Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
d5f26b6d832178762795615b8bc6f5f6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5f26b6d832178762795615b8bc6f5f6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5f26b6d832178762795615b8bc6f5f6_JaffaCakes118.html
-
Size
4KB
-
MD5
d5f26b6d832178762795615b8bc6f5f6
-
SHA1
5f8e1d9c04f141e8d41f4318e479c23ac8e77180
-
SHA256
40e2614f18065d07cc29f268e8900573a281fca947ea54287e36e74b1fd57f66
-
SHA512
b9a7cc39cadd9ce2fc9c6a17670c012c0db16d5bc54f2da777096d49c1ab228eb01a2b1a744d3f3e490662b1d348721d86f9235535f70251557c1f5078809273
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o+X8d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08a52c09102db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBCEF4D1-6E84-11EF-9FF1-E28DDE128E91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432032132" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000019103d91ec9f3b759dea25d371efbfd537ce04654c9c7968eb1be80e8f2bddbc000000000e8000000002000020000000606e2bcd27612b72bbc0237fa7b9596f279a7644458d27b05a2958349047aa5e20000000ce284af7f4eac4950d44c1c74fa995b948d761833532acfd1a14f685c371a252400000006d950a545e53f1bdedcd5b5867a1f6bfbc26ce03757b2c9c831811dad40cae4075c00b2e1d6b857a0c491f3b9b1bb4486da2d4a8e6989bc0d8ed6de4aa8ce17d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2380 2020 iexplore.exe 30 PID 2020 wrote to memory of 2380 2020 iexplore.exe 30 PID 2020 wrote to memory of 2380 2020 iexplore.exe 30 PID 2020 wrote to memory of 2380 2020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5f26b6d832178762795615b8bc6f5f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1f87c9ef667a683e474e9d67441747
SHA120c292466b5fc99ecb0c7245971b42153495b885
SHA2561ba1a0b0650132fb8b465c28c00b71327bfc2283dd24ee5d6b72b978be770e93
SHA512dcaccf82b3f9ec8991dd5ac43f77b4e2b8787f1e58bbe5edb21911feef0ffd95ec371d5a60eb131d078b29efe4f31367d8a72fc5cacc6dc44b7c75944a4f7801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50444304a64c744e7d3e591a1a0a01568
SHA17217f2c44ca43e18fd9f9d3c28f5ad2a92bc0a23
SHA256317754b16633e976cf477f1af847b786d37217d2ac64fa8d0b26804aea7888df
SHA51264e370549f398b29c2c7c0c16296e25416dc39b020f002da6da67b423a5d1bd4e53f879eb48dca22a1d6501ece3e9966172ea46c5c4ad55faf173b7a3fc66be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542373450c86933b2af79195f008a545d
SHA12cd3f43654555f49f40cb3cd0c25a6f7e7da4bf6
SHA256c8836c0e3b8f5c5dd6a87a8375c7dac20d5728aac5430899fe9c95c277917d81
SHA51243bc52be12a2869f6685d9981c92a57e0516656407d4b428d1da2929d2204108fe977313496572d1371b7a9cb933a5573e85a3155de25a6edc295843cb7c671d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59143ec86292a3b55cb8f6ca0a83a2bd8
SHA15611e653d420a968d359a2f0a0b472528248b472
SHA2566301cc5b4928e863c4e404fdbe55c9128e49a6a7519668765721474ffcb403bc
SHA512ff8233bf7c1d11ec69e4e5b6e06ff7b4829e95408568ed149bdbee8ed1eb33eb34ba07f670e5f0c165074a32159094207e5b076f243ed386db7c0c8e73b980ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c73a64c5e894011029b506996bb444
SHA1c62462249af77150b12b937c97975d41f706e6a6
SHA256181b92c3dfa0395b69bfc1cbbddde6d2b497eb7d5a959912ae03ddc809f7454e
SHA5124acbf05838f96365e4b598bc28b91d7fcad75015891440a738c26a3b0118b677aeda6f40bfc315fc417b97c535a78494e50eedb6011bf748442895c34bafa892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda6cb79d7e395f58ec1be2044e3e3c3
SHA1fd910df1f76b0773118b96fca747258dbb766725
SHA25606e30b4272a70073c000e89a16f1171ec443ea0df77ace511263ee41c10d5187
SHA512617fe25f9982f3d2e25b352496de7dcf9932e2fb38f0d384b910d6aed8e6858af24c6c53d5846a979b29ff3cb7b5e718eb4e636a5c4e42c144ba1c410e64a951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e03b3940351bf766d44de95867bc9ef
SHA11926814ba944f51af0d187f8f20d4b92b4645c62
SHA256c7ce2308b2a6688d13c07766ed0ec58b1079d6feb98c1422e9f0808a535f298b
SHA5129a569b6e0b5eae970a9303e956ea624751f93ebc3b22ee269093c4e9dc0d6636c8ad67acb80bb1027c674e8753cae6fb443f34925888a92957477a3887e5443a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c2964c1c9cfed4327376842a4b5985
