Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
d5b675ddcd9bfb13db5f2ecf2378c776_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5b675ddcd9bfb13db5f2ecf2378c776_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5b675ddcd9bfb13db5f2ecf2378c776_JaffaCakes118.html
-
Size
461KB
-
MD5
d5b675ddcd9bfb13db5f2ecf2378c776
-
SHA1
bb200a325f37b700a4e9f9860d47b13d7eddc0d6
-
SHA256
a5796e3ce5fd9132c6ab266062c1689f4864073d9a522f24edaeecc33d4b64f5
-
SHA512
50ee564517a42606e453a1637a8b5967bf9af9458216669e7d1e3436c475da6cb8ea0a0e31a736672cfdbfc39784e4c1c0be3c427c426ae30e5ca786bf90d0b9
-
SSDEEP
6144:SCsMYod+X3oI+Y2LTsMYod+X3oI+Y1sMYod+X3oI+YLsMYod+X3oI+YQ:n5d+X3q5d+X3H5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e092037802db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AFE3EA1-6E6B-11EF-AA9E-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432021071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d42460bad839b9410bfeae6878f4fd1cf300f21008e16ded4366bbe176c98635000000000e80000000020000200000004acba161f94c23b8f064f01a9ac8a82e8f2006b7f85c52d70ed74f735b79534720000000ad3ddd144e079a9b1ba0cd3ad2828d048e1562a8da31d202912e09362dd99a2e40000000033f1a38693eda95ed988595abfdde4dc468945a3a1487c46e41c61471ed4edb22d6dcaca7a43fc9319dc0e0244f971498a6fd549f47be5030e5ab4854adf382 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2732 2400 iexplore.exe 30 PID 2400 wrote to memory of 2732 2400 iexplore.exe 30 PID 2400 wrote to memory of 2732 2400 iexplore.exe 30 PID 2400 wrote to memory of 2732 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5b675ddcd9bfb13db5f2ecf2378c776_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ce45af24bbf95764b96aa5186a0ff7
SHA191a6ed3be510b52dfedefc1dd4278d9ed9a36462
SHA2560fbf5c462d8c3042bdf1f382725de794c33895b955b78c2a5ffc8f3be7a70919
SHA512aa742c898808c81757d1e5959d8525fe6bbda03082765627b94f29c1898858bab8fa32ded07ebba7a3f63360a3f6dca263005adaeb7e877f23f478ed535e886e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc245f62cedcc640a7df3cc9a2fdd7ee
SHA154da19b916f4161e67fa368a9d9daa8b0877f252
SHA2567d7e59d282978e43fa218c57a134104c2eb3212d23e8acd48bdf2b7c1f46e29f
SHA51272cbfe2cccbf52657e17d42ba7487ff03a9e7d8269ffc9a461a114326dde3b061011f2d32e0b315df89356b20090e12787840ffdd49f3a1c9268b15b5fc290f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b0960ba49cd7fa9aa752022f8da3a5
SHA184b576c3f5a7b58a15a2cff7c9a7d80a4cb771e8
SHA256d3283570ad19d5ed6b7799e2fbadc42a0a5bf24232db757cb9b1e654d8fb8cc8
SHA5127331c88348d5f6b5b45677f3206d1ef6c69592abd1c24cecc087dc79d3abcf14cf999984b9da6fe393ddb01f89e38ab98110a910d57fd6ac207f2f0f27b2a6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3bba671f90d9ab87574611b43cf319
SHA1f71be2509ca5e16970b41c65ca51c78c607fa7cc
SHA256a0b3ac132c8e2e32aebe3b03fd99d58902deef6c4803dd68bb6c290fee596728
SHA51250295d1b0d8a7f994cfa74748b4f976000fe854ca9f21944f1d0499fa9d254c4b341385263bd312d9660e37d5bed7f35cf11e60364ee6434763468d9fa65797c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b18d884153138a72683745df7273706
SHA1b8e83b9ed8cf300b866385c2ff664bac5ef7be6a
SHA256b114cc949ec52ad87979367f7b66d219fc12c72fa513611398f31b784a6352e6
SHA512ddeed9757fadf68c4db0ce464dea666a5e39704b341761ecc8087d3cbfb06ca390cdbdb8fdf078a04cacb6d51dcda9a848feed677293eb4da36d01cabcdc2a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576647a39bf939ec0bb1e9ff790987868
SHA17172dc7ae28cc9e09db28841e09fa5e121b0201b
SHA256a5eaaecdd1a5d3eec229f1a06cdb0db75107ce51f76036f2865335a6057b7361
SHA5124bd94e2f92c611021c2399479f8637b25c87e693ab42d0ecbda286d584d01fbe9f11e9be272dc0d0249bb53887e1fc104523965092099c7c5db27d72267c809d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b85170512dd2096f7523fd143d8ee10
SHA10915700a5c17a6545450673c78df5255f51bd8b8
SHA2566466336ad14341f2dbcc0ef7d2d40b02b7a0054276ee4b5d0747e3d65e06a543
SHA5129659b37d76b1958f43451005f4fbf5bf13a8ebd49a5022e21c23823e208155a563138079a2bf8727a5d09aba8e1296ea215a160e14b24ce5ad71652839b479c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e90b8cb93419370c05ecb366789a511
