Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
d4e7f74d30bda47c1b56d24d9a5d0fc6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4e7f74d30bda47c1b56d24d9a5d0fc6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4e7f74d30bda47c1b56d24d9a5d0fc6_JaffaCakes118.html
-
Size
54KB
-
MD5
d4e7f74d30bda47c1b56d24d9a5d0fc6
-
SHA1
c2cfa291162b8e96866e77c8ceb64cd082516414
-
SHA256
91d0658aab26026794aa35bd12eb2e272ce237a616956fa07c66a1a075cf952b
-
SHA512
c9f7d5048e557276efda766e5979ed2d97c60aea76aa2ddfc2dc527f4f511a3f6d2eb962066e5761f4ccb2419cd3d70a802e9f73ebe74342169e36eebd98a796
-
SSDEEP
1536:gQZBCCOdO0IxCjXq2M5e9Vz8xRZjApXBfat+ppRq1sGjJLxVpSV0hVQ8eJYBeo5f:gk2U0IxWM5e9Vz8xRZjApXBfat+ppRqL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000012734e95913e9de80739c4d8b28fdbbe8d29d9f89fc5c59a16c5c533b126dfa8000000000e8000000002000020000000c21e00c7f4f1d147bde20c9ce7571152750c85cb293c8700ff3079fe66aa525220000000cbd29b570168b9721e6c9560973d07586ea51ee642b3bdeb27b2ed076dbc51b04000000066914b183641303cf8a8636cc8b3351cf2e122f1a50694eab0222c6a858cb7fca73499f805f364401e84efad7b3eeca0651654285146e0fa79728595bb3e86e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804841ab1602db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D40E2AD1-6E09-11EF-8EB4-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431979265" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1840 iexplore.exe 1840 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2252 1840 iexplore.exe 30 PID 1840 wrote to memory of 2252 1840 iexplore.exe 30 PID 1840 wrote to memory of 2252 1840 iexplore.exe 30 PID 1840 wrote to memory of 2252 1840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4e7f74d30bda47c1b56d24d9a5d0fc6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bb9153011ed3ff7e01ce37a9772c8f2
SHA1bda9ad0a26857070abf3d85b7641ed06ab04046c
SHA2563c22ff1cc99fb629e2a8a3afb69763119a6900d2f8e58eb3fb62ad60ee85e608
SHA5126c905979a00e4747f4b5d9864c74d562ebf5bc5f8bc287fb42b12aa70f6516e64b800c2ad41e1d23180cc04ebf43885cdc4b41559af421715157dfb679ec5421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a5999b8894adb7b0a2929fe3624064
SHA199985b7d1b92d647ed07f43139c43adedc37f476
SHA25652c8abeab46fcdd0c92d38e98251b6beec98b09c901eca1490da81a8aed306e2
SHA512741cf261c42711977b384d3385b8e0091dd3f0d725f137c46a061a7653e869b09625dbdf8e944a8e67f83c3e3cbf724f1bd7f6e7eb72a40f0fcf9a91a2112a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c329292c875782716dd73e8007da2e6f
SHA1d7ddbb7f5544a6e67ce77a5eb9290ed627060f8b
SHA256cc2678462d99593f070b097a1c9def83b85d96bf7a3a77c58650a72b01801b03
SHA512bb1ead819e6da5ece30da8ce7c7547c2a73f34fb3fe029384fcb694288514dc2335c52154001ce3b76ffd8e8fb226c5515b7bc6418f38a36518a996a61800f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559636ab1c4bfdac8408f105bd3e24ab8
SHA17a1b083b89dd4b231846676142b224a8bd602c96
SHA256a73b15c40e054aa264abcda995e988eb9342c8ee0343a9e7af43edc022f92197
SHA51226c5f339dc7207998badd3a00d194af08dea0570733c191845ff359672ac558c823aca24729fb789f4a0bf7cb645f71754aa99a816cbded08026b0406a3e8bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f38d6a78d6c8c466803e69b0f0f988
SHA1982fbe801893c55c96ceaf7966200cf61227c5ce
SHA25627375a9c9deece46becd8bb0c2900afc56fc6115611500abec05e4893dd208e1
SHA512860664e3b26f9f6cbaae557cfab922f2669304093d3795d3e9bd4793d9a626e514e40d6139ff773dc7a7acc2f3e8e56776af32b77eceebf017f5325efb10b091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8e66df86465abe82b4ce22ab971913
SHA100f457125288cdffdef6f08e3297e7251baa5e5b
SHA25636ae22ae52eb224be8d4f47b7e3c0a84ed0b14afe1b3a595adbbd2bd81937581
SHA512f87fa33875e508664d8a593086c7b5e065887eb7c45a1fcba4ba5f96e88d6a2c485c5bdf524fa527b6cb0afc13a0f5842711b0c5514472f102fa0c74fd0b6d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d0aef11d63e5d5da9001aa87d14a888
SHA12e9ec16d8e7d40fb1eccd0eea81c104ed1d41a41
SHA256a5fbc8cd65bcf40840e47262d7524fdbc5745a46d25bdd101824cee9bce9e2c6
SHA512aba4f8761047afa7e4b964453b9333fc322a6547f4ff0c22082ba3cb7d7fb3e559de259f04c698050e5008f3f2ca6bb0c168016a44a043a1b1a2b1ea5c6c220d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf6fee70803d85f7c81289f094fb7ff
