Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
d72d2f80b6bb0b0c114899e3d8124ace_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d72d2f80b6bb0b0c114899e3d8124ace_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d72d2f80b6bb0b0c114899e3d8124ace_JaffaCakes118.html
-
Size
23KB
-
MD5
d72d2f80b6bb0b0c114899e3d8124ace
-
SHA1
dfeac21f0186cecc362b3312be3e3ef7f0b8182d
-
SHA256
c9b72d423c395d9e211b3e7f673b1f63bd3720c7c6ba83e668ee0fabaf91c4c2
-
SHA512
ec46ef3f27ad21e24e7dd3df0ee4bd5f83894307ca22f5bc6b6798fbd760c055ef3807945831f6f2314b25e5c12f2a09ce4f8b6152bfa08851c61fcba57f4af0
-
SSDEEP
192:WLZLwKQkUOpBRUOAAUdQ/uQe/TrBlgV46B+r8Pi6blCN5WafW8OhIi0Z9LRIXlC/:f4RUoU2/I8f3o9ZUVEdX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4054be950503db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432081881" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000763db5b9c4c4dd95e17d570600657a1edede9e8afa3ebfced574cac933a44e8b000000000e8000000002000020000000600dc9f6bce4890066d86121f0c6ab431da641f225bbd0722f785ead9c30be1c20000000c4cd6c6eae2f1888afabbf550732f3a863119b89ab541daabec73c6c7d56e3f3400000004dd7aea6ccdd6d979570758fbca54c408f19ef1e5cd61a5023d5af37863904c22b9f8031cdc675ec9a8adb89314646448eca0a70a10dab4a8af3c611f76af994 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C12002A1-6EF8-11EF-9204-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2200 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2200 1916 iexplore.exe 31 PID 1916 wrote to memory of 2200 1916 iexplore.exe 31 PID 1916 wrote to memory of 2200 1916 iexplore.exe 31 PID 1916 wrote to memory of 2200 1916 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d72d2f80b6bb0b0c114899e3d8124ace_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e22fe549f85cba544edf4079ce6014
SHA1129f1992d14739d8a503578ff432ec349d0c0f24
SHA25656e54d22ed6d4c1f6ab481df5f0273c6eae17e5e7243e5bbb98402bf330e5267
SHA512e02dfd43460dca60685f8cef46616cc53f7d3d975f3b87033017e2699ea7ce141884f2d2cf498e92f8c2794c07e657d02542903a368eb9a398373be1075fcd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9387cdbc604889a636558ad4497348
SHA1a415c0ad1a178b9292c9bb5b725f0d3f1d075403
SHA256e0b9db56963d4b687c1d01eb5118dad868dc1f26d35fc1b22454510a80792f88
SHA512c88e15b7cd3fae688d6c08effb97ffab0f6de131f66bfc24d0cdb54a426d3cb895cc347ea1eb4412a293b6e68c2b5a0f8d1653e0fd8ea4c1e1c092ebdd247899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ffe989719dfc5ec7a82e27ed4b83b1
SHA1d6828419a4a844329c3229078516093df811ad9f
SHA256d7b0ada5872c344ed420d435c81d8ec05a44da8a5ec2a2e06b775ef17b29af44
SHA512654670c025e9c3d5db0e9b621137c783eb36cf472df10fc2a349c3b98cefa8f182f817d3356335929de1f9f59fa43d4ae23a63e38dd47b380112bc77ab34128f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ee7237873391fce8bf55d412fe0a37
SHA1ad496b2ae5f4383b8b02ea86ed992459758ef432
SHA256fbe52a4dbe504a04acabbadf8fc4e176c72b3171a32de91b2f193be030ec9474
SHA5128904e5ba64d2ef51bafa087a97bfee3919e4ac4277e97e0bd4cf619ec19a5e972505c59d1da85753d431d3f27177d8a1b4f5272efd953cdb488ef32c6f1a58c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cbb7c214cf4cf87f658be22d1c9db86
SHA1397e0b1d74823d3a1e22359678c1fa42c056e55e
SHA2563987996de4ee0593358ec4f1cdc2fc889e8e35782dd5787166de9cba292b1556
SHA512dfc36fff6babff4200d6fee6a44b93c647c105427877f6b088b761b34766de535f00a309060d6c147a359d14bf089ffc4eb4ae295d58376fd6524c4037058e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a0bdf3dd70d9269f5d4aa84c8aad632
SHA1c88ebb0fd0572f52316e61553f09dc894210cbdf
SHA2560dbe2e4825fee0b56712915b8bef2c6af5077d975166be9029d1ec0777aff66e
SHA512bbacbed1ef4614afdf28583fa34c795358c86483c77feded23c48903a7b479c637115cc2a555d745899026da5647dba04f29b35f9a88b9cb82f52e6514c2d335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867357e938fdc553c55be291d441227a
SHA15657e87feb8b541e40c829043e33ccac288808d5
SHA256322d5bee92756607e2d225330aeb5f36c1ad94d812ae4809569c00afd60d4ffd
SHA512b7dc62899480ceeaa0c188b21c86a23f52b6f5921236cf2f1e803043baee236d043712c1da5611f3504dc7174f8ea1a3644d671330afd56bcf02d0ee5fe2cac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e273d5b622ac5d8d2aac642ea192c1ac
