Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
d5071d9dbd7c51f6abafa03bc8b36450_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5071d9dbd7c51f6abafa03bc8b36450_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5071d9dbd7c51f6abafa03bc8b36450_JaffaCakes118.html
-
Size
5KB
-
MD5
d5071d9dbd7c51f6abafa03bc8b36450
-
SHA1
3a834a58d4079b14fb271540b1be8f3361882ac6
-
SHA256
276410d2c76d18fedf29b98b976bef39e24f5d593d9cbdc4c4a0b916aa088408
-
SHA512
efdeb05f1953648094fff86efa53620f66f19cfd17d756b4a81001ab10d7e14d1355f007c60f212ca379d8d91275ec58dd237efef319be9482582949f3cfc5a6
-
SSDEEP
96:053ew6OQpOf/OoFS1vPkFn82TwOF5Lz6WnSwpEWFzS8Q9:YeOQpOf2HM82TJLLEu2T9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431987517" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80062bfa2902db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A05CD11-6E1D-11EF-B36A-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000004b4a60df86391aadaa1df90a72d3750da0108433e909bf9eb19caf2e1a318720000000000e80000000020000200000008320795c476d59a90a6eda8f481149b58011981ffb71b3a0daf85d2483135fdf2000000076b32c66b0c7800c63fbbd1d53881745ca57ea235161c928dbbfafcb50f05af4400000008e07102112fb1e07eab3131aa470fa254d122ee657e72fbae0ce867fa903fe27878a9acc345648f08927e531d66be46af6caf2f27dc1ddb8b87c40767976c08b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2276 1732 iexplore.exe 30 PID 1732 wrote to memory of 2276 1732 iexplore.exe 30 PID 1732 wrote to memory of 2276 1732 iexplore.exe 30 PID 1732 wrote to memory of 2276 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5071d9dbd7c51f6abafa03bc8b36450_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501436e615023a7a8aa6584cea9b93230
SHA1d421095e31af69a993453529691a09737647fd11
SHA256ad8a54d604d2eced957a764a92f461d022362f32cbbb2f63b2c15fdbee2c6b23
SHA5124ffdab7d4b3487e80b645155a7dfe15c09190e2515b81964431521e3b753e08d81f4dac0451fd3a5e6ae1bd3d2432c454fe9d17afb1e43d31eeb5936378454e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57b37ade96ce82792ca32e52b74eeed
SHA1a82b53bb7ef9455e0af97eb4b48187ee8f1a1bfd
SHA2564ac86911cd140a045d433ec4b212820b586a0bc0b78508bbed33e5887577bf11
SHA512585375f29c67490c1ee0a3554f340339383043d325bf01ed97a132d447609d748b232fe083e4e5043e648870b051c6cadc105a6fe6b072d78700de07a3dfceee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c305783b7ec88d05ce4e047c5150d56b
SHA1ed7080d8487c83741d498c355958d40351e6a278
SHA256b325ee16df667ce19351f0c4829cf795f9eb44b2dfa851284d6da78f0ad0e0e8
SHA51236e4ea9409eeb07b6de1a5ec08d914d19109c6f762efd846ccebdb80fc6f4ddc3ca334a1f606e3b6df2ad8bddfa6b3fe2cf5bfc67475d2b893a00729b847d466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcffef80a5c2cd5457a9e3355f0db845
SHA149930185fc453c54b374e4f0533bdcfcfe9e1d68
SHA2563949add331d2a65e894e87635581cc4b0bf21ce2381d61d2cd223b705e4d5fcd
SHA51271f7efa766640c9fd7ae2beacffffb9779f3fe2d7c529a1c42e97b9ad8ed00e660aca8626a81a68066e22fab04e8d7a32a2598d82052a8f24236509c5f5b4c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c37718ef759f0b09963dea1cbd366b6d
SHA178f339e2116baae78bb8311f7636b5218667c28d
SHA256ca3b6075576227033327106ca3a092dd97fb9374444f817400bf9a4aae0220cc
SHA5127022e32739558c058b1ba0a0ebcb977d35f7db0499b75883f8db3c98433ae0c19cc5e5bba930be8458fddc84cd1a1efd10c9c9d2a224dbc28c9bbef42e4e0e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0ce47997dcbc0aa8faa7043ee38a3a
SHA1451206f1502c5f2c65a85aec4cd913b94c83fa63
SHA256bddf1fa77b47f9ad8f7e158dafce5a5562d2362680e7e319c7f7e63d9045c4c3
SHA512762351972a2a0d04977f9e673f05c0304cbc9e9f30cb96387ba05d8407edc2a881f8f5b051c9518f4d7cd4d9500e027d336bc8b7e24ab37ba0744e53c36e5a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eac4f3051592f8193e98c03dbbca7ad
SHA168d4188ea46d7b9ce8153fe41356515b2a2eb438
SHA2564f10b067ace1caf4a8b1e293b6c45ae21e664b180b893bd53d38ffc3312dee94
SHA512731e5db5f56cf97a11c4feef3899d1b7aad7b36b0da4eb92c4c9bcadcacfa3f50b51677706a395468617fdcf5c3ee0e481d84cf41ce23c9f13cdb65a3a881c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa207d39ba9ae735d8e1665ac1f5f22f
