Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
d5a1b9f73aab434ac4cad56c1f784cae_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5a1b9f73aab434ac4cad56c1f784cae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5a1b9f73aab434ac4cad56c1f784cae_JaffaCakes118.html
-
Size
30KB
-
MD5
d5a1b9f73aab434ac4cad56c1f784cae
-
SHA1
88adadbf0cc36fe0a0fb40ec4b822524bef8d903
-
SHA256
266f7b40de89259691ae0c90379846160209a6f22db2d68b796cc6e87fb77e04
-
SHA512
37aa8b0e54a163b43a04e22e22040d5d2204c83f58a472f998fce556fa8018b0394f57dd1b8a87d00091fc27cb81902a4d42f493343c7768de52057e7593b337
-
SSDEEP
768:m1tv11jIV0aHyg77EAoUp7M63+SxdSouWVv7Jbix+ZCYMsmZ935Cnd6UqPgI:6d11jIvHyg77EAoUp7M63+SxdSouWVvi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48C57D41-6E61-11EF-AAF2-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000efe83e2716f43e79b3dc228520ef5bd7ca8651044a54c86b2c3837255056b277000000000e8000000002000020000000094a0fa81d314747bdc832170d82ad155180eadc74789a00def077663506c12d20000000e300c9c5bb2d96ba719ddd8f1dd861191369e6501798361608ab239e87f34ac540000000f0487596b9e80bd81532d91c3105f4f59a7064f28e5ee87ad0c2fa6bb14383cece23f67019f30edc3f8bc0bb5021b2be95aa900bd24031ccc2cfacac42562547 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432016825" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508402226e02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1716 2540 iexplore.exe 30 PID 2540 wrote to memory of 1716 2540 iexplore.exe 30 PID 2540 wrote to memory of 1716 2540 iexplore.exe 30 PID 2540 wrote to memory of 1716 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5a1b9f73aab434ac4cad56c1f784cae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f14d279007d1565074dacc31820f227
SHA12f24cc1bea18e3c6aab1f058566b12daab63cc00
SHA256c8c478aee0122c543ef32f01385af00fb0f7995f147d3e8a0c1da1862b6cd61e
SHA5126b7f6f420a690fc7d2ae2be815493edc7230423b699d0251e4f66025c2358164ef4d35f62d8e4f9c9b600b394ee4e96d9dc84de6b53b1d91aac5a05521262944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ffc79f83c643ec5019bfe84884c0a77
SHA1a68c077d9372195ca1cb18351904b80e772c1579
SHA256c2ad86c5fd59023e8a773fda8de4ceba4536bb7f788495d134c88d3189c2bde3
SHA51299ae00862d72b808bd7d6908934723958922779dd00386807385a5b58d61a0b29e0bc97e204f85beae784a6ec39f1bbb38641ef9450ec0c9f634ecdee0b183c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd64746cefd47475598a536fb3b2dc7a
SHA187ce80308ece8778c21503e4f33a4e3258c9f349
SHA256c48f1d4bc752c5e630f58ab13e10d364d5c03ad0283dfe01e7d39272ff544ac5
SHA51287ee92fe963019547c1916ac43da3688e3feceea433039f0c78113e1103004e3b5e01b12f8010c8995e0bf3d98046ff3c902ee45a492fedbfe256e19f1fd35ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7733b281958878a471f0baea4b9cbe8
SHA10a490078da32ee2277c90170724731279fd449fe
SHA2563c7e906a74795eacacba512b4fe85ad3cb6166ae813f54490f4da4fca5c10248
SHA5125baefccd003bc036945c2e438c8c8ec0e0be1a45ae9353668a71fc8b9aecf72376a4605695fb2cdaffa6ca8babcaf34025b49f3d09ca5743c8d971b6c353284f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e7c1bf0b9738125d514891af5a3891
SHA1296475cc854bfacfc0c3fe68ed4e62181bf6d075
SHA25686efe07360cdda87180a416176c1249d364bb5a88814975fbaddabc08ce0a17b
SHA51298b65bac6a83ee51dddf7b3b97d1ebeca15bc76aa19220bfb2aed9d2b6f0d98cdbe750a326f9b4ee5073d295438487f6306e6351825b9c0ff4fffb0ba08b63f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c57e17462b67f89983e5a0080cdf0fcb
SHA159f203b272023b6f3881a7207fe047cb37254539
SHA256f7008909afcf70e5e2081b6823bdda90c68fb1e343c96ffedad5ca60fc94e6b2
SHA5120b941a775702a753c4014c2ee796bbc65977162cf50231391c17b7b7d6db813106a5be8586f7ba7705bde235b088be4f0e14dc0a2ee6228cf15611484bed3a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb1ba0cef9069b0cdaf04f1b6a170d8
SHA193e253a45093b6e8731a51af8af6b4f2d3058759
SHA256649cf87ae0dcaadf0840f3fca71a3d673eb347e97f1d7da0aab0ca351db55c09
SHA5123a2336fe8c44ac59030fdbbb4660ea4d83f75eb06dcc993bee655c30766fe382b269936590c46f18d4e626d4ca5b030abd5354f46268cfeed7c181aa6cc1367c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577968648a4d35c8b12a5c7d7198f3471
