Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
d55574a9d089cadadc48cb8964dc06ce_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d55574a9d089cadadc48cb8964dc06ce_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d55574a9d089cadadc48cb8964dc06ce_JaffaCakes118.html
-
Size
6KB
-
MD5
d55574a9d089cadadc48cb8964dc06ce
-
SHA1
409758d76f75c48adc322a2b9130ab05638a86d0
-
SHA256
4cb12fd1fdf0009bef28603122f63cd540f02feded61d6a39f6e35c1f9edf4d0
-
SHA512
ab09b3dd8b39152c03f8ac91ef393fabe5876ab158d63c9b8cd84c718d67ecd11dd228727659dc00760a1264d7cc74889cc5bdb07e502c120c507aa647bb24cd
-
SSDEEP
96:TuGXcr/DryZrH8SeuM4/JVJwJMKClcC+FanRC:ODryZrH8TuRbJybCmug
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432002073" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED14C5E1-6E3E-11EF-9319-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705ab3c54b02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000cdf85c667e94c5095ab122ec003e2976ff98d281edf035c28d9b6978fb583e4000000000e80000000020000200000005975532f20f946302ce9e18fa437f1abcf831b8c408c71a65bc70523482ba99d2000000052c6f69398d9f960fb61791965e41311231256bd8df0476741f0c9d97907624640000000dfc961cdf03a6cd1f7add6aba67082ca72de2e1be385ff56c370b2a0dd45770436144e290af4a3a4649d480d8025dabf08e8fcf42fa996da1af1409df9b193e1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 468 iexplore.exe 468 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 2808 468 iexplore.exe 30 PID 468 wrote to memory of 2808 468 iexplore.exe 30 PID 468 wrote to memory of 2808 468 iexplore.exe 30 PID 468 wrote to memory of 2808 468 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d55574a9d089cadadc48cb8964dc06ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b7c58bf7a07160c51c4d38dd16a762
SHA1fd0db14698ae5e03f46912124fd68d53ac57d957
SHA2567a006878f080d776c1c7cb8c853d5e4b9abb038de32276da9438b699611a3b54
SHA512232228369341d1c1116ede680669f445193372a47329801c7a5b89b341cdc79b4c6fc2a4b56e3bf2ffd50844bf8c814aba515f16f73f4d05b93d798041c105ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679ea58258c770e2aebe0722b43643f4
SHA13c7fbdad4ea6671c30b5bf30179dd223d186ead9
SHA2561af2a89ee99e160f963e99a5b698914f26d3c6ac81d6d4a21f2cd2bee6035c64
SHA512707014599da03472ac2aeac5ebb0325fccce678d2a0b5104d83619491e41ca666bc24ff941c61663fd151e8354a5b9d8a187242fb159a7a151ed700d2fac034c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0cd76b2157c1746ef2db5eb17af126
SHA1bdf9f015ac120e352a32a31ac8bb33eda3a777cb
SHA2565ffedb946e3bf89474eb3508dc791a0a71bfae3794054e0ed3afc0ca1d99efb1
SHA512a6b995e793efc97438a635a794df8b875de3c923db6783e0516239040492bc4c9b5283fe5f4e8e181bb4b382d9fc70711084edce98008409f2c5f7370b59d06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9847c2d0ff28302932821bfb2deab3
SHA158640e0fc00a60e09e3cffca275bfdaa5cec18e7
SHA2563ccf6375d5eb413fee006796ca9472287498a96e5c5e9eda3ea833b02cc361ff
SHA51232b07f8ce2968ded78869288f18e6b40ead9badc3816a33c73201fd457cb3ad8b8f2da4c35298fa10c7131da74f59fd9ea07b0e42a2a1c97412002a825db71f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f15740fa9d891a96e7d1a7fdf6198b
SHA1bba1dd13883c985e147cdd8151cfadf512398e94
SHA2563aee1a33f3828853c298c4c6e7b397f0a69890dad7bd8b0632b0a98592b9511f
SHA5124d25bb3931f0217b5c3118090b48b2f350d950bd2f70b43bd26f027e4cb38b8f71b101525369efca450d732cc3b814cd7f3bb6bf3b02dee9703d39fa3ec0bdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80043b33fe5f2c95cedb65e256c16be
SHA1388c426395c2f9dbe027d6d7ebf1956ced8696b9
SHA2569e04e5bc282c2bcc26bda15eb56d69ac42b544b70cfdd30ed2b31d636743a68d
SHA5124ff581be37b20b53e19e734a82d600c1f58cf4184063db1544e4a89d0ed368f1d674cb26908731f0b238d064521d195dd8ab34ca15018d2ee7f41a1ef5560d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55560a846670616608431365eebff5a2a
