Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
d450011fcd73a7cee39e1b77b695bacf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d450011fcd73a7cee39e1b77b695bacf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d450011fcd73a7cee39e1b77b695bacf_JaffaCakes118.html
-
Size
23KB
-
MD5
d450011fcd73a7cee39e1b77b695bacf
-
SHA1
3a6a671bedbf09f902f1999e552fb42d3e621ec5
-
SHA256
413586dfbef4fd2a79b4e16e3a3f1922cf83ff81170e46d761cfe8677b9e137a
-
SHA512
b842faaa18753c6e7fba8fb9cf8dfd46b84c97b7f7f16db29f0df45c7e8c7917f66136bd1bc822ea0b292fd82dee74ac1912c2af197e2f1477507c0b3749dbc7
-
SSDEEP
384:jiqKvVESXkUr6QW4czobcVBD8ctQ3RJF9FZDhdLsXZcfIk9xhezNzVc9mM:jiIS0Ur6xz3gcm3bZvdIOIk9ezlqmM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{099710C1-6DDA-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000079f859a3e6938be94ed6fae75d1f8ef6ca7590ea282d99f683137dc5aea467de000000000e80000000020000200000002eb8ee74ed1ec3e00a4ce539b92239fa2a1409e90b8f82949215c81ef104922b20000000c5cbd8d4c0c4bff3cc87ea6d63b9a595de5c80de5e23257ae29323d51dcd63d6400000005d603fc2efb3d546b9ad6e81fe895a335bf1f77f12c0238dee948832b3f79803dbdfc2ed773efcd863eae932522584960d6fdb872018c1d95b2a4c6b81933279 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ca72e6e601db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431958741" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2260 1656 iexplore.exe 28 PID 1656 wrote to memory of 2260 1656 iexplore.exe 28 PID 1656 wrote to memory of 2260 1656 iexplore.exe 28 PID 1656 wrote to memory of 2260 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d450011fcd73a7cee39e1b77b695bacf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9c63c9061527a1fd79be243309e940
SHA1dc575f920700f6281efece146ebbaddd636dc4d9
SHA2567f723e6c0023d819a3ea14f403ea3ad400708f0caef06ac473299acb73d2842f
SHA51209e4eb2031ca77b357bcb3954db2c128bc1ad5d8a3d40673d111e4bc476c0a92067fc74630c48909e713c69bcfed30fe2c1fa5738c8b55a14a20627ba000cfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bca7701c4eccf08ee2c0fffacd89bc
SHA180cec4b1fe2bde6dedd2dc6387a98b127dbc1f6a
SHA256d110d57fc97c79cc09f78348e10582b2157b6e658b1014fa2fb4c2dbb4e4bf99
SHA512561b1fdd773147e8d711ae08df75b1d078f6d3114b23bf3c849cb0cd3e39f647ec2a70631a634261e0f166eb0fa96e1ff6b446beb4405827c30c0da554e36763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a0593d8c2755b446519129478d3be9
SHA1e2df080c044219fb9f8a4c08d35909e64b9ab128
SHA2561f4b84cc8fd8594ef7cafc8fe14dda79cdae1686774f28775eea30299a9f4aa5
SHA5126aca47759abe001a5c8bf4444f364e76119dc5b7fc5836adc9b77745364f06303d11acc47eb269681e5bc993742515d5aef004f52b17547bce0fc63f97bf0137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a6857f6738743b855c7b1a903312e4
SHA145c18978f6d7fc2c105a0b8a6f74c19b7866695b
SHA25614674a062c63a546336111081e477cdf203a2e4dffd1a9cb91343cb5ae501d93
SHA512d5a662300d6e4f75d0d4a320799d33dd8b2735e354abb6c588b857bef2a20b206107ab87bc8c5d92e73bbcb703e1131200c7dec1ea3cb5220eb0e5a704edfcd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b582850fb6c817541f94384eb40d08
SHA1d740d1b8e37a5254dd866b556168f638f60c0bb6
SHA2564eb87a426537dd12fc102443a95e303626b1fc07943dca9a1327c15e7a8b345f
SHA512b2bd024babe51780cfd6465247fa56ba32ebd091459dccf35b84eb34fbea807948a719c7c447a7226580a5f88ce94b5234ea961883c91cb1da580e57f0344743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f3d9cb66eabbe13f856336cb39af77
SHA17ecc3356aea04a7b4749837d2c9114eed7b8bbcc
SHA256f9d6b29f8b493c93616b296beff9b2f7761499cd344066477e5cd38d206cb9fd
SHA512bbd61fd3c677888c11cc60fc981b5e6a1e6538a103dbd29394d2ad868a4cd6ed8f2af14e24fde726a885e8288afd5c690d36203f30c928e804468ea637b8d4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55959aa482f01cd691ff7b16d4c777c70
SHA1aae0345584a447ba1062b72ce1bf5a32e5821554
SHA25673ea3cfc4eb8561357d8ff03b618168b3ddf5a4b934a908fb0985e3a30894c78
SHA5122a96c3a9446f1d983e9a85f2dea3b6b0cac31c9c4217e01891060315d3214297fec32473b41489707d836204c9d3c9520370347862bcaf2ee72fed5b2c18386b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac71a5a8641446835447d0135ee75396
