Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
d730b902a5892749fc59dd2d7684f123_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d730b902a5892749fc59dd2d7684f123_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d730b902a5892749fc59dd2d7684f123_JaffaCakes118.html
-
Size
6KB
-
MD5
d730b902a5892749fc59dd2d7684f123
-
SHA1
64633e17a2e72a1e910291f3427b980acc365540
-
SHA256
5a42ceaa9f41380a37262aca3a47fd3fd5d3146ea45dea5ff5768442cae14829
-
SHA512
d0087b6787a2ea699f517cb1bba54078062623ecafd655bf097926423f0516b35b3a98c83a4a2b86da80fad0bde72a5897e1f80b681f0c7279f4cea76997f279
-
SSDEEP
96:uzVs+ux7THLLY1k9o84d12ef7CSTUIKcEZ7ru7f:csz7THAYS/kb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432082642" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000aa893fed4fe00be7a497d2c77aa721fd94a02fc1f80f5abaa0d06844fa1ae055000000000e80000000020000200000000d4f41ee00eb0ec84b840f02ed171d17cd19927b501b0c9a59dfc25d4b40df8220000000a6819326e88fc174982bee4a3d448d940956a957d3de68ea61de9c95835bd4a340000000267bc53232b815a7cfc85661b00e9bf0ae71b2d80bd0da1a9452c96df510672ec44eaee6829a110f6ee8bdfab445c106511c0218c8e8dcf52b82d11490931a9b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8620E1E1-6EFA-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a9ab5c0703db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2380 2156 iexplore.exe 30 PID 2156 wrote to memory of 2380 2156 iexplore.exe 30 PID 2156 wrote to memory of 2380 2156 iexplore.exe 30 PID 2156 wrote to memory of 2380 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d730b902a5892749fc59dd2d7684f123_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a34a1f5b2b4ec4d13c25f463b91f449
SHA1f68c3a936d8bb439f853d547286d99a8299afb19
SHA2560e393cfce31ee3cdc27990de8a6355e3b7273863d22abcd589716f0d34e4dfef
SHA512a6cef60f804204277a841e9553ad6fc7a23986462e961ddce26669accb73de0200b21d77d2502fc8b3b24a7365c41f5d177b3aecf0dacce5523634b0c61d2418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554fa69e7ca5c62d6ad102e6004dfead7
SHA17901dcced6ee561f972ccf7800c2bcbda315a5ef
SHA256647589265933af93159178c706f0a426646ebf86c7d9b3ea6d32be67a5079db8
SHA512795c9bac8e945f12a563cdc180c910827df30c62d11736212b3f17786437098004363e936309591716e3f0c64e923260e44d4b31205394a0205d4617335ea6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550861f9bae4abf8a8cca0de411c5bd61
SHA1325d6073cb3673e86511b3322d1f9cd245c20cb0
SHA25619d4a308d38ac8726448dfc40562dd1f748b849698ab9d4e4352636406f90c11
SHA512694c18d55bc3d84fd33c52e30072b31fe74bc6aceeaef1f7d6918fbc6b65d5bc159bb27922ecd25868b2d5e362d09efbcbe3d68ebc7ea2464448532da8603f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cedd4ba0a62573c635c16ccd7fb657d
SHA1ba1ff0eb028651615f3992b5f3acfe1b11b835ca
SHA256a496977d74f4ea9dc08bceff4d7e50bdfcedd37c9a9a08d0585e7328f7772aac
SHA512b38663e6e116fabe5ebd3462505c4362a3591f5b44009eb32bd8791f3df7afccbcf0a2453ff71b3a72a1a8277cc75be7f230e4c14eba1dee832621a6295dc2d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2aa5867f4d8c7a3f92943257314760
SHA114e540e05b0913f7aa55393a081a38fbfbfb287e
SHA25639dfc15c02e19fd6bff7bc5cb1bb1601e15bd5b819cd98af3da49c63664b5a96
SHA5129531fad79610eaa60e2203ec0f59069a4ee8ac79b268d1c9ef382230417655e8290c53b3925e522d5cd2e7b0b2294b75c18d7f71597c7c5020cd5faec511b626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981fa72cd059d16e2071b661d30ae939
SHA1499f67c74fb9a0035b570737293195e630d9cd80
SHA256fd4d99b346c1fa39af2884d7d33b0b1714759b4fe3c9348a3adff15442e02faa
SHA51276b313fec3f2a1f88f2882923ee4fcf8a47025dbb681ed897f1086e8f1493525b78f791531e74d6fe23b80b4a5534c6e89ccc03147472774ca17e625fb482418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a102497e3c9457836c1cfced446749
SHA1993535bdef9faac74bfe107b156b9f63d11a058a
SHA256197b49dc35c6295a8fbb593a4f52363b71758cee18ee94df6e281ed8ab8b487e
SHA51241c92918f65ea1c3f1d592a522c057eb43702adb99ed1ef137c670398d2b1e01f66403d099b4676c926211594f3af7357d2d31260eb5dfd23949a06cf9cdc079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59814fb478a3204ec3020a26ec33f156d
