Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
d5a238f934ba393b3ae061124b9d63a7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5a238f934ba393b3ae061124b9d63a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5a238f934ba393b3ae061124b9d63a7_JaffaCakes118.html
-
Size
23KB
-
MD5
d5a238f934ba393b3ae061124b9d63a7
-
SHA1
1aebc13c99624e19b6014da337b233d28bdd2130
-
SHA256
c7d0ff88edaf8dea2947c4d52894544f8997ce2716e34b772605730e0aee30ac
-
SHA512
22186372e149fec5e1827830e627527b29e13c3622f88f712def4228c4cc0adfb284c727775443f515810a01e5cb62b9432f5e94f7d4c4feb209df296b389331
-
SSDEEP
192:N0ToBykb5nXnQjLntQ/gnQieSnvnQOkrnte5nQTbnYnQJanQtHMenFnQ7XnqnQTV:qTo0fQ/M/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000015e44c4e3d2be572f4688cd557a92ee7c4c4a4ac616815080afae5f934b61419000000000e8000000002000020000000ed47d6d9f08f3af03bd0785f644940e6084b11e2a7f2a9aba19116b3529fa5df20000000e4562eb3fdbcad066c86ef654d32f0adf2153360c967faabece8fe5d5486692b400000009fa23f5919cc840c09afe117c93d4661a6f7e202e9a614204eb7ec35a33e91db357389fe6550db626c671a5b6fc6d6ef7a1db830c622cc13c9f75459a35ede14 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81F36DC1-6E61-11EF-9303-EAF933E40231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432016921" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08216586e02db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2056 2520 iexplore.exe 30 PID 2520 wrote to memory of 2056 2520 iexplore.exe 30 PID 2520 wrote to memory of 2056 2520 iexplore.exe 30 PID 2520 wrote to memory of 2056 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5a238f934ba393b3ae061124b9d63a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b33ad62619e6bd22d3b67479c7d8a02
SHA168063bbbc785f082ac1bff065d3ac595748b79c1
SHA25681befd9d76185658d6c4614dcfe46510f9bf2eb51da5bb87f727847642e71bd0
SHA512bded63f12cd6d308aee4d8f7e7f20847d5f49b0e37a8a98bbfa35b95895c59a5db4575ec26319a5d2df7a1d983c7b7dcaa02292dbcf05faf283d8be5d7d5f102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b563aa3151571675eb7e64ea82a0e4bc
SHA1f3dbd280d96c8ca2173ba06c2340ff170074543c
SHA2565fb029ece43fb108a76e3ac27ce5f715f4b4862acba255b56c7ec6e3f5c5d94e
SHA51277f128eb9ad6fa817f03cc23ca2ce87d67ac4493cf3e515b73d4d964d9b89b0c5305d76ab067990fe93708d676cb1b4432cb33d8ffea7961a020ab4e4940b0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103cc6a74622c9d90679a478ddf6c2f3
SHA1f49afbb0fedbc0d7fd069e928be30a773782925f
SHA256568802031752cc81d00c87f26d5cd4497520589b04ebb6ca83f26ffc4a2f245c
SHA51210576e35b9fa386ebe63851da3f59864a61b5255ebe57b4fd20fa94a6d7c8fcb8732a6ce4f840fd30868cb88e88fd63b01c8722436c0a992c11545e457066a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58390e7ec4da6c1e96b1c3b798d8640ef
SHA13f1d1d7a0d5fd3f6582d7cf770c9e501dd3c3303
SHA25690123dfb9e372833bd8fd630bdf7af73885b904eea231caabc5a02def8a6b94c
SHA512708c1c06e728912ba9a913ea8e88ca0cba958aec432a5f0064d3cc9676cfe10e1db50e0fa20b687fb558deeeb858f287ac606a6c9ea034e6368f9df130614b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a9c6f7b7e56e7e0ef7b9bf42c87ee7
SHA1b3c5e94ab2dc319e3aac9a19f8f0bcc4ca45037b
SHA25684c4382b83af761e70ccc893062a7d0b62507dbc3319b144e56615b92ac0dada
SHA512141676a786d21344afc28b80c8d4ac3a72d16cd05a22ac43d553b5fc6194f9b27cf9909b5237b8c91476f21b9d7f66d00bfbee2a07f70192094d2f7a318893b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe98cb1da65bdec5f05312d692c47fd
SHA19b1f38c1279c338f811ca4fa922314893e257b7e
SHA2569628ab92abd4a8a42df4fc24e8b6a87dcbfa38523836a974789a5780bc867b72
SHA5127ac3a90315402e149ac79aa82fd500d6b616f85d360fdb34ae4813fc0de729f8817eaab40f8e6d88265159587eb6542b81741985700fe4f14ba9b96719b6f13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb61826727577fc2162a715a9896871
SHA1fbac9d30aeaeb5a7ca2dc863ea83df06ed70feb1
SHA2560213090d901804b52e3be5af37fb2083118e9a1e995b7b5d9c1c2ea05e41d4a6
SHA512f9eb005d2dfa5bf9f49d697565ed1482510d9784a6305330cbf5f61b8d8501f05c0918fa46eee24b1e88ad592db602d28b9fe17303935a3c9d00ffd2cc0f80f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574aef0a20390c975b9adecf068adf6d