SHA129f818eda4c8bdb9119d5cc5b0756e2fcb8017ab
SHA2562aa0b2b17bd853fecd5c549cf110c14de068a8a38abc92a7edc1c832e05bd016
SHA512cf318c98148fb2f826306b15dadd0a77c9b3e8edc339ebc599593892810e5714dbf97d5d6d404f78a4d88e76c9ca0a3d83f5f15a9a81a7cfc68974424f57aea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5382166c04329b3d0b8fcb1ca0696e5
SHA1fc565c0e31c6926eb8da94ad6427bf23a30df287
SHA25627ec7d9bc584c9a62637620141516aa991087f9a0c5fd934882cdae873f3b779
SHA51239159070eaff53a3f427dcf87ee8d4900e1d93fa62d859a262f514ff4296b44d06859bbb544525253484c3f887f44b4d254cc1e7e9d07bdc8de77a3271b2be51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace804f3ee7560fc629d78dddf3ccf9c
SHA17c9b613b85d64d9e5b14f48c0cd4724372755388
SHA25674a0e32cd7ac641dfaff7f40836b5a2ad076a25ef76ebbf645605d0e4c388a0b
SHA51226c86efc0abaf1ee5fe995b86265ad074d65a378e8db030c8eba4bc104235f0ad6bc346ceb74bdd15dfe2991d1c822328ecf1a6ee51bfbf3c1827952d26b7023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb097bf323e9a3ba17926801d6c9b96
SHA1647779c084e3239208b6195c7d9911f0a45b2a70
SHA256a2dceef90c19deffaf305a87f9d85263f976147e5274098fe0565e40cc3e2960
SHA512b9c429cf518bf4dc0382a32b00dcbac3281de36a4efe5e8fd7a6ca5b058782f9406e77c4e85d03a590977718a2069df56b7f28c2072a60f38d5e3965a94b032d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb34cd7e1e3a03d5b2d1d1467d8ccd0
SHA164cf0f471ca57c5f021bf1ce88723a1716599be1
SHA2561c2b216d80b32dee6498c96aefdab637b7c6c36758319feb7760f36f789376c3
SHA5129cd7cf71410dc80cec4400328f23cc9ddaea97aeb72fbb94a414c1dafdd60a62299f379558a86c7265038f1f07314acc9270f5d835f62794d836fc7f5503e5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5696107566baa4e1c77a6ecac47f6fe56
SHA111bb9f7605c753b8e593676904348bf67bf5b04d
SHA256f39c4464b71e7a2799baadb30ebed33269ad0faa3da4eea1249575a5c94e66f4
SHA5122870776c2308059618d76e0ff6c9633d00383629d3367ccd4b28524a838289c1428fe1a3c5e0079f7a0d4b00087d0c855c979a36ab862338c844ff183a47798b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabc4812857f48419d5e53adc374393e
SHA16e1189550b8f8f6801fa35636303e035d633c58a
SHA2567cb3a1d9e563691b0f0b4ab1892979773780f523a7bba550e2f3128bfa804af3
SHA512e30500d6afa47ba590bdebc1a4d544f59d4e92fe4023fc01cfea02ee0cc5df0330ecb7bf10ebd26c7880c55e6bf8c063140633bd394135c15b55106783208300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96ad89f71a9d33c9faf00718c0dd191
SHA17ff6eb7284c38353d5d0593b557bed3fdc9e22b4
SHA2562542637f7850cdbf4e627f6f99d6aa21ec0aba827a230973a7d37b3390f7b291
SHA5121e291918e3a9be500d696008611b564b40cb98c2773633e3ae21b424db53bc889d30373d2083b110d11839297802396e63ead3f17f1d3337936a2b70f4c17107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b517b267949b42ed5f0e3b9ab35cdc30
SHA1175ef5363f313249b922e6dff3f4a1a0a89e8af4
SHA2562b4c9f2954ba3e14b18224ba57a3b1f9592db9080536281d3f5d6460d1bcbc39
SHA5129dd5be60f9a00e837f03d0dcfd78b2539196fc856f48fa5aeadf0f4979fc9e08a4f6bb651f6ec0364295119af6c24a710751fc5d7317989a83a9883eaede8577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b42f8e601eed5fa7ea6910e3130a975
SHA1016b2e63e35eae453eb0a754726149984edb2617
SHA25647cb7f09283ed0afb70022509e0692ad8f0a341f2e6a6958461a421769ea4e3f
SHA512346097b94b9a91cf5d5f0d5e4203073e00278eca205fedc66a71faa1e14e24169bbfccad27e5baa044d2d80e80b39d019e4a1023fb1854563f9d80c2f8e113fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9733f86a04422233e42c57e7d2fd9a
SHA12e578ba8536ad57195639ce669e82a532345f222
SHA256d8f094e871c464bb926fd00ce82a7a033024688f845d5d91ed23d80dfaafec59
SHA5122578eec044cb4330bfab0d89243171973c0a3eb5665a97968bd0ca504523ff05d744972af2ba7da4207991c62f466d10d633bf7931178deedc10ee3fdc00aa1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bafa50952d2b489c3d6d39a6e3ddb50
SHA1761708fc7945f1a1baeabe7b7b8a4ce9e2832352
SHA2560859af0726cecb79f549b1614e2f2a6c272cc7d8d6134dd36b9b14c964b04df7
SHA512a1ee750169f17640cbdb9a6fdedcc2ebfdbce1588ae90a1904e9dbc7a3e51b004b2b032d7a1ad914ecdc5b3ba778667178d8d5a4e71b36699624487e1b2ecf89
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b