Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
d597f5c19cd6636aa61e2fe905deaddf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d597f5c19cd6636aa61e2fe905deaddf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d597f5c19cd6636aa61e2fe905deaddf_JaffaCakes118.html
-
Size
28KB
-
MD5
d597f5c19cd6636aa61e2fe905deaddf
-
SHA1
8869665203ba68a4b49be22d8135d8a7f6f112af
-
SHA256
438fb4131fd64e98ba1e91a74f38578c378f8462c6b809036795c26a8c256b30
-
SHA512
4f6060a28d4ee2b63a5c031ecef9cf169f8abea10bf2d70a709ad59c65409b5da1e3afc8d0218a233e35ab70df40cc36a76d4ec82fd009fc4480f58d251a9899
-
SSDEEP
384:EitsFqIi0VuZZuDXRU3Oaha8okIIfeQmXgto9K7xrPsGpkULP4SX2zCR92ki0LuK:pgo02AmOahaBwto9K7tPsi0SyC00Eo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000006cc789571d98ad5626bb9c367bb2267fe9d512a76885b399c31719edde601791000000000e8000000002000020000000ae00087c618c1778d437a1d401e067e4701b7fd80b5633a70ff1ed3d787e8ad620000000660bfffd0d5b1fede2781822800823701fdf8367f66680d8f048d3f1ac2d217640000000d15c7e86b23f326a35e0c7f67ec8f7d53da65144d674b42b81829a3a986ef8c8bbaaac2a21d11d058a78e007201eb204132960db5b7ff4d4dfcbbb31dc71b692 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e0ef916902db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB823531-6E5C-11EF-9109-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432014870" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2256 2420 iexplore.exe 30 PID 2420 wrote to memory of 2256 2420 iexplore.exe 30 PID 2420 wrote to memory of 2256 2420 iexplore.exe 30 PID 2420 wrote to memory of 2256 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d597f5c19cd6636aa61e2fe905deaddf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50925bd4cee602271e8713ef84b8f69d8
SHA1de29518fb77362e8e9f810508f5b5b485e5f3504
SHA2563ecade9e5975a98d2bc45ad7294e3c80722c701e1dc846882cd134779c07a877
SHA51238183ba4af5a74b44f5c8368a254dcb5b90434df7a3d89050c4fd3b7e87cd9e0abd777cd3536dbcb5325c140902a57a2e4b060ca1f26062ee39bfdf207008caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba35393a4eca56c028e62613841c702
SHA11ce2e8ed72b339ecfe8771001a2829d5baea6e72
SHA256b2759121c3adfac6b66d800ced909d0f17a6c94397887558eab698e8f1f5c7a8
SHA512159f36f20f9d220c7f82b5fe7a54edd74f846058c46eec212c7e1ab6cd65a3499390dbf7501a1caedaf06965da06f13f803978effbec2c4cc4b1cdc061063d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86fe42bc569ec23cc5e12245eed864b
SHA1e04caa9385d7d4e3d54de0216ac87d2abca5122f
SHA256adf01576d5ac0310c46461961d0de79adbe027103440d2ea1107c1a2141e71aa
SHA5128280f26be32da3ad5574b6acfd38ffec773a570752b467c3678f74c25780a3928d40efba68865c43b5844bcd4a79331899a32b24e796ab95e2ccb545ac8d402f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00a0ad077b68da2a1511f75f559a647
SHA11cd2dbe38c3e94c5a92e3631f058c5e323b157d0
SHA256000cf6c6eac2d5ccd3b9e2a2c9fe6a0baee83fadfbd0439eca65bc00a6cd6bda
SHA5122935e52d79fb1659ebb358181745f3d78b4aee3639c97f2328e6de61c1ce6bb0a0d1b0aab9c0b12a041b4a43de19cf085b5562626300b5ffacd53c0e2576e58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531294a18b7cb43d49a52a73fd712dd61
SHA166497047987683d643bc5449e6efc2b74568452f
SHA25663ce8bb3e7fec56de18ebf41dd34378a0aad448598b6bfeba3b98755217f13e8
SHA512d535213284e25aaf7c95582afb6f90b8f5290dba19a21469543d812fad5b804ce1e24bf1f5d3a534c57ae8e653842704b859a1c8c746d82ee6d319e26f9028b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54458797dd4e9077bb61bd927b7f79581
SHA179467bc59da74486fa1f87505995ee500464139f
SHA25664ab7b0e4383adceac30dc0a67d75f0251a59dc6d29195a7b666bc7bbf6be864
SHA512c33db1f487dfa301459870347537346d95ee98188f06078abf2a23616303c63d8f3c4efe5d7360e4059338e012f0d545e5f4fd3c8a0f6bf68287ef2e58703e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eda127fec3ba39c6072375635e7f608
SHA184da852286811413408ef8fc2b90aae3d03c83f4
SHA25657e8f2030c1c1d8f45b85b594bf736e82365f10ff5ef928a2b007e4a9be79ca9
SHA51259a2e64c6f4deff7351f78ecaeb28282834125f66ca155d2e2090ce0f1d7561ba121707d7ee026b316ae4981267608294dc0782627a95f0221670a81f7f34783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18d045caeb6989d27eafda917aa83b6
