Analysis
-
max time kernel
136s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
d50a1ad646150cc4880999e0af18853c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d50a1ad646150cc4880999e0af18853c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d50a1ad646150cc4880999e0af18853c_JaffaCakes118.html
-
Size
68KB
-
MD5
d50a1ad646150cc4880999e0af18853c
-
SHA1
aa9425fa12c41322e6e9c2b63a9927e0e28725c3
-
SHA256
278d24e2bc7be5c9626432074c2d60fd863f3ad6bc33a06ce6eaab5e6f040089
-
SHA512
5c1e0d3e14fb5acd73ab46d0da8d236180d1bc2721c9783b3aae635284fda894143f90a0aacfa7f77b150bbf4a9efa454272d21fbfe22075f101b64ca4db7f31
-
SSDEEP
768:Ji3gcMiR3sI2PDDnX0g6BkI1xhGRoOoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JFDKxhGRo/TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431988605" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e78e6d2c02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92807B71-6E1F-11EF-AE26-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a4989a5f1bfadf642bfdd31fe71cd410e8c8227a541fd56af5003f2eec551f8b000000000e8000000002000020000000da71d8c98dcc1a128a12b4ded02a96bf49180f4a97e69985180fd55b5aa5a818200000007fcf4bc4e903779397d7630a5fefa31446174de393ee8f8fc1080b94bbee1cf640000000cea2908c5dba20719225642d6af01f3a232ccdcce75d75bc79be1052b069061e2942e9547a26558e4f4e1240e49d14ea54c6c0d54953061d0799b39e7c80bd70 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1804 2372 iexplore.exe 30 PID 2372 wrote to memory of 1804 2372 iexplore.exe 30 PID 2372 wrote to memory of 1804 2372 iexplore.exe 30 PID 2372 wrote to memory of 1804 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d50a1ad646150cc4880999e0af18853c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b1cb8a72b64fe57a7a4441625ac74f
SHA1ccd5e1a4c04855053aad08e0b05b807e81ace1e0
SHA256583dd0312c64cfe0c812acb802f16eed58f64dba2df460441f8601e387c62447
SHA51284d6bbf11acb4e3dec92e4c83cf1e406073a595766da219ef2ffe9a3cdf2db6b7075c837de9f7c90761f498ee9fb96c6d291fc2bd8640fccbb154c5a1c391825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4152dfd788a1f0aa9763b9a0c0bf4d7
SHA1063f83253b1a044fa040f76daf0ba5f44429930d
SHA2563942dc04d3b1072ecdbe220ada653f1a9e271bfd2f17592456a89dcc5fad2d0e
SHA512a2c4dbe41ae957613c278432294b424ffe19fa0cb9d9a9bb27dd81b4c8e249c4b9efd2dae32a4623be5ce3f00faaf780bffe75292ec804bfe362f24b09805964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2bc82c7a6cb5545bbe623b1d53894ac
SHA18b1162e395d80dc05bed24fea369474630d7921b
SHA25699b4cdd84aab777f1a2029a87a6393850629cdb7a6612c66fbb994d3b5fdbfb4
SHA512061c20bff99146c0faade37e58443cef8de009a45f9195cc5eadffe32fbf9997ecc25bbf382c5d4ce4924e9d2147c7a8db9e04958ea119036978d7f8de1acbcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb730c071f0d258e3a75d01a647cafc
SHA1f513f5fdb086f60bb2c9a923327ac4f9211d97d2
SHA256428e14ca606e864e048911ab78e6317dd0dcba0fe1d0433a4c90b5e575e87b51
SHA512e9f39d3c59af57b1c9945781ba42b9f5a28c11fb038352433e3a5c3211614807bf8d4bb495ddf41b2db2b4f2772d5746590c680f0fdd5eb516873dfad78e1171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5613c12b04c5b062f26d3e49a79844a12
SHA1a4066961ee76630aed095b9f4a4452882fd67950
SHA2560683e4caf7e8ad293b1e1b0e7dda160a26ba554e2f36d6dbc0efabb739aa8d46
SHA512e0e8f49a6624f273ab1ac7d266ddad5fd0629663f303d300d0c6708b32d3807729e42e75cff5b96d993104d62233123dffbb3a94bd040293c5894c5d6f4d2704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a369f9f49658eca6cc3ccd12b0b677