SHA1124f392319c1457da1b06f81261f0faec870aa9b
SHA2560d278e223e2ac4dbe1133c5a335c1d65b90470c9e4da4c270cc4533d8adef65d
SHA51245e3d3ef2120e7dfba69f81cc8457673456971dcd393abe01723e23df7c9be489694c54d45f37f34e66f638f44c134ba100046cbf1c2c0c7f1446fc710c2e7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d784111699382bab32aa2012832d2d4
SHA170bf1e879e1b332a377e0a3d6e5295a48900c163
SHA256175f522988534d84c58f6c7e4b2aef52c27bf60fbd846848ecf93013d96642ed
SHA512c87aba4faf79d6f176ef2f2e9901e6e3c98b400c479b2a7e4915dc6d90cbbf8e0738ba916ce15cbbe4e396d0461ec0cd5a63e9caa1a5540c72cd4bb8e17975cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0cacce475536818d78174e6501bab6
SHA1c94050cc88ec9a3d48f627c8e584f55ead21ca07
SHA256d671a7241bb0efe93fcab727a9a9fb5053a3bfa635d5e5c69ccf419e748c6469
SHA5122dc69b77718069be936fbf2346565a998d4b66f972bef660b6560a774aafea1e1e83d46879627588269655ac1f917a2c8fa6bb8c41ca768001e6371877ed2664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109308b5b65cdc49fbb72eb0efb56dc3
SHA19e2d7a9d04e49412274e41f919bf00c9e6404400
SHA256af0c2a4b0692391091372e241e8d7131ce2e11089dab55aa42a22d63d2553494
SHA51262d9af2f9a8f149765f6dd5a5cd2a40671a84d84cac3f52ffd1544a1d41a538d81aafa20245870b0aa60218e093b0df83ebb7b0cdbfe53f26ffe6490c379db14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27164609b80c54a423d04baa2076c6c
SHA146ab91530ddd200eea19107e0a29889c816a6a8c
SHA25623dea36f6568f93f29078b8267bc7fd5c0530540402d0c9aaffde9cee440732b
SHA5128233d56d45b3c1e00c2441d9c64d29662634cfbcf29c3c89ed5e0644d0d590a1682dbe4ca54ffba55ae0a462d4d2bdb9d050f2e97640a3a23d94e0a8dbc4297b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a7a5d5deb036a6ff427b300cbdb64b
SHA16d0ad82fc36333020d0309ef19b2afef6171c326
SHA256d39a6f94faaa1314daccea0b499cd18b708b024bddf2e42ef7e1e2e2efbddca4
SHA512f548b400748312a3bbd140ff4ce2a1ca0cb43b65417cf145b6474651a31f2995246160f57edd41aa48b31548171de96d9330667d68f52121892ea41831fb961d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb093ad788cd24955797a638b2c4a1f1
SHA11a94b25e122eb236b9456b74c0a3ed3d4691af3e
SHA2568d1faa14afdd12367f1611f60feeaae6c7e248aec5a31ba8a76d85c0dfb79b5b
SHA5122ea0ba6192346d47a997f03d0fe733b234c45f2b37a2535d227f061377a42f3023d5ecc0b35e9edab28d811f98ef73dea300e36bd3538ea7e4aca82a5001ec1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829407d89d0103e3f6bcfa0e7fece323
SHA1620cc686abb283a57b25191c269f69e0a57f3b62
SHA2568296d4176c29fed709f6c88c0e96073c2aed03f20dd67afda9e3645ee3e27aac
SHA512a0f8a020517f90495a2204c87229a9da96dc2ff2832a158fa8509d7a17310b83f087e5cf7bf3a68b0a33651e01ba7626212ecdbd001442ea53719ba18f27e0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed2b4cdebca23f0b8c4596a7bc9b2926
SHA1d383cf75e4155590da7b2fc419b612622c884168
SHA256d72c246c44d9b8091d2220c84168ac970face08e98e2ccd14000c56796cd4035
SHA512b540f952e3d9653f379b69b55c42a5faf21ee1fd475a0c47b1444917a16f9e6f849646c056578338890e1a2032b1c8af294bd5edfd29995a8805956764e8eb58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537240252f95ee317904d4834748bf724
SHA19bb67fbabe92ad9050b5b38b03bf2a1ae821645d
SHA256ce67c7232bbc69990d53cf9a042b94932a73bc7ca25af58c9637eaf27f0dea9b
SHA51221829a09bd30f28b7f1ca22cbd23dff9aa9fe1dcb4f4bc6c42eebce77a39c558fd0f8bef7f263d0ad0301a7f43d852648abe33c469627f136a491e7d794099ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522fce9691d6129fcb96c13a798e2f948
SHA12ed7e83e4fa6cb3c978620c493e3cad5f4ca660f
SHA2564c9ee302b994639b6937d0235df544af29c90b2724d89f89868808c2fa4bc912
SHA512abff20a86fde71bbc1d1e0dba2c85ddf0c8ccbe1472137caa08e9de1ad3c4685b3569a24cadc8ac6b13086cbf0f18c386e7a9c020d3f4e1590a2901cec7edab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082c8ef71de1fb9e1293bfc3953687f0
SHA182c52554d2e2ea367ed977d6e2fd9cb0660069e5
SHA256b124f0460c8ba666278468884a7156b1efbecefe213d9ecf6ed03139e04d1cfc
SHA512216c0f421b3c56c888edd299720202a573d4f547cc793f0f95a3b322d6cdeb99d51ee29e2c22247a79509cec3a293e357cc9d8d4c6fb0cf780c4d6185bd55b8f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b