Analysis
-
max time kernel
130s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
d506d0304f8e9e7f9afa581412e2089d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d506d0304f8e9e7f9afa581412e2089d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d506d0304f8e9e7f9afa581412e2089d_JaffaCakes118.html
-
Size
37KB
-
MD5
d506d0304f8e9e7f9afa581412e2089d
-
SHA1
d4d7f7a86548d6f4d3598b036fd83d30d885e8eb
-
SHA256
623a6bb0ec6d064c8982bd58d76fdc15222b583060535241475309c00d813713
-
SHA512
8d2ed94508c65374090ebdc49ba921334cbe22726e6dc313b85bfabecc2cb9f5dae584d63573c5e57033cf2d7d2ddf6f7d66a82324f104d2854cf0c3f3ca4c85
-
SSDEEP
384:gbGAlguo8dKe6ok7hYavsXk+z8EQiTad0lDax0:gbGAl5o66okuXk+z8EQiToKQ0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC41A741-6E1C-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431987466" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09fc1c42902db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000995726f4b55084521aa6e41a71ba92946b1b4765fc8db5c68e5c5afc3961b655000000000e8000000002000020000000eebc782c67f22ad13f6a18b69fed615a2ad6df8ab4dbeddad85ae0f1c4111cb220000000e51c38852c0009196e4547f59468d3727d5af2fbda8a36d8bc8c33e3ee414da940000000ebeb08cf83747e0530f085efcc6cf6e37edf9e45c4474c54e334b82e4bd566c762c4e733ae687b8004fffa56d0da560b91c3ae600f54bd2882bead680e2ef2b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1652 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1652 2204 iexplore.exe 28 PID 2204 wrote to memory of 1652 2204 iexplore.exe 28 PID 2204 wrote to memory of 1652 2204 iexplore.exe 28 PID 2204 wrote to memory of 1652 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d506d0304f8e9e7f9afa581412e2089d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb11878e44714357a9f80a16d2b982f
SHA11a2f9e684a3cf0752afc5147c89860f15fb0daa1
SHA256c2ec632dd58bb504356b514bf6636d4b26c34b64f6cf956c8dd5f0c136ed8451
SHA512bedad4151143f523b9a3e848bdbed4286e3ec014d1886137054113b8c2a56a0bff827ea445788e82dbc1ec9a5a1da794daa3aa1be398e19f204592e2cd07cd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feed843c0b338f70c204babd8f69198d
SHA16b98f1234b79c813630fb2ca63dbf9ddee07c4d0
SHA256716dbf5bb85e26cb544b7ea0a59531a30d3e047eaa0264bb52e7f6592d26ea4c
SHA51224943a5e05393d659bad6d7ef8ccf7844c7be707fe1fd4d13070cdede37380962a969644d18a06d8dd8bf365493c02bc8171dea54a668f4854b03585366af336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41252b796c9a79979ec8e6a9dae7b31
SHA193cf537bbbc5537f32048555de93a78a7929c19a
SHA256adf578ec720f22473d1539c0d0e2c76b8c52642a090806875c3ad437c53b1d32
SHA512928184ac80ad6059fc1c50b8024b072ce079253d3cbb79320a4cb8c0dbad0c0ead5a3592a93dc542f81d29a16114f1c9094c5dfe309c8c91e376508e9a31ff40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5d86369637b99b5d45fb1fcedae60e
SHA1972fc87a712b3c47c71e5c8c4873096a428011ea
SHA256cb387a75171826d38fc960ddb1468f89ad43b6472b061a2ac21d2aa232df18ad
SHA5124c2c5fe01cc2bbdd73f678c1b9b2d0780eb4ed51b6e98bf10eb2985dd2d9408e0e53268e55332ee8c53d2113e0f9650cfbbffdb275b755326311aa13d1e1b690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523cc0fdb73d34c53b0df799a618d4ab3
SHA1e4e4e4a73db7bb1f92902e9c1428f0e30aa14d9a
SHA2569d0fdbdb440066b00157439a6615bd9a8a982a0b1709db905da8b8340b3c5bab
SHA512c5da5fdbe6194519a34c043526bbcd50d197eb252a03d9d930cc1ebb7eb4aab7fe08f077bd5e3befb030171e8e76740ef38788915fefdc750bc6ae4c259b740e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814b9966cdeba8a56e6902d28decdd18
SHA1bcfebd898a0cd35a323bdfbba49bb5d648763a7c
SHA2569b2c2b3afa6ac80a6293e1845ad91fa7cf3c011e2ae32cd41ee193ede0b57474
SHA512306958c785448ba8ad9a93706cde8ee47e699c0bff7718c499b6af5b6f56f0c23610fb0bf427d0caa768e580950d3719cf611a7744ba25269792e52b58e2e745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd5ac4e7e0d071c6995476751c1d467
SHA1896602075c32f2cb336810f1b5f8a0224002fb74
SHA2566dd8681044f55e45d21eff4b6c49f9b618ea33232e6f55acafa2de445c3e0c3f
SHA5122fec993dfc1c942674c987bd6dd203f525948dff58cefd9607bdadaa8bfe5e36c797998bb45fcd7db3db3cc15a6b4b4ddcd1a7a439813daf7cab7e5e3b969746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbdad4dcff0dbff07596905fd8971fbb
