Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
d574f9f2444622c6da9c40a1ce5668c0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d574f9f2444622c6da9c40a1ce5668c0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d574f9f2444622c6da9c40a1ce5668c0_JaffaCakes118.html
-
Size
19KB
-
MD5
d574f9f2444622c6da9c40a1ce5668c0
-
SHA1
fa56667c5bcf798e7a4aba5ae436721001801832
-
SHA256
003d1bf4c02fb6d3a5eec7b990249b15715008b4c4acbc975823247779ea619c
-
SHA512
1151167f22ee61cab77561a0da76f94bb46afd493e03c640d72da1297dba3f2229d1702ee79aafef25a88fdc228c4dcaed68d9a7898472d5e54f20dd6c052afd
-
SSDEEP
192:0y1Z3ajSgKIRIAqo/hPwXXazqua+gAiUy6xw2A8:0CZqjSgKI6Aqo/hPwXdua+riUy6xw2A8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000005f5065dfce6fa5ccc8a45f6be56436acd1bed8d0eb0b60da90b1fd34b1a6d118000000000e8000000002000020000000eef70e1efb443b4318eef93212641da51c0865b7dff5b43856e8bbce8a4ae06020000000dbe4299ff732aeef01bed3ee27aefdec92d01e25dff7607cd88c4a09f993115140000000d23741adc3cf813c47af44c6e991b748d02475db6b4e4c502e6c8e280c29394d3b2466751c9cfdfdfb6b9d9b9f2dacf9dc961f4e575931b8676083c8c13583b2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80D94051-6E4C-11EF-8FDB-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432007906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502fb75e5902db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2064 1756 iexplore.exe 29 PID 1756 wrote to memory of 2064 1756 iexplore.exe 29 PID 1756 wrote to memory of 2064 1756 iexplore.exe 29 PID 1756 wrote to memory of 2064 1756 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d574f9f2444622c6da9c40a1ce5668c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e868971e718ae3a967fb50465c2c0aa6
SHA14ea1f5fa411f6fa536d1314667279a0016e29f3a
SHA256ee72d625373012c8795170ce7bd1b910e1045c0ebae6a8dcf58b0b793d0b8df5
SHA512110e6d980bc0521625f45b1ac2ef055398947d242fe74e9ac7ffb58267d488acc0ebe13cf0d26f2d59a2cb96680d2824c46ad02312c78d86f2b31fcacab6174e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7e5094414ac09484b8734196226f68
SHA18cbcd38f65aacdb5445adbbe78c0022e11747cea
SHA256c16efb6ccea3400ab7fc3581cb584360602145b7261a4dc3efec739f8974e96a
SHA51211b8b873bb9c09c3ed9407c39dc03243f419b6179c7b398569644f47b32cf3572ce0e1635dabb851ba5f3ce1793b21d59740b4511f215de553b63c512f19f106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e94dd95976f82e3f6348fe2464ad01
SHA128abf2aaf124697ee36a135454218db79b1ba982
SHA2566a15ebfbdb3ea25c147d835e8afc25942889a9230a4bbf333c40f1a2b9f9fe50
SHA5127dd84dca2433f1f6e0683335b933ac656719489071743f7eede64061e2af749646b74278e97a81e1af949b914b2a4537c45ab77d0aa9bcb59a23ace247b51ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831138528de0528f82e7956032a0e17d
SHA1f61e81bcd12c4e1964aad0af099508fe36aefe00
SHA256f9f527db17ac3f4eeb467d6482e0148346062795e9858cfb792abea54d8397fb
SHA512a463d387caab9b0e43b7ebc7cf4f5905ee8245478e1309e93fa03b5bba3c1d060d7f3321a448750102443a9459be09c812ef7ed2e45c89222ad25aa8f674bdc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591573d7e65164b2c8fab16358dbf46fa
SHA1b62a029edd6b69985d5d4138aeecaa982eca1447
SHA256038319afd0d636adb39564d6d9a1d0ff3d7407a2b918b65e22ee7e1f5fb3d9e9
SHA512e8214415d5aaccc9047dd265a939c9ea876ec29e1a80c0415e70f2967cd61318ba2c6bd686eb5cbc0d40bfe8e9938c9e0f0d9bb92851d228a793647e678dfd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3db70bc5fde69496545bea5600a1eb4
SHA116d2764b0faa45decfde2d03cff2d7ed77b2f1a0
SHA256243b14339729a20e4bfee54f6720b4522118aa472f444b12802d82876dd088e6
SHA51267ac0ff436e42a4f614fca84fc80cadd7f70675a0c76137dd4256e600ebeefa361abd8c7ed44f470f7b48b3acf299134f36385dcd4f2ec77877e6cf6d13cd02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572361277d0db5e8d4b1bbab51a6ab79a
SHA1b77000d5eb984d6036e3ffd6bba2eaa6c40cbd6e
SHA256d31c15b1111f896d8d1cc4170cff3cff832ef5cff071c0540e1c55c627652129
SHA512c8b5934ed205bd75f61797fd7873aaf4f9d82c6d7de5aab78e490370fc4ad7dfb419c431c684c4009a5c4062805df55ebf41b1c6c6860fa180553c6f3a9e2b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d504a364bdeb7f2c50208c50e88d98d8
