Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
d511ba3528c5c9a3b58bf72102febe54_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d511ba3528c5c9a3b58bf72102febe54_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d511ba3528c5c9a3b58bf72102febe54_JaffaCakes118.html
-
Size
53KB
-
MD5
d511ba3528c5c9a3b58bf72102febe54
-
SHA1
862fef4d59a8932298a064cd2697f1bdce4d4e7a
-
SHA256
c259d5c25c8379cc2369b33a992ede49c4f53a203de104ff44cd274c80e843d3
-
SHA512
83417518d513e070329456e89265a6550fb2123696fb691a325e0a33d54c2871fe670afc73918f52817220d4fcc5cb3948050050bcf5100f21e2063c55f4d4f7
-
SSDEEP
1536:CkgUiIakTqGivi+PyUorunlY463Nj+q5Vy0R0w2AzTICbbXoh/t9M/dNwIUTDmDE:CkgUiIakTqGivi+PyUorunlY463Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431990153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000db89daabe1ca85599a0e9652ec8b08c591afa6d7a8a6363965a214d45b9f2933000000000e80000000020000200000005ac4b614b5260473c20e37ab156ec35645e6674e5bfd0fce439334512989c27f20000000ab6acc1c85b66730fcf36da7fb391f0cf62dd4a3629d099f44cae7f08857f909400000006693698c1b7486039c32aae1b28046b8ebe038831157a61fbf01f0de21d7c5ce8e1836d4f3358f6217f16209541300d14348d3319018dc1f3efa455fe58f5ebe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DD12A41-6E23-11EF-925C-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408961073002db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a8875dcb66415847cd4a481486e012a0e95456a9165e8efbbdb29b66e1450a17000000000e8000000002000020000000ca92129bb15947e7cc141d7d2540d2dda7c963547701057f6d35ae82b187a7f490000000094b48a43ff1b8062ff0fb2a40e568f08a3130464dc7f2716055c39dc7aee619afaa35fc5fb45bfb30e80315127393c4395286e50f29a569c0f939fd6b836074d6bb0ebaf6a0cc72bcc72a9cba97b4dcc58d36ccad2d4a48e3d51cc4293dfeff4dec320d44f6a1e7bc6a5a54593e76e1b1c271b5571e8052af0d2869322aeeea8a1489d56ba0f675f99a06a3be35bcd440000000a7d782acd148bfaf4a074831b84c0f55f7308bb7775adf4dcfbbb6d9f6f20435e0bb35198e0d60dfed9324b1605235990e4dd505e443d012bbb07e3cc60ab241 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2524 2736 iexplore.exe 28 PID 2736 wrote to memory of 2524 2736 iexplore.exe 28 PID 2736 wrote to memory of 2524 2736 iexplore.exe 28 PID 2736 wrote to memory of 2524 2736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d511ba3528c5c9a3b58bf72102febe54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d7e0928408878a30d379157df6382c
SHA1f51169b1dc7733febc36d338c7fe34ae473b38f6
SHA25614584d59f211d285921931ce81b6c1025e4f7cee20bcb56f2d8fd1dcddc98d36
SHA5123f4e86ca438b4750ea18da504eae29eb34120f0dc3427a54b2246499fb101af983c2b9da23fffd49a10f73e45d5b8f3f30ca57a4afcea2b33e3c8801afa52795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d7f5f4ebd998a008ecfe64930ad0cb
SHA188dc212a7632004a5559f41658ceba72e51e411d
SHA256a6abca851f79cbdd58a8199fe158f8bba5c9978d3d99751d711e2db62d23cb41
SHA512b70d0b24b61be5a1823a311072f3c98f05e10dc3725aae3dcde93ae182642f6ebbdb2421f57041f1db837c4607cf94aa5bff2c029cfee9a9cd4b949991499708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b4f8fc0489490333c858d6ae3b0672
SHA1b7948119d3f6136181e6d7dba71ead826e840c57
SHA2562742cf4146f0ebdd840240b9b1d361d005eb645b54cf42d92bdaca691b972f89
SHA512e8a90eb4a53499abefa96e175c70e2825fc1bceb6f16863f779d9cc90d69b10c3eaa3071160e9c9e3b9641576694684edd4b5c2b7b871d2a2b6a9d4bd4711fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c966bc8b7ad52632d2cf1f9fdb0f3e1
SHA1aee5d1cfe21abd2eb60e9befc87664c5b0014f5c
SHA2565e5454919132bc7778aabf93bc3d830d1f3eafcb5a8bc204c1869fc3bfbd8de5
SHA51279d972246ee83409a8af5bc84e5718964c2a10681a318cf0d78eae1f7f52e4cf8ac95b22b8f7e93140f064e57789f29c36f82bcce85e49484e72b3710bfc76a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a33c7be771ff9622b02410f13fc207
SHA1b719f00a3001cc5f80bac3a6d0c4faebc40a0b8c
SHA2564381dc583093a49e86752d53566ff75be9e913b96cf39b45f4a77f96077f2306
SHA5128a84414cbc8180c14164156c63e430b7b728d11b9f5a1546283a544fff764544b22a3d517631fcde1d161c1a6ddc66bdfac0c3a27d72e4b1efc1d269c5fa5d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd5f1bd69ef9a95536b1178235ba82a
