Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
d5984300af037b0c6e669c70d9ed1167_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5984300af037b0c6e669c70d9ed1167_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5984300af037b0c6e669c70d9ed1167_JaffaCakes118.html
-
Size
460KB
-
MD5
d5984300af037b0c6e669c70d9ed1167
-
SHA1
4adec9a7123d626d4d1b4ccd754a733838261e7b
-
SHA256
81a755bc0a51d724f0d09d747cb6d8cb902674516eae8b685cd4e91ff54c4ffa
-
SHA512
a7d70ef28cafab605b4ae64ce57de98ae5f63e17360d12997ff6bca94c8107e100d41b10be075cb8f75e7cccd00050fb9ed4990e4bdf2a394f47ce7507dba03c
-
SSDEEP
6144:S9sMYod+X3oI+YmsMYod+X3oI+YTsMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X3e5d+X3d5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000029ea86f4ed07ccf040e45bf108904269d0eb8b264c2104f19c6c81f6c13454ea000000000e8000000002000020000000b664d5671f3a22abdc41fc61fafe31aee255b9c9699072211576c462c75972f7200000008b55381af8fbf91e60bc70a7556e8cbc1ad62efa1291a25c052082d1609cf6ba400000005a478f6512f7a23e41c91bfb5ffe58b99a158e923ce1908ce018c2eceb278aecd04a27b3326205288bff348e21357379d26cd6881cec5d63c89f39aa4a33ab19 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432014964" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2E06EC1-6E5C-11EF-97EC-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f024f3cc6902db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 532 1724 iexplore.exe 30 PID 1724 wrote to memory of 532 1724 iexplore.exe 30 PID 1724 wrote to memory of 532 1724 iexplore.exe 30 PID 1724 wrote to memory of 532 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5984300af037b0c6e669c70d9ed1167_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b4585b4564e82ee1f642cfff5d8e7c
SHA1fa2090320981441080f99dca018813fdc89bb7f4
SHA2567b0d5ada18e155ba9a638cf149b16156abfe4da08a9502d234c82b6e55c3669a
SHA512e77ac61e6c336635c7a56b05721cdfc5fa507c1bcbbcfc7013fbc47ccc4048ee863a9fb2e2c276d6def6b717f3fa902bd7526930a96d0b0fdcefabb5cf9c2330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748d81cade50b3876791051c381d1a7d
SHA16e3583ddf726f4d87abdfd74a73a365a7b8efd80
SHA2565b572c5158ef20a504433cd8b89ac027e146efd121a98ba05ad1382ed8af413a
SHA512d385bc4ef2ce2ac222c38afe797bcf4a78145c5d32681917d65d13d0e662d3e0c3b3cae21771e540b901fe86c8b1f1bc71ddafae66b7ac1a1e6736b2a15cde9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55065cefbe4a33ff380e408484b6bac2f
SHA18f717c3c6e1ecf95bba0694a81a9f0b48d96b547
SHA256ef32bbda1f0e6d254815b2110377e9184de4133558a07a6ed97b6dce07062b3a
SHA512f62014fc10d098942a7b40eb33f20e31c7c44a9d04ed87b3cc03a13a247209ebc1c4e0e2f769cdde507feba0519d9dae7db76eb40a1214dd77295dcaaa0bf2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29fb8eea89c14af9872eefba23fef63
SHA135090da1d3f85b5aff1c39eeeaf01efb6ec3ca8f
SHA256395e727d0e1d7efcebdd0ee49f155ba0bf9b34797025945bb0a805c103b642fa
SHA5126126fb76149c0de98fa0728f16620d1bac7aa4f1031f73610e75c3853128f2a706b46da10f809093188d94c57f182a2a09109422a335ba962b95d50e25ab497b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd9e3773e0ed203a25b4f3948da0627
SHA1b7af4633095b001ee4217d9ad8fc8b1988d147cc
SHA256ab6478abc1dd651c6e150e844f6e9054827b35f76828c533f4c435f1000a1d35
SHA512f47f226876bbc770b2da8519b9b52825e836a22c64a70b36e97a179b9648a5cf35f115a28f264ae73bfc2f0553229211a60b7458e98b92d1634788f3297e2ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f71749644d1aa3d9c6c7b0c7ee10bc6e
SHA188191095cf767da9c0d229abc756429c9a73fa21
SHA2569a9c2acb87c3be73fe5faa8d1a4103aebeb7e91dd7a66f337d0830c130346c69
SHA512c9d79c6d0deb734785ae6bcd537ed733ae0d7e382066d88a263c2fea42f74c24e713aad4e4314577d1761bccd4d688ed987cf52bd8eb413ddee7c0356b1c1b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9860064d1e37771232f0143c67c3831
SHA1ffcc6a4d79a608e71db60d9829a8d676215972ed
SHA256b8ba7b7316d58b73c1abe6d86d00e71b1ca0b966db7cce2488f3b97de0028567
SHA512ff4b58bb810a4cd9914ed642f699bf7fc0aacc52232c9e00b81b64f62fac8f9187f251be1db3e3b78d235484c3f8fe391c8561fc750892e163a1254f55bc08a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03f281907aac94f7c7a103ce2ede63a
