Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
d5729957e4042b28859a26ba208b1919_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5729957e4042b28859a26ba208b1919_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5729957e4042b28859a26ba208b1919_JaffaCakes118.html
-
Size
9KB
-
MD5
d5729957e4042b28859a26ba208b1919
-
SHA1
d8f6847aa484c3930773905dfb9a8e64b5809e8c
-
SHA256
1613ce964fab218b1236709d58ba548f91949ac9870d4e35cf6aef6686f885c9
-
SHA512
b894c09f0da36b26078035868479d51f711791b221aac847fbfcb1d07d1128acccaffcc67cf84bae59dc95d13ae121f3ae9b78110de9092679336d1c2424f542
-
SSDEEP
96:uzVs+ux74OLLY1k9o84d12ef7CSTUzGT/kd6pNQlVHcEZ7ru7f:csz74OAYS/mONQPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432007356" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C2EB031-6E4B-11EF-B59A-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000e4c1e5802db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000078def4e5813091caa803f21e9cd880a52a0c7af34f62b27b718d143643d2d6bf000000000e800000000200002000000036eb552cc117f46681d27ebd0e7b9c8519a9681d303664d0f284d25dc939655c20000000d421ef1c6b59f4e74f25d3fa05495d1b42f554b24253103fd4dbb896cc76cd62400000001187fe9e2411dfbca954962a7c57f8550b0c62457d8977d0cf7b2095ffdedb55b7de95ae1f75dd9d5493f2b9212d6db8c018711143eb0570876907fd738d0d13 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 1512 2452 iexplore.exe 31 PID 2452 wrote to memory of 1512 2452 iexplore.exe 31 PID 2452 wrote to memory of 1512 2452 iexplore.exe 31 PID 2452 wrote to memory of 1512 2452 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5729957e4042b28859a26ba208b1919_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1098011a0065cd84e8a1e702b617882
SHA157245cf7e4c6347c5d8042998aeb34e88912ce91
SHA256e6642ce48d666bcca41b73e65253e766be055d5ef15905b790e766ee3b0ec427
SHA5122f3325b606572617ef8d05f1abf05902667fcc931ebc1f6ee23f5e21dfed895b119f62929704641e7c02f4f9d7d852c3e5c68a308ad3ea12b349b6668de5f92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7271d720aacf98e3c698fb5abbb24d
SHA1cde235775d51eba5914e7b205fafd9c0a5357e86
SHA2562625eb89fbd50cc16c5ae3dfc61f4bba0a30df04b5c19cdcbb110f5c71d8e84b
SHA51211ef1009e0477a9277e1e69ca8e6b4fc22ceac03cbcf62e424d0bef524af0b5e7c71e068ae797dc509ffd946107fc02a03d42b309f7aeb2419c92d394cecc42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4dd204cc88b7be6e9bcb5569ca81c38
SHA1ba8c81008e588cc44dff26c0a64fd332faf4a5f5
SHA2563eecab3f2719c3591b528908b57a6d334a05dce3d8ee74990b2dd9760f61eb31
SHA512dc0fe01ee37701408feeb11af739af014607daa6951e3c4853937ce286a56989374e68ed3cbc08ee17642c25c435f6bc71e81fb9bc70296b415e16ee704fcb43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4392505bf588280fbf0246428d92ce
SHA1a65f2030e8a22342519de7a93f86edd01c92c61d
SHA256354e2db9d61684ff32417982d71dcec8e5da31d5d98d7d0711bf71161e583ad1
SHA5124615f3fa1808cf7e435291323a4125dd060dc3a2d49f83e52bd76c6d5b2871cc3fe6acb68c695b3269130c1b15563e4252c2ed1bbf7fa23ab0d40eff59053600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b079288880297c7cece69dd41a76e6be
SHA1429c3347d456f4383e308f48a697ad4273fc82c7
SHA256be5afa673ffece270cd3c34a987ae4063730bbd85c922d475e7df3a4e7b19780
SHA512b3423cf18686199d18996284f8f7d8dd836eea1116f1d96ad93a793be8b700558c4a9cd15d24886c8508c2926c1677919ed5af45da3f97c82ba73d18f60ca3c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef515adb810c2803c38adf904988d624
SHA1b666f2b32caed6d7a82568289987299520c317ef
SHA25636f843ed96536f46085ef775c5231535a45ac08dccaf43a4d466de149cd0939f
SHA512d31cccc2078b49bf5a4fba8c524548917e6e05cc31cf23e680e3f703c81485238c018917cd76517c07d38c09c994ba8e6f764d77edeaeedef396ce1554a1732a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6d72cc43aa15ce6a42458f576e8a33
SHA1475d7a8c7c823831290465bf4ed02a658b6d307e
SHA25656e5bee0ddbf51cf67959ee6142cb0c0e8f00e60aeb8a83bbbc140528fd9a3b4
SHA512976c74b8c4bef43cae051308f33cb65759ad3c6b7d15b9cf0f5412cba5e808fb745e83adcb59d1e647d69fbcb13a36b9b9a6d72bcf11e7a05e940dd8c8f210f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f54dd4a0f8d96665edc176b0f973b9d
