Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
d5593501a5dbc1963de576757e40280f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5593501a5dbc1963de576757e40280f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5593501a5dbc1963de576757e40280f_JaffaCakes118.html
-
Size
461KB
-
MD5
d5593501a5dbc1963de576757e40280f
-
SHA1
6356f9fc2c41f9e3b72db89b08ed25341316b314
-
SHA256
2d08fcdeb8d6f3b0b32ea6ca4b9fabc4836ba53ca6c9e5c251371e4379c667f8
-
SHA512
84dc35d39cf2d9e82ca97b5a034d4c337cfb64871d51a50d824329122858cb9fa0eb34a0712c945b505256d5e3bda1ab42447a308f2ba7aa8297dbac84f490c3
-
SSDEEP
6144:S0sMYod+X3oI+YvIsMYod+X3oI+YzsMYod+X3oI+YLsMYod+X3oI+YQ:15d+X3hW5d+X3p5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41C91451-6E40-11EF-991F-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432002640" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e2921b4d02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000007dafebfed21fc2bea313b59cfdc6f6a96e68c8862739d0661de835f11272a754000000000e8000000002000020000000524c7c547df75e28906b69613f8a0fbdaa94d42626121b5b74d793fc6245e98f20000000bd918f537c27dd63501c450487e353a16a63597585c22dee4c126d2a6137a98b40000000613b7fdfd4300c5c16c5a2beeed9fd47269510d4bfd62f9d86c76debc9eb8a75c6ca3911f1ab3411f0edf6c64e05128f2aa22169651ff02399b6e92588fb8787 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2968 2468 iexplore.exe 30 PID 2468 wrote to memory of 2968 2468 iexplore.exe 30 PID 2468 wrote to memory of 2968 2468 iexplore.exe 30 PID 2468 wrote to memory of 2968 2468 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5593501a5dbc1963de576757e40280f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512dbffcb7b84c2dbdc2fbec5a6c9ab18
SHA19e71950ac396b9ce1a3be001005eabcdb8b135a1
SHA2569489d338ec1cedde8ce2f9228e085b69942e29f1a5981364b82ddb5f4f0bd31c
SHA512a3217bd948d9e5f40ca880a9b6f6d75d44a5cc334c77f041568e1c8d7a123318aa5ed7828fb05de483719d3816624235cf4fb9581c2506d5a1cf33f17656d6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc7709305afc18bdee0d1cc41f51736a
SHA15cb5dfbe33fcbc45b66c5a33bfe68fcafb7257e9
SHA256bccc114875debfa1d748e3c7de495a29048a262d3c12eedd06f422ae9c6fdb04
SHA5121b1a9c849d08167ae4665b1def89ebad464e3053c816bbb716acffee9d40a5b0cb937caa9296a7af16ef4763e6a453e1d79684fe708cf8ca411127bfd1cdaabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f4d42a6173600e4e5d0c6dca60183c
SHA1018ea42030f7b6c10b900452adf4024ffdfc08af
SHA2564ead4ff02845a2c222af7447e837ce62306b96bd423bb15faff378c0d957966d
SHA5123f4cc135fa1d88ee27d5854f42aa0c322193bb22a8c74134fe6cc782949090a36211cc6168f2bb53c930a9af384bc4c7c54549d8b90c3bfbb678f092dd463e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530a129bf7d7fc410096dedb0be02e51
SHA19ea2eabba33562e26cab4a3d49042c825dc5ada1
SHA25648e0299eb86f557d8a2e5ec7b903b84da264d50018003ed0cc38dec326f8d1e6
SHA512849d61e655a4f5b61747f4bdd576a40f47bee66d1715bba8ef1ceb1a5a7b78b294356630ed460d23a59892d9a6b42271dbc2792d04cd829a4fd34740bccb64fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678d60a7c5cb0d1787d50e6fac75f069
SHA12522a0cc29a45bc16ab7ab323f19a59e02cf6645
SHA25669d19eeb86659f76b00a397808f505a27564734f9148c12cb8fe72f97aa430a2
SHA512917f75e092ed9891c58df9c1b0f1925db004ab16c3a23b2e41a4702d3a6cef68b901f303e88d9da357d15ccf1934169320ff02c070b91d2901375e2d19446ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5953dbb3780e25bafd348079126c049ba
SHA199871a48362a4745196ca849430ac944504bddb3
SHA2561124fadd760cf6b9ad3bd4af3f7eeb10c99feee93a0dfa09017fda6a9aa65ea1
SHA512c64b4142690068e34d4a773276a0c6ccfdabf8e613b712639104dc35d7bfb4027ad732f4b24746cece85b8b8fdd2594e88bd093ef4b503b89bc44f6a6f41abe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a25afe8c21472d482af54de4c5de7d5
SHA14b906ec356659b78768369fc03ab996c93cf5b62
SHA256fa3deed95f44ebb0ece51a92d4dd360fcf78cb5916280d4373d35125b0e9b71d
SHA5123f7e05e1e0ac2fe4b2c58601ae3a5b99b354ecf9d3b541a15da37544a2a5b2637b9c5c34731d2116fc763b72758b80ee5c63a241c3116e36e43dcc06e14fe0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463a922f1b714de651ac767d1cb4fc0e
