Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
d5ef73d7cb2e39c603695064400821d8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5ef73d7cb2e39c603695064400821d8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5ef73d7cb2e39c603695064400821d8_JaffaCakes118.html
-
Size
8KB
-
MD5
d5ef73d7cb2e39c603695064400821d8
-
SHA1
98c58eb133dc6a059e357bb9547d2e7fb3ce7659
-
SHA256
c099c33419f1388f71df5b655a9a873225c599cd77ac15d1e901939012dcde5e
-
SHA512
53830e0f9f6532103d2cfe3a02dd4259c7de743ad1dd655d4e9296aff3fc86effde2586f84d5d9856454a5fb23029ff626352b24959ef73bfc8aadbad6677d22
-
SSDEEP
192:1eU4N9xAH2kXPsbRQC0cCrZEcWhPyaAuhcWNM4w41X2R43Jl:1AN9xAqlygcWm41XVf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3849361-6E83-11EF-98BD-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000006f39e3af6c9e509344e883e39eeb5953fefc8a162ffc1687ae0ef3318212e07e000000000e8000000002000020000000fede8ff9e0c2fb2ce9be11dbb3d72ecec548efa1cfb847d5d71bcbf0b64083e720000000bcdb975c09a928c0cd530a26610bff5a09cfab0cef355568bc401fbb495487ec4000000081dbbec3f04446532c0c15147313b4ce168a96ee753240de6918dc82d32f6fb5bad04676d1e9214bccdbc26ced7cbe03257f171691cc4ee4b43efc91c5570681 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432031607" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509b3a889002db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2864 2260 iexplore.exe 30 PID 2260 wrote to memory of 2864 2260 iexplore.exe 30 PID 2260 wrote to memory of 2864 2260 iexplore.exe 30 PID 2260 wrote to memory of 2864 2260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5ef73d7cb2e39c603695064400821d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fd3ba5c0e7a5878b16abaf7726540d
SHA1b6da99f2021bca7a723009ad1abf2eab12c2c3e5
SHA256c2b368eb7be9cba56ec48773d8f517f7cb1a9a408ae6a2e5d5e9562082d0084b
SHA512270d85c640e595f6c4473d88ed73fe5cdb4ef68b10ae6270ff76d0b3bf77b37e0e80ccd1121a8bf9a4db48a6dc454acafb7b6a0924320341d8f81eb59da047cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5381dc34e0d7f0c936417ccbeda887bfe
SHA1d7f5d0ad70e3e17f4a5af8d0af98ee078d93144f
SHA256665a797108d3e18623c8daff79d7d4b372b79ab973178bf951cbd423aed8e6a5
SHA512aa6280fac0a5825caa69175570de598e489b2bb2cd1e158d859b0fe6048caeb4f9ca45c56849a9d68444780fc47f2915e42053e7d085f25b498ef8b1fc941678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec9064bc56ddbf410d7fb6e98b7a45f
SHA1701990d34d9760d7099612ffc1fe20ead3711f90
SHA2568f076114c12339e8f5bb1aaaafdb7fb23b34fd5036591b7264b714d8fecbfc89
SHA5122c0425b58ca20e0de7254969c1e2058a5ee97ba6a84d5664424f57362f6a0f628b39d49c6ff407857eb36e6a2c9522237ee82e136c7473ec0809ba62e15b6a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57badbf6117ec525e71a1ac3fd2f82799
SHA1d94fcbbcded4f004648f20260412bd95a6296276
SHA256701ff8c5a9cfe805ae5c89a59bdfff4dd6377683f655fff4b987f37a7cdfe71f
SHA512fd864ffcf6b5db4dc876a3758406f2c8ed77ec085688bbca434a4528d2e86bfdd839c0b130740c9270f18f0320dc27df0930fe7857a79f473eb28081336fd955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59413d90b99bc93a6563409973485da74
SHA19cbde221ddd8d53a164bae54b24177973f1d6f42
SHA256ed638149a744f434f770ace0f30660bb555fa678c957939543ba775b960cde3a
SHA512163c3615327b1e2123f0679af29483e895f55250e8dc61bed44af831d086b85b1a03f9868841d08d796f91f6b676617cd5ae5f2875ae682246eed48c4b59fa51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc5f89b1fb93a4475b0d266a3bd7298
SHA14f05738cc3fbc6b5c426cc31431b1a37e0f00d44
SHA256c8c84a63fda7a2ede9cf88c22978b61f2250fd63707fa3704cfdcdedf4bc1389
SHA5126f659ebc66aa703eea783e42b3d0689a257edf7c3f3b3e30b6c2ead616f4818abfb400083bf67895b798e38afb5844850602db78399ff1a9ff253b9588a4a525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5713ca30e61c7da9c4ebd3ba23717aa6d
SHA1864706da33b3a2c086f632d0f934eaf2aea43233
SHA2563244882d2963d0455a1bdb8b35c2fa20bdc2fe1ff82ef52c4e01e7ec74bba24d