SHA1b0020bf98bc405d15e973c382a07b1f8529e01ea
SHA25681514246eca89c715fd819446d2eed74813b9c5686107d4020d90f10d4de7216
SHA512a0df4f959f9a396639c8f005c944d3be96e0423fc0df8376ac19b7925c03b98eaa8140ca6455520252a24f115fb41df67d243b00ceabc4967a718594e55159b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08706653f6f4e7d1113280630f10863
SHA176bfdddb1a575638ed55ca9ec76a39cebce9b84d
SHA2560c442e59ed09a3c8db982f9ec6927a0323806ee86286ce507518323d748f9039
SHA512910629521ef4717ff97e0f96c3de9761d82cf7d449a3e62cea018cde45e1147b41f718a4f3224b5036c14eec825e2afb9c904fe84dcc9d728ac3069d7864bde3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce6fd06c1194c5695d7627dbbc0ba1f
SHA1f8d06c1c9f7b45c4e2029c3287ef7b309a64470e
SHA256f5af79660a2927d10229a62d75682c2feed4bfbd192c0204f324392bd3c7b985
SHA5128b6a9f89cd8592287c3a3e692644bc241a482911999e9ac35395327ca0d21550518a5fab1d1fd94c10facde131ac2e15bc3c45d1a4bfee67c60d6952e80f3e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534977c370d04e7877b2011d1ea0d29db
SHA1e02d67c4f845debfef4fb33cc42c09b85c30f9bf
SHA25634681fa5eca2f1ee3d826c7407ef5c9565770cc25ad2da168c863fd9416a0a61
SHA5126043690d5e54016672a80c17a9894585242992012c86e698e8e948b55955a5b0075198cadb144d6d768ff09a11f0226b7544276f8cf031c8c91dda2abd395f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51050249adadda03d22a25016cb1a4d09
SHA112481922a54f476a1123d5dcdc2070973b5e396e
SHA256258a869e09fd0a5662ea0d6259c287597347d4dfe1c4738d0e7af4535a027b18
SHA512237f26cdbb05bfb1c856a060aeddaa8b7a57e630f379aea69804255d59a685b9cfb9de2908dca03703d7b73625ce5b86f58c19aa794c3afbf9d40495f9c49b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516088042ab9d4d9810d804f420a6c0e
SHA10730f7ef2ccb55217f9e23f6e2b17970e522573b
SHA256c888d25547cf17ee023eef665fa130d5383698d296e7e030f9f54b9179950809
SHA512dffee34fd8a6d88273cc19841eea423917c99708dc2d0c035170914b6be31c336d0fbfdef8d23271c707a8f74af09afcf5bbb6a5677780d6bea1528254fad896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f568c6c10bb949fdc484d4aaf20b6f22
SHA13963547305d5659b971e0b2a64a1bdba3741197b
SHA256b29f552943cb151a3fbc86d36f48f46efa6e1cd00c4b5907efd8ed89878107dc
SHA512eef559ac5cfcc649562a8d11cce62924a24e633a7ef7e825771ce681fe98d646c6269065a568f08fa28ccdcf0b6d658578bac666d4dc46eb46a1e3255eeea88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355c468b74a640de1b21ec9fd516f870
SHA1e17bf5907e09fc57bcd993300c99688ba0f1e074
SHA2562d281387a5ec86e0af6f9f36af3ab4310d6c744206ae1510bf6f9c37776f73c0
SHA512e72107580683fbedbd2c3aa9b966d700e4649fafabda9392bd501b80b03a98c31534acd9fa76ba3aea7158a528a3bb1d5f7a45fdf79aa2e5e474d6c4c94e9018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519db6a1a5c9fbb866d148a7a9115e8ae
SHA199c3990dafb60291b90a386162e37315a71c45fa
SHA2567c74ddb359c5a1c00d59d731cf8b1c7ba87c44a097dacfb19a6105c855edecf7
SHA512b6315bb5a72690c1636e8c38f315abbba019443d73007c4ad32508bf6ff51935a7aace99f56b1ad79daa240c7357bbbc70d69af4cefa4975faaa33cff9e77059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665014dd1f41148e09efd5caa4230690
SHA1c88786dfc2745811c39b6aed8dc20223071c3689
SHA2567e4f326337b8eb6255899811697730e0ac30926739fe8667e9bb8572342eda24
SHA51232cd297c57223326385c40beb82367ff3673208cc0a226eb7b67be64ad0567e34b75a50955d252093985a245cc9f2ecd3fe214cb99dc10686b8a1ff18aa62143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55802881c4613616e8ed01a54163eb6a0
SHA12870bae762acfbf49e150ae7019d4d3cbeb4628d
SHA2564d675ce640f7b573e5b718e446ee978209887aaf54eb7a65fc8056967b51445a
SHA512e25f1891b6d1a42890324240771768f78a919a513d840291f37c2d9398690bcc7db51955c179d5dd49232a3ac72af3d05817828343377b548a24fa9913a8dedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b756d2b7c823de3ecec8f11e06e74c
SHA10340a403ef330fcdb685aa0d3a08979e7e53847c
SHA2566028ae8a9f3b0f698cceaa809190818142eb8f2bf4d633f75fccda1f2bd33657
SHA51249eb9527fb509589106930da7ae2fca210731bd73192d3e62aec892a624891e5853eeb7f7735ff357f93f9e8e4a9481603b1f68e48e14a380fafe745f719b948
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b