SHA1d946b421951c6f0b311a762c5f4c59dce5276eeb
SHA2566eaf733399b17ad2f22df976918072e12ec3cd805feea84fe018a45b2588c0ec
SHA512aa87f5d65469e170626cf4d570d0d4e0b6281ea90ee5a4f08cf14e91241919331142353fa2a3b6e5a56e3d35aec09d6b45c745805a5339c70867cab3eb1427c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4dd815cd2ab77ccc93aaf1964d174ae
SHA17d1fcf9fe0411f2bc8a3ce28a66f699b7773a0d1
SHA256bd7fefe6f4dbc0a556ccfe548ee55d397ff8ba2cdf14e236754b83ee73e729c3
SHA512451ce6454603d0e2ba0c67fa2cf4ed2bea3e47342eb12d1416e2c5b2a18d387d019936077e2c91eb815dd5560b3f8e392bafac56d58dfb96681342cde5b45a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e46b34e99fa025091a9f1b7bbd256ac8
SHA158bb4a45bb5a28d88dfb4cbd6ae7c1b7aefbe805
SHA25631655cd794ae3b0d7e9d9d2d970056a5f6c343b5472b77e39bef2746bbb08779
SHA512eda3489ca21f1cfabacead0164c2bf6c1c2e09a57f39d7b23f75add28343229a8c36371e338e789fdb988c014958b4a066cb231ab6a35837859144d7ab0aa6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571da8556d002c77abd9fae7f99caf53f
SHA1f55f63854ba5c08b65f3f686d99994dfda113a81
SHA25672748d50493f95dd1c30495322d18fc23edefa5eed61ad37f88d3c15d87735bf
SHA512d78ccbb1bd00e03aed37c7ccaf6a44d1dcb3a74068853afc452e56063e0a4cb828ff8897935db1fd77e480c43660e88c781b7a667de549b7192deb561e03fc77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550bbbb4562ac2526baae758cbb2e5484
SHA18fd7037575fa245db62cc6d92b7de9bcc42adb95
SHA2562738ebf99e0bf3e86642705cdb563d7b733b7e84fda546c203469f112a7b8fce
SHA512dd93fbf8b2e2702eb85315e82b279e68e4674cd4f84d6db770ed918f938ecfef658d5c33b43e4dcd465c72aa4f9567f5c03f4a19f6286c7e6cb9717ef72507cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51943d6984fefd0534a10f0580660dfa8
SHA14a48d458c5dd2f5ffab4290ada0efc2f4e1927f1
SHA2566187ce3921cdb5ec5a0d71cec0efa7c86a2373944e24989de9f7611fec1b1f4c
SHA512316064568cc60eef443e0707c0f0f3ca74972daaf9aad058408b97dc1597f6084b7343c81824d1f4209d08366d9bfd7108519b993bc068d593ac4af5ba730f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b337c20d21d0db48eccef18c4caa581b
SHA16efccbfcbc108f2018482d40f3fee4a1b37c7147
SHA2568e4066945dd684a2f2d01c88010b19cb8dd41fdaa40aaa9a8a1792fde84804d1
SHA512ab199d4224b30a77271b3645c7b744237e6a66106793ed9566e6cbfd67f4d32a3ebfabe58c4a69f678cc9609b1df9c7a9d8c6c416dc44b66e7a7167ffe7be645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53282d8d04585fcc714e437dce699ae0f
SHA18c1df03a3d43fe6d7c31323e72d77f93b0c7e447
SHA25633c75b135e5acaad68fcbd5809a74b8799d45978de3ea33648a05a39f2e15284
SHA512eb716c46f486563bc0f87b813ec05b79da4ebeb0c0b3f975ed160abb3674e105a3b374646b1addd4297e6c0219c4de396a002c5325dea74d63105cc8031b41fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587b6a6f24b4f742ebdf1f98175b8cbbb
SHA186ec73184d870f0bdc6d065b835cf39e95af2cf9
SHA256ac772dbb623e5fad0c08e1d98037423ddb0968c95f2ca749b1bb5440499c6c73
SHA512572e60ea796e3588ee01daa728ed5821b22757c0017f63db7730c50a2f6db01fdadf12afcf8039e3412d96f87fafc750d9d3588cb780b0aefe2d6e9106cc3fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d6825a4d5f28edf97ca58f2a3065eb
SHA1efc6464704ce4ce2ca3b4d3f8cd398b0a2ca327e
SHA256b82c8dd1e91734fc343395597eda46a2802c0ab2ae3dd37f92dd4939f1ccccaa
SHA512bfd6ba6cea7472ca30f181d160bb38dac42538eff6dc0bf5fea050a4fe7fb994731f940bf0b259c005fbcd9113c329cbacb1c213021684ade6b604fdabaf312b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5577c9f3dc30ba72f329b5eda1c05a948
SHA14e4ffba081cdffad398a115ba856f765b8ce5ba4
SHA256118995ab0b8c4968aff5352de508d313f49a85a4f642c2ee6457e9cebf427dd6
SHA51290941ad4dd2b8df5a17e4828a86921305a60d5669f2089fea2539003572d7928f327bd39fa77a796491320dca75534ea44d2365448548e401ec56b1b1e13749a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b