Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
d4d715cf8c7305671f77c40bca6c2952_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4d715cf8c7305671f77c40bca6c2952_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4d715cf8c7305671f77c40bca6c2952_JaffaCakes118.html
-
Size
3KB
-
MD5
d4d715cf8c7305671f77c40bca6c2952
-
SHA1
016f34a3b896f00063a4a0a681e3a8cc08297a7a
-
SHA256
4723fc35b94b9edb8aa2cc1ebe970b41446492e5b5f6d75e35c117f4a31a31be
-
SHA512
80007aa07df9788b76fcbaf57246dd7292c61f85601f74c766986f2ebabcd08f8e4278f61f1538d6702ec734035e6058046cd214b5f83a4e294744b74c274c24
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85F3FE21-6E03-11EF-A8EF-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c81f92464b52f33f237c07622736c15c638baa7194c51d511390688995cfb0f3000000000e8000000002000020000000ba3046354b04c7914147047b113ae152c07cf307a1e75109ea659cffd106384e200000002b3c1c6e402567fdcc804859a53fdec495e1eab6d6812dcd4d8987e06bef72634000000087ab78f24d3b6939f1a76f94af9075c7360bf8598eed51b695228239ffbf3e858b76b94414b783b681904ed0db6761eb920caeaff8188db660fcd88f55552815 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431976556" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30baf85f1002db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2888 2804 iexplore.exe 31 PID 2804 wrote to memory of 2888 2804 iexplore.exe 31 PID 2804 wrote to memory of 2888 2804 iexplore.exe 31 PID 2804 wrote to memory of 2888 2804 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4d715cf8c7305671f77c40bca6c2952_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0f8eb6566cdfbea6f4351aad22549f
SHA19d0afe4963651d1006d2f3831f16616bf215faa2
SHA256dda949762064489a2bf674b0867a3bb969194be25801a615a5d6425133412801
SHA512725c5cc548b8b4a6bad872dfe1fb4542d9b8401c7cca31128641edf4ed75c6e36ca6ebbaa060b67f59513796a6225436d9fd5819cd50820e1239210601c80a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebdd6d2952abea7ecfec03dd77cf993
SHA1bef65005aca007b3aba4a17d77b809b6b6c7950c
SHA2563e0873bf63ba1f9e9bb88fe563fb25bfa000541a867d62ebfc98fa09e49e63af
SHA512e16703fcb5e11d70c3a20f162ace1003beef3264d22f7603c43f8d2458bb6662ffe48fdd18d3a8c3e32fca1bc2f176f7108e0f6932d4fc7df98af40698dceb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd882830745c6268b00fbf41c2fc9256
SHA1bf8399133beb2d87c5c28b0880c331780bd724a0
SHA2567f74cf08f792930882410e549e632b62eed7dbe1e9038376024849a0077a468c
SHA512156f08dfef10ecc6ec5197cce4ced5ed62c276a76fc92e76531e65d5c3a6eaa4715e5e10bc608c1ece9818f35281a89df874990bdc53812c48ead4281f21a027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59937270bc1834cf9708f8d4cd61c8cc6
SHA163919b1ad82399d59302d889c61003f3dd0f4e43
SHA2569ff75dea7fbbe24362d9f461a7eddd938bea39d99e1097158e1d613d3bcdda1e
SHA512b3fef33f3520af8891e604817812dc761a81d74aa829f10ddfeb5aec04cfa6c1817f0652ff3a2e295146088f0fba9e1f32e1e00e53016cef7d1c77947c95fe50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b21a192ea8cf1673efa8814acff667
SHA1f9a6d8674e74dadf1d74047841426e3b20d65d09
SHA256f79cda9b639d86a1c35c80cbbf85b221242284c3178b8ed05d1ff0e64d7e7e4d
SHA512f796aaec1b41ae4c3ad8cfc62a8848e26a3e0c660a8876fd4f5716a495b0dde91178cb4f8ed8b70aac99fb1fb90d641ca6cf8eca3104867e7ea853b5f517b0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3fbe9fe542d22b3f01e3806d5d289c2
SHA144aef28ac8d3f11c9b973b805d0c378e6dfbbadd
SHA256b45a0a8dafd6491548d583974d5807701f27ac2acbba8ab9554b402677047d46
SHA5120b9bca80160f4d718c034f7183a6bb59d25dbb1f1f7f0b55e43057c23b37e7ee5beeb555f13ed0d272b940e7621a57f62ecbaf8888f55d81c3739ff13ed88cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e7fff08702a1ff5acbcfb550100268
SHA181ca8f4d09775c229c4ac66b43b50dce3f8253d8
SHA25686ee14b0238e4b27f1a2065aa4b54e2cff7097702f6a5b58307502ee64e4ac29
SHA512141a0adfda1836c76da8fc85a561bce8f3010235dce962501de18d47fbc27263a2e1b89c76786b5b2de31bf5f45be9175fc1084ffe41912c564d9ed4648c1b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1b254587cb38745b23ba77ca6a6520
