Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
d4974a66b16c5470ef4521aa92b125f2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4974a66b16c5470ef4521aa92b125f2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4974a66b16c5470ef4521aa92b125f2_JaffaCakes118.html
-
Size
33KB
-
MD5
d4974a66b16c5470ef4521aa92b125f2
-
SHA1
8fca7bf5701c80fb4c9b567ef9801e03061a75d0
-
SHA256
791ad54504c2fa53c04fa586d3ac3d882718b34bc012a0cd46cecd4cfc514605
-
SHA512
c0f7b3ef5535c5619d93cf22870377d4ededee314cd91484a4031b5909c5a0a22662d5600669928012b057e3516b5be796e0c0eb8fba10ea74d22e9a70f1479d
-
SSDEEP
768:QpHy2YDY7jYNwifqJ5702fq+b6QeJleeB28dKsbPZKWmuMtM34xcip8QuWBunRJ1:iy2YDY7l0r+bQJleeB28dKsbPZKWmuMm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008faff1f84862f60817e4722ee1037eca5625cabf4a3e906236612efd42decc68000000000e80000000020000200000004afa09efe613a475a76cdbd71936a31d582f1d7ab609b4ee548e2cf3f0a645d7200000000af3619ba6db087b65bd8470f99a0537cbc3964858a3df0987a98508f1c020d240000000c1586c476c0961e7afbc94254d48031a639e8c2e1ee28e269f4d1ff3ceff50ea160a10d8c0a81f4eb9549b99ee60b923282779d347c6ef52fdec36ce9294b558 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{819D8751-6DF0-11EF-A1D0-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5097ae60fd01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431968393" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2624 2724 iexplore.exe 30 PID 2724 wrote to memory of 2624 2724 iexplore.exe 30 PID 2724 wrote to memory of 2624 2724 iexplore.exe 30 PID 2724 wrote to memory of 2624 2724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4974a66b16c5470ef4521aa92b125f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed2bb9a43791663047e1311a2689d29c
SHA105e75e00590fad41cc10f9863ba2669c24485945
SHA256aad4cad264e16cef4c4939c8e3219298fd8be76e1ab9ffe0442fd728b4d3fee7
SHA51274e921c9ce177878e1d127f44a2b9365e8b208b0645b93894b55fcd05ab0ac961b9a479cd1f1f0668147893c0db9a6d01a33bd25a62a0d0ab6ba46eae747e481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521fa759d8c7c7918efd3fbdbafbbd8af
SHA1db4407ac068c2086b8cd9d728ee57d7811076531
SHA256b6b7fc4172918789d21c6ef4e6cabea893c4dd4ce817b570538ed8a006d65474
SHA512d1b70d0f4e00f753d0d045e915051ad0cd871d4dda2cf5ceca5b71faa8488e01d9a8a0cfaac515d6706b8803b6110d15b68d8095fa4d698bf4015cba999e24de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57729322714b82836212c7159bcb9fc14
SHA116c205712016e2f480bba2974320017a1c6dc6a3
SHA256ce689fb825029ca6250b0f7f067b49df854a87da5ee16ed6c3b5ca7fa3ec86a8
SHA5122f550029c5288d5130440c89943c81bc13e446c250a629f77de1d58521b11364215f058750a90318f25be6ab3607d65d14a67c25684b6cee3fea8e9be686febc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58549178740c4a82c02a8eb501bb1620e
SHA1c3b6278abcd02cf20d5897c188d478ba44eaec1f
SHA256a056665699a959bc2b02c55f0a3a46387d21347b977137ca4954511394fd71a5
SHA512a91ceec7f76e7db6a82fee430b92322ae148ed5041abce1c01443563af1950d5927b96751a96251d24fe53db947d5e1e0efcc745670fedf92c31b5a42a7c9d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215ca7211ad3770d07fd9747d238bd60
SHA13daf575e44a0e175f7b0e0b56610285c0acc3936
SHA256b05f01c4092fda55bc9e72b3c038f0bec9f9640d829454d13d2ab7eea2782220
SHA5126b4989f16230174110d6d44d04eaeea32be921e56bdf4d7571988062987e81384fd2bc142384196462c56670747db3f818e4922b963d4b78d7e5b62b112808ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f3a8bd1124a0bc4e3294cb8dc25e0dd
SHA1092063de659d215258769d0ddb5066fe8baba438
SHA2561bd22a0d740208951fb78770d6e5744a6f8356b60a2f57e7f3f244c84e2f0784
SHA51249be7fac3a36db57e478312de839de149182a9bb64a1eb17de2c55deda9e4546f360f4d870c68680502646b17c0a8a7a0a674ca14bf159064c0ad7024acc04d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a965bc715f092e1b668fb45ae3b2d898
SHA17beaec810fee6474266205fb02dacb6d1897ce77
SHA2565d47b85161590b27eb6dac251b86a0ad6a1c3a002c22da6b292c7f99ab44e562
SHA512e420fa506ee3b0729c83791d1f28ae7e97971c9135a36795e08e57172e87f824b9c4cb2337c680d5cccea38e4bd94c56f6e0fd9151a8d3128a76c58b69d0d537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556fa6c22a27cf56e59e79f27af058dcd
SHA1d7c6d05e7e62d1ec9cf9e2e6c391d5e68331e797
SHA256cfb1b5ed674879b5f734c1b86fa1782d3b0311cf989efdd795d439d46129d8a6