SHA107bc46564ff2fa5b16ef75d57d7df22cb7d6d730
SHA2561226031cf3b8d5d44ecae3977d7070149f0c4f769d31d6ebc6c92084e5407c8f
SHA512462447400326b70574a9bb24a1b4cd1266d424b7f0fe6c7e77819a9e59f62cf67cc124398c50d49f93af001660273cd07b7ddaabdf2d49053f6a52ee867b285b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b7ac6bd92d2ff5c6acfd81458ec045
SHA133cefe1e29b34f6ffe1bf2dc89383de7996c17fc
SHA2562777bf52e9549776f71b0fd7cf567a1f9a7716023a734aff97f38f4f793ed6f8
SHA512b95acc72376b39f0904e429218ea7418a9395665fffb3674b8f8f2052ac17771b6c76bc51a3d97f567669b55c23540e688e01c994abfc58917da796e68ab688d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f966188d6929f6f8e599ae31bc7dd5e
SHA1b0d6ae3f2e7eade3ffb90b0f5545c3950856ffd7
SHA256bef26d4c83ee77ba6b2b438c22aec2ee7d4421c139ab14e79ea8d6c3d9b2ef65
SHA512161e6d56235091b04d960af13781563ffcfb338e5ad445d76a49890c90b59f74c9fdcfaa167df8aada3f45c1f693b399fcd7811e2e8e013eae80221f383804a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce1cd1903d75bed9d8e0ae607ee82af
SHA13c446218472416235854618ed2577144e7f1a10f
SHA2563e6367d93cde1dbaecddbd56ac6b0abe9bbbcf5716b8e032675e42ce7f6af1da
SHA512dbc7baca50839151706096ce306958b4556c21d5414c6ed1bb493116201938f19d69773b0644918e967354120a719378adb90ea9f83599052f8813e326732733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa2733c4c73f038acbd8052410fc49d
SHA16c14f94a2548c7e74ef1cbee71aec4ef6e9add34
SHA25612ebb7411c270a21d3eed4827262d0fd90446eb9618e578e3a6d32e2ba27e22f
SHA512b388d0195508703374f9ae85e1d4bf6afcbe9e5172a55c5f13332074da1caa6d7477f6fe26a1351c79e3005b07a32b4ca6c1b9c8a423e338c38abc3add4477bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36e86dc6336404a8bae8e7ea70c0c56
SHA11b4702c7f6e02fcc2831ca3dc865284ec3366013
SHA25635e73058b396be7a1dcef5728f8a2fef2454885289f011e1bc186a1f866333b6
SHA5121013617d08534dc3208b95a8d184382985614c1a84771dae9290f52f1116fb9d7b49e44d52d9ee7bcfdece31fa70b9754809bd2f4495888359eb30b748adc8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1a772efa7a5a19c75b4dd817c93a30
SHA1e28134d05df7a18459bcd2537c9359196a572879
SHA2567cb73a6406848b97b8b0221ca6cc2e37d8c99f64249b8fd9502df661f53296ae
SHA5127a3a93ec217a37a1403f8c1ed76441e6a7f8ac5da0bf3cc46884bc2de267f5ab2f1996a1e7d736e33500b4eb3f180fdd03a9742e37fb94e321f2227643f44aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2b5131f52084d674430424ea2ddec6
SHA146cb60fed78c9ba9a99d32162871d7bfcbe82e0e
SHA25654ee9d67524de9925088b61950e9feb68f1ab15b923fc39dbc750992c81d7928
SHA5126876d0f7e4baff46654fbce225661cd2569d6caacc41a53d68cd24afa4d945604a8a0bc352bbbbe798b2daf0a18a5b1f5ca1c45f69533dc273c438a5daae54d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8c8e88d8894aa6470c5237413a983e
SHA17b2d054eb6ec36940e2b60c33167aeb15a6fb537
SHA256ed2c79ace3d1156f8271c9b21f8b1b6d2ccbd847f96bef0dfa1959da316b86d3
SHA512eaab2feb5f0a620ad98e367cbc5c4e3085ac37624badf42cd12fad9191874611b3a69668188167183df43dcbf3703e5f9bd7157ea022dc9c68c89bfd322b339c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98779904337978629f5fa79748f348d
SHA1234055f5bbadd4f187d6eba03ac4ffe06b3b6301
SHA256be21b186874f7ecf89bfc5beabbe30d1cee5c33f445e01dfa570364bfddabd4e
SHA51257f4afa263234733ec64300ba9a6b942542a73b3b93a1f33850ced6c196562dea0c8a2704815c60aa7b5e00530f97d763f5e98712ec14d0f1fdc1602f49fba64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d07bb2d020a394ede3609b72586204
SHA14cd9055c354346c8ef178b47c0d485670bca1dda
SHA256ba71e97e40c7c1d8b0ab296d6572a085d650e285854468da7944689a20f131f9
SHA512dc2a631fc0eb5b16f6c7e76dce66bf2c669baaef44db71c50f002dde0c738e3a2dbdd8c26f208461c2f0772f737769a7056876f147dbfea68ef46254a69f68a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd7d444579e6ceaa91af205c9f235d43
SHA1451acbb6bc32a3414c7daa39f7c8e7a68ece9a21
SHA25664e88094b702e5946e3f78f556175c316844dc93957950083e8f1a117a7456ca
SHA5127f8fd036e4c436d0453413cf1ff932a41b9c2408214c9e13cfd85964296b9e6854079f85e2f319d72f93377481cf9fccb997ac39103fb0d5665cc8539f9f22bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b