Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
d46bb6e68c8128b0cf5bfee18075272b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d46bb6e68c8128b0cf5bfee18075272b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d46bb6e68c8128b0cf5bfee18075272b_JaffaCakes118.html
-
Size
11KB
-
MD5
d46bb6e68c8128b0cf5bfee18075272b
-
SHA1
2d982c8ed478dadacc1af2983012115fca2dea0c
-
SHA256
77dce4fff1c47ff079c1e9cd27c16c31a749fe8e468e01d7364d0818f05d8282
-
SHA512
73da677f768b8240d8f97ac6be253af8f563927cf1ffdff761c39890d3ae2608f416f8df0eb9608e4a30aacc1ce8d7504c5a7bb13b847e6aeb7f1bf64ca64b46
-
SSDEEP
192:uiopjmh8tX/U+gtbcqEllbts0iUpkT0tVwJBm9w/b6QPyu:uiujmatX/Uhtbe9NpOKKJTb6du
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000006d7fc67149e881229a61a7d5d750d6998d4b6ac8558a6745999d9637b4f02182000000000e8000000002000020000000b6570a44776bc58e84fb9290871df04756d7aa0011886012315880b6b7505bf4200000002dd522570271891474008d72de5a1e3188d816dba0459c8bd951cdcbd273aec640000000130ce21bf5cbe15d7b26677fe01425843de03c20bb7df4b49e5c270474d28d0b214c8a1de053d454d200ef5058f6a3485c3f1995f74d40d05664cd297bfae660 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9344A281-6DE2-11EF-A528-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d8736aef01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431962405" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2884 2472 iexplore.exe 30 PID 2472 wrote to memory of 2884 2472 iexplore.exe 30 PID 2472 wrote to memory of 2884 2472 iexplore.exe 30 PID 2472 wrote to memory of 2884 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d46bb6e68c8128b0cf5bfee18075272b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5a67b015b655a977c85d1671be2348
SHA1ad06fcb2042ab729e7c08c3653a72f7473eedef2
SHA2561daf723b202539b9953d69694f15f91f62aac70255dd9e81a464d6bfb09c8996
SHA5124670e07ee09c6ed920c9b7fc27bdca5644445000af20d2f281aa202456ff7bbf67fae1ef55c55f51484850a73276c4301b8229798182b94d8702e4c54d642b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5be0f14a11868f290d7b0faea4a589a
SHA128daa4c8d420a5494a59e4354ce6c9900117e170
SHA2562540377dad5f13e511dd425cb39f6b5e3790293f29ea240d86b4b2ef84688bda
SHA512853b04d6ebbd823478e962ab75eba2ca103dc8955f114f2d8b5e40758b192709981fad8ea606837a3f9597c92a62f21ddf616736ce1aef7feff2cdd0e46112cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06a62a0bab2c37fcfbb3983c93a8605
SHA11e535ed8bcf20190390404e5c4264012631a7583
SHA256041a7a1de862c1e9c12e642f5b61ea54c1560939b4c18c9de002b65687e8d22e
SHA5123759755aa5b14030cd27227b5e94fa7c58e115085deea5e3b2ab2548e99971ef1ace1da518b5d27b8906e8c8855fb5a3cdbce27d0e23a2021b7c276b1b5f4876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e98b059d8f6abf04bf8eb3a6f03e08
SHA1770e0c0f5cac6c6f1cd895e54ad2ba292bbf344b
SHA256b2d65a855f128eca9ad103c8af46aff6bd200ed96675f89e784093fee695396a
SHA51281ab0fabe3cd694fd68e885c4f04decdd13d2702c3c63d01ab119d828d4af04ab5ca19252826ab543b2425a9234f84951a67170dfe30774bd43b52a6222f6e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb43de637c047f987e337e389b074ffa
SHA1c8ed7f4a657064ceecc1a80cfdb4d8d1e421c2de
SHA25636b1e10ab6aa2ab91435a155961ee852580374410a7972c4545ca13ff93c5ea2
SHA512c310d29873e0345bb295853fc267b5d1e75a2e49ee506da0d72f81a03acf2c3b4cdb15f3ef3e12866df0fd315aebdf75d8453d329e630a2015141b9eefbc255d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ebd1821e03ba9903ac4255a10015bd
SHA1ba375da69a0b44b35b8dbad34ab0b36cd754a1d3
SHA256ffd54b1f0473a69679b81cfc3425549db152a6093e36d8f3e7a561bbc90f9210
SHA5120dec9eb0e7500998945190610eb92da700cc20bb061ec0fd223411a61a2b66b9798661ebe1d8caf3490cdb3304758f5bf9cac0a31d34615f44b6463bdf79bf0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f2852bad4cc84cc8fb52edfca280f8
SHA1e1086663693e09df660f4e482375c72f67cae6ef
SHA256add0f8f6def0260bea6d01c935fe5c23073a7d9165d77c800e7af09c927278f5
SHA512360f0a8798237e99b0a75c24fe6dd04939d072b5e62f38bfaee8c81615acc3bddb7421a3f8a410014ada1023b8e00d9e3ad9c59eb392199c759dafb4a141c23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd2e757b34d57042604531b8d054e57
