Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
d57b52c6383070de457ae1a23a2d71ae_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d57b52c6383070de457ae1a23a2d71ae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d57b52c6383070de457ae1a23a2d71ae_JaffaCakes118.html
-
Size
4KB
-
MD5
d57b52c6383070de457ae1a23a2d71ae
-
SHA1
e8e946fd27cd67f2724694790466f439f0e13938
-
SHA256
71789331f07da3b27bffed17e5918bd5a6354bb127b3660ac97df710dd5d4bd3
-
SHA512
ceaef9d76e349c93933e2a27cc7e870a85166cac783113cba2942c6a087a965cbb5b70496eafd920538f14a252f126f74d2cdacc074916890e5167d6f55fb028
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8omUwVJd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000081740552e8050cbfb6513e10f1c5199bfaf311e17193eab147cecc4d2260c741000000000e8000000002000020000000c19d2545ab5b5834d3a684c170ba59c2c93132f6426551d76c19bac277061d47200000007406a4992d24983bbfb7648a95af79d11473e42db1f62160700183130db68ae840000000168d5e9ae989d3ae9fd587ba77c3a2588d4d22a77f2bc1e14ed2a0a2362cae9c0cebbdc3bb0ac7b3bb39a803052e16aaed6668d6d407837bd57ec40f1448fb61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0aac2fb5b02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432009039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{274D45B1-6E4F-11EF-A444-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2388 2068 iexplore.exe 30 PID 2068 wrote to memory of 2388 2068 iexplore.exe 30 PID 2068 wrote to memory of 2388 2068 iexplore.exe 30 PID 2068 wrote to memory of 2388 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d57b52c6383070de457ae1a23a2d71ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a015c26e691dfa2fe2b558b5c6f32ba
SHA166254239555e0e08e5ef312a0ea881fb40f0ec70
SHA2565649b99c6add5d6f3050f491fde3959af1ec6b57c19959262d0664118e9232a0
SHA512d8a961bceff74950254b58e05c0e3e2919f67650ac8eb4cb845320d569c4f6d36085c6180ef6ac2347a3d2b2aa47bdaa786ed761a1dbacf902c4b0953bbee4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5403e771a521edbd89d867f8283b907
SHA1fca5a8b584e5bd454cd2757acef7bf21454355c7
SHA256fef619774fc62faf68785dd90567adfaf60f53b111a1cc53fa06f364ce96a1fb
SHA5121c7f0ece76e216e69d941f5320d41582ccc703c530c9a373240490494419874c6597550a52e811693ff1b10ea9d1a345ea9d1db6b28dbf9133af512b0c27f603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5f7c29a3fd9d6eb91a80fb7cc17de9
SHA17df9ade942df8e01ef1b5a57fd29130a6727babd
SHA2561680b1f2a3dd33f1e19f2d6863a9d26e67fc5a3e3167224bc18d9cc37eb9a502
SHA51275845433a401cdfcb52371676c2281738c2f2f0d223cb269c9e4f6f6d77cb78d8c4a1a56f1bc9dce0fc5e026c85543dd08e05bcc94bf7650b5e7f14707642f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a178320e7a0402f2c43264007cd3c93
SHA1755cceb51e4a5b5bd7df7a18beeba500c4b22aa8
SHA256def19f936275202cd20f8f64ae136ba69f31586210449366ee3a05419f778d8b
SHA5124497e4137ba646b7bcc3b5e1368b87e4f531d0891d052ece8591c44dd4a8ebdf13f6111a38253c72835a8f9a7c2110ab437af99b3b7aa911c7e6e2bf9bbf3a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58099a1af2da84822c2da7213c785a1df
SHA1283f2c3d00c0f3e0fc78a78270664cecec67855a
SHA2563beeb5446d9622398cf538bda3b54d7a93b5f4719a2715027fadb3d7fda1477f
SHA5127dc08219fcfc8edd915b256b6506a190bc857ec3e0184f74719d49b9d4c8a8f0154c21381bb780c0fbd08ae12f30cad4cefb472626f71287ded5c06f38bd755d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2af90711eb3534ac1ac3552aa946d95
SHA14256fccb0293cf1e2f6ecf5a388f9f374b1c2714
SHA2565f917ab1af5cecd40252ab10e0c590ab96479c1ade7570661da3d6a8538b7df1
SHA51259b4313951112d256770d51b1e3b33039063fff146ec7cc96d30122cb791ee87fd9aea54f145f67c743c304f4dbf9eb1161592895a4bea6903c18aca092588bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d51525221b0bd0988c053377269bbd
SHA1e535e06821943fc92e10fc471b540ce951ca0cfa
SHA256797f3a4b745bb5289ea84abb84009166a467a87ab2559a5c7f9c36981d76f37c
