302ebe64f660b4f62c73acbd2447b048968d3b87f798b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93af7c42ab263234183e3191fc7de76
SHA19fb45782a695102f2822dd6efda7fe6891593068
SHA2562137c252ca06fd9c0c4ef0e6f0b211b7941390a6fa8a3fb4fc6e7c206d27b240
SHA51231c8a410b5e1bb17bb640547d2ddd7b7fc9e2c150a770da973dc253eb6d8239f87ea8a363376d737b5ac545bc2bcb470afcad4b9395b61e80fae6dad0838e992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50546749783f3663b7bf6e4c764d034cd
SHA1aa37182bd21f864fb2fa1ee313f212a575e5479d
SHA256dcb096399059ae06bc86015ca5fa587bb13ec47e1a3f7861bbe497c8cff6b088
SHA512e5391017462e06d87a9dff97c92acf833a958928a35c1c6919721b510aea28705da968fcd8335399c2090be250b81c80bd4f46885f9fa0ccdc1cbb226ac1fce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fc8fa3b1ca76191cf57d3e8579a868
SHA1d7c2f77075fbc0a4f773a6b9dfa0a619c2f72de2
SHA256a032d9d7922161df89840b9b288875c1c6f3d667fe8f04aeeee6712110a3df3e
SHA5122a9d40308650f442f3f8eeb1319b50d1edf9f00e1188363f502f0103389a333c2f9f7368b6f861f3bc91bd1d259f0409670754fcd003dad17b4ff3216cf2f09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506cdd426c3001579b0ec35170fe3df08
SHA187fd9dd2d3d1317a97e373ff9f7f90c77373ec85
SHA256cbec32728f1f67ce3d7c6ad02c7fc84a4b45b0c01073abdafa30330234287ff6
SHA512a81be620475775849a66615b1662a4244fc17fcaddec82bc4e3f53010123828c4130c550d72e39edd8b15b1b067ff7f03989fb7b1eef78fee502962c2ea23a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57edd114f20b53e1e4c7cfa31d71ce1b2
SHA12fad24fe50e7d21db38f1502d3e7ab28b3add1bc
SHA2568da31f8cdf1ac3f801a22e85e3c52c5fe611405a100ca924ca36861f828003bf
SHA51236939ebe0d11048a0454ac3d1d5b07cd41b1972829e171a08dc839707d3dd74fa52aeafe33f2b65d57e18d3b92405d0607ad58a38dc240d1c1dd138ee0f18799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807822deba41142ab817f5b19d3fdbb6
SHA1618a70ee85af88adac1ae9c8a9d77b7315af1ef5
SHA2566a655e533ff0f8992e45a68b270bd6b04c0587db2e7ebeda47a0eb7e052339b4
SHA5124ec0ab69b41bd94a0966a55a83228a661417496a8f640628578a8e69f9372ef980bf48b17f4e4e8b6e528a83c2275ad7af46a3102ea04b8b294076be88c19587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286e965768a889e5ea125bab6034b699
SHA120da1cbf67877d519fc396ad9696e6006baf3bb2
SHA256e082c524d74df6faf8988c4303020973babb7535e5d0a50c1db4fc26d44e1f4f
SHA5128a5725f29a9b04cfdae2825460c57aa45e70bc61a90e316723a6edbec61821944d7327ad5eeabebac9476fec2e63b839ce0394fd52c97f8ba3a0bcbcc048eced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525dd92135909247d2f2a5e6df2331c4b
SHA128d87470b5ad8ed1cf533259c6b4a1c0f5ef68a0
SHA256eba4e8e96de4e2b4220cbc92a8b304e2134c45f0637745c0ad26672397dceaff
SHA512bc5fb039c88f1c322af0d9f0604dff7751bd7276c274b6c4b2778524bd254653ac40f8fdad86e645241b194b7eb7ff40cbcff4aff3415e107d685b7592d22dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587bc652bfaf99067b93ccf2619f9111
SHA1abb96517225794ccff25fb5c14bcb62981b121f5
SHA25605c29ec27bc843fbd49e3c36d67a3e24f36898f473f8712a25dbd609da1d4fbd
SHA5122ae658cf37083d65850159d2e8c7bce6efc10550054b69063495ecf787eee4f257831ffbb1003e14ae48cca63f1e19dbef3a0d3c1a33a814828e5115520cb2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b1e39e5b6b94ff278f305ef983029e
SHA1fc73b1ed35c6d4a2a520749aa7d24c49f744de19
SHA25637a420b324ea746fb910e3d05fbddc55c6e2e36d690fb8d68c9dd9001bba87e1
SHA51275c64ad4ffa4bcf2539f0674a9558f0c62ff2c5538bd4be32cb2bddf3458498bbdf61d1e6f29813351cebbef0bc49983930477d9b75db38b87429e4c8b99ccea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041e34fd10b6e73d55302f1e61e6abba
SHA1a14ee1193e183ccfe264728857485fcba7f1fa7a
SHA256e7621f6de2c70b2362fe2ea73c9780673f7a62d2ff22a2013620c4546f0cb1b2
SHA512c79b2e2a95f2a23f1c3d8fe8ac5549b0c124a6b1828a32deb820a17e0af818d7c66796a612d4b5bcd3dc9106baedaf66e2522681679c4b1a62e6e0174392d7e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b