SHA144cbb24fd980d633c5a1e355fb43d2d1316a4227
SHA256e752d2bc4fcc159bfda66f98809bcbd80411f3f206a357c18d4f80f760bbd0a5
SHA5127d577df00ca157a3cfca37689d46228a604c348be3b42514010cdcf2ee07158c45fd84e20697f7c38f15a82ad3dd17c7401509c0705472ad08269d0bd53a08ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d6ea094baa84728273eecb773cec38
SHA1c7303bb5808264adaeefda6c5f7791fd4dbbb365
SHA256ed954defdfe5623094cf7a25a00a6e96d3544c159a5b29cb6da32434b8b89210
SHA512e82b5cf90495a07f1f818e64cefc19cbbc6a4c3074fb4187dac4b444d87791a6d023f3ce4702cd5aed8b2328e831b7bfe04009738d1612bb22b7cd1e8b65745c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3c8f1ba3acc3036b2a733afa15482f
SHA14f618af9a11791991a654f28d874f1c24203e61e
SHA256a1bf85f9d01ca41d8ec28cec32ac199d1318f683c424d97ae8131da50cb669a6
SHA512eb73e572aa7410232dc487135b2600c3a2920316c2f47e1c716111ec1c7e1599eb98d0fa9005c460d09009b7bcc55c6230f641ef9c8648184252dd65ece69ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766530d5774420f06a63c8d018df82f9
SHA1c9862ff2d9a3f6d37a2366afc2362b0fc6a3ed1e
SHA256c39ae7771759e83a83fc6fe18da82e0e10da43936ffb7b421a4939dea37ddd81
SHA5123bbe4f59b401562c043985a630845e0584940b3953dc0c2a83b9d5fdfcf8d7afbb235461b1791e9a190e6300611794edea6a5114033c198918f4faa118dfd693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505665c68bd6385b41bff1a1e83c5809f
SHA119fdd5f905c7416322165dcfc87c025c43dc73da
SHA25633f5a5b9f4798b33d8b43ffa668fe5025654ffa97fcd9ea0a952448af8f72cb2
SHA51259b5c203ea87e6592a1fdbdb0e7ace41491ec9fce5464824ff71c96d7fa543095e6587766f7f81cac0d3aa90c633647cef39eda3aa18a67548b1331808285683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aaa428a7b33fef7f6a68cf0bc0a6dad
SHA1658dec990d211ce597c8b618d915132c6bf9e52f
SHA2562916da61b1f7048bd634cf0989cf8766ee058da7c3518f617df788333d2a362f
SHA512c5d846a3945b645f02ef54c3ec919c923c8c8048d6e5989f0fa5b0553a832188678c14bff7617a32a1bdd647ea29d2b568a388729d6f33aaabcabe05c197f0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934ca6812b8c7b4f02564e59e1694d7e
SHA17cbf76355c9dd6b50444fbbe70780bc26d53b528
SHA2561221bda5ac151eb5e848579cbe44e659e72083ade4c9b6530817cfd2b6bc2ebf
SHA5125ee1d8e570c479169b250cb0465c8a19d54b108476ff23a571d9dbdbf64e2212ee09a246be5e584a61b193071b2c186aeb70c789634a8e229fa474c1191a6734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9c48bb05248b0c2f13de45b39904e7
SHA1976a09b443af63e2c5f06256146315efce82ee23
SHA256a2cca826e4f98a2c1adc138722fb0e44d954fd85268e5175fedc71718cec5995
SHA512118ce2bb5f3c9fba05e1a754bfe38e3cb3828c143391ef15e913e7ed4f1c5a7fd6881d6934ab177f15263ccb71739e9723da27006901526e0d01c1f590505308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543282e5268dd1eede60052bea2b292df
SHA17aef0ef1f7f09cdd70fd3c35eb84137a0ba050cd
SHA25689cde5097c9e3cfa928e4ffec37bb4eb40b365ecaf89874b462ad44c9ce90721
SHA5123df007588902bfb912067728d830ade17353e4d1b0d837b128c17e3ae891decf4b323b6e9f2bf22934d8ccee2886541f6ff5c55a412d789ea7cf5763be318f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391f327c68b235824ea60fa5fa105bdb
SHA1dc5797ab92f7ebec2c2abeecd43dcfaf08d5153f
SHA2566eecdeffd2f9588e5e15b13ab675bbb637b4aba6c302768e61b17ff797e83372
SHA512f716511bbf729d7570659314d622ad673f78a4e2712a22abc13fcac2eeb60ea08574563e1e43fcbf3210afe4b18958ce4d64eba199a59af591d6a7985731d500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda1bbbe109a141cf32f501bcc1f9e96
SHA12e6804f3812473dc065570bedd084c52003dade4
SHA256315eb101c9bd6eeceaa8fee2be127094ed28286ffea3870fafc27fb616abf861
SHA512e24250b6f3025adee46a70a0105189fb3e430ddf2f09f9d148b22f78b65130cefe9a1a354e2d5a816767bd0a592871d5754d686503481201f0bb6332de1b842d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b62eb4215ed05bad71e0ead2373328
SHA1ed809ae7f9c63b04841ef55a9834b856fac43fd6
SHA256b95431b3b5d3b4cd003ff2fe8a0f09a6afe55c19d7dde084834eb72f8f52e2e8
SHA5124db18085c451e7db8129773c76e2bc51f83ef06d251e218c84c491bf7395006238b2c760f791ae108b33c7d26a83385d360aa0fba73e4fafb6d5dc26ff9634c3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b