SHA1a0760421522c56cd5761d40e4f1a35cc808a3233
SHA2566fdecebe0f18c09879996c63fadcd0617bd07144f9731d120ecdd0c082491a23
SHA512037fcf679bb92cfde3da79ed2aa9d359ba9476d24bbf7c2e434485a4d2afc4426c52ff37bf78e51eec21eb7421185f56bb2fa7a4035aaa91cf84b93cf71bebe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1dd471a9659e0f8c00ddb02045c58ec
SHA176e24f7d81df52eb74f6f31b58168a1cf956114f
SHA256e76af63a923e132eab61649cc35f6c6ae1c3f704d20a09ca84cfa4f3ef1315b9
SHA5123a0b818aaaaa46231aaa8a0ddebb0e50fb57e29ff7f87915f90eb22ca4e64fd8227f8f692a2c09b141d1802a49cb5dd888a246a0db979032c254181cc8d92ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9aa6d9c1d4f921054c92c45e372d8e
SHA1d753270f8d9b6c7de55fdd84ed54c84601a0eba3
SHA25694441d6a30757fab79e90dac4a792fb9c105237d74794f76a29f0dcd4bbba899
SHA512bef4b32cca1f6772d722e8e087aaae613dfd740b71e4ef0824650527c839c73d9fe796450a194dc912c974972e169ecb0e1304c5c6c2950d4153d34ab2f7dc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcf2daf2aac8fc2cb60c60b49dfddcc
SHA1320abe09b51ab3dfe7cf4f80bcb2bfa6781c13aa
SHA256f77c280ade74ef362ca9d2d97e1394bef7d02e1e44cbe2ae0295c85744aac538
SHA5120b97406779fb198b30cd7789c87c4c76f0379ff1782b9d55d42b8d9b706e274c54c856a16d271adddcc1e710f21c5dfd8b9cd043e67cee704b96d7fb465b0c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af297d7f4b3852fdfc1bda3ff8f08887
SHA1a8ebfd6d18f54485887b9c3e1ebfdffa66b79a62
SHA256906dd9088782943cb159f98183e091e5732691ceaf1cdc553eef6c9965dc575e
SHA51211fa3b83c24da36fdca84376c50331103b8e7187b575ba2eb305f46e8d00decc1b5071381ff416ed07ef0ac20cd5829cd031377505b334c756ac969f48974b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee818ecb1c37d96c9334a4a42d1612e
SHA1f4e34388381c0ef6eb246729ba40bc244248f6e0
SHA25607c2f3ad005c0f0fce8c03afaee515c8bf218509b100923c2dc0d9f0c07270ad
SHA51248e878a479059543793d6b1af2fd92615b6fd85c6a5e23065e055a737dd439520ff9ccd807ee36dfee746c5dd33d8a870d3398f5670b9744edb46bb9a62c6b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae2265e0f7f7cb843a5c7576bf8c811
SHA1d3b95240a3de5110a872e7f6844ada99bfec1166
SHA256d2430855938f9a7b2a21e00d26b58679058e6f7e62e2dde5c479cb4cf2de05e2
SHA5122364d75db66d16f3a28a03af0bb68cff4d47d4153afbc23c3d2ce30839c89855630f5626c7cf1f8d4707baf6fab04a27e88ad41b75801f7929bce6985ff07028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb466bea8fd6664bb6a1aabac2baa91c
SHA18f41884bd27c22d30cab6cee36b85e932a58776a
SHA25670de42c1d39d64ac2068b57d0e4621b562ad197eeb1cd7f2f3a19e61254e98d0
SHA5120d36844846ffc062821bcb731e3092e9290660c65840373d0b594df9ce5a36333aafbc14575b5e76adcb3cc81f02b29761b452c6b44679fac52b611f5ae2c9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a0f566e57f7ee2983a5a3df2fa40a5
SHA1b5f065b825edfef758479f42bd3f309a82820780
SHA2569dea202fd5659a51697c94bf43a83f0cccb82ffd9baf91852450a21ab84512fa
SHA512c359a148a6f313f59f8c84a1e95e519b35503f744d3fbc7bcbdc5610d9f9539cce01744e79e6b2614feaec8bbfd62643691ae117dfe0f67d3c106126aeb2fc02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036b25ca644ceb7be5bcf93bdb682ca4
SHA1e2af11aae35dcb79d7e17af8e0da433009e38c5a
SHA256fd7abe726cd28ed2d0a7215cbe8dad866e1dcf701e4cbfb1dbe1b2ec96e7ac4d
SHA512bd5f7c4cb8b633b097e47cf67d0d88b68723650e9a2bda53f61cbc7a6d2a7c30967be7f29e812b0691d42112168831daa0daa60321d567620f95c85114cc43a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c72730169079944523658e8f8601bb
SHA17ecc302eb9f5f573c638c15c0fa8911fef8b2350
SHA256d4687d08040afdb238321285fe1b571d54fe21a08753008f7220f424c697eb28
SHA512c4384ac49978dedb612f18f56e95608cb30e25f886bfcff7899d1be03378f7e4cbb2eaab3ddd45249aa0376fdeb4a50767cedf3b7559989e33f795b5fe43657f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590beac9172eb096c73a596196e851d24
SHA1ef519bbf78d727b46455ae14c86ec492465153bc
SHA256919cbee620ec4e1126798ad9eae6cfc4a8d4d8f7d8d31aab1dc3f8d6abd8009c
SHA512d0f3875dcd5f67e8795dab889465bd1e6389d33ee22bfabcc4d44567d9df914103e3b5b462c24fe004a141e729d4bf0e79440161a6d8e251049d6e98fda4966c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b