SHA14e74591a14f58156a3a251ec829a9cb05347c78c
SHA25681a9c2a51048e7c81b9f1ef74a4267a960a5f4378f71de70aef2de61c5266c59
SHA5125706bb3e6ee342a955675ef216863779681113ee1f3f147793fea9e379158c8ffa446a5f7890f4e3d1418c45cb60425f7f194150000d5d35be9b78705068ffeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8db2266d8d90239114af8ab5c6b633f
SHA1e15da03bae6371efe4ad8a01f01ee99832baf15e
SHA256f04cbd3082731b69288099f8bfd3a701f171ab11a120f0f75149c19bb7a9194c
SHA5123cd355a4ec0d68b2fdf806c4644dd7b05075799923a5941d27c3e474a3526d1fbefc456e2a1d28c9d31bc1d59b9c78d2d7ca5b9d27d1c57cb03b0fe5c0ed36bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1b98b5bfa03425f58ed37586509980
SHA17d899378b641e4a60e4423d6ed8670c03f1433a4
SHA25691daf2b94220870e656213e714d207717b3329886e90025b05fcab67950241e8
SHA512fa4b1d3057a33a9772e0d28ecf523bb75d51aa054dc428b2d88eff7ca0124856e97a26b714d35513f249746018ca1479d79b01efd0e33b597e0e5b582ca1b3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b125a35d9680fef23daea7f2945be82
SHA1bf356346359a039969c8d0e99a7cfdf9b1ed2689
SHA256b1657270e705f1782ec70b7d857de55df53655759b17408a7e44bb25c5ce812f
SHA51221644e53b9cb6c6dc7d65f740e6d2411d41f1e363d30fc8494f13745dddb6ce72d0e70a89dd5687f57df93b2eafebdd770377c591163e79921f6e9417302bbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c9805b2dab592c2109b258aaaab238
SHA1ee068c95f3b840177e2e18d090beadd7fd99cd12
SHA256c9102f01728f2e18cab23a46df9924c55d1f2a980f1f36870923b0e21022ab2d
SHA512fb96598528b50994db0633584204ed7bdc2c4827a7c3f1c91a82469b125f8daf2a9254b934d11e6b410a6846af10db05e5ab00faf50c760f323c46b4642953b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e21bf821a94ea44717d266b3425240d0
SHA114ee22e46504a685082db90ec66f5d75f6fce44d
SHA2562da22aad2e8ca39cce91efeab228d39a46fda15e47d02c32ebeca67a37b46e47
SHA512e3dc13d153274056f12cb32e11e4306b9af18be91936c1338c181b648c8bed8ecc24f561ed6be3f6eafba281b59b63de9c3618070f1f5f02adaab9ddeb676370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a07679de0a0321a98282fcd47774cb
SHA1ba34c6ec416d2841c42adeede79555209836f0a8
SHA256fc32ec6870a5a95515a02c322bd01b5b08139d4fdfd186447821d15aa0e206b4
SHA5128a2cbca10e975b00e5fd08b2dd307ef5cbeb5aded6f44e33e1da31dc0c8ae3a30b6bd033670bbc1a2fe29503f4605d2b902a9e846aa9c4aeb710b34562b3ce08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947f72dc003eb4146967b6dc1c928ddb
SHA19df2e1fa31643031715c3e506a1e0c0e3c48ae97
SHA25668e21528298577175a726eb8a0ad33586e5e0d2eadb81a9e9b15941e75a94dea
SHA512eb457c33b84e8d205a24f7c93caeb13e38ae027aaf965a8bde0fbca389230a0c46a1ff0da700b78405fd11d15095293d96921995b3417071b95754f88aecfe85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea295a6011a9626dd58cc95a2d199b5
SHA1e19ec5d6f31e29129cc8d329968f087226dc22e4
SHA2564d258a15a54aadcccc10ba9308c129a806ad098a2a49713539d9644ef37c4a28
SHA51281190e2b159042e411fcf2ee10cb437fc837551a0b7bd0b108a42c578e74e8d9988cc73179cdb77108dee273f3bd915eb000c0ff2835c814d4ec3ec2595e3bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0152cf96f98d66388384b0a57fdd21
SHA17116ad169e0bbb872dcd2229db57f7cd9387d46d
SHA256c5affd36f92b0f371d812cae8b5b18bc1bc8629ca6176f0b318884df0309c325
SHA512b5b946b5078c719d01466a121b0ff19ae4d80753838c748baa317f30acfa9ec14cb0f6686fa522db622bcea0f959849467dd5cb25310283638562c61f003ed0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0b2c1e54a65a6a73fe8523fabcd2a1
SHA191305be29c8894b51ce1ede0ef3a318cec699b0e
SHA2563a3c217bff6f05d2d6b4dd04a51668057fca6e1d51b77e6fa91e92c46091e29a
SHA512c3ec7ad8d1482e0d429ed5f608ac150e4ae9d30cc8a0c47ce8272d43a34951f41d671fb218e147e27913e069c2f44c6bd71af49c7550e98209fb2dccecdc7a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e13a7455af161f10a17851e1caae10d1
SHA156871d7c015ede622a148baff44094b9671a6c77
SHA256e0dfc7f45ac954e24ddcd8f85faa820963fc064d3f5f6d67211325112ecb2ef0
SHA512bc14b053d6f2ebfba53f1cb3acf9039340ab9da9f86e0c544a9bebda13b80e5b52232771d99c0d09f4f3f563d2b6ce7f2ddcffb8394489668a0d8a1fd3f0df33
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b