Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
d595faa2556ad88c6474a57d50bb0169_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d595faa2556ad88c6474a57d50bb0169_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d595faa2556ad88c6474a57d50bb0169_JaffaCakes118.html
-
Size
4KB
-
MD5
d595faa2556ad88c6474a57d50bb0169
-
SHA1
d586204e4120dcd93e0de12f0b5eacf13219f776
-
SHA256
744809e59928c926cefac2beba046921731f913e9d7c322879fed6afdcfabd2e
-
SHA512
fd6ee93663a09bd446fbe03524456c5475277d25d1af6005b944e56b70d01410ca84bad6975f1ef95fb32d5d5db2b086b25ca5bc7071e89d7fcec52934b8f8c4
-
SSDEEP
96:1xd9hwVPcoGg/j5yntxI8vq/5K/u04XnaQpy/:fdbwWo1/j5sxI8vE4/uP3V4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000723f1529870ced7e6a3b96bc8cc490bc108ff959c135aa5a16c8bc476a95c727000000000e8000000002000020000000888fe4510debe72483d04e67631171390b82f7a4bdb6dc4e1e01ea7329b8ee06200000002ee403eff39c12acc1961202229440412d91d7a2723f84c321b2f55885e2205140000000a1065f2edd8189c667a8905803bbc338b15916e3deb20e4db0780141533f4e05442bbedeb5167902ccb2c45e8a1f44e75c10456945ea7466bea7ae73f82ac33d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90147e9a6802db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C064C6E1-6E5B-11EF-BF4D-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432014451" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1640 2516 iexplore.exe 30 PID 2516 wrote to memory of 1640 2516 iexplore.exe 30 PID 2516 wrote to memory of 1640 2516 iexplore.exe 30 PID 2516 wrote to memory of 1640 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d595faa2556ad88c6474a57d50bb0169_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d357f02225cf0a8a54b22e800b0860a8
SHA173c326d5d850809e839ae6acc79af6f85eab1a25
SHA256fcaed9db7aaef8fe63b9aef33c093dc36f699714a1e8738043eb170ab68a7165
SHA512c11d20743c00f5cdc55a15a85f18bcfac05a0d53bf45bf3c51ff3c81736ed0e2a3a98c19d20ee2917255c12b886509f5bd7cfba2f1d501d4c73138797ca686e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41473738d31ad5a57099f5e5bd68b82
SHA1595e9b3d784a42b0c6404027f9388cfde8a7a84a
SHA2568453da34ba2434bc16f8d4ca24099ab20ad325757c793d229d1737380d210a46
SHA512ccdf51299b7755143883b4bdcb7be102959ed8c368b420828e3fda6242a91c0232646dc27b5a72ab352d55a4b19db8d0fe98e9dcaf080e34339872cb7b0e378c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cef82a983a426a1d972894be08e020e8
SHA15e57a080f6a38119cd84dbc7ea6501383a1a7b40
SHA25632c06e6f5761b37a97a67a09a53e834ceb2b0453ee89b4d2cc5aebee956c0a11
SHA512e5cb2cc435adfdf67d1772ffa6da48be33d5d3382b4fd3bd3c49cf6b5fbcd9849fe4049d96b649f8876ebcb676b330c4e2b253f8855405bc369122f61156f87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba598d89487d82ca1249f8ce2603420
SHA1faa7aa998ae4b1ba650e24fe286c2b1bcd166588
SHA25606c4d01fd3a4d55ebd5bb73d027f2d621c94f21c2deeec93d35a3b25b3cd7429
SHA512c0c7946f3b2485277f6acb75d4b119115285afa5dd95ff46acdf0a1fe48aeac842d1277450dd28fc31c0b464a1eb0a96b38f023ce1f479595221de8d19bc4adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdbffa6d58901e35443864b8d3dd936e
SHA1c6de07b7a5abb9a4969f4e696f1f03e386d635cd
SHA256672ac59d540090645492a11a2033e2b2f2a6ec13c2c12ea914d000fa48050b2d
SHA51261cd8d0decdeb820197ce1886d789fdc262b4989ccfbd89da6d2ed3121b3caca2ed00f0f9eda5af10fa96289cd12264da8a5887fe2e8fca8184b7fca4640fd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bfdf5b819dacd3ab523c42362f6364c
SHA1803b30f5bc2e58cf0b22f8822a69708395eeecb6
SHA2564f3cd433a67f8d8cc9b66bc63a5dfeaaea1ec420b1d52e63d43b04e79b7010e7
SHA51271314d25dc770e3b24f2fcff99e921296e52ea6a6f93eb71eb0581a323d346367de9f7bf2d4fe19885d38a8e55512aa7db17738d0cfd902df3cefdffb639a60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597d28f215d0e3641a459a355e5805f4
SHA1dcbe864a1204d6b0bca8f255c8133fb7c87af2b6
SHA256f018561a2f2447f0c9154bee3b435f0b29e62c042bd1bb008d229ade03b8884c
SHA5120ab24676545b36fba7f59c93ead53855cfc15ab47c90a7cb786f7031a844cff3af9e909ce3b6618d184f746bc1ae64ac548803b937da2e1942b8bebcbcbcfa81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a5cdd3492d4755485e8d4ba302f9b7
SHA1a1c9113575263cf72d1c1664051ca2b85fa7e0ef
SHA2563f80483f9aa77bea8ed346b3b9cfd6d5d9a33e2a3203092a3451950cbfabcbe2
