Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
d48d3bb95d93f8dd5571cc1933dd3482_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d48d3bb95d93f8dd5571cc1933dd3482_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d48d3bb95d93f8dd5571cc1933dd3482_JaffaCakes118.html
-
Size
209KB
-
MD5
d48d3bb95d93f8dd5571cc1933dd3482
-
SHA1
52d776bc5c9dd36434f90d59af9f4fe311d3a5e9
-
SHA256
99672b35f6ecb93923abe0dd3a9fa4dcb971749280a06ec7075ffa790149df38
-
SHA512
f306cbac9f5bc32af64078bf18ce99bf9531100910401fe1231864465188f22419b1bb1a328dfbc7e775f4cb7c423db76bf88505769098ad5b7bb3c6217c4807
-
SSDEEP
1536:ILx5dhJdsf0U6uDgdXHh8HH6wrrEo2U1QTxQkKZvarsfBhmDhN813Kut1dv2qJR2:00DgXHOHawrX7fdOoDPBy8QTm0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431966972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000043332401326381d3df57828bba452d23dc6da14792db6cbb08d14380ee1ba322000000000e8000000002000020000000b3b91834a33698091e436d1a606ea5f68093e0b3af46edc04f07e089b12d2e1420000000e2ea27eb22093479f294458f94f110a0ba92aeaa2f3c4d9b49538ac6b2ab9a24400000007fb4f130f14ff743170f41ae164f5ac5dbab452cd5453797afbb5499e121e0daeca4392f826ad38d55b6bf3edec24c4ff9e45be3c179b044703efbfc40553a47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33AC5741-6DED-11EF-83AF-F2DF7204BD4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000009d68601fa0e635409a7d971d39fd03fdd8e25f46b22ce005abcfe08ccf918808000000000e8000000002000020000000bdb46d6521cc4b244a24957f270961dfc01f2d1e377924a2a1e2e858c1d621d49000000048274af9f4636c21ef29465ba1880c6535ea790f33f29d5db913ed10d5b9ae23c3419b84daf92f29e2eff669a33952ba00898e833dcc2d2eb3ab45735534b3d8a6268d2e3f9d248da438ea6cd47ad02efd36ba84af82653ef1e31c0cb8e0bbe38f0af21abca7c043a703a102101a315f401c0d0fe9b6a57b0b85d649321897059f85db9038aaa20cea0163616235fac840000000469c25c5d679e1fa7cc622ae574d96cc579bad723d3adbd3c23a6c5c405e284dbda5120c32121e9dd94a0eb8009dc09be6c7da151c2c4ff62b240d9d168471fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c15d0afa01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2984 2432 iexplore.exe 31 PID 2432 wrote to memory of 2984 2432 iexplore.exe 31 PID 2432 wrote to memory of 2984 2432 iexplore.exe 31 PID 2432 wrote to memory of 2984 2432 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d48d3bb95d93f8dd5571cc1933dd3482_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a43bbbb9a515c02d4b79beb9c62fe1
SHA115db04e3b7801f5bca0dc47aed821852a0074c6a
SHA256984a30ad9b5fb84aadd30cbb60d0152cce00712de86880b199f14f7938aaf4a5
SHA512f5393c3cf4b07ae16037ef85d162a6c6a597e925e9cff4891273d8cc3d1a88fcfa061395bf346b1b20afabfce31af7f18f2c7d4b25bce1bb376669a0f0fdd304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8abf857360eee7fcf7d25717cb58d0
SHA1075119a6e3c423e2dfe8dea310c442abc39485ef
SHA256de899f21da14e9210d0ff3e9790322df965daafc12a78d4f94c4d779f172fb09