SHA10b74c85cd34cb4b8f27b2af33c84fd6052cd5206
SHA25632ca24b4153eae0406a4251d6ddeae0a146f59f6eec80e4d5c154f3c4995fff5
SHA51274a1796cca9719513d7373527082d93d0fac084969700c79babb83dd95d93a4d8642a97aa05b2f90526b11d87a81eb34d64b6ebf9bf677ff68a0810228071f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9d2684ce4141314547d6e43751c3bb
SHA1f93e29eaddf4c548830439539617d24e01a0f8a5
SHA2562536f9cba38600928f1d2d4b79110986b8fc6fb1d10f6a7311824d542d24ba07
SHA5125340ae17d68823b1835d12749e05e6865c749c9f613db6b110eb7bf036fd12f0b2d2d04453c7333b742558a03cf768a31401d945c2d6ca07a5d8e8b05a3179a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f3d401b3c21f8c72c0a670ee95ef04
SHA193da9a502f761f398e088ac60dbc187037489086
SHA25682faedcd6e5880a680a7b3d87e396ed75eff5eca02dca12022a97a0b1ae4766e
SHA5120afb7f0af07391214d3fb32aac4c97834725e2fac55284cb7d567ea47e680e3225f8ac90ef06b36aa5f5ec5d9d0eb985a5b535ee78f88c4d182fe95ebd4f5430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dba515eead393785d9864991603ffd2
SHA1aef45bb8ff05567bc0b45c0cc0e647a4d2119d08
SHA2568611a5e343b1aaf63b4966d3c1e25a6167e11f18e0b6511b9e713bdddb82ed8a
SHA512fd27565e55430ed070c6800fafa28e33218ffda2d6dbd18a13dd6da58c3bbe7ef4f0b7e3d34ce44ff5319d254d417fde6989999befe3e14a24475a6f1d8fc9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c7a1fb0a68f16d75fdc24c41fe2458
SHA10364c125fc43935198bc4d9fa3d1de60aa293c77
SHA256403167d9a60cd6f2b58576add8ffbfade72266073cf2d7ec3fb7abb33e00cc5a
SHA512c00332605af7682970af5b3d013e42f73a0b9856d0f13fa32060deaf2d121d4843e236d8d8d0df71e152e9c0dc1d57dba5e3d41ffcb3e26b8402c0699de75b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7875cf6c7814c1f733a3a58d861acd
SHA156078d61c09937ea7f6b59bd20f02c6d30a7809d
SHA2563d9998b87200007794e71be25f89b91a6550c5a15b8cd4cf932827cd52534a4e
SHA512c366598a6da7ce6dca2ac58c5c7843770aa0be396edd4d92d44f0750b185a8b8556046e51af7252a1b88f9dec2d4641e2d3b2da7e6b10d2ab737ac9a8e770c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523c91a585593cc3899bdbaee16289a0e
SHA1b42e4efee05fe9c3d1df877cab0f98216a6fbfe6
SHA25624b99790fdeab3a14bee820bcbd90df2520c8cea76fe09ab1a0cc88aa77ddcf7
SHA512e1a3b7920a25ded355fab26e8d24ee180801f8c03fac3e0c268af13c4f02e202855d4ed1233207b7ff0bb8ce8e645ba1da28a7a47752dd91de2b235bb3e4abf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5316ad52cdc07bedda87e84f8191dcf78
SHA1fe668a3694614db5686ff1099fc05fe0072bf630
SHA25636141354ef5c035d3f115a3c017292f19962a9d4ff98f400f308bda26f2a3032
SHA512d76a9741e9831f3f4d540dfcf7d8e80c4329bc21f345086fcb6d8942ea5beac0f47add9a305713f94d99711e7eeae86932e551e1ae4464f54d33b69122005713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e30fff7a67853b9a90af99b46d9eb7
SHA1fe315936ca5fa36b098eb3063cb3ae02119c3c50
SHA256dc5423daa9ff8caaa15b56b42a6e07a80f9d8e9d0cd85f7f4a2f90cfa0aa7614
SHA512b324c4f3b2c6873d743af5bee657cababbab72d804426d678113f5c3ecdbd4dbc527b17c025c200a8ae59737349c15b526d12f95961fbc65b56079333b769d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182d3c390539805a86d1fee86adc04b5
SHA153f4b27fe03d1df69a1c4d945b0ea6708692ed6e
SHA2563e28e0d35bcf886c69ead19e3fd1b942a46c24e407b1412a8bceb0929edb1708
SHA512c9542845f389293c2a3c45f3a4b437da5f78cdbec71cc46467feca20089cab1aefca32eb3598388aed8c0b6747a78a8f52df7a6b093cdcd5dcfe07d3492ab888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c94058a644dee09566fec853c54145a
SHA1b91aa69eaadc8c0aae81fe45d0e1e55e6e4568b7
SHA25686a05e05a721cb6cf830708dead887f74b2e5e930760a110cb7a4e29e8ae5f25
SHA5122acc2853d8dc82f40c868a9786dc5cb3e8f891313a11bf0edd4ed56f3d93a9ef97b2c830dc3862ef5a3afca49460c860325326096968c55f744cb3835d8cc57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e016f76874edf3d90e4c24a3a832d64
SHA1cb4de8e262346d9b909f66eddbf6bba3d8e87457
SHA256c68498f5c1c6f8aaa03c5ca07cb39db056af07e91846008f5f7adbcdf51129ee
SHA51217937937dc2c0f8f2f949d27b40f56f695d26e0554e955ceaf88946cd07cba11ab07ac57c0f00cf36510543687ffeec0119070dac2b2f78f12e68a92c582095f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b