Analysis
-
max time kernel
78s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
d5e4997006619f83a6efcf11f96d13ef_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5e4997006619f83a6efcf11f96d13ef_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5e4997006619f83a6efcf11f96d13ef_JaffaCakes118.html
-
Size
9KB
-
MD5
d5e4997006619f83a6efcf11f96d13ef
-
SHA1
7a9bea6b274480f789935520d9e5cc5a85261683
-
SHA256
f74aed55daa185430a91e5b60480a10c788a781c7408c576704036c7e8d15d5c
-
SHA512
121840efaea5214d5f8212bb8f2f7ed8bee511e2abc504e97a2220aa5b2ba4169a4b145de04ee7e7e61c8c86e49bb4cd609534ee5f1be41fedf6e883ec6cf454
-
SSDEEP
96:uzVs+ux7Tg0LLY1k9o84d12ef7CSTU/GT/kPsi2pUlVHcEZ7ru7f:csz7Tg0AYS/+mUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C004C01-6E7F-11EF-968D-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009d3b57672e2f2627d974db7c4a975d07bb111f5a595d59aa8845a17a121e4cac000000000e80000000020000200000002bbb1f24626eeeaed935c270e7647844eeaf97476972ad48e999848f7f6c84852000000016ff35cc1e5dd22e60ffd75be6c0381a5d4e37bc4fc4a64269b5338338cc32c840000000710855f842abbd8892a1403779d9abe203d520efc0348fdbf99aee8d0401d18e8414a59f9669ad82c070a3cd8c891abd2d4823446593487764d4309967d43708 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04da4318c02db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432029744" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 320 iexplore.exe 320 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 320 wrote to memory of 2228 320 iexplore.exe 30 PID 320 wrote to memory of 2228 320 iexplore.exe 30 PID 320 wrote to memory of 2228 320 iexplore.exe 30 PID 320 wrote to memory of 2228 320 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5e4997006619f83a6efcf11f96d13ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abad6518edc273f22c22c7590600b5ef
SHA1b2dbd0e5388d355730e1aa9f1e15e9d8e6b6c258
SHA25618897d56eafb36ce13b97f0c2d3e84e38cb8369ca1741d259f2e5be64f5d1f87
SHA512ad9ce8da872166b2a611b8cb31305184b490a9c56bd0e45449d6a2948e369b26a7177b16869ace40832338db38a44776894774009d74fc5b118da3684be2b407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648751894eb3b84056ac62bf8ec30288
SHA1043a65f584091b0f752057b8cfe257c8c843d0b5
SHA2562f2d5e92857a10d27cea2e2346183841b99f14f05e6b2197a3dce165a3be1576
SHA512ee389e4dde305409bfc7a7882ccca4d31e0fa8de0d4c56d277de0b54502d3ba82ee3de882f7ff791ede83a2cd81830454eaa1f869b29cac5b2fecb4dfec44415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8300bbf9876d97ed07d7c34043643ad
SHA1225d64af512c8a126ab6a3ae2beade35dd6923c8
SHA2566e7fe81bb817c2c615e86c0b3877b178fa74ebd7539c8fec5caec0add8d0fadf
SHA51264c49b61240bd0ddf3a547f419578b282552704ac52d81ec3f3b397624a5090f03fef6e663ef026927e55e0573087801575123a95529c92b256eee9820252030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fc33bb73e80807ad1d23cea641ed36
SHA1aa70249d3ac250a51b58acf0df3522a68d4a25e1
SHA2561d80b61145fa6554e397be0bda97e6c2ff4f215bca21b77a2f132dd534ef36ce
SHA512aea15bc8645fd30e83ff167f6f7d922f589eea3cbe67012953c28bdae381eb42a92f6fac893befbef538b64469b4043b77cc74acc23536dd1923264e4618be0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539177d94aee1b280aac4f6d675ceacb1
SHA174f022fc536563f57b3931c7eca4d2f1e5755f3e
SHA256c5c117a7a6110379a00e1d9556c248852dc288c1ec79d794d99457bfd3d912e7
SHA512f7b5b4e657fdcaf087eb6e55ff1c7e7e4bb4972c1d37389a2e96c7a8a345f0d7e3687e3e0bed55bd414e0514be62fb0cb133f872cd62e35f4c385bf82db17358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548e985eccde66740daa1b7d89b2c509
SHA14adb0e4f70c12ed875412dc4175d07137ddd9c76
SHA2563f038ee7c3ab6512e0001f6603f8e65436ae5dc8e8d052e1f1e1efd1c90e8262
SHA5124eed15c80960ee904d7e8ca070b8b51976cd6b70ddfee0f3558a9780f5836c68a218a40753eaa3be821eb60cea7ef4fad1c036f35b79f1b591c296241960ebf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ba4a82424ce5d11ef0c46e0ccdaf60
SHA17e64087a9fd88e98f7ca69794714d71fbd768efb
SHA2562fec5e6cf7281576c5e0432da295c46cc39796c2dc9414fb7e17910532a0ba5e