SHA1bcc2d6610b402c405600f54488e0c691d545ebdb
SHA25657feb203a7f6dda508dc5739b5c5cf9c8810c749bc049ad5e787622281d29a75
SHA512cb503d77703c3286212db91eb1540683bdad25f2fc1ebd2c5e5862e5104767773fe4d2617dfba7040ea802237720c9d9dc91d093c5ffab6e26b071821c7d27b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80232c45f793e232dd38a2d23a6aa59
SHA1ce6bb08d8fc59445ba9feca628762444094a82c7
SHA256971c5665d81e1af555db31aafc3c47211865d2135785e7ac6205bb384dcd82ae
SHA5121de72f3b77bba5ec6eb3b85f260f9db5a9a6db3c909e9a38408119fc191c52483f8bd1664a6f30a0170bcaf387d52a88a8cfcd62bbf3df4a4c59bf9bd89042f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4c6cc5f16aadf4a0738062ec14975b
SHA1f521df5272ce6834dfd7c4b80e60bf1e38f06727
SHA256fac362664466533525699bc280ae4b168a996e915ca4b20d571451c2a7b58da2
SHA5129f1c5cdcca210f965fb9d990950e32a84a91a5c5d21bc3518181d48ea105721ebac9e780ef63eb79c7c5727cb9921ae68bc43bf70b2178cc581c6923d2c31251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea29efff9b1231fe31fd2526b0926f3
SHA1af067e2c7763ff8b58e414b74e87104e4956c75e
SHA2566619e7e7b33116154d3b8b6920aee8b74d6b4b9aef13d68bad7a81889acc66b2
SHA512cbf5f720207e024edaa6b3378912f6a66026364df4793afaf130c3f5978a7d37992e891c206e83af8e10c9bdd91bff98bde0cce4a2936f0eb85129b62374bb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7d850399afb41011897342764c8854
SHA10c1f4b5bb6ebef7abecfab737f635a25d489e67f
SHA256be77668745fc3517ca95ebcfd9e8674f840fa2a8e1ad12ba8f404210a7aa2e91
SHA512c58e53f9415e20447a1755aaaa6ff77f26b88d082e4947d2609d64a174e33e64fb445f3cefb25d4bf7f5ece948819127c20aa236069ce377043b0a4b62d0282a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d07e16e00414bd08de5b1aca4e0e62
SHA1a7416928cdb3859fb7433ce4701fb2d683712b63
SHA256882c4791f3c47bbde851591c161db4715194d14d14775eddf5639b8206dfa5be
SHA512d9c4240c0c9a9f063137aafeea25f7e781bced91fd3f582eb553f025ec92d9660ef3715350c443cd3ee64f08fcfffd1ce557b8d0124bafee331a16d80c463dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df9d02f4d3547205b6b14de4e24574e
SHA1533c713f3490fad4ddddd2d7fdd727646253b55e
SHA2564bac424dc48ac71743476f5f58bed1e1a8b772aafa37b113c01dc2680d919c05
SHA512e4f89ee5d9b27dc84a2277c20cf51593ad9d19eaab8633e375faddf585450abdf18e6905c9d062b76015fc7fd2a4e5e4eeb43ab041d65834e1c99b032b73fd35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e50f8c552fcd2b8a6a7d036ac90619e
SHA11f2f329315386102f3f4bc5b68853ef12a30d174
SHA2564ece27e563e7c3a5b97dc250f51ead0f210dc8f3de20d104a3218419b690b712
SHA512b4d00ea7ad797a91658b9085f76cb0364589986ed30e615fc7d3847d021ad10adcaee24dc1f4c8fff93b7b58c74ef77c54e7d0cc929d68a72a09099fa81f6bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d78f4367b8333eab6207047af3b5854
SHA15fd145bf06f54f412ee2bfcbc7d8749658df642b
SHA256f9fd566c783b48b6017a2ea4eb8700ff0a0d76f64a564c38821ac971b12102cf
SHA51289e2c3c622b37b893db1b0179df8065eb5c614f13f3adaf8424b63ac27aae93876859cca279265a1a3731fe3a3c16a851a441645b6f0b78984d9e1e469cb119d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512b5310e47a22f84bc8419f251f538a
SHA15cab8c193bb5998aed6f0fa03c97c9e7ad65c530
SHA256008de864c2289b463eff600f0d26f7ae42a46b775fcce2ac576eb6a092860c92
SHA512b6b607041977a7c84a312f75e1539acc0bb80fcaa3a029200f473adb531767082fc520afde86a81138b8d178dce70e89037e8a89cc56a360eae9f853f76d7464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9008deb97a9de93d3b82b1f433bc0a8
SHA159be923a50535d4a0c38e8ff7b3e59dd2bb39bec
SHA256c06d6b0cd8137017b875c915043af6464eda3468a187bfaabf4fd30680cc539b
SHA512f47698ccc99b24aa7256c1ed38d935a819710d33536bd7e1c564def32257ff5d759f7f0d10941b5e4874aa1b0ce094eb4ffd312e6e9440d01ed5366a2aded456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f40bc30a640edacbf5bb6c8d803d65
SHA190bc4fef4d1a9bcf8576b3a5abc39c9785937ae7
SHA256fd6bdbf192505ecd86b9cff563ee83fbd7da478d2413478a75bede9f865a4f4f
SHA5121bed40e137b5515b80cce6ec534515d5a4d4de7564838493d8d71ee015097720c48af89375ac73a981db15671fb80f28389035decca64268405d039267857ac2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b