SHA1ebf12d21ac565d6c4faa5b36cbef4c42c9bbeccf
SHA2561587f208889d35a046bea055c64e40260b484d70c713c1a5c882fd754a3636b6
SHA512ede1484739b55d1450cd1cb26dee495e5ea39844b0cf5243f1e6486703285fbfac8270256d957689899d4ae3f42ba86c26c15b14d929b14cc21ce2fa4c5ef9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747885210e263c9d5a0fa1818f21a70c
SHA19a19878880d1ce561b46246f2ece1895bca1f89d
SHA2565f7dcc5d98ce808dcb9eacbe6e0d2d2e792f5b9f99dd558892e9e8556832a92d
SHA512987a955b8e731c34f55d30a615f1d59796e9ecd986c7afb9c0a68f7558e1c0c9812189db446986ce8f7b9a7f77dc9d5ac111b47d00b4511d896a28e08bb06f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015b61a132c73b9148c29f9caf8001da
SHA1f11596d07c81311cf067cbacd4c17990e9cb882f
SHA256176783d40d798934d416c5ec3b153bae95a5586cb38d6eb3547fe673648fd413
SHA512194a296aa0035251452faf41eb826b2436e34d1a8aeb301483ae1dcea96249921133cec0b271865ba856fe091fbe2161e207d5ce083ba02cf02eb9ef6d7ff82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ed373cf07a6dccc46935f526e37444
SHA17af7411534cb67fcda0eb79bae591f1f1bf27f3a
SHA2569e26bfccbe3fba156963058ad0284bd20e3750fdda902a181a912eb11384366a
SHA512fd3d00fa206416d442f7977c866c51f0bb2ad3937b7d2345b850e82b8aff29888d0098f2579067cc8a5cd984e385d62493afe6f0a49e2abc0f46768e886eb2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b17c8c5ad34975dba7b2a00fd10511fe
SHA1a0e4832dc9f5a4ed64d7ac5d3ef1f67555b34f8e
SHA25620b314a648171cd2741e4271a8882e94ea0276570068857ee5bbacee0b99d9ed
SHA51287ff1f31624f781372552af6ddccca51b4bedb0774f275b1fe7921241f67850a9931abeed9dd83f3e09af815b79186586ed6324948765a29ef9fb8715ea6e513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee74e558c4c11aa3396045b7f7f5d596
SHA1401c6bc4b1932a933ac80df32363c11eaeeb21ca
SHA2563ee1dbcd7d67d6385b9286ae8a7ddcf5f7fba376b90385c4dd3848abacbf2ad1
SHA512eeb2d445c6a2b903022336400c42c282ba239bfe0a035a6f2c6bd028c013b39956ad90d0da46014e339b5d7fc9fd886466faed2bd6c28d90c49a2b578abf88c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd23f2ba3e1383a2edfbff9e0cf1e56
SHA1859f5203bdf287d089115a8afb32ec85e901e28e
SHA25697ba7fd653cd4b4058b18f2e514f7c5df4c94c8afa0a84272d5627b9e4914af3
SHA5126687545b7c97400fb479c7b0d9c08947641e60cf59a4a2b723389724fc6ffad4294897a4dddbe6ae5ac3b26ee6febb69d301e2e04594662cb1b7e4e171b944b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add3cd54cdbb76900bac3872b1720119
SHA13f5f53b926131d7d726eca484f83f837b9088204
SHA256f24f12589d20d0313b1b13b8e700e7832c4d781d3c81c4ab2884cbc3146dcb42
SHA51237f9a54e08d1389b94dc7ae796e1513b6d9f492639bafed06245132b9e17542f0e8f54737de51dfb72d2e92974f402b39e356d4f368dd2dd784e547b4805e92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3407d110e9867ced97fa3ac2980fd0
SHA1f57aa0c71d386aade81f5842dc504066228258ce
SHA25696f5d8924ffa75957d04d5c554a41408f5ee557a4eb9e52c877504651b168562
SHA5129cb97437d11ed7118b7d0b77f06600be60e0c3ccc29c78781d8c3089d2807d9ff371a05ef51adeaec7c2b1015a54aa6d5302fcc263f0d30350adacdcc320b0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6157325a0318230e37a27ac1de5fc2f
SHA1882eafc78b54a68d407077a48179d8d3cb67abdb
SHA256891ff3c1399a4dd3e08b6e5cffbbdfc13e124a68b9d5242d6a02f44714d8fe39
SHA5129de0e1a1cad36ff8bf5eb3129370039488ad3d05a265cc15c5663d6eb0d5bbc7174a4b81268df4ba27dc7bba612e5f370bfd279f6295a15ae7be0ad60145f009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4eab55e0b2d1df81b1fa95e7758ec85
SHA16b9b537c22a3bf421d5402f72afdb4b444a067be
SHA256859924e4801dc7198d5480e0c85b8d8d37ad89a7314ced3c2b3d64f293214cf3
SHA5124b633040f3ee59fb42bccef3b79eb9b35df2ed4b3ae8095946a0edb69ffc1edf17a8b2967e322f8616380edc73cde5b01b5a89e65b3597ce35108f5c06d28fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2ee14094ca3fe86948a084409f093d
SHA10cb345b8766cef19a829217eebfde61e319d01b7
SHA256347369628de026a2cdd26989e5d1a90fa4f8079648d8450c629c9c4e8118170d
SHA512a38ec10dd10542217a5d1fdf6c1f3e74a0f0847ae93f191100202f415eefcbd12abe7c4a5163dd0573d07661c562492894d45ead0f9d21333be01a34d64f0dc1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b