SHA512cc53a99782f479a11068b7778e02da14e1febadbe63c3a0a260fe7028bdb59b3dd81cf1de0f1515a2ff36043a8ccd782e910caf7cf987606bec415e8848e8832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d9184eaa450dac8b6decdfcffefeb1
SHA1141411278c07b1cc75a7d14cc8991fc3431e54c1
SHA2569c86a4c35f7abf5ac67bd7c9d701cc322f620c2d9186ec76440cec5bc87f133f
SHA512629cff58e0459ae1fa9c749cc0e6fd035b5b6b33393f3bc4814bdcd94071c65d8b219ad742df22e8c5e809fa715b21ddbc8255be8e3ad0954e7c34f617f287d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484660fc1af4baf7cd72f301ff498e1e
SHA12555a5574062d8f8b49e67deb9ca1950b13ad149
SHA256f138b3a252675696f197bc988da5fdf32506fa5dbd07b0fe05b94f03c86e0414
SHA5128fe6b7c31e8e91f7d2837368777f183052f0b8b8ac8d2721da126c4972af450023001aede1acd96ed84d5500caa2d41a23329d8ba514722382bd8f100a14d986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca54659a6fb8333f4c30d6fd76cf590
SHA18e55a819ab141575bd874907e8cc54232457ead2
SHA256e1e3c9cd31e04205a6a5cf9110df5dd42d219ab3f8f8f0c297391ee53a5603c9
SHA512736e77a481c743607dba89b96498bbcdcb0249f11a41c009c909dfd50209b1cf5ec9b036eb23a1be3cedd77005f6447d1c1fa08352bcad312dcf7af1ca930526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f3600c3c1e6a5926e1670c466dffec
SHA1c90ef65d4394b7864a4a3c144b50d142f96a3e7c
SHA2561a93fd7af3aad161442c172f04beb4ad140e56862061f47775a6c35e6089b830
SHA512f2a7acf2d0ee7c28ffddb77d991e0e66aac6b0e70f9a490983b7dc07222cd0b1eab740e995dff961e7f103a27620f83567e952d740d0dd879cfe1fc06518dbbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59728fa5d4c60e1afcc1271b296747f6a
SHA13e6b277e60483716bb99210ab4081dba061722ab
SHA25677f5bda3973c35bdbadce5d046c20c2d9456cd668779b2cf59b67fe874c6f0e8
SHA512df29bd96399483827adfc51b3edac242eb191fbabd0abd0680e2bcc7f65e685a43f6efc8cb04e3c29104c099b243da259ed57f8fb57b3b980c1f839e6722fe25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1722c0ee509838455994681d1b63a2c
SHA16d488cb3fe2cf9c9110c8800564f5a72cc5f6fb6
SHA25658a68b52424f5670e224511f5c75901cd420e1e7563c0b551fb5d7e590e1f22f
SHA512cfb59db6809f5a7a977fd37ab965024af705dd05e0adbf7584010c4c2bfa43807a0d980af0d88679cac84ce2a7f80378bd79e7cc50e333de1bdeeaeb654721c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da348a187a514031f42d8a1c830a7433
SHA1c272c96cac0bd0392f90ce823076d33615c5d1f7
SHA2566e7eebf5a623703b7b436828b1c87f43039a644c460d377be4c05a16fff8f37d
SHA51268148dd7b0c6ec08ff295e38f475df0e5f8364d2fd719bbd41810864c9ef699627d8d8045e6eb501eb30743eb586e69435f61a99759bc7387d4f551524fc6358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9b3befc4c2af5622445963d2e0efab
SHA10403b1bdd937646514921f94cd2e22d18aff09a6
SHA25617d9424b85088f8602d06590aae5a1cf2606aeae34bc59d2b84b7663414b8564
SHA512457de3b4ffa47bd02863ddb98dbbe2667ff44df23ae855a15b220483fe2c8cda59fe5d69403d3eef189e701ece5ba114067426f5789b984fcafc20e09801cc63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582953dc263521f190aa9d7356057565b
SHA19ea05a7f1b6ddc3d25ae89f06ae0fdfc418670b2
SHA25664ac1b52a15b2e74a47611070b45ed5a64777f843417ee24a6aabfe7a9ab4f2f
SHA512d592f03ccf02eaa46c60f1d12269b253c7030ab741d569fc9533277b4fdc089468a110f11c4ba41948e9971000b837fb991bfd3e7d4420822ba70920b33f1ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d033f3fded119cadd04cd424e9e30a0f
SHA13f674a8cdc34a340e05a3642f4ba08753446bdff
SHA2564c52ff55115b1edefe915358cd9a68a2eb96394d6cc65b1f03322841f06fbb41
SHA5128cdbafbff0d0882386b93dfa6ae42e2b5468906ebe2ded1155ab020d3d7c93633f47cab6591575dbdfb60f4df83eae162c059de68df660572d215d304e5af0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c129f4f553bdf3738ba4babda42e9e
SHA1141985d36ffc9a1bdb1bf797ca69cbcdba681e26
SHA2568e567ad42e0f38abd4eddbca7e7381d1ee7bd341a60df8b551abf12af2313e50
SHA512e6c552730add9338e2bb45fbab4dfba75c13390613428ba36c9a9b1f64bbc4ca744e955373dc2f70c38478bb4484e020e87a614001923bd95b71f6efa8906849
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b