SHA1c30a0f14dda1db763c045add4ded825e8566a167
SHA256a95235f80d703d06b3af52c63034342f831f8a6ad161656cad464a0e93b48c34
SHA5124562ca20cf515b7dca32261ee0347d8b8f5af6136d378ffbeef34b6fc3e8fff96d0332187a0ead8d7a3fed0d2402f3527dcae8eb4962a1bb8919b3ef6d1a0831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3235444f0ddf3ba093c286e3e8cf31b
SHA137629390a41cd61c2c2653f92219ee385fb4b408
SHA2562c6a05e6fa66739d1be548ecc694d1d820e157c43d6043cdf054cf4a9caf6677
SHA5127479485ebf416e6297dc566ff7b039adbd5b2d452cf0650cce01bbb73b61b0d201e1d4e11ffa4fc9e5c7d8de61cda5f850cf95a530683defea0d77c00a993083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac00728434c42c2b67f92f5a67dd043
SHA1d0a72a9d49709510ee043919871c8723e9e09fb8
SHA256c967c7ebcee0749a22432e18629b4fa3e6449839966247d95cde7f7a257ed160
SHA5126d27a2203c3b5f0c42ae0558ecaab8b83171ce027b4cd804ed55796db901b693f7592ebfc19c2535e87b7a7f19d6bc96459fea7bfc5800a33f2ef35d008801db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7622df99ce00b94d39659bb12e04988
SHA149e794a941d02a4da15a5c924904ae6f42b9b538
SHA256a499e4fa182a821a7121e56a425e45aa16bb7cd6056ec18fb655319fbb2c6bd1
SHA512c7dcf0e0009473f39039831a533ce56ed91ef2233010dfc9142dd1d89ae50ef8e919030ae99e228b2242d75bf44e48d050049c24b08600f595772601b7759c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eea7728626131cdf73a1ee41a39b47b
SHA19c4eafb30c75be17047e60a541f3e671b9fff847
SHA256035a847fdd59e2aa54599442d6a01b2d8325270f6c1171f5d36a25220677a168
SHA5124cdf17b8d837423c08b9d907159e1bc0072b89785cddd5cb243547eb764148058eafda6c98f4f93d8d16fddf462bc4f8f161e391c666cea29384a806bb264da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5337dc77c0a7c38c9514ef42609b91680
SHA1214cfd1a955889129b4179ffaa39ceb0c6263419
SHA2565f31c50e02e5f54581774fddaea41d269ab0a4708c577ead0b29c84633d40ae4
SHA5124dedbd911a1caa7812b6cea2bb82e96a28eae106b0c1c765f879f00764d1600ea723c3b7f46cd7c1788c9b882907a601c07ae4ce48bd5d21a0fb21a4004ecfad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19bbf19ee391309feb663dc23e287ac
SHA12491b5f19b5c77750cc3ec3653a6e1951f718a44
SHA25617c05cfdf9734bd21c19200c880b2f164d2d4440ae4e4c2f3dd60e04837e8cc1
SHA512e4616c0a6845c29e2f8a6debe0f54383f47d59dfd4ed2d61adc9c394bcd573e10919fcad02b3e608d18aab9af66194e393a25d5bc667cde6d96be0c9ecb6406f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5134f63ee00494a0e4389fc0d304d4742
SHA1128febf2b5eba3afba5b883efb573fc2c3f8b90f
SHA256365adad42977b3c81ad339fd291cba3cb7ac42f08940afebb20b4121220fc5c5
SHA512363c37df3b948a10068b68bd27e5f817fcaa257e58ba47f6d0cd6d48a986e06228739154e7886da22d052d5c74b99215cd02d329fcaabc72c01e76ed68143984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576157e9877152c2b09629e9b523e2019
SHA11f44901d481149b0b7fec000bf7658ba27fea1d3
SHA25670d765cc53241b9ee4bd49545cfbad8ca9eeba5c0ec22ba936b6ab37c422a6b2
SHA5128aa11b20a95b20c30e52cf41508b86eef02cc87aad3be04f90b8ebc9a942b72c644b36f2ae4a9bfb0a239c867a2d1c67490690ffa7ac70a32eb16372d11c7462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ea2ddd2d471832e484524b79b5e8f5
SHA1321d84d72158e61dc53a8f2138e57b95a32efcef
SHA256784109c29b61bb8343a19878170e9f5629c0603bf821794ed22d678be24d0280
SHA5123a1cb871426cc8a9cc8cce217538dfc51c7b3ce96184552f242f688ba44f8a4de83b407b73a462a51d59391ee7cb1098121e73009967b31c3764dd5295233917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4684f5496e3946e9ce8542ab96cce4
SHA1f33919cceff9bc5f65bcad81d5bbd54a7c0f659b
SHA256a5cd5362210646e36481b545be8fc62d5f689161dc50aa1519319b9d2a91bd73
SHA5121f6c7a2fe44a21ebac3d08e32209e8b87352c1f1d8dd80961dc91e1465968a53211e8d53c1597804447681a5123aeb888ae85156fe361938ab01a1bd8e3c8c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54072f11b352f2f69c06b663a97f5c17b
SHA1031197dec33243b2d789d0a4dcb49607f0576bcd
SHA256b474be6326949e12a699c14ee40ffc5afceaba2c40492241364180fcd0814b0e
SHA512240efc97bb8a21827ae63e889bba543ce05a34a98a6d364c8a2e03371a53ac4ebe6bc5bec16fcc1fba43e4407182c5fd7df215dcffee3981873026fc1f3e2825
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b