SHA5122026c2035f90d079222790b5835eb0fd0a15ac3709ba665683b69f8339641b3838e1fd8024ac458bb6a11a0c99f6688fc246c19a77950b148830bd3f185fb860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ce28beb7630b67c301f0ed36f9355a
SHA1b9d8117a9a1c91609dd54ff76747b221de678897
SHA2566b9410d9a8abe7f28a4436bd9d0a4ea436b84fa8f39fd4314abb11fb42b61b79
SHA512039fa7ce12bbbabf5736e16ae1ad60d960d7646cddb30d203119466d5d64663ef07318919542d74fa6c38ad4a7847db90217ecf35d96d771cf54b97854951f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7521c2f44fce3007d061520abb776ab
SHA17bc993719bb5d8a61f4504d2194db9b45c0034f5
SHA256f4ebeccd7f07d6755aa3d602d4a40c50f278af3899413ce43c911191c277875a
SHA5126169fdea81a0d5485e40569010d1631aa25d8d6f504e6f2ca2f1cae65d2ccd772fe57f5b462a1d2ec840ed6b2e19cb33ce8568c930e9e0f158c24a799f6be27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ab889b8e3ed186f174818af9537e2b
SHA1b75b8737daccdea9589ddba9cc4b52ca44f3197d
SHA256b938e68105b5b9e0dd0a5734c5fadc9442fbd5ef0417469fa5fccd386ee89ddf
SHA512882f4a91511574616d9289222fec109bfa3a7cc53228cf7dbeb1d27301a1b79dbaebc56648d4011724c5d562a9f2b9f5fcefb7f80aefbe5a29002823afde9356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd333c1f2fbbaf6b9386f0f37a6cb625
SHA168d6832a6ab897056eb237335c46a7545620cc23
SHA256c210ad4dba7aad6108999e4036479915d1f5cdfcc2dd19126420a41b2ea852d4
SHA5124508de86f40e9163bb688e1d3fc0b998539184e0d641259c96bbfecb084663f720bbeeaba4845fda6624030680aaa25d11b049e967929a1637d2bc38322d4046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53613add8253158207d7476b28a13a69f
SHA122acba07eaf4b342811050fbfe7ae22e2981e896
SHA256e20b7042e91744cda4da4e029ebce0a9e4f1f163674a7312725fec024a620af9
SHA51252fad1174fa3f741321f2f845a23d52724efa68533f5462078bc5765600372664d257b63bd33ecf35179701505ec01c90421843c52fbeb9dccbaa1f930de80db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981c6cf10b88b0db283daace77ed033e
SHA1fd84ee8b610101d512b5dcb665038f16130cd42b
SHA25614d8e65d486405eb3e926fdfb283aa1b27d06aaba6691f8aa8aa489fd7651bac
SHA51244dea6cacfb27f284f44448a277121ddc06d24f6ae64f7a737da635521bdda467955d10d134cfc01fc5afd9764ff15c1ce8ce3c46070fdd6449693a4944876f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec14e7195279e605ab79dbfdf3f26524
SHA1e650c67e14be682055094058b6056f28b565b2cf
SHA2567b7c7cbd88638a771d7ecb39262897d0c12eb6947a8bbea904f9d92d7d7f7a8e
SHA5122a4836b4329d28cae91e78d0c8e781a26205a18b6ae1ed2c1cbdd81ef8128fd06c01ff5ee4ab3e33e5332903584b2050e8563ac6205bbd0e4e618adb700b088f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e6ed3bcc4b99d40bad453176759f7b6
SHA1ca3186a8495d093aba06dd735a5ee799ec517064
SHA25665b7f7e803ad7966465af979e9833e33c3d72d48abfa19b4b1b44f8d779a3d9a
SHA51220e9dfbe88af5f1079f2627ae14f551d1ebc13f106d36a0f7f4dce475ced40cbee6528b2b7c7916cf69a047435d9caedc7c641d9f3c8188ccadd5775f6eb2afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982828a74dcfa7903e9fc5856315d653
SHA1d17fe68834c404176825010f8a79894d7d0a9245
SHA256c1c18cd874c5027736063c1067ac44aad9c962bb7aac0b2f7495bc404754c510
SHA512546689cf43ccfab36e7a9ed36f49411ed41b1c8d53b517f35fd7f3c5aaf48ec1d28c8269acdedb728f8e7cdd38077a655cba8a5cf93404bed6ca48862c0cd998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00fb77b9404382e9be581a65daad794
SHA13c2d240f45bd55e54ff5cd194ee7f79d992c7edc
SHA256cb1ca1abdc5d0eaf8b1dbc09fe0106af2cb8d88f3a07676744d2657cd31a6f90
SHA512c05c49e21371fd33284a4ea4c9854a04a722185bb80c4f5ad262d433049bd758608d727e7d85ac7755310d8152233cbfe53801ca5a13bc68588509fbbe204f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f9ac8723ec88ee000e38cb6e9b0806
SHA17186361b600449cc7d3cb2c0705d471b60989489
SHA256101ff4931a5435f2f3bd904927530a848437e503b7a37e71c7028e0e2b44e089
SHA51277ab00ac46f183bf219d0dbdff4e92aa545167249e79d235e360ef435b861482b329f1bc45c49350153065b1bd47bff2d610e7a2f5229053dc7ba656a95da92a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b