SHA1f942a092a5879ca7510bb4eebf3a6bafb356fb43
SHA256b497c93fd88cff2a1153ca61e1f2d0f508e8d37fc0f99b4fc739091764723824
SHA512d7f094a9538020b54620cf33a93c4f88ebcebe36d50384a230f021a67247b59d89608052215417b7e0428f0b469524209e251fb13777d9d60d9b6a3cb38e1c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5749530aec339a177989fda910b5be52f
SHA1b71d8469087365fa33da7ec23e4f2984a7affbd6
SHA256e77016c69090aa4e96a4d4f777bcac6d5d78bc4052e4f226aac6112142f5e406
SHA512deae2271f8a0aab347478144e552120c5dc420099145a39c28851f5a87038ec3e8bc2d3f6ebd923a8d00290c545c2b178da0df56ddf786b8cc78caa53754c2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70ed9840a7f6ca59b315ef861efa75f
SHA1bf72ac751b7306b9854b45c1d38997b353731921
SHA2565e4f20aa4a7cc95cb08fe710dedfe1e2f03b1d7294331b780528474cbbe04579
SHA512344fa3e42b2a90e2aae3b7a77ae3832abf405adc1b8a33e21dd3dfb3d4d37119b0a1253a3008c83a5bb8a8eb70abdd0431611dddb32909f40f07904a618e5081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcec2d40532a300dc273a8f1f1a605d
SHA126ded5f1dd53d300d370198f45f7480264989759
SHA256d23099e8e4aae2bb04f36168df470469885a8d5f208145e5a464f59d85dc3dc7
SHA5127ab0e83e8e782c09ecfdb541f18fed603b93547b2c87e6ed0061b87e3665823acc64aac5d5e97d6457829cdd6c53098be3fd6318ef9a28847539fccbbf7c1442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa946db8c6e2b365ab78cdd761b411c
SHA1814011af38f92a6ea1ba69e87c1189a216594394
SHA256daface9f8c496aabd9f813006ff75dd1f4cb29dacc837e732143b7126e329873
SHA51243a351a87fa9ef8e32c05c2cd8d8c8e4fe8335d035af517df53bc5387e283eef1656b32005f74a8f77ad0aecfc6e59e9af0be64cef8b14da2b773e8db361e544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4be7543d7baea5eab1f786290d65cf5
SHA1ee677542d83292a5711282a7a321461ef97d14ff
SHA2568ca6ca5b787d332c2fe876a5198e74033b2739199c1996c138a603d6c6e4cba6
SHA512624fee7beba82f0df82aada72e81f62af4402c636a9d03aa42a65e06f33d21bb2755fed4668d1bb3cb5bba54e5ed51150c5e69d08a8704afb2cbe3fb4903a331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52518e8b9be519e7d45a565d0771aeb52
SHA1ccb38d32000b0a829c4f22dea7561cdf13f8a598
SHA25652cbec08a2617fb27e3e025a138fdb7dc748041cd0dafe3f9e59e99e79a32a4c
SHA51272fca2f01405bc7b0249b45b9cfbf4ea9054f608ef07edbf4704e464cf15dfe08d3b3bf49d46ef47239e6b7c8a59db9626d39a47e660d6794ff340842a6e5f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ce8a8f01d2f390d75ad39e81000cdfc
SHA105fba3000b267b62850508309618708c45b19d10
SHA256378b7fa1e7af46be9f1e92c83646a3e6c18ff4425036c1d53fc5ca84f4510e85
SHA512c61ee89059c21d4d03e56373450bc2a0ed8024083516571e6493319aa9e2ab75cea1c533c82db256b1445a4892ecee3201df34037ef37617a935759c530a0636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53469d5f6a12d9e3ee29f7fcb593786a7
SHA1897ae4b1092e7323efdd5339fe14fc19c013ccb0
SHA256f04addada7ef6a2f06ec02f32e99b363290412349c702a8ffe887f0db3b3c321
SHA512cd96817d7dd6583cf41dc7e31efc2d7db27cf9b63e14d6e37c698048f8562286603db880bbe2dd78ab50a718605213dd44f52b33f25208f23c60c3a5a8b89cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd91d6c39fbec6b0d593f212c599897
SHA1d4b805187af26c261d2ccd181f4809b2a8d02f2a
SHA2564a75fa3cf0697e1d40c696cf0bd3e8220e95a9d9d08202e0de6cc76166010f6c
SHA512cc1a02530d181d14dc1b0f98127c9bba9ba269bd0befa45166fdf342e03035d058f902f67d665e49392f68e340fad33c7bdcffcb6bb22fcc022f2f7996121e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591061c020721b18f3579b46f5b1bb4c
SHA16166224b48cd134d93f55042d814ca731a91f03e
SHA256fa75380261ff5b1b765f2ec0198c83b733f26d7b69212767ca9ca01c20fbf23c
SHA51250d3880ac9b56d55da822225bd7837e093c259da09210092c8a2724abe1d252caa994e2df0dd0fed2595b5d34fcf07792707ee0f38ce825e44ed8f93a6ca2f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3bcbfb8977e7f46eaea9d163c3a87ba
SHA18be6e5b030ce680764c6ac5201def9ea356f8989
SHA2566d650bf16599d454186a4ce67da6c3fc926174a703c8c613ed59efca40793a33
SHA512fca05e3398f59773ee26168388a779f29aea0d943543a34effa9090793ab332d4cea4687e225831e270163c33bbdaf68e630b2795c746a466f6f90a3f0f944a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b