Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
d5e657f31f749090bd7f66a054dbb113_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d5e657f31f749090bd7f66a054dbb113_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5e657f31f749090bd7f66a054dbb113_JaffaCakes118.html
-
Size
204B
-
MD5
d5e657f31f749090bd7f66a054dbb113
-
SHA1
858af8ffef5e8d480d52753be0c3e8cd51d1cb4c
-
SHA256
030061013e0ecfe9e3e641e23008863af4496d4ef7c1f3df20f97fba48fe0c5c
-
SHA512
5cf6fe183dd85c43ab35526166aeec7a6134145045773c6666f45d79b1401f3094df0491f969d3f7868d5f94dc0bd3bf3812af30079e7fa6182fff9b74b1f4d4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432030074" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21BF5031-6E80-11EF-9DFD-D67B43388B6B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000a0e8bebce5170ded87fe4aed3d6faf9993c96b46ed14e20f7a20e60b2b1adbee000000000e80000000020000200000009f2468eacab09da3982a29d9945bf018a37f0c75d762a2b591bada41cd6ea127200000004c8d099135cda0fde2fd984c63269b7056c5146a26fb125269019a6ea9d0b10540000000d56ccfce3d547ab8f10569ee6ca6d8dc7a041c145ee143fb2349cefc1a59182522ee57a38bc87355ae529e3d21c964965dab0164fb3dcfb5c46dea388e3ea8fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80923ff68c02db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2072 2320 iexplore.exe 29 PID 2320 wrote to memory of 2072 2320 iexplore.exe 29 PID 2320 wrote to memory of 2072 2320 iexplore.exe 29 PID 2320 wrote to memory of 2072 2320 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5e657f31f749090bd7f66a054dbb113_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b2a6c941fbfaa03a71cf6ad5b8b7fa
SHA1370a49c90e9a73a6d28bc870650dcf88d5074c01
SHA256bab2f7a4dd52cfddeac9f568a15748d130611b1f5c6a7eb6c98439f782743c93
SHA51221a2476dc89d5337bb5c779bbc6c84cac1b0e18d6ba51f3920017511efdf74b00273be3b87593bdeebb065977254843f270b2cec9b0938bfd7eb9ea45660f5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd4d5c25b75c1152f8826779a87b2e3
SHA1978ad53ed15a53cd9289432139c3925dd9ebd451
SHA256598975eba4039eafde5b7ae5d4c2a3cfc9ac1b6713f2a09ae04832d0826da17f
SHA512e1dcf862346f478b62ca9a0bc3c8bad164c1600b230a87262cadda77d5e1fda7725e48ad7e8b390caf6e8a607c3d78f6f2d6bd4aed5665846bb048189bae28b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb30f91ede0daa90533550ccc94ab07
SHA16bc668aae58f48cdac8bc778d8b265cf36d2d3ce
SHA256534f7d9d6017ebd925de6b0c7696d8078e612b0b110425bdd2281e615f31a39a
SHA5122d5399300f52d8f107cf16a22fcd965ac3ccf34b097cf54d348ae8a9a35fdd758181de90c8f72a113d8bca4225fc1ca71e3fe69f41127d7af8538f8ad49dec7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f417e4bb61ea84f7ab6ae0ddafe24b
SHA17a954418e27bf4b76567a37ad1e39a62a6301be2
SHA256e98aaa75d84cca5dc8ea4625eba2ff51f57e5e64a2f2012ac3e9a6f26f5da259
SHA5122497320a7e8ab3a7302cb4e9e279adfde4b62cbf09495e244c14840e294d6141f01227c6fb22b9b694555c041e16ae6c419cb4ca70e39fc335435e0996088bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51154512c013f71273395b86e73e29f91
SHA13112941e5c3c3e86af92161724b6f2f7d6351e3c
SHA2564521c913adce71b2c5f3b669e07d58911fdb50ab12c62adfd379c0b20805f92d
SHA512209519732671cb038882bfd9582c04a0969dce498a13930499c8f07729d45a64ce6017ce11e4642524c2f8f9a695fb300fea952e1244706600906eef491a9115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136847bfb626812d334b26bfc60e5973
SHA178d6a67f893e8a730d404a52e01268cd901dff4d
SHA256ee8a8c0aa63ea96eb8aa54b63466068399b2fb54eb5df0d38da3be2c2e8173b6
SHA512d9e4078c3970dca23725bd226a246962870d9222b3e944f96db1064681f7ed6e5c4cb04edfe797c3984db62562056fd6687ff01c5c91d28372abe97a5205cea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573db4a4b924e7d1d88e394acd4b27a19
SHA1200a2a792846a55a2dc41d69ba9e31877787e489
SHA256cf6541afaeffa36016a6a9972f9e5d57c9f724f88d06b5cdec8fd7bc2bbcab8d
SHA5125def70bced6c3dda4ac492fe6f22e182a425c6405c332a6505e0d36dbd136c0f9af25a2492214154851e3584e47ba8dbfd02d0e2e71ab0ca92f876925040a448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd4d176d8d68f260e368aa928f3bfdd7