SHA1a5815e0118f1e1311101067801d2d88169d38721
SHA256cebb2312b983298d0b1612330bfa233db29b75e444aa1695c88be15f3750a8c3
SHA512b0a32c6cbfb8f016ad5167acf4021ced35d7c18e92c07e5391c04fe3986c40c9974d81493491bac29121f8ba3e278f0bf027fe7adc79e3002dd52623ae6e80d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db2f13b6bc4a8ede381e6d891a7be3d0
SHA1f0ec440fc4c87694425c972ac5635a921d3ae948
SHA2561248ec4eace4bc8d1c7b131a6b4210e6f405c259b07903bfee9916e0a9b099e7
SHA5125badf9a0124e4e477c332fee14a8d1b0deb8c0ee13e35101d84d3a3ea9bdbbb0237dfa3bca8c0e1cb2975a5c34b595922d11f21eaac7fe8500c387c632a13f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bf110746c2e8e53176cc68669ab6dc
SHA17823fbed0e74e343e7bd0398985d1b533fd2a777
SHA256ebe374ea55ce7c0fbf707a66d1828cacaed0861c8589a935dabfce94c73b1cd8
SHA512498182dc629970d1fbcd0e45e1b176d38a1b6863265248419c2b08f37b16bd9968fd03284247871b3eca468de95b2f45bf218206edb03316483d0191b6444ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc9974edac628cff7263840f990486d
SHA1de8a765e9991119512762555991ba7ed0df6d71e
SHA25683bd41995324bb81749fa1fadaf838afc614f1ed3667fdf8fae9d36577b7b51a
SHA5127b8fba250ecac9d988f131eaf78b439ce13ba57d38c09ec2b2e24ace5fb5b32c13a5acbea2792b0f2b5abcfdb7302965f0936d7a230af3e40549762f0b0122e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed81285ea8aa71408adc8e9c30bcc0c8
SHA1f88fa0872b1e47810f1b5bf1b78772d15f8278b6
SHA256bf4668954cb04ab6528cc8f58980f3da6d19795ac093cfba7df1056dd8b22e54
SHA5121f4d4a88db1dcd5f3dfa9c90e9bb3da8b493516e70605730f445ed4ea4a1679a3241d3f8cbf9345c771faeb60a74af541f41ef060ea0f19ff04389bc09130a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482b2c576fe65812596c6b7acdb3549d
SHA1bbd6086fd87ed1e8a201b5446426f544be3ea070
SHA2567cffa306c82ac295d55ff80c40aca17d92c2ed946b1fa6cfb6e55e356b9d83c3
SHA512e083fa0bc65f51ad1280bc7d68ed98b382725c587c71e135b193c517703b868055d8c77ac06310e89c41df05feb32cf28362062ddbb5c169ddd245df2df9f62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac2888d0c78d259645197546cb7cada
SHA1a83fd4088ed62f014a657e5c7458055a23b7a41d
SHA256ed79ea203927c1f4948163e60b050154b03b5bfdc1bf7fb9ae5dfe83666fc153
SHA5129b20f46cf68b57c282b305c1a3645919c5d2646e7cb619f5ff1b2d361e3760249196d39bc52c1f361b437b863e5fe86f7879c63a7eca98378965c0361e8d2cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7a4b4644f7ab9068c1a8e5c62e3a0c
SHA1ec979b21254effac3993fe4a81c6288ef4d29774
SHA2560ddb7d5e203aacf31e6d0dc20efdd60fd52fbf752d3fb6454ee1be7ddcd8b369
SHA51284b4b6df4867ad0d4f4f60c374158fea138096e78f07a61c279150f96d333810e0487043ef6e7d0607967618eb3fba00b8d6546d600f4b1912dcb42f897a810f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57753ac4955106f28a874148de2e3f06d
SHA18d3a1e81a0dd243b79d4c02c16adf55e89af06fb
SHA256106fa64ae3ae40cb1680f245aebec533adf3ca3c24d3df3697cb082adb2b5235
SHA5128378307040ac1fc313ee25bc5cadc3d997d41274fde90ade12c877af7d8182471f5137a77b45079ed5d4bed7c0f40958d5f463edc317e53decdf3381aae782dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c35a53aa55d522ea97d6dccfb57e6b
SHA13b35e61d959b1f2ecce522c7690b84c8b76480f6
SHA256584f8dbedbf4c8222909f50e5aafd5df8cf17bd87f34d6a98d49a3bca0e4a734
SHA512fc236c17b70c76126b9f117b8c220be77ab828e5eb6f85bdc3310138f6bd3e2bbd0038446bce5c2e77ae5e26864aee3f8d6e2de0574989568359b003bb81f951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58adc25f3d7a0e1d4b2b2efa2503ccf41
SHA1f706f2e9caf75bcf392fe0bb553199e22968c073
SHA25614ee55e4a67bddcb5114d83753e44d4d0d660135283e082c9b111716ed5ddc60
SHA51205bf8619c276da16009afc461c3408a703bba93743bff568dfef5c5864762f1d532ade9fc0b523597fa1fc27cd388c0bd3fee48f63ac65fb037ee1da1c9fc638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536d4b01d1d8d24fb40f07c79e6b4f80
SHA1a7a8542278a72a26c3cf1cc0726f0f3ec2a7559f
SHA256fc316e96a45be6c2ff515c9e1c7e5e0c7164ddb5003bac0d2a7c113b77f7d00e
SHA5127abf05dea425a82a9779f8bf5fd0b46b5cbbf5b3771a46e98d909d3b1dc79eec846cbbf98ad539b4475b9bd4c21eb367d49cfc0ceca09b24dcc55c2578f71a5d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b