Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
d5a323d0e3ebd6a9d0ab6fee59b6bf99_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5a323d0e3ebd6a9d0ab6fee59b6bf99_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5a323d0e3ebd6a9d0ab6fee59b6bf99_JaffaCakes118.html
-
Size
44KB
-
MD5
d5a323d0e3ebd6a9d0ab6fee59b6bf99
-
SHA1
326786a8298d2d67accc49629129b60fca422c6b
-
SHA256
8e2eb22820e5c4b6d72eb0e409b1938a34b02fff1619dc81dce34b1ff7a5a731
-
SHA512
4d14e73b27ac3713b0f0cc11311a220a69a986d9b4d9205cb72a1146d659e2d8a6951f5054ac741b14379570a90314016b5565739d44634f2003d2d31e927955
-
SSDEEP
768:WXyFl3jnC9CCCCCCCCCWCWCWCWCrCrCdCdC3C3CesRu8N82Yjxm2+EUhus4wNdWq:Flzn4bbbbvvvvqqaa00DsRu8N82QGDUA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003055d45782868eeb860b5d60c0da8a0d2e3fa96354a5f54c2fed27650a6740a8000000000e80000000020000200000000038298b577b9ce101418e274747bf321e1ff4e32cecb4bb3f9a0bda0f51c52220000000b556b792eb80d8d97e1397ecb98eeed394361d1071197c737b1308e328a4aa4f400000006c8b56dba3c51c4d4342ba66477acf7f0c263cb3394bd67dd91b06c160802391dbde4d6af568fa63ebe4a174c426a984b8b6a430d24d8e6b07bdcf704ebe48bd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34E2C571-6E62-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a056280b6f02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432017223" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2688 2708 iexplore.exe 30 PID 2708 wrote to memory of 2688 2708 iexplore.exe 30 PID 2708 wrote to memory of 2688 2708 iexplore.exe 30 PID 2708 wrote to memory of 2688 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5a323d0e3ebd6a9d0ab6fee59b6bf99_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54900d7d6a1e66be0ae92d6cbc166c0e4
SHA1bd636261591be3e5715d103e6134ad0bd1912999
SHA256c38b33e0feb751902eb8b754af20b2dc4bf586c1c29b9e2cc52af4d4d9446f54
SHA512becc97b4c1e1f5d1c9282dea67871d0d752111f531189e714b5a06e47e8e39f2ea926e584777c65cc45e0a35e3cd66ec4e2200d322c936846815ae4c0aba27ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32f70b8b973813d802210db5a6524dd
SHA1744f67e842bd5d2cf435b4c4eb8fead429228de7
SHA256c1d924107a7919b68787e121f01e2d273cf88cf739273edaafdb11ed4f7bc21d
SHA512f12f1648851d48fbab956756b03a6ec33af5846fc39420dac94d101abf270542a7e5e3f8d97626590c7955e800e327705b73919881c2a5233c935178d37a38b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc057889d0a5d939ce766efa8f53c7dc
SHA13871f8bbfb3f6e49f2097b218ae0ec0ea6443233
SHA256eb8353b44c187f88931837b160ffe8e7246a86b4d96dd70243b2fd75ab9dafe4
SHA5129fad2551b86c3c60441aef80d31da33b9e1bdbc3901bd692d929ef56127453dba5a7649725360718613343212deb0d8c048122c6844f071a0c3edf7261af7072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538da07a335634fb3aa3798e0f67ddcbc
SHA176a67f88fa8e0848d8331319442c563ae441d780
SHA2565a47c4588eeb78243560e5b097759cf3cf4eba25d95e01ab23bb81d12d231373
SHA5124af9fa2a6be40612c8b1d040a2227cf773db5899f313add5f7ee37ab9b9e71a7430d019ee768d4accac05cb65a59f08b5d55b1ecfebf481548a31c1cb6150ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fb48e8b7b1edf45ac02462a3067404
SHA163ddd8cc422ccbbfda67978cac4972ee89bfb324
SHA25601e0700766353ef45efe8099d23dd562b9829bab150c0d5ad272e3b2087a9427
SHA512d5fe17a7a94d5f6533f3a773272b354f3cf530f3e161c9ab7b2152e105ba613a165f474c3d47fbacdbccbea32c0663c368a3b5da2674aea46cf0211dc4ab4675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6d9a6a512ad081ddadcb8fd70a5c2a
SHA120865fc18d97391ab7629e05fa2637ac78baaafd
SHA25629375583f91121fa8ecf24970e76b92a092a35459d3185a8b430701f7344f46a
SHA512bdc58f454b4a7025e4a552c52c570c5d5e5adce47ec2dfc447202be1d4b2a9196b57120b5e896dd62c9d2d4b1b1fe3a74b59c34a64ff7cea8c9363af51e076c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c3580690a886361180170d1232ee7a
SHA15c8e926be0ad950688de9fb11206aa4d2552e0c3
SHA2564846323ebf2074ef07b8c984b788b837211f0f58a5a79d69a45520dffe6c0a59