SHA5128f5cf18407ae3eb31410522f065612c1cc6e518844f19479a7bbad1419f1ffe2ca52d21634b7a9ecb15cd31f14f18932595ad68e400e9c8c04bce8d3fcd12715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d108eb2ebea267c2db68d3ff8a6cec31
SHA112b1375fe2c7d1ffcb71f5d5629e73804e9b1327
SHA256f7df3a2efe1f5c1ef582ee7ff699173164f08d540145e4678bcc24523cf374b0
SHA5121251d7414f363ef42691b7733387b106899eccd47f70f2a2417a46fb320138c152ed420438532598b681245064de3a17a516fd7ae915a8b1f21e7d809da682bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcaf4a0378eac0f19dc0b5c3faa0e4af
SHA15e6dbe241ab787c6430193c8018842415797eef5
SHA256f991b1349f066050c4ab38ab9c52989e39412c4ae301817cdfedd6d7cd82baa7
SHA512baa8891424b39c414a0fc634338000e5ca76bc0c97d06069a11edfb2ef6f7b40d8fd7bce43654cf8d66f23897c2910fde38cc1e0504bfa38964288bc66c5d8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c4c4fc27cd3e696769ccf3551239a43
SHA12ee9760cc7de1a207c5e9de8dd02a6791b4920c0
SHA256f51955c77352b6e9f30fd0385c1e99f381fe9540fb3c7c666d258cbf1540069a
SHA512d9525dd94e6e2ff4f482e03088dedd4bb91c20437aef6acbead05586e96623f3c708222854f32fcac3a8e78e9c379cf508e96ea7437e9bec8f4fb2be55079199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436531bad4016c25b633ca9b6a0de856
SHA11b5102838c1c53752f9fbb178ec56b6af8e24dd4
SHA256354e919392a616bb4d58c670a6e009768452769a09e5be34962882d597f613fa
SHA512f5dd6e4ae1bb611f2152cd1d7234f073812ddd228d8daedf9922a7abbaee357b38e35f439180c9e1acb2be05563cf9e0b4eebf8a92a4aeecd7d47910758f4ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb1db6351c719014e40682597d10d8c9
SHA1c8bc31441e3d9f8c7e3abae7ebcd7a6228bb7a8a
SHA2563ab39fb5fec9ceabc9fb09a5c39d7085ae3e34ec09b93329c40efe9c31eb7940
SHA512bfb449ccd2865a269fbd9c9cef3af7c9e8c0aa1629d6c682595e4bd2ad348c75af1a2fc3847d2c1bde58fa621aad3ecaf1ba8055acdcf23e68714c9dfe9cfa41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3a8c9ea65fa1496ea9e51c05a476cf
SHA14cdee8dc4d00231c4e12ee342786ccd1fab5aa08
SHA256311354a5bfc9b03fb8418df3f39195733998d2c5eaad3252cf94611960f620df
SHA512bae45556ba0e00dd3747acc61037b65d7358f9cb69bf8f253d8a8dee727d4f94c8f015609911d6bed2748b402ffb2345338b7fed36dfc2e526633aed8900c7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ef7734067055d290d15d54431ed4a6
SHA1d9149a09cba680b0c50d616a7ecc67a9cdaf7934
SHA256817f13b227fd96519d0e9e0d91a2cda34fbffbf201150ea1efc76d4708c0f968
SHA512d754aaf6c45ee2d3f2e7cd2b09983653edf0748f3f448f899368a065fc03a09c9bff58f821696df2b2013e1430a3a6ab79ef768bd665768bc7789fd10c95ac36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532921abcd18d6491d8f1aa772729be5e
SHA1e879cf19054985e2fc8ddc3af3b28452f180dd0e
SHA2565a42f7106cb9e37735f8dae29052d109fa6c1cf9e1397ef356cb9944c39e24c1
SHA512ff19c0a5a8ed2f678588458f97e412dbc744e7dcdcc81e1f01f1e6682e4ed5742377d699fcf026a1900f9e035fabd6ba64ee1d619651bf8dc3745a005b8bac3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6cdfb195fb1c32b20bdd7666ff8e91f
SHA187ae3c79251e9f8e4f1f88e709d540797c8d70d4
SHA25639b9d43f9685a67010e447494ea53873696aec2617508a91c74aae406ab6db0f
SHA512c39b9a429a0d51b3f96ff89d199c20f5aa34d9d8a5a84bfb4c72a7f98ba337fffd2d5ef1b228513cb963e7db253671f1d06b97c107bd8082ef8159c000d51418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42e91605a04f08bbd0537e00794e46d
SHA16598d493f7260f0ea64680e0fd7a5ca06a013dfe
SHA256352f0acb5ecf1b5f1966f7ee62bbb9c5178184001f05245db2cac2dfc80e4d4d
SHA512deab08cf3a7de94d58672a074501811340e9e6e83703f3478dfb83d8abcd54e7563946259ecac4eccf9c78156098e9f5837a93af618eacd10b3753ad325e4ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a122288a3972bac20944f202fbe0e55
SHA1c0f73b0cd74d2edf5c6adc7ceb3dc75cd8733002
SHA256ddcef56366407a26d903f94264b4c59d666f88273d223e7bdeaf46d7de3aae49
SHA51266361dc01d5d3a153984f1a5233af5aa1bba467b06b8e7fbf02fbb27917493f58064d2f6008c25626f9444c24fb2fffcd1a692e0f4023d21f7a666f184758820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf10c7d36aaefcdeb51f3634b41a3e2
SHA1b89018bdd30dca2cfd75ca847fb75fca93b53d89
SHA256b1cc189477b65e0487e08bd78bb8c4a2a015b909c72243ad5eae2963446a3eb5
SHA512938dd46cd2968b861214a5f2262169dfb37399e198f0dd9267f7de8bd7c2254063f0b91338e8d9981aa8b2c5c6d7fdc85628da894d36252bccb4b3dc93dddcdf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b