Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
d58c55397d73bd3edc1e6c97f31f184f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d58c55397d73bd3edc1e6c97f31f184f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d58c55397d73bd3edc1e6c97f31f184f_JaffaCakes118.html
-
Size
36KB
-
MD5
d58c55397d73bd3edc1e6c97f31f184f
-
SHA1
f964d84777a1dca1a4c9e57714a532cedfd67c3f
-
SHA256
42a0cff713bb5283199d6f8590f6bbc70d39b34a6f3980aa6797cb21f3f71ae8
-
SHA512
e83cf546adc23b7c44c57f95a4c29c4ea4538117de0ff35b8be0f21586bf768b41324ce55fd94735a3827c3c9c7be4d3503ed7667dd3e97328f159f6759bc0d0
-
SSDEEP
768:szjbhm7uDcpSlqMowxAPVijI9q252hQ2q2X202Q28WtI9N29N19NZ2HS0+lheJA2:bdiU8AsQFodDd6I9N29N19NZNobbb1fx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09e5d576402db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432012510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000098fd6ec7e80fe05bf5901776604fd1add7c24aaf5319bcd6c8797483b82c86f4000000000e800000000200002000000001ab99242f89b909a3b6d88b80fbda587315953a294d0a894f0ae0149169ac19200000008a5037e4af8249318665e91c0c14401e3003cf1fcf4220aaeac110113b94d23540000000a3a6032aa9ed5c0093997ef92d1619885a19c11ace6fe66024d6e82862d40b8c96a0b8368ea1fbf79289858958ed7df38dcf7cd49c45a3605624503cd816a1fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C2D5A31-6E57-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2168 2112 iexplore.exe 30 PID 2112 wrote to memory of 2168 2112 iexplore.exe 30 PID 2112 wrote to memory of 2168 2112 iexplore.exe 30 PID 2112 wrote to memory of 2168 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d58c55397d73bd3edc1e6c97f31f184f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544615366afb49df07924cb0f5bbe2496
SHA1b5b15ec10951e343d1a01a17ee7c8d30c17b8bad
SHA2568686830d4b260cc89967febf0ddf1bf4ed1c1f2b8b982e8d84e5af6f60f998ca
SHA512ebc705fad272759835c829eae7fe0b9d3e04a382cab7a2baa941f43204cc6685f0344d83ce6899ba1c9ed63853991b507433b8df38be455048f24e7bf58fc72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ccc27654ad9d504f77824b06d0a61e
SHA16ad0f3cfa111e7e34f5fcb22220548ea35afa591
SHA25615eac8d28608414ebc330fc2abe36e9d8ff6a0e6f79391e30d64e05af7905fde
SHA51275779923c193d62019aa6d6106e34274f07b01d7a9bbdd7a5826418317fb14f579122af1673c25249f44c24d86c7de2f5d711dcc11c228ea04758ee252649aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c489a2e678af8a0b6018e736f6b70d76
SHA1757ac4023dd7ddd557e552e5c897794bb1b030d2
SHA25671dc4c396069bb45b485856103cf015cf801dfe90c78dd631afbca7af527a90e
SHA51202b28cdf0c418ba79c9611f69f1a84aa6bd1db56115f94bcfcd9913f5f4867fd9b42229a3dfec39f2095259c370ac60fedc5a705dc81c2a90c46ba478f3cef2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552cd60d91d085aa10bcb89f798adaba9
SHA1c3c7170bf8cace88225244096acd347b9aa561b9
SHA256e60ebfd7ae5af0a4f09f8914ffd6e9cad59076381aba18917bdec74a9195be5e
SHA51279ae61098673c36ebce9f6cc4157d82bd8b31d6cb21fd944276f307e4f5727509b5015171a248feaa04bcf8c4ecb3fd30e898713743a9270761c5a9d06178284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34731f3b9cffdf065d619764a887b40
SHA1200e6889ffce672aee6c8c874a0fa82860f4a19a
SHA256e1e0a25f9d43b2edcc705923ccadab7449845ee57408cb9dcd7b15aa3861b5ea
SHA5123aec151a2db3cd9a76e31fad16aa9d7823741250ad909a99c17a66c93ec0c3e9cf19d54f28cc7053ce80b929f11805bcbd053821d746cd140914e55dd49c292f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee285ce75eb998939a9c8d15d015eaa
SHA182feee3cc4ba25c3a8b3a5d07852279cb0393cf2
SHA25606bff66a73f18a2bce2df824992db9b201d06dff5dbd6777df5bf51c4a0cd3b1
SHA512972be87c7529469da0d415af1a390a63c34465489cc33eed320b967950d4f21f996066eb6b183d6f0fe6deca2971086940088ae5264a8f316c8662f6483e4a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae59ec5567810dd9feed8e14a2c17062
SHA12adec57dc9a0eb0a12a656af3529685348bdd744
SHA2566a2867a74106e6084006131bcfd5cfcc99543c8bc12ceb6f66362fe38a024324
SHA512871b0d80f23fa6ebd6609c015f1b5d49d24e250bb88ca4584ec125466d00da74def07eb8ec8a4eca4e0f79153154cf6c6bbceb36195d100dea99079aac8082b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1109ea50888e2941b421f1ab30f100c