SHA512886ce483b46ea3e7037aa2b67ad37b2fd2ddcaa78951bdf6cf10f9fcc647f130db34c154a6537774b107d0021edb8935fa2de37ab1bfbcaaa59c134f77a0bf5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d0ce620e14ee7eb31d1755601efa63
SHA139e3e5a69db9f2168c7931335f554f4a928c10ab
SHA256309636040a631c2974d1b67058184bf92c85d56634cda6481695a1b86b42c912
SHA51222e9d24f580be85a6f82cec8a479f865677780c21b9091660931fcf55dbc04218bad13f4493d3f4bab141dd4296c5dc80b2262e0f164f2c158579aeaad587731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a715f3b366d67623371c5a8f48c86f18
SHA1b82792b954edc7df91f16ac0210f8c66bb1cfe76
SHA25687b36d463e3023ac2a14a7490d28e966c190be7c11529fdf43559df3b6a40c4e
SHA51270022a2828732f57d35c2a63bc0633105ecb3529ff882cff03745305ef0090f6f6afb72537ac3900232145d8ec757b1a1c816cf3a5cbefb1004ce3825b672d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a288d9152d616a0e3310bd16ec0d117
SHA18e607af21b0fe8f9119bc543f7cf47ea8033aa5d
SHA256699a84c5a8f7dde5e0a0c0a8fc56bdaeeb8ad2832629bb5744479995ffefa49c
SHA51217a1fff4a1b41867a16aee9e088783ce297e4f3ce76e814240515533e7a8cebe7c54ea39981b856eb7f0f5b37750c124d555cb1903051bb544608837e9e95238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540eb44cadcd20ce1ae1848de7a5c7be3
SHA13f18932f5267308108dae53c34d58e207d9c03c0
SHA256632af6e5501a7c03c736312b346ca3d71ba5cc24aab502533ba8c0224e8e5da8
SHA512a659b62156c712be99e044594183038d6229bce21cbbfef3239bc2a9e05b1b43c71d63fa921fa56414db87073e0698b55c56f10dd5eabde8cbaa2f679ba1084e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6214cf65079ef83411175b86d5908e
SHA156e6f18cd170eba16f0266f92e9b9e0998b8088b
SHA256c3b08a1635c4bee1865459b69dd43742c599e72a7f671f1e0b67a34a0628d6e2
SHA51236c8dfdebda03824f6845bd7bd4fab7e050b219fa2ecef6bc582933423c03110e2f841a66bea5d3c8c2612882c5f914ac01537a092e439880acf1339d61cb4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8787dfe55f252a3c025cb16bd9c58a5
SHA13a4fc9a2d1c1e66268efd594ce5daa2d8721aa41
SHA256bbd4c4926a24331896a84b015109a434bb2c22bb8156aabf148033fce0f3a064
SHA51251f0ddc86c5ea1373abf76a773047dab697918e17d72678325126c45301b460e80cab0b181b42f05caa9c77cb3d3aacc7cddf1ad319b2b2467f90f63e01a9f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f609c68eaa8ec1a35adb4e9e47502c3
SHA1f54d94ca6ccd440e9e62138f8e9ffac4f680450b
SHA25682cb4dbb6f82b675aaf919c4666dfa0c599974256aaaded81e4a030be6550e4f
SHA51298bb6dd487ef73333f44cd7ffa62b72dd3bbf2fa99f749de827b8f18008074f33a787322bd502413ef8fa5f95080796df5eb6e4dfce277a9cbbf421fce53ebf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab8f141415290f17a4d8e192bbffc1f
SHA161538ab567fdc83b05c30b5832ad5de7fd1b3ad9
SHA25627fc923396f80969cf4ab283979e4201dda8454eee79dc88e28bab8a9542e4e5
SHA512fb3252361fe086cf5e6b6237956691ae3da3c6d613d33d9d46974d2794f9e50061891151472a6e87cd774125cf85306c6b982ad98498ccb634fe9ff6c07dbc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ba7a528cc49e45d7ee60f52345ba67
SHA1822031bcc7d810b8e093c484edd17dc09a9b606f
SHA256b684ef17668bdb8addd8474f530c38e79281172e6a544330d73d67f5f63c4f94