SHA18061111fcd1c80a7b1f954aa240599f4c62b82de
SHA256e455cf27012e5f44f66706c342e9bc85f9bb4b7edff2e4e185fb335aff2b7728
SHA51240957a76b8391d74cd57639829f6261d298cca73c02e168dc320cac74585a9fb24e2f42e5adc078d21f31603e503ac81cf725efd81afa6b292e679c2bc5e8ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c5c0dae056fdb11cfd8188c3efbcb2
SHA109736bd61c5bad9383ed5769c3850351e4c87c46
SHA2564c6534505e7cb44d4804e19dc3dc273ad718bbdb1152f1eca7f8f2b706c5fe71
SHA51238d23735c48a652a43d21a87636c43fb8846c53ecb118607b48fecc3f182fb24ccabac1675dc7bd70bd5c485b0a2d35eceb680d2352ac6b84ab1a65103396071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df676e3f664b8a050703ac32685c75c5
SHA1b2a84d91099af960024e6dd7ef03c3fd8139e6cf
SHA25600978d47890fcd1621f012366cc46bc436f19ea7d3c6c965efb81d08f94fde22
SHA5125ccf01d2c95501ff10bf662cb5263b4131f243ae7cfdfca30de6c87819dd33774b478c477bb4d1ba86fbc786874e25df69b6fc6d0b93ca8561bf2e43d9debbf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555616a3b1810f71a8bd38f0f6411515d
SHA154ae99e7bb344f5b26d5c1660707b7b5aaed94d6
SHA256e6b9f6206d5dfc745641cccc5a10bdef16dc4b16c169ec74dfb89a132e07c4b2
SHA5129289071fc0e5715386c049b379d8016b18a3403fe46a3f87beb44a57ddf9f2a94d045ca983afe76743fa99760ec5d7b6a24127ed55d7034b0803e3cf11309e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6633dd2bc0afaa78f6e062e28f701e9
SHA156e9095d1de81ab778804888b02debeb73ee17da
SHA2564fe0ce18b388322294ab7a0c66139d6a6fa45b4aef9cea4f9b33caff2ac3d9ef
SHA512192faea35537e0ff24902f2b4b9aeb809e5ee25c4e512c39713db015427403009a77278266c1288a831dc33e4fc4dc684a4e070c29039ee19b544547f02e0fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fbf57805419fefd1903529fc933968f
SHA1f3a2e4c69214c25d95e3747f3535b524d055f5f0
SHA256e62dc08e6d925424bf6c7f8aed061a0fcc2829db8c43b78a64586259d3d69040
SHA5120231196383c21d52499c383da3a9925d5093dd011df5213d514024d1985a7bf8d897af2e9970a698d9f893735a858421ed5261197c98c5373dc70e1ad40ef2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac85584bea8a5e9e94648a49074cc06
SHA1b297d138710c47d9cb769302b54a1154c4acf899
SHA256ec62e11240fbeb01bf498471b60d31d4db489b945a98c063fffe9cfc810c7005
SHA5124426965201bb21294015e9c256b712e3b3a6ae7ea220f5b443938ac02d305184273ffb8fba924741a5fa09bebf0a015c3c42353c25f483ebb6fcfc5c8635ab0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f4319b84f585a228affa908ab081e1
SHA1b6fd655238c1c0277b2fa454ce597644e704218c
SHA2561e418ef948317edb38ee83363ed85489a03c3420a24c4251833e4dcec3b5a5b0
SHA512e424fab8594ec0b29b8508596cdf7c812937853b0d7b93f76401d8af41cf9ce328f3ff4f4f4eab7000e17328db2dbff8ce4fc40078c5bdae3bb81eb02b3c2830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4a2de8065cb46491c060389fbb4874
SHA1904874fd7fc7f35058f1a2222e1f69d54c6d56a2
SHA256f81564769299ac033b9757b00b76695ba4e8b0a749879262591eb04503ee402b
SHA5129fa0ae278aa8a59a09cf2032d82db03e6828717c97464c356fcaf617800153089eb04cc9438e89d7941e1993bd574e08d90d5683d099765fd272482658356e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773562c1273ffcdf4a16b66be464a004
SHA16b7c0a25d00e1148d53820ecb9ed8e1baa1b8182
SHA2568cb399b07852b00f8b4a14a9fc6361e52e37011dca1f25658d71442e11ae5cdc
SHA512660f6a73c5ba0b6bd41c38fdbeffe7ac71faa71e91c91a2643627ed354cf05dff4b0f1d04d5df7212fac7da71eadf7611539ed0c3ea08e3c59097b139030ab70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa366adb9f537d1a3e41fb5e7fd32548
SHA171dd501703d265265a4b71274068aea2fda17efa
SHA2568e53ae3c13de6f9013809821fd6bd520c99bae76030dccfe2a8b6d5e04b55907
SHA51209db9020f38168d4218e6701477cde6e5003fc57e77291f1cb3b3dadc77b5e70da8e7783eff9c26d5a2b6b35cf9fd7b097d87677174692f4547af72b68690605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a76fa41f2ec7c3308a2f40ea4c8ab6
SHA1238355d30f51ad2713376009ca975893d1ee10cd
SHA256deffe1773b3c73bededb7fc78e89efbd0a953b1f1301c590cd8351511ca36e09
SHA512627504471416f7d723e862fa15edd95d50faf8611969089156a33dc60c68127e7c0eea55c307eeaf54ddb528479d1dd8da080ba779f26a9e926017f079bff4e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b