SHA128c9ed5554bada9c0e00b2b825258ab482a2a638
SHA2569bf9d9af810ca0dce937634185324cd608e1b29e6537d4c1470d1badd31aafe5
SHA5127d33606444396f19fbfcd0ab5600f7743cb19cf515afaf40d00ff34d8485d90d4b43c0e7ba56bea0432dedc4fa305ba318712e120cbde3096b2d728baa722fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588e1e1f2ba6360cbbe3dba62bdeda7a
SHA146716e8e48fa99b7ce7fc8a7aa40d7996d7a4936
SHA256b39c426df5382ba0cc2f1b568ad36e7fbacbe1a41aec16fb1bda171cbd6a90a5
SHA51209d39bf7b4a79d50dc5f9e1328abe54a237c6ea466fe9fe65508f681ced1f90428e0c29a89d73ae796ecf876a753fef7026570ce0f383f100fac85a7fec9e32c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de8b3d944263dc5cd841d96004fc18c
SHA1986092b83262181f70a504eb530ed202a7687872
SHA256f3178e2553a1a6d9a3fc6ef41550dff75bdfb1af06a5e3733aa440cee84c9fbd
SHA512166d74e399e11d7b04cc88708bc5765b831f4dc2dd977af488087e5459bdb4cc7063025448eabff96c2dacf19e545c7b092ec1c0db6bd119c18bc7d6c52b8913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b355594ad0fc0c484832c0310738dadf
SHA136775731085dba98f377dfd77b8cac5e80af48e5
SHA2568e0dd172896fa804a1410d3f9a7f3bfc27a6dd0063be17fd1ea8ae0dafd01c16
SHA512830e27180a1aea1433d2fd0cc5e291d473a19bf4b7d77baa22a0405a468aa2b87c9732a0731b5deb5844c400bdc4324fa31a61443446415f71de2c5b67655f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55327e1ddf316002d64c35814b63b3f04
SHA12f72ecb77f572bd4fd71973c09a5366dda3f2b47
SHA256388af6d047c6a5a4c3136927256d33db4d6560be2842a28b381e2a7a638de414
SHA512281e10b30e69b4ca876cb9f86048dc133f1b39c52142cb70f316ddf9d43b4b1c56e2982d335e64b57532c1ff9d814c6135b7e942f27b742af300c3ded6b4bef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff213093784bc9986fa77ef1e8f8825
SHA1f96680daa40dd469d13d69edd126317679d45544
SHA2568ceaa82b7b2813050f26500fd15a80485edadc4d0e4c34f759e1f39ad667de75
SHA512bf0a005a9b4c1f394d80a996c926edcb100f3e2c9d2fa034a049fd5c040d56148c0b6130507aecddf02999a38fb8eb3b9afd025cb10274e9d40333b0b148ef07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb8b7ef2084941a17d80b82911f11c0
SHA14543e55c64a86822175d892e66c26323d3dce9e6
SHA2569468867f009922ba326d8d0e4abc83a39fbbf8d7a1fb8905040249ae7f6be23e
SHA512b170cbbdcae9d8f6079370ee61264ea1ec7eb33330b5b1943365c18653dd59696e711eeca590592c7ef5a128134ca6e1ff915a97d1de25578a0b1c379afb3544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e4abfb64305ef6ad7c41d80593eb6b7
SHA1940895bec95b0652e76fe296dd81b97df91953dc
SHA2561882ade1b95dd2f710984481a39a448c3a4054e34335ab1e4a003ce4a8045f46
SHA512ecbac23c01fb3d93a683fdd500c3f3dabc08ed213c3fa4e6a0b7af41e258057f9429585c8cc906d4d2913eec97b585d36a99b50fbedd8e01a4088356df4282aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5c27058b86079d5b384408406b1138
SHA13ea04b82b0d9ce21fda9fb1c030ea3ed1724ac53
SHA2568017f5b164f3274d83006106adfaabce537ec581bc7052e1b7f1c5e8d94490b9
SHA512020833a8039df2d9af7254a1476dcfe209c1d7aa54c76ab7798baba2f5e90e8f012a9341c278fe29320275288ee20e771c4b78b129c050aa0bfd8ab5fa981774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56068c4e7e1da89de885412a8bb810238
SHA17eafc76944330038fc446eb436fcefe9fbc7ec13
SHA256b84eebaf3d93e9227442cc7a1aca6daeeb8ddfdcd81979d2377513ce376ec057
SHA5125d4f9eaa5a1cf0a155688bf3697d1e66112c395b2ecb8398f7ce70c3b95445e33c14a423cb2091692345d92cdb5af82ba1a03e74dc703d2c8a4a9f6ad960e0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f7134cd524bd23b720fc6f5ae6813d
SHA1b4a226e4231fb76c0c7cf7c1870816dbc37d280c
SHA25697e7e78730c2e3ebfd83b4f281ac0c93c951551a8977242abb498b0736d8a0ed
SHA512a6a463c77889ef6b036dde44dc009d70488a4e82eeb6858a3a037a4fb73a268549560c6ba1daa44e1ada17ed4f70de47f4be9382fa4dadbcdfef199ec40ac77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d813d10c2e5d7b9cab056e09d3170c
SHA14c0232f8cc462a048298a27c2121bab2bf677ab1
SHA256a381472d937477279fce1fb12691ecaeabde8ac74875d1e4ce5dcf3285ceb01a
SHA512fb69adf54ac1881ff86d4cc1e57cf17fb23c983595cc3b2bca8a4e90f72a3805c57aedd49744b3b38795a9ced373e4263d4992c18f241c42a25862a8754bf1cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b