SHA150707340157ba36430009613775a3892f5cb0859
SHA256abf4ec8e5216670eaf8775ef8ea78112ebbfcb6543ff18bb269c17804709f493
SHA512862775281cb1ac2828ebc34a6fabacb87b2701e856c4d386fa1192c0d1d835a77112f26fd953d3d8e0915a7260c815cdb25359a4dcffca6d86acbb350f0f5cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588441b203b1b301f3b1e3c6c00b0a781
SHA10456317bc6890980ccec40f2353a14b701612459
SHA256d10bbf5c3d82e4a863b37aaeac87456002dc9c2318dc6ed9e989bf7b3fe6331a
SHA512771ef1fb36f8014d047fda6fb7d06f9ed587b3a4b25197e4f0f041af8e38277b204e7ee282d47edf37b4e5e1d094244ed0c83f2c81dfc7b44e2bfb52e6fe9156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55889305020bd393b63608cac352fb6fb
SHA1a0eca7069ba712c3d0b3dc9d1603a3fd475323e1
SHA256977db8c43de2e6c170fdab6267cd56707541b50e92c6b4f3e7655441c520cc57
SHA5125939d71b9f5061011a89f35d86b02053d7a2e02be5b0132b3ceaaa452014ac16ea3b92282f47c52461c15210b18aa5d657b43b3d2b243cca1da847362b8d0942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b6de196c8ae8d5e06ef530dc44b5d3
SHA11fe63c530120720ac7369c8032cefdaf214d15b7
SHA256a659e19e93bfa49c30954886221302f9d974113ee771f7756297568c95b441e9
SHA512a11de59d5b3d1a3a8980714e92cf05716226e08d707123803ffaffb881a2ae646cecde3c47e62cef4b336fa1f125f627a0727f4787a0f908d4310c9ed29c3518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67b58b022e094eed19a0d6319c2ba9c
SHA13285bf9b244349509c00231e65223f93df3117eb
SHA2561d2c2969eb17e9e6af71896b506813e435b3bfe2d1a5cca8703c6513e7104b25
SHA512830dbeb21a549a2f8f3066ae186569d9c83a3908310f27b1f5e513796d6a6b758bf933efa1793a7b00d44269783761fc4a43a8f9ace75ef1ec8f339c48e0a5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53617aaef2fd2f65ebebf4482c558965e
SHA162b8cf0262f6720d2e8e49098e0570b58888d191
SHA2567f2413844e9998033f10aae2670d0958a748200b2828539559cd172cb7a35682
SHA5123a2cf09739e45631246f47bdac46da5bdcaa41ba65c68e533eb4eb6920c31d299c7950b53ef64d7b5f68151131aca3d226104a9091bd028f54f67c7a52d97cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9735aaf9781a22d09b3803b3cfa201
SHA120b0e69755c071839d03ae56369a3bd4942fe8e1
SHA256052f602c4ad5908b3478b991ef5c0040572446a4016d433afe983d52d7ef7afa
SHA512b0aa155236ce47e815e961d0b37be9d0e8868055fe5c83b95bfb2a11a6a300663698fdde2118631ac9f3342df903a88433ddbabfafbc04cbf05943b003d101df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b963d614842829028313ce815114f018
SHA1c846414fbb53b4426cffc59534a5735b55b6b888
SHA25684065de9b969b5ad0ce1a2f91cccb4311a3a3ab0b73fe25d3a03e13d10b6977a
SHA512a912b9b93718e463cadc9510c8e2612aa71bb745609bcbb12479f527c521ba4ab7ac463e48b06e4b5feb1981eda1d6b6c1add343a2d48c16e21870ab3c22bec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d0282fde366b538f7a6ddabc5a1e46
SHA18efcc685e2e55909be7119d34b28f98478154a9f
SHA256b136c4012c2f9431a8d4e31276e078ec218319f28aa2a3321fa894867e6e7a8e
SHA5120a365f325dbe495e35dff5f377de95657f030020f1f9dac1b19fce901e70ad0515b75edc79f0a907dba3d77c21d0c8ec8a4c7b0f76c398f38d976778b55b0e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02977975bd71355b08405e34b8460df
SHA1523afbcfae67dcd876fbd22baa24631a067012a3
SHA256190252ad248c70ff7b54ff1052ee9fa9d176d5262303d2a61f995e487ce18fdb
SHA512374117d0185e39ca59b0eded3894cbe129a45a63a6c43d0b11c9da62a390d1a2d12097c41ac162ac5fc972d0eb42d6c6f6527740a9b5379a368c2bac4f9e8095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53888511e274d461c896b937ebc21999a
SHA1abc7c1bd41eb72981b8d87fd2f13cbcdeb0e6071
SHA2562d05b88a983c9d16a0dac9273533831ca8f646cbe54ad98a41103818a84f6fa0
SHA51265881cc0b5579fd6901f160bf07a9aa315e79915b9419b4a481df21d9357ceffbc7c59ac51b913af8464bdffb00eea75f75eebaa96e5106bae13a4f8eabe2333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea4c7db3e412f11c527922c56085d8c
SHA1c3cc717291947d87014557a10b95cb13adf8b758
SHA256fc70bf1234516c922bdca77dd47016bc40ff135d5dbd0e19e53bd7cc22218bbd
SHA512e25d43bd6bb814d7024374c7db4d7db2a73c538c93df524090f8183f4f792c3786dfd9b14fc4edbd320d9d508fde09ba785201e1248bce3c4f6a179358cb82db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b