Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
d4c0babb7445045c9780eb94e65450e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4c0babb7445045c9780eb94e65450e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4c0babb7445045c9780eb94e65450e1_JaffaCakes118.html
-
Size
460KB
-
MD5
d4c0babb7445045c9780eb94e65450e1
-
SHA1
f30136e465f47b7c57816d0c9dbb648a613c9dd5
-
SHA256
debd2ebd72a69a08399943a02db9e97e63a46ca368f17cc34499e50126dca189
-
SHA512
7d2e73b4656ebbb631462cf192ed7d2736239f093b2c9daf1ebdee963c3e5e0926c6c26f32be93acae991cbbb693c8f41d9f3f15566d7b9eefa90e0ff29a3b93
-
SSDEEP
6144:SjsMYod+X3oI+YSCQ4sMYod+X3oI+Y/csMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3P5d+X3w5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FABD87F1-6DFC-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431973747" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707aaed30902db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000cf28e5580dfdad7bca28e12f55e4bdd16f65ec33a74808b241dbc32437a7eaa7000000000e8000000002000020000000be012d46f2a0025511886bc0309289b5d4cf3dd7ef3e4cdcf99f87b2b053af4220000000a09abb685374930dcdd5d380e40122e6eff4a2154aaec04acd997faa4331aa4740000000c1acddd88940d345b87a4d376d85c157e52257b3de5bc250e509914fb41d9c1f147a9ed1b6abf512b428f38d362e5f5a2fc3537a1d47137da3a9d331c6146bf3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2668 2752 iexplore.exe 30 PID 2752 wrote to memory of 2668 2752 iexplore.exe 30 PID 2752 wrote to memory of 2668 2752 iexplore.exe 30 PID 2752 wrote to memory of 2668 2752 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4c0babb7445045c9780eb94e65450e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4f09e6e4addf717666ab28b4bf55b9
SHA14d1b5c70ccf441e99641f5dc9b2f4bced2a1aa62
SHA2563261d494ba4ea14995e9add613a5117045cbfb8c0f63087f2fc44d3a4de1b3ca
SHA5128945f611748afd4e652b07cc798fb457cddf87f841641ac0a61428dafb82248bfdc619d7401fafebb145ae6208d46b44e3373a770642a6f3ba9738b1faaf1ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830540b76ad79a2a8d4a6252e4eaa8d0
SHA1edd445fb349728f085683fad971dcfe5627ce894
SHA25692c1b3abb611796e8d60fa2c1f97c5a2f298a134b807b9c97b9bce355725b7f8
SHA5123bc33bb18d8504dcbdf87c9f5e643bd83064c5b9c5a7bf37124d6f3b37583bd14d148c68061ff59c189410e3147d2229933e9fdba1204677a881b1f3885fd4c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f4f486435784aaeaf18801cb06881e5
SHA17a71ba474bedd60cfc4e9fd35b120c24dbd0acb3
SHA256cd06774571e1ad5beea061f78bddca405d764059a4a401208ca9f896a2dcab63
SHA512538e75b87d77192a86e3941cca73086a9584d28f67879f8c4f708b916f599eb26f4937f986436cf528ece16da1e602ffb2d38e0f8922a4bca5971369f563df50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe79a79571c10afceb58543fa97e7c3
SHA10c633e09bcd7f06bff5c54f87bedd47be332d13d
SHA2562f644205b2dea431a556734c6ea642b52624e775b1822bb167544d57969b80fc
SHA51251be60274913af9e6bc07612d62dd342d8e1b4a70bcdd81e945cfc636228171944f887e3bfefdb811c65adf6e6f79e5309fdc30b452253da73cfc2194858d357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5246093999eae4eb35aafdc1a27304f83
SHA1ab08763a57ad858247033a58ef2ea4ae16b067f5
SHA25671c5865598bd1e5e64259ca33569c6fcdbc9d0ebafba271b14ae32ad656464e6
SHA512edc8b0871677d408392d0378474fe46ceae1fce9143dab95b0fa40a624dc201ac49d308afdc4e59cb87f71baa7b9b662bb3b0c79953dfc669d8a82c18c3f9b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d959ae4b2760b701af820e7dcc9b4986
SHA1ce540aeaca8b9f220fde3c063d7ee273267824b9
SHA2563834e0e65eb80f9bf9d5dad618cc66dfa79d6b74ad8538abba288611aa56bf46
SHA5124bb3b65801543bfbdc6b78557525d153784ccf546ed7267d153fdeed1874ab5e4f15c4e6cc500e705d8c6442c32f28cb3b21a2df13d4a6271532484143d35d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3012ce884edabd30220b48c0a44b30
SHA1d361a8ba9a580c0f57dbb567ee4627e67cabc338
SHA256b21337b0e354f33f33f9ac046eafade4d05a97a153269178d02bb5877aa19e84
SHA512fa33c49a6cc54afabe266dbee8c85c8f596cae2cfb129eee2ef20808f99d679926b1c3c97a8e9e5fd594b4e08e2573c53a9f91900c59bc99df11344cf5412e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad879e1af687c2fe692a26df368d255
SHA123cd985076437779e3e891890e2565efab0dbd9b
SHA256c10a5bad4fbaa3f1b54d853e336db7609c9b7129b9fce90b87222bb287b4b092