SHA512049c2bea826d0231cbf74a607a1338b9354779ff3e8b4c68a9b7b15351b84c482889255887c61e3d2f806460b58243058764533ff225a6b3810d5f6940cf41b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b84616999aa66174b7c3f55bb8e87bd
SHA1fc3dca8ecf077707cb89ebe9f4ca7c6223e3e4e4
SHA256cf127b9a66d249abb488571ee399fa6785d0f22888419550dafe11884f186329
SHA512c3dd21149190ea74c2a9c7497da6486e800eebb6eea3cec16cf2107ff955928f5ab3fd65cbe4c784691844bb0fb2fc13ae6c7b65e3500a4b3555aa6c88b5d0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55358890be14a01ac331f07a16b981f4b
SHA19ade2f25480381321d748ad76c14559ffeb886b9
SHA25662a9a50c47065ba2d8fc43c7498ae58afb427c10e77fb83b36f56ba4622bb3cd
SHA5121100c7c51acf589693edb8718235e048b171ccd5fdb1b81002b401ef97749d3793bbb313b6802f35063332f705bc2b96495fd4897238438e74cade38f7581593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece7498d57955b75a33a485b4ae212bc
SHA110bc2966c05b89855ba3207b87b68e17fef4a0e8
SHA2564dd373919be3b27962ff8295471966c4dccbe201b05bef1c32d2989a072ccf93
SHA512623ad8e670460f57b195b0c9654d9152ab6e98d56326b051485b4fba0038e60fc36e4a559ac20a23ab8daad8951a1328a83e80d27fddfc3a833a1685e4044461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38ed786c32c797b26c2d9b780333933
SHA16d3b6a0d7319744bf41223f7b12998afadfc8f45
SHA25614d0cfd0976806f1cd122e72a601a398e8a2ae3a37f9351ca5ac6bba120673aa
SHA5129a0355aa363f313a0c3c34d919873c3f36da3d093a45ce5e0ea473b1d7da74cc68de1b5cb02b4103108945e34489711913385eedeff6b2bd65ff2c125d296caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58779436e2febbdabeeb8ff87586f76a8
SHA1e604f5892887e5a889cff629544febf7ec7e6a91
SHA256e9d1c5fc926b40d676ac54bd9ad06dddf90d445d70c9c6d381faaf5ea0e00efc
SHA51248d7b5c7cee4edece05196a010411088f82fbe2863bf979ad9b6b6e644c05e6e7958a3d0c11cf765291c4b3fcab731f80f4264a256343929dd474cf70ae09d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159a9d613affd4c5f2ca43fb313e0d87
SHA1eb691477d9b2696a594c6d414b7ee0bef60b5445
SHA256ef89dfbf6b0a18db5d218d7d8697cac06ad03715f9a4b04f1dbd22773da2dc07
SHA512f3619326ef2d272ba503346026e3436c2c12b52d8e7cad77e09f2ef6b17900e505754100e88f961010488a0030390483cb6056d532274c4e40e008731853a24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e4726051b12dad89d29a6a6767d4e8
SHA131a2335c87a8a785693eae9e5942837b37b65fde
SHA2569df41874105f2be6c87bca3cbb755913c8406f5f75eba7cb58b144c78f88c394
SHA5128c3975dab653d05bd67767f333c9e8410c55aecd1ef0ff6b032bb4efd0706bebaa7abbd3baa478c22034dade6fd50e5fb8eeae5f9c04f3795c80b22dd6173a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c13de20f1300f4766c5c3b203ef594b
SHA1d4897bfd6c5a3728726be7c4931728002b359afa
SHA256849ec96b0eb09c53bfce0b0be50322979936959ff44b26978b989d5af6e5ae70
SHA512ee22954fc3fe3e87d9febf949f4d80d394584b1f646f7300b19d8e1401c308ba71a3513730307dfcd5b4b8b9710eede20b83bffcb94d3af3df4138d1f98ef74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f7cbd90d8df82ef40a7cb61db6a264
SHA1b5debac5948898f0177df22c6b21983539957bb3
SHA256554ae82c873c1571f1aaeb79568bda133d0bd7c58b7ea06e7da2189b8504f0ba
SHA5120acdf77f5b411593a4d26f968d03d06ef80f1fa786763a8fd168ba247a2a1c2a54d87f68bd692ee08fda9e8c61db093504bf28857292faaef7d4a7249cf3903d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eeceb36f5bb93006356c661e7380deb
SHA15c1d2e8f99e7f586a79e5360ce905098480d993c
SHA2569117f5f26d29d9d99e3b674c5bc80f126df044072d6377d98e03ee7859bcaa10
SHA51294669f86f3547e9ebde9490d4c489272a95f18bdd4781f016b28279cde284b3426ff330bb0dd33054ef4e142639646f3bbc5dbd2a992c8bbdc64acac46ba56de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b724aa3d2dbaa37aae3694137277ff8c
SHA1a620cbf6a862efa4ce32ab1c01b0d356a3afedde
SHA256fdf3c421489e2757754be98b56ab10fcfd41328cba975dc895854993ed5d5358
SHA5121467d7698dfb2ffa57a99a88205ea67992d312ea8284cb118ec90e8c36a7126b1e61903647effd0539419b9764194ad776850f323de44c92eab7187f93cb0b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39d50648e3e1309901bde37971befb0
SHA1b7e20ddc3a1779e318f4df48a0c4ffbfb13ff434
SHA256b592bb3d6b80b2deb852b9f03e1f94ea7dfa186432c45d02df80974b402bd847
SHA512c26d15ae1a0828a6df3949175602d6386091a24aab25b6960dd69f124b3d8a254ae839d7eea7a3895a58621649635dc947e80d23eb23f4d6c61258fc95665709
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b