SHA126e213c6091ca367b4b2bf5dd078e5a4e10c4e7c
SHA2568682a915b99b73e954396ae7754282210df7579fad0661c284b123ae5e1328d3
SHA512b3af30d6988167193a508101677821a10437469d126fbe1c5450b3b4928ca6c08299de39f0949c98e9c5a1a5b871a25e49d840333ea3ebc3d866b5ed4f7e79e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e303f2b87feaf18e6259bba36745cb24
SHA113c519924439d2d2999f234b368a1d158edaf9aa
SHA256a16845a9b98d90a1733cdd003ce47d8b20441b30088eecaca6cec16a5e5e5bb7
SHA512ceff4ca13613e0bab08472bcbd2f9fcdde8a32d28e786f059adc5c8261d5d850a766321fd83c0f2d79cb03e5aafa986931ffa444f7e8f02c006c087f1cdf859d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447332f69ba4e6466541199b14f0eb50
SHA1737f56cce1adad87b3a11446cb4a4ea77283495d
SHA2565894a9c708d8a5a64959b3e23af72953a285be2d126aa1e518e2ef3b55dd5af7
SHA5120afc0ac8f9f72a2c1c042241edda5d42e956fd82fd9ef707d4052ef278601d51e4169487ca4bddce8bf77345ef7e748265e20fd6466bc204eb3f28c3c9abc4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbfb7e0430b4091727e564d4a7e9c8dc
SHA11f82c8f5679730e552438499a5aba22e2c19df53
SHA256afafbca728ef72796a8ae6b7f658e12e25090a92d84a63e147419fa617ad109f
SHA5129edc16aca85b834e5c165fbabfe92a5111b65c3bcb59eb83227eedf13dd042328b635c860ccacd1f7f95c5f8d510c6c12a676b81aec0837f66f776f72f4cc157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5785dbb77be1ee7aef7e360561a7cd5fa
SHA1e3d6efabc08126cd7294a797f7c759abfd021e2e
SHA2565d783a8f129dae027ba04f25558c7f3216e79d8f80af3e880e32fd7f389e95a1
SHA512e90aea7b094c96c7b896046d165675dec45c38747df29a5020d144c27b0da5eaa197a133ef93b72a4201fc5da05eaf7f9af7a8b548bca650fff349b11d1f3aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323a5b6923c73e7feee37f09962eb781
SHA124602cc876dae20d0e6a6848e37859df260618ae
SHA256380c8cb013928b56ae7421a64b8268ec1c322be1948e3a3c49f375f06fc21dc2
SHA512479bdb2b45b9ca831efca17b35501a4bee50edf8b8b9821369cac1e79484495f916affdaaed7147c83c145080572f4c3fab024c8ab060ee59a5d54cdfb6d8be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516652d70d0752821d4e9ee9d803b696f
SHA1f33ac3052ba05e6f1b26266964a52141f5d8d2f3
SHA2569f7e4419c01c47ec8cdc79c9c0cd35800d7f5b097bd3e807cb133542067b0f01
SHA51231038f5282a01a4071a3f2402615a2379cb7165f70fcb0a761f4c2a79611e48a58235b023ac22dcbe9d1ef12f02ea0b9db27614c9217f7ddaeda3ec34a80ca97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b9fc9b0905dec3ab40c125e712221c
SHA1e4d8e53f15a2154d7b1042e86f726daf3c803e78
SHA256e4c0b7be27413b4ad06e3fc5c74f36ce1706cedff4514228480c017c9119a3e3
SHA5121333ff2583323634915a14d3a21421a3290e35aa6cc072ba7d8c7f2ef3edbb067aaf8c1933cd14d5c733f512890fc7e793e9d82d09307a98f50276dc2585abaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a8b81956b70035cfe4000a79c18a11
SHA1256edf3c504be4c030336af4c3b399388e2585ff
SHA2562b3dc2e0c6acd1ccfbd6fc3eaed2e91383814c647aa8d6cc904c3aa97f1c1511
SHA512a38c98b42a25ca685db0101be0d82fe4a42fde8f79b5b9e34ff9fb030e9f07669356ebd5d29df54e9e12dc5ed71b2775628e4fa07d3aba6b794c785596b5fa03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f628aa6eb81ccfca0b3af59a5b8cfd
SHA13277912486129fc63f3dcc64d6f5ac4da2fbb9f0
SHA256b514b834b5c67f12b2e0fd97d5017775595b5986f40e313652bb9f2ad9d1e101
SHA5129837f1400de646c3dbea96794f57cf4c7f4e5b356a8bcf4f6b5e43c7f8fede7ac67bdf2cb9b2f5486f60c64c5aded803404ca8da37ef4cd787ba995698e76435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d257f09eab20fcef3fe2da758b6ad7e
SHA15e442117f3c523c137df983c19e42ce3d6ec8b10
SHA2561e2e96215393948d9aa12bc1f42c45923ff50f313cb8297daf50f437e3dfad5f
SHA512bf601f81b5c58c8cd9fb3dbd49daaa3d12b9c732aca0bcbce1b8f5048fbf21c74d692052b2cbaeed65bcfed312317b2920c8ae48d61c55919cec17c67bd758a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9095dc389665a1392028d0f6585d0c
SHA16b234b327bcb072ac733a4f6c8f95e3cdfbcb6b3
SHA256df854b2a2153fa98988df3325a3d1d1f486f5da49f384ff3874e8d453051976c
SHA5121fdd358db51c42192c8d81df242c8902496fc27e4b06894a3ee1108bb3201fe0b85f59c3170b7f3aa4b389be97f644c20f88269ec69bd88d7c331e19a45b9c9e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b