SHA51262517e8b80123337743accc26464a5cd8b3874023a649d23952827fd4ed60d9993059d3505baeeebd94804ed175c14ddae392ebbf342e01ee6d1c8aa1829451f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee95ef4f98f848d52ef434b33c56117
SHA11cb29f5f6159574a0f9390fa3a4b605dc9fadb22
SHA256138966680dfebbbd8b60096c67a659f9697980ec65688f48b02961ef0f4e3719
SHA51285086288ad5677e8505fd295c7d17306d1551f931f62d498d7f76385a3a6b167cc96be87756b200ffaa9e6e2b031725da8980901079ee3880af8f7cbde2acb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b82f1607cb04f40c6c31cc2fbb27484
SHA19c71ca38406c0f2192cd8d27531f0e15634732c1
SHA256eed162e4f664555da7a0624a57cfaefcb39ec0693b072b4db20c16c084217022
SHA512fe37480e68d1715c9b597fddaf661c8b632df9219b8aeed9b5b11784ceb24e96c2fa2d2f29e532877db7dc2cd6cb351a8f5986b448fb462d259ff25ce6a200b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531412eb4a3c15a647030c89362298363
SHA1453723789babfa3d0ecd015108d288a9e901af90
SHA25693da164d21d5783a0c2e82157637ed1419b6cda051e386d264635c868f2ecf30
SHA5129445a28cbdd460885efb7c809857236f860306c41a63650b1d02f6f08b878ab895ad9eda156a255d362a6bdf74b8f65a8b75e6d5ca2dfc9d887b8a98962ac9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56413d0aeb2668ce9d5d6b0d050b87eec
SHA105605ad246e604bdec3d241905c51c40e2e2c134
SHA256a43b6fbaec0a1eec1c0a871b579aa3687531f52614b63c5ac0a8a6fa9cf36b5b
SHA51286b22d2317a35eed1e76a987488a32a4c7a8cedbaaeed32f03a49d6152cf80bb471ee916e5faa2af207546ced5960aeafccae54103e6e1855436ef1dd06b9952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5819c4213c80e94759c0b6e856dea7692
SHA190f7a01cb8cc0c54da9da161d429cca6e9ccf801
SHA256c1061d0a6fdffd447acaa0e23550bba4e9656a23ddaf6de03e577fd62ad461d6
SHA51215e889a7cc1037399501c58787b95344f46917aa6933028dcfa9dec250477ad34bf65dc298f289941db48111657a2ed38015ecf65ace744f011f91d542bbb120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c9e993a9931cbb766a4ae69e485a61
SHA1a36b4c0115fa7bc592d954c55eab67445f5d174d
SHA25637f8eb34ea27c7c77001541e9be12836a207d6b5b4b398a647bec04c767d2f14
SHA5121f3e32333ab07fd46a9d36d688fef2318979a764ace9555c9b07743df3950cb6b231c48a9d7d942f1fcf53548a82801008d1be7fdf38500e6be695d0d22ae7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea0d9796b82903337bbfb22e86b2374
SHA1324a74fbf6d6e44beb5ad13ee43dc94a60986c5e
SHA256ae05a7d2216f97748589e07d8d5859b4a58fbc2749c913abae63d2fa35089711
SHA512b3a00e32d362bc922a1a8708b8baef51cb79fae123471ab70b6027cabed54e2783aecb300047da49221f203a197d1ed6bbe1692b658831327ee056d544c33ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f525f09ffbdd55e7e92a7d1beb884a05
SHA1c636b904df2672dc3c71c222c35e43c2151cb0ec
SHA256806bfbfbc7a46cae6597196fbafe746698c2d60d4a4567cb98d1bfe86ad6eae8
SHA5128b91588e28dbb051d3d5338ccaa12fdbf7edd2e628e3e8a086459c4dc16bf3d6408731eced9383b637deb010bbfa7dac94aa691618de0f7f6ae1555c3ca82579
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b