SHA1423fabc6bc7c3b05245e8c1220c98200354fb037
SHA25645ecad26382348386f19477d63a40dd1e2e1fb0ba54f31f234d6aee5fcf50e32
SHA512edfda214e2658971b892adaa843c452c6ef4fa2799cfe01d9150bde3f7c7b8f436ca707a5ae608cf0780c0372ef3733728e20e3ebce6ba58a6c82ef7bf99566d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5605ea72e04b9e2de70c1aa206170f5
SHA1a5e65e5c23d7ddf8b7d6b445d15667e4d6b708a2
SHA25614dc63ea6338c21d24a0b6b8ac0c163cdbd38de7ad87cfb0607ac5bec4804b7d
SHA51215ee22cc1273856e6bd42600314825316d0582596a0053ed8e7029c364893684f4662ecc0f7593a75c552d422f984102b77d9f52bb59a55d90c40a9c4b41a65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5801e91ded95bf01c4976ba5233023
SHA1575d5f1c33e90b891c0f45ef125cd32321e96c1e
SHA25659cac88894bb465d869b8327684afc340084003d95a81745686f7ccd5e361c15
SHA512cb1bcaf0e500a45c2fbe3b9ea2e91333224366e90888942424c1cc8a27194c81cd4d639696dd6863a27cdc923b7a2d893c1b318186bb8a58bd06ee14f6583841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b525082be1957ad0d6e084d9663215
SHA1dbda433ac0f6268267aa72fcbbb15568917d269c
SHA256a4cd6e75deb2c9ec0a0a4d296a521488fc48d5ef1d95ece5882078f9a12aa903
SHA51290b0e6def742ce33964fbebb4120f01808863e3cb9c05665a42d18909959e34a92d38313cde457ee79a501cda601df99594a55a66b7a7bf58fff8fd15e58946c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cbee4aef54d8c4e4bb3e441c10cb318
SHA1570ac6d337dcbd348c41dd9c086ad40d9946b2f5
SHA2564bd8e1ef58b9843c458bd58e6aeb76c0ecd3b8dfdccf8942f8d60f1012d62227
SHA5126c96138becf6fca406cbe9fad2faf205f411269a39298a0cb1fcf94edd1972ec905a865e0ee4f01932579f81f6fb85d3a673ad132a636df0b969a9d942da7468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b0696a483c5dc3745dee7b4724a7c7
SHA139407dac10410bb3f083af9b307520ac5fcc8cd5
SHA256d18d1a040c61e1f717d0c1ceba150e99e7bfedf8303efdeff9a8e671f1502ffb
SHA5124fd62364d11e03d93c0835a0d6c3c4665008b5e13dfe6f1a0293b0bb487287ad8c0a105f3466f1220be88d4585144774bb2baee097c00a2439995d6e91c485eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a976e7e8448bcaac8180cc9d000acb
SHA13551d518f7c790c0f5afc4fe16429cbd606d7980
SHA256d68ef1f620ffda45d41b3ca5cc1dae83c0b46e41c4272d7fc3d56ea83e0ca8bf
SHA5123d8d8f86583ac07abdb36b8528d5fb8fffb4d284949d53a7de55ca51a4a2799c8234ae748eea94ec0f86b0bdf9e781ac4385f05a3907caad9c128e1215a2052d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a28f0c9832394458a5344dd542e0aa6
SHA1347682ea46d2c1ae518897f74fe199a4dc8d3239
SHA2568c7bfebfaf3add755a6b38e2a8ecf26747027cac0a0bf68715077e9e5a63e4dc
SHA512c465402572e1e04660d1ec01158faab24bcaf9183afa6cec7d6383f33f0c93a4c358573d73e71766613a22989362991a141164af8532377854d3189717449e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c8b56f868c27d012aabc244856ffe1
SHA14d9dd25c7ce007ae4a631941cb9511fae57c0901
SHA25695faedb1e63c7e7a6753aaf29b7fb35ee2a8b25a3bc49b667de72fd3c11997db
SHA512527d76f34b3acf7bfcfe305e069d87146aa5597557320e4aff1ac0a6b582723d3ac156828a0850899bb4ba09760fe1b616e98760be5bba5ddd3b5586f09ab01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89eb81608d75a41fb9a5750348efb4b
SHA1e48a5846f5c720da60209a98615446640d71c044
SHA256eb4685e2594fd02746f7518c34d18fe54ca4fca25a31d739338582fb85f4e754
SHA512e340a7ba752d2c62a74859a1fa79ffd957ad671f82360b2e1e7dbf3c22921ec1454297dd2de3054f06438c1fd17a2c57b2b0a33eed322654a586821201609b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159426af5b21c60ca4d8dac452a8576f
SHA16c7d6626d335b893c0941a2e24bb88c39e17c76d
SHA2563397ea4502e4c3238b1d05d2e5ca61b5f757bf3e598d9bda88e13bb0dd19233a
SHA512e6aea90bc218a955732590ad750d35d01310e00b14f1cd9fe0b8c5ae3edc3337f36421a3f0c0a4fe8814b5a1f742a7350870461263e21ed67982595731824598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5324a17b7908be3ec7a537c8f41e6b13c
SHA1af5135b4a998b7240780624eec321471e4675659
SHA256feaa6608325c25308a693a302a1af8e8b48d9fdcf5b71537be0235da487eacd2
SHA512d04601e897f3746fa2d3fd5f8fcfe90ddd121d6553a88bfdc2049b4158c9706512d812948dc06f96322c79851b43c40fbcd76f00c56ad04163fb3fbb7dd53e81
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b