SHA5121dabf7af898e4d5fc99c285ad2de1ae3778594ed6f8d45955f5a47049b843f40a587d56b79649a02d7224202aecf26f60c1cd7b2eb43972940f0ea69dffd24b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583b48f5a6c7d7aabc89112c295ae3131
SHA1d5247de2929cc38ff28af66256bb75a42b53090c
SHA256831c31964a363b83fe23146d8c8c6ea72280eabdfbc5c72b21cee15c6aeb2f9b
SHA512f82a653afcf22d845946b7dd187a2bd17e5cadf18e911687385048a9a5d577f57475e877ed836b35431fc292474f53f114f2f1998dcaa4eca7bb316419e1f80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535afde9925aa9b72a6a2c83296cfced7
SHA1f5a34e08869de804bec21ec3d9cef62bf5b6f35e
SHA2563a4b320002a625a7ce458d9c30bae208cc9afd721feca43b0b5471f417861602
SHA51256aa73f053a889afd8fd0d55961c28e77c2512208d2e740d4fa4b71ebe64ae094fb0de75306051576ed4a88adda70565f927fb0941d19c8c263875f7c05f877b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511051cc63f6ecb8590976c84da31385a
SHA142acc57ff8cce03b1d2bee827a99b162e91a8703
SHA2562cbea871e03cca9839f01672dfcf64f84d2d2bdb36f9f8a2aca13f9cf4b6badc
SHA5125e954310e81170facbbda4a78011fb90ae063b24bc1a31c3023036a877830baf28d1ff887b64238628ae8f211302242d611164f957b8162c662cd3a6dd31afc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b49c7c34c160ce3707723c30fa8914
SHA174c5c4b08fe42be9e467d7e27ee066bfea3ed23c
SHA256849f57c6249ab1be22909d31daf164c4a117998fccda5d55d21f98665b9f6ac8
SHA512123685815b61e09a011af8aa36453a7779590038293e45a19b931bad5b600c01b1b999e5e537b8257f72fbe969ca0d4279efd9d7d6c521e8f73d8efb7c0b3d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55880ace33a22fcd76260e72afb58258d
SHA1a56ffbe351d3df9eb10450b7972a3ce56e0a2dba
SHA256209d9116f62e1e000d3c47ed8be03bfc224615d6489d3eead2c79a43b295b6a6
SHA5127672b02cea13318c4f5155cb8abf9fba436a9c024e6f8ad2a9b7235c7deb0b8ecc388db05cb3d31134d7fd13db5d78b2bc0afe6e375ec65bd89cd3540619e8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb08454f885a122beca6c5e02491682
SHA1138c80caa78089588f6cf0789da779c53233f56f
SHA25699920dd6b3a755cbe4e9b6e08ac27bc783d014a534a9c526351993244cd09bb4
SHA512a4e3d951aa65203cca39834375148d520314eb9868e7ffadc88e10d55c9245a755d385aeec65aa3989e2578c5cf2662b0b4da4cdb9b4c0bfffed70b6ac13c76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d4fdf3360101bffb00f41815411faa
SHA11b353a5367764953a54d7feb8786774b8836dee8
SHA256ac22805d03414f7635c41ca32710e0512f4e1b3dff0d2e7ea8b45a536f0a2803
SHA5122914067ae641bd27f81d0e4047b6179ffc47209e3e3169ccc10360990659043781491432b0cd1a8342e4dcd417272bb099f44380b09e930fca9af616e43642ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291de649be0d3199f8893ce8028d935f
SHA1880829861a641fdb5a0475190cfce1dff00ddb77
SHA256e7161ec17e5e7f204c1aa064922308e97b32487261579e74cf99e75117409dd8
SHA512f9eec307999c0159901463febcc2b9181bf065b51f0eda0f41cfa939949053e1936b6eb883319371d5b3205ca425d90996ce6e3baa28d09151efc313beeed140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffb145a74417ef97844a6c2427fb65e
SHA14030a3dccc143ffca345e053466818c57b4030ff
SHA25690d2c277976495ce49b808c323dec4b321ee4e9e364608828692b010b721257c
SHA512c1204a1f8774ebfe838e981c170f67d554677d395a38f58f44cfe96f1057f0ffb406be75d2f10f2a2299d56ad47474bc23ceee069013f71e64f91d80eda0fcae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5216123e2bfccfe20911b5a61705bf70f
SHA143987c10b44595a129f51cc4e57e1e0a56975a87
SHA25650c9f9b78a35c9ad71d37faf1e961ceecce8dbf6bc25137cca12b436ebb22870
SHA512083441ad475a19f289f43a6062bb63ec1f1b1e2f71ff14168c0a742da0b361c44d149d0e039004789576ab2df9fec80b605fd0bf9f406244a15b87c553c71990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb79e8d3e0a203b6d339dfd277ec2a5
SHA13215515ba89e59386380305ff470d978fa292d82
SHA256d739b1f7f92238c89ae2fda3089263c5a0fda055470f820699437200a43454c0
SHA512e451b3824822eb8516cfc171dbecf6d08b0b87d63b0893e143943ae8341237a6c9b5db1014fc686b14593a7a5838332659f5710ec03d5a3ecd21351e19951c6b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b