SHA512697ed49e358850d72dbab4bb3729cd39c4dee31c9c2efda038d51562d0d8e7647aca5756e75d87024a23dda3d913567e4ddba657fc3148722cdcb439896e231a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5640cef3d7ba3699f74f6148545f660bd
SHA1c40a113fc46a40427db4d2c3a9ce08de8708ea23
SHA256f980ee14a323fb3e5534f328a1b417508947138c417a0f170242092355b81a01
SHA5126467033994e6f967929a48735592a07025b2c0e99401419b4d60175a0154720e2231ea873fe1cba5c4d45e9b13184bb60a614ad71fe0e10bf2e4488f9eca52cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41d9a2e660c5392821bd755a479b51b
SHA143086ce657a67af49c6309cd1191201f409fca88
SHA25655dc48cf9d874e0e9b44afcef815333a6d9e592bccbe72520b4b4bfa4e7ed2ec
SHA512c5209104f3bc245046e90e99b0d689e0b3ce692e67cea6e837e3ae7eea10830c2dcc15e624a95c62966e837b04e03af0161d8aa07111755d5a272c7bd41d3167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125076e8c816eb3948621bf0095b61a5
SHA16090d5dd3926cdc76b9f90ec9c921aeae28ed187
SHA256f242d3770f21d89d1621d7a2c4a2bb5a478e770d85587f780f0a7fa2af590cd0
SHA5128d0d1e1f1403d6bd57390bc21c5d9194ff4f7fef82a81fe3d3c5ad835a754596be2ad5e17f924a3cbe7556a52d4753e8073e292cb3adaa073d0673da3a313dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4eda71f407ec2f4956f73cc20cbb81c
SHA1dc9df00e93ebb58d9700d399ddb56a1a28d15e45
SHA2561c7c42416acd5941a31e8877048b4a45f96d76157dd048a19761cae2a9c1e67d
SHA5127d640e30aa8e9d7e13b122e06d32bf9a3d1539b77f289585ae39964417738b9b9430c9d8636cb5598e38b59e02c56f24815489d79cd87156e6543910edab1192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cced57d66511954d49194a592fed605c
SHA1d72a3f7002a7adda479067a58d57c4f5764d470f
SHA256a00c97032a747db57651584afe97d5a0e299a4285f26159c305cea0a1566bdea
SHA512966ebbaabbf6c74e1bac034a8364e13eae5ff003c712c91b34cd6bbefead3752b03826550c7e79d2f719cc4d70a46a0928b587793f2b67f4f250e6bb94f7a5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc3ebf09eadf8ca321f7bc5f890f24d
SHA1b60750c3dc07157a8229dec1f1eb062841e71172
SHA256fe6519db0792cc3cabd8d7d2a97cde1290f3f9e4bc7af9a3a9672e4bcae2f42a
SHA51214acbdb7a957780bf8dfb9a0f7b65b48537cf64280c89d6ff522ed44ae4f5ed50edb5944d74f1c053c4b6314ed08a9b763734a5de9f7b15af9a075e707462af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686ed0fbdc4f9e42c34a524df6d1a264
SHA171cbc623192b434d20bd50f5b8d931779f54015c
SHA256b4385da798c577b29b5de0c195127b98f40d50d6911b675c08ecff05092020fc
SHA5127b5e099ab6d4a441b737d4b7575acbe76813f560e9d7cfa5fe743136fc1a51f83bafa8ccce7ab5c58db1e94e52e7592e52836b5eed86862a01688f9a4332efaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1d4685eb1e1a97954e49b7746e1b39
SHA1fc47b8095d7a6bf71a5975d31dc0d492498c5cdd
SHA256f4621c42b8992203cbab71413fa8c1512207a632c4ace97999bd78d21f1dd1e3
SHA512c8bd3f69fd59a28fba8422e6d620589f4665065c6f0f726d6407a755311eb73f10db7d63598797a4146570d07775a534fa15bae077d20ab1107a980d7e3cd5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7d0fa5a8fb0cdb46c57dfa7d9def43
SHA18c9a4ebe68c28b556a5fc4f2a2a372ed91ac479b
SHA256f6407b7e0a840dd3d7c5f210271bfff83760f3cc422952606b0a17e36b82b56d
SHA512a8ece3c3ec8adc546c7c45456f12bf63dbe362723bd5a1877575c109e54f30cfc78d065421a5a19586171d267e5761efa18c2aabe43c01ce4951aaa68a14a4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52101c0590e70339e89b90248db6b6b52
SHA16da8cab726bffa4544877163da56b23afb3b8914
SHA256681838be16ea6270f969954a5be1dfa683795ba014de2448d5de232b90438b0c
SHA5124952890d53db7c090cd9716e4249774b2d9aa97fb04383f3603c6e3e10909ba5612f2a148d8513069b206228404ddd4cc41671b97cc105e429ee256f3dd5b8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f91db4d0b3260c2711e4fc57b40055f
SHA1819e8107495f838a5276480e8a0ef6e2790ffae6
SHA256b923917e87ca2ad13c978d189544e3bbce977b0fd02ed62342231ed51f5816ce
SHA512df796b78913c02c6960e07380b136acbb8f2df658da3935366dd7963743fd5dfed621c6623d4df2414310ce9cf0a24b4f44d02ab691a18eff998b41a2dbf4260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b97bf5b1dce861f5f96103045b12e6
SHA1527651e40f047b8a9a4f9d68be0b8b154979de8d
SHA256c9062371e4dfbabcfb30a41b9251e100093e8d15771ce9ced7d9a424301b1626
SHA512dbae37dd97846ed02cce2d572bec85b993060e75eae0783bf8a91fb9d4e4cda7a83f38934e80b8628f35a2e9692b482c63d7b5f17cfd56d64ec3f4ac6028fd9d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b