SHA1301266b093f04dc7eae867baf23e5ac9077003d4
SHA256c915ce4fdf7d86481f4c07a1226d8e55a3e914db4f69dabb75909bc47f775367
SHA512b41ced1b3271680666a3e9d688b1792b46798cca612c67e347f9fccea5d280ef9fd0d56ebfcccea5a240c55c4195a4090e685b0d18446b693302b5de5451441b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f215d87903f7df38459edd20114a18eb
SHA1faec56c8883a2262b04b21ecd17e222768e4a397
SHA256ba01207f4fa3f58775159e40a84e714b9202e399d288591710ffe83c61d8bf24
SHA5125f1fe2e2f04f03890951843f8f105058eb309d4bbbea5e484e8dd6ac8db76c4c4da77a65c098c5407be6bc48149fd6eec3f00ef06a07eec021ad8e49fc20b27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ce8c0707e1111016ec6ac2aba4a005
SHA1861938e0645e4c2015564fe303110b62405d256f
SHA2562f1e9ab858375a7bb456e9896b7f6398e3985e9bdf44d77d08cd8969ca431dfb
SHA5121d9466b389fd4b4092bf3a7ab68916b115d5035fa2a3aa30a77264b7793a521baec5f87bbe6abb0d52d6666bd78e036f7539d28b109faebbdc011e271d1be80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de578457ea85faea437e2139ab639d38
SHA15f50e732707d3d022b8eb7439c5b1bfd9524eef0
SHA256cb869f28d4cc9392e149237c0f14f81012b14780512235d165eac2bee4d3e423
SHA512824d049ee6157970eec83473edf12b03d85ecaefe3e2ceaf6410659c2bc26c1a4ddf1f1e0fad420cc60955315fa523aef5b35f64d22992bc7addd4864636c596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb58d6d6e6dc946556596edebee77e3
SHA1a6b7bee3c336ed9bf070287bb633adeabe0e93fe
SHA2565b7b24af3184445d0b8d5c590717ffe6a37644c429ca6ad6a1e70c9a1a94aaba
SHA51246c99e0dc5e6506edf30eae1bd9888f2b42532c3681ddc7e1a5cb3070b7ed4e202a53ae94c166c5e4f2f8da0f1bba79e61f785fc5ab0a437aa729511e02a046f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e921c69d010ea1987400f911ccaf7e58
SHA1e4e0cdecb07305f47689c2634b0a019130dc7af2
SHA256d3812a9d0ffb495492a722151e84dd4eb51463356884783c2cf22ef5a17702e1
SHA512c88774640d7c0b90176283bd0e611a595c47e4af0c37034b2d61ffc13fa1054760fdfe760376ffad68455842e507bf7279b9810c9986ccabeb33377bef393fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c20dff205d8f7671f8b32e5c1f8517b
SHA12c510419fc74801bac992e9d6855b386ae038c0a
SHA2568bf5c45dd05d91b351d61cc8f3a36d306cb9388ee55446827643fccfd18b292f
SHA5125432272287c271a9ea6377e0d22ec9f62697ef8f76e8168ee131b76935ef5752f242c01f484ba5c376e2074cb5449fc5020299a7008db05604e7e857ca0000c8
-
Filesize
99B
MD5a8a28fb0a81216d4fb96d638d2716346
SHA129c9e05c96f1c85ba44d64428c48ed6fd81c1c63
SHA256ede3a4dd2a03d7f53f97fbf56a48ade90ae44bfd332738d217b83ba6fc410c32
SHA51272000b96e636317c03733bfa1b07aaecf6668a155208101b5684bcc60ea2ea8e859e39cd7531cd106c3e65a7514ac219920898d6b77ca6d5b2dd2164c8bc8185
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\styles__ltr[1].css
Filesize55KB
MD54adccf70587477c74e2fcd636e4ec895
SHA1af63034901c98e2d93faa7737f9c8f52e302d88b
SHA2560e04cd9eec042868e190cbdabf2f8f0c7172dcc54ab87eb616eca14258307b4d
SHA512d3f071c0a0aa7f2d3b8e584c67d4a1adf1a9a99595cffc204bf43b99f5b19c4b98cec8b31e65a46c01509fc7af8787bd7839299a683d028e388fdc4ded678cb3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZOGPI1N2\recaptcha__en[1].js
Filesize537KB
MD5c7be68088b0a823f1a4c1f77c702d1b4
SHA105d42d754afd21681c0e815799b88fbe1fbabf4e
SHA2564943e91f7f53318d481ca07297395abbc52541c2be55d7276ecda152cd7ad9c3
SHA512cb76505845e7fc0988ade0598e6ea80636713e20209e1260ee4413423b45235f57cb0a33fca7baf223e829835cb76a52244c3197e4c0c166dad9b946b9285222
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b