SHA1d6ba249bc76c0d48245e23d45f5235c6a0cb0f7c
SHA256762bfea13204500aa24064fbfed50579b70e3ee16c89e907c52a1cc44e1d14a6
SHA512b3a04c4560fd1573ef24125b280d9633ca220d5fe1b6247a50b27d9499cd7fe5caf6f8b948a0cc3bcb2a285d7754b276b66e6f01329ef916e3106d72e6c31d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509cde643502618ea5bb5e5f25abc9627
SHA104d83c7bda41ad94aa28509b310fd6631c9d2859
SHA256e814489cb80cf0074b78dc0c1581f04b0c503596aff9217017d985ba3cfed76a
SHA512b07dc884c5fc287db2b3dc7f56a767899957d59d9688c600aadc6cfbe53a057902984f79a82655529711b300d7a6ee314a7079dd8ed571e0ef4f440cf05a38b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b63b4e065902b3bbbff75a63b72c2b6
SHA1cd713bf9c388f1f3e8fcb2762781955bcb350dca
SHA256b7e9073fed6f89045fa50aee21c00b02d00dab85ea8bd05509e8fd552f06759c
SHA5121a5ccb93f0fdc830a55e7b15685815f72c978dc63b35dce7a6428c311b673623d6513fbb1ed782434225d262d570f130bd986e1edd612b5c1f0cfd9e0cb99953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516dde98114a3c1c4ca85446a29c7c516
SHA123194fe3b0558d2dded0f739bca721807fb5f7e4
SHA256a1695345b8a2a3325339fdb0806361ca5e50a1af83a4e89b96ec6cc24c1bf6d9
SHA5124732a41618b6ab440ed6eef5558e5c4080dd1bbf74fbe5d5124ecd640159d3f718d21fc0f6a0d1e5a3e9123c7f340dcc0791abf26bf2da2108d122a934552c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f09db9bb1c364b6ef95352898cc4318
SHA15eee32435d8491bcf2ca2c55694191b93c709ea9
SHA256c906da80cb6956093ee19ccc958c2b917e6c1a00426f819bec3960d5ca37bad7
SHA512047a63d655efc5d141f51c6177db1faf192b65a4c48fab1ffa58e32f8a8aa433782068f522a3e419eb5ac774c5ad63fd75056495eeacc3b910ffb132fd3eb555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558382c7eb795275eb6293293f8c4f5f2
SHA13ba000995e3816c736240d9b6219c6673fbc581d
SHA256b8f5d2c23116342a336455ff199faf036ea8368d569351e10211961cbd4b8ccd
SHA512bb9f7a39f76249252b2db3cd3e923f38b12e83d3db0b03cad3f1f1b0474ec70d2e027ab1562afd5d17c3abdb3dee2fc0bbc730365a423a4c6d64da61d70aa77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e2e76f1908eac2be5883b922b57f2b
SHA13d75a66466e0acdab80730107a7ebb8ecb31ddee
SHA25670d113924c471ec1696276ad02f099f578ccaf1e3365bddad3fc267d57b7272f
SHA51211e38594dc9e7759494c93e005c6c8e7198f1ed03d5c9b90b14de8dac4049d23540324d568dcf86ca56352a415d96f546f42c974eb10216c8e6ce8aba998f0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531982e9be4b0e5eac91b8803ce36431c
SHA10fcf07d8d112a3caec7af3905a2da439eaf4838f
SHA256b6b9e34c93ba64a858077afb07bb6d0b01e5b08b611b553617d87ace94edcaf4
SHA51233f41283d33c461aab7435d983162941c40bddab23b099c6c4c02723e249b0c993400ec0215d979a6c13616729e9f4dfc2cca363437c687247ad5d3aa6b7ed76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563dc6eaa790c15d44c648a0fc1ca6a74
SHA15f5715870d8922d9c5816aac3f0b073c516699b8
SHA25626d052f4750ae07ee74c59965ef06a44895e8bd0fdd894ecba9c9a9246a3adc4
SHA5123342d8d15ede818bfbb503af56b05c3a809e08eee36087fea122f8eb33efdf9f7636ae5c4ab5fd3d373381a3cb8698e8a88146aaf6943d942e9b9649cb1f5a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bbc93b47154196bf6e993819ddd09fd
SHA1cea3478f2689c2560b5fceb4910b67f90ccd7f60
SHA256936653427d41cd74a51424564e0a55ebc55de0746b06fdfd5013082bd73d4f46
SHA512eb295f91e274624d1e6ee669cfc363e8e28b5f0f0594db9a58433a9f06f1f0e016fd00fbd1ac1698850aafe9dc85006a4dabf864fe2b5084e10b8af2a3687322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51289d38744ff54b1014b777791c02f
SHA1b9ad1a3c86a957dfadabcd1a422e0d24d49dcf75
SHA2564d7cc0ae4d209b29a5453bdc32c8861b9bd99d24ac775c8f64abf1f1ad12e6d5
SHA5123b10a945385d1e5be424ae2f85e6651dba2a0b7d104889d64d00ce2ca0045ee418acf72b4f3fb464abec3e9e43ef17338f27d12021c81682a3581c2927bf0f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05678b18026529ad8e00d0795953e2c
SHA111c372ef37eae361b8f3d4d856372853e5584976
SHA2569ade8252ec829a5c8cef5412594f7e42b6809ede145e6f227f9d381f2bfbd385
SHA512b2288956150d4a43ea177892eb4369fe578e620b89fb7fa16b727ce50a1a1d99a7addb2a7426ce36bc582f6bff1bd8d9eb9ddf05ba95a8cc400f5907d9428237
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b