SHA1374418464666f9b8465838a4693746353f66b77f
SHA256d8f39d3ed3fd47812dde3f0d4369b08ad6853dd897cc29cf9de30d0de30b6fd2
SHA512a210c9200f826000b62da8fd108d3ff581cbf159aa1d0332289fa59a049f86b785e4da271deb724243730f44e066e742172a073b886dac1e60062df55f8c38a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7170a3c63de6435fecbb5e0c795b1d1
SHA1e420534db02ee9a36acfe31d83bd936c01b93d15
SHA256ac5d935087956807f8804c6dd809ce987b9e0257ed3949456ca0635dbb3aa995
SHA5125e5bc52cd8194aead79a5d40cf3dba4ecb1e0ebb8f98d88ef0e81e17b365a3edca2414cfe5493c207695d7167b3e41f3e0f0266136487b22e252a0c71d7dd4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5842bb13eff1f6ad4eeaa64057cf50cf6
SHA10843f55b43c02ce7a4bc867dc66555b7a0e7ce02
SHA256ac891493ece1b7d0c94cd50a4710f26ececb192d72601adc574126112e8efda3
SHA512d0d455a035b09439419112229eddb57a56cfe5437efda3c0fb2b493ee6df35f1f8d719da362bb26fcdb2db8024583255119a7a64d2b24510e3f2e33db7015eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac4f59dc56885cc55471ca1612f089f
SHA1d3744dfd7649abd435a980918bf1bbf38cdddb01
SHA2566107e5b618ac728b18eb04e5d6550d4f7a719cd2f159984ece1b6249bb03641e
SHA512297ee3cba5f0989c95a5a398d5fe541ce1d1a739f59e8e7462d4d6098da67f8509ae1d2a8ecac11d43bf151c227dd04c778591154836fed99f78426675a993a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db5ec96432d193325f6c8cbb6d8bc3a
SHA1beb4181af784d0760e5090b90014c56f671396e5
SHA256228ac62460378a683dd1c3b91a25d78165219793f59f386688ec14195af57d95
SHA5122c3b074e6928401528594d54c53e6a546716df63290e5a37a80c753bb78b073086307a731d9128b1d61eca7e5cb08834d48c0d43b1d4ce58d38e4586882a724e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a41f8bff716991cf8c38227b565e323
SHA16b6e5b3744fba45710e58197a1719de1edcac8f2
SHA256ffbaf88a7aee62ccc8e21add107d8fda8fc5c437019351d07a4b3f49205fe335
SHA5121849d56dbff23f33c9dfa25af1ef3340d1406f16d0cf6273ed1a46343f2c570f17aa6532e496ed0747804bdd354a66f0b74837dab3c46ed606bf772e70798814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f3cbe08dfb02ee7d7a101781a1a651
SHA1b3dd3679105c35550985f1fb4f48e286b2c2b197
SHA256d81a8b11b3436bde5e77b65fa89c9c69b6aaa0574f46c8c0cd74bd929f773007
SHA512934f2101cc1da3dd944933398df0b2f0ee31680ac2a8cc85ce63e0b488dcd3bf707b4c2c75b563ddea30248b5c10eb44f955e136c69c0e8cf17d4cab0ce4a541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae19b0457a7263bac3dab06d39352ce
SHA167c220e62d9054b438afbd8392b738f83bb08337
SHA256858ff69cf5ad76ffa2a34baf5246e3c92ca7279e65c25ad2628bf7cc929ec2f4
SHA5127a0d575f2423fd4d0bb5e26f82df892f83f0de0378f8b8ae2e6b52f2e9865fe32a2fe27ec716c131b6e752a36c74bde569cd06a4656a2ff7c809d584524c3986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57335d53be7c90ba6cbe1f3f267023e48
SHA1efd0653904bbbb2882fc68925598712e334ea159
SHA25688408d7d0721ceeac7f7d9b9c3c693381705e272ced3edffc2c133ae253acd4f
SHA512130c10900a1b66766cb2b36bbadf75ab053ecd748eb0d5e526da94750099ea96126e2fc2ed22214fb565b1c4214cbf98a67a57610040d517685f39870ca0a8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ba674ae80bf84650d6815af2f52d08
SHA1ee8c42a14ac4097fc21772eb96b3dd5fe8284e5c
SHA2564f987bd45b76eb729ce78c2778d3ce5a5a670cace14b618953c9e8c1e8174238
SHA51298773742dfb7b58200bfe5d50a6994a4d95fea84f92491cac44c53ed69938d80d5097f6e6e7388b73dfb128f05b7cbb1ed1b9cd4254405b18c8aa821644f6bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d306655bc5d4c4dcab556b965bd37d
SHA1517e4de294dafa041150bd5a9cea24c81727669c
SHA256808c7bf9575ffac634bf24f04b0c1b81dc3428120fa17db92ef1486018a9c05f
SHA512f690927d693190393d6dd387ed82ecb2eb97f90a9cc962dc5fcad0d4250309cb37a932227bdda4cb853e21e3b47a8bfa043f10b00b81bada55e1fc17012daf08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c091fd5d97a2017c662a228775709f21
SHA12f64412a74bcaac3d73a567c77883ecbb20afe7c
SHA256626b2293d9da953791501c48e7387e6f66f69eea31e08b626d1c8a9db6f8bac5
SHA5128584512a33ce946c17c3032aa4b9e1460271f68fa4e03a3cc9bd5a617c847da89d05ea6402ccdd977ceb80d186d59af0ff147ad37ecd7e6296c19d39c6e70411
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b