SHA5127f150028a21dd371d837afa5338445604e8b9f3d1b18c1ed1295702381a1cf00eae76ba729bd489713831ee4ff48fc683cbc9a901a356af46abecd71ee75b96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5683965da1e47341e631e913ffb245d1d
SHA1b043c244d3c86ab7d6ee1e286aafbc7d6625f4ef
SHA256315bfc7030e419482c3d56a20a646b24b1ff8c5ffe1a57c8c083f18cc1d96901
SHA512cc52721cf34b2418ac7d9d358b744dc0d9384eeb0d07a8345ef650d84671616751883049e724f36d14592548589902f6d0478ddd5e7c7a9120becacc8ae9c642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce5b53bf648d00bfeb7fe834f7336d6
SHA1c3c7604af0e3a3c61a4c9e88d04e529a6e3ba9df
SHA256a79c13d138f7561aace4a95b15c5e9a087076fe17a7d11ad7166ec64da543816
SHA512bf25568d63188b690b2f3a8fbabd1122c5dc0f491eb689d766ee2b4cb5c794e1a65c30b01bea6091ab32d2431562e74a4eb95980f6941480a28d6e361e7a6c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504decb2e8dd3a5999c1fbcf0114c4b28
SHA1d3562df0912cb2fe44b04adac476e0ca5a389dda
SHA256900ba984df745f30216c2f4bba4be514b9e4e34873cf72834d36502134a38931
SHA512d34030dda9df41d8714b34503531f38abec11f10ff871adb6c9b13e212ae1d4994b38733e2b01c9b08543383d475c858070dfc99d032ddce65be931f3b45da08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863b9e87d99a7a79c93e31f39273d825
SHA1fe79306f493b6c8aa68553a3c48609fd3485b1cd
SHA25653e661f957a73ace5c9015fa21669728532fef2e53b1f04d462bbcc0c0cbcacd
SHA5129a7a4ca0359dd2d9a2412aaca4fd3f4b7e5dc014e2aa8c319fb35be4d2e6861887aab6f7e4af80fcae539bc782b42c9181de2f8fdc6e6225c9cb15896a587779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed71d92076d2287ddd13e39177eaea3
SHA19a370b8f59793794ff06cc1802955ed37bbffcb9
SHA2561e8696ed50a54dc3ef7bb9924b587f8ba80cea3248860f6b2f04f33e59d0864e
SHA51247c99b2d243cd54285afaa370aca454a591c457b5bed74a3fa2778c6aae199c783a3af568ea036b724de00b17c690873c6a21100537a291cd01f8e54866bc8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd8c53dda58e8bff9e01fb065f4521c
SHA10d13a11e0464abfbcab149fbc6608aebc3aa9592
SHA256d759c37b1a8cd29f33255b9a9f28c5705468c9766d146981786ff77ada483b65
SHA5120c337fab5e5fc2fb2d7b90bbbb0ff1e201fc502c3f5ad909fb706b0ef184e066464c1690900f8ee73567e1cde322fdd81d48e194f95194eefba226e3b4e964fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f59ccc4d8b8c0f492ef55cc2d24efebd
SHA1a0cce4d735136b4bc0f73edf3e4b61902f88049d
SHA256afcb556e227c9f31f5b55bc28a3248899c7c4b5f2a4f45747b6f1764347c25e2
SHA512f3b168ceba5ab4d159a5ffb6c59c734f2e289b840aaa73d5fd0921737dafcef8d02e2adbbe02127db9ed022e3b44c4059a284da1e9411a51ea6d412ea334700c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558db55b88e18c2ed42f9cfb7a91016ba
SHA1fdcd355bd00d4b2d20b153302c20e3d1bee5d498
SHA256d00343a2df760561bf17c1dd80ff99a9040e12f506783b5b372928cd37992db7
SHA512285195a2abcddd015061d5221b7bfc80986776965745635317187b196fadf26e6e493feb85a0198a25baed2d04f5dc0582d22e547522d8233c8522c2b8e5c7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d820282395652b04ff416fc1493c5b3
SHA12c22b1098da4b080da522427dbd3b850c3ba0685
SHA2563569087c9bd946f8c72849b6f5b1816f156e18801bc0f2e894eb4ed03a7f7e62
SHA512672b3b13f864c4a87d8c158bf8705eb266970a92b1b6e99c9cf6462542def0e2d7bf064ff33c4513f337c96e5813367530ffe6849310b907998c2691920eec44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1085aba38b5f2ac1fafd63a883084cf
SHA1dd85f6ea2fd6a2cced368bc01f29656bdcd713fd
SHA256b485f3a552823b8282fe53c1f08ac302e4c99ff8ea43657849a06e998cb8ec21
SHA5122ff59b12b84f118afc04d49577cbc82a0aeb652b34f7abc0062ad9324465aadb30427a815d7f5ba97f7c74d7624a4fca25aa4ef625bbfd1d119d00c77ef72dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57fdb4e271fc22dfabee4cda42bc173
SHA17a7a0f4ca5a8d21a1fb9846bd27b70f023356245
SHA2564e11c0b01455820f6344a7ed3380024ed6578b5e87fe564fdd65d3676ff2db6a
SHA5120fc13b11160bfc9802fec3fefb1b4224b859317b993db4dc64e9b9d16744b7435e0a4fabc7d678808c144bebdf377617d76e4bae7539440d1e6f29f6345eb30b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b