Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
d620c093cf76b18956f74006df062bd6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d620c093cf76b18956f74006df062bd6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d620c093cf76b18956f74006df062bd6_JaffaCakes118.html
-
Size
7KB
-
MD5
d620c093cf76b18956f74006df062bd6
-
SHA1
4b53ab64c4a2805b6d2a826ff5fb436b83fe98b3
-
SHA256
db0a3be076dbe234c7b4aa731467be68afbd433ea9ed05785f825599e856b058
-
SHA512
9e097f8e795579b8f951fbdafd0b046c1df29560ee575c0d008bfff9d35bbadf00badb0dcdfda23d22cac8989b92b1b19d279cf54bdd2e561156706571d43594
-
SSDEEP
192:Qv8BFw/0AV8LnOFdfbTYpU4bMWsALO8+qLAyKlf4bkO7n:Qv8BFw/lKLnOFdfnYpUxkLOTqLAyKlfk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606f6223a302db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432039567" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B67C1A1-6E96-11EF-875C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c285d79f6a9db0dd33250b021e0a3880063bc04d004f25d3ef82c044f80ffe45000000000e800000000200002000000015886850999630c89fb3232924784f46f116b06a95c346d378fd0796456868b0200000003b79f176cdb27f1ad8b76b6f84d5ccf4c120be2bba649a032ec0e046b82d3b2040000000781b0f7e3ea592c2c8b88580c9a0b37d5a08d3db4083a232965d3902b8b9ecb4622019164c6d4fbef990c5e66d5d56c228eb1888948255384e05689c29ee5139 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1808 2524 iexplore.exe 30 PID 2524 wrote to memory of 1808 2524 iexplore.exe 30 PID 2524 wrote to memory of 1808 2524 iexplore.exe 30 PID 2524 wrote to memory of 1808 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d620c093cf76b18956f74006df062bd6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914c4d5ac53844f8c2dca6ec22be7623
SHA18294ec29027053a58d4adf3704cce9b68d796718
SHA256465a490460be3cfc4216721d9f1b278ba952ab5213e2c2cc17bf2605519afd55
SHA51232c9e2e9ade3faf508fa340ab96ce5c575164d0d6b37029301d0414aa180efc957a25325164e3df4a2969e2a5985fce04704f40941809df9b8ebf552f9865545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc22fa745c70871b57650fd9ea74b73
SHA19029876dce84386bdef933a6fd5cc6186635e4cd
SHA25690fc4e588b7dd6e5a10c4e86e8a63d0336f602ba5df2107ca410f64eca0e42d1
SHA512d7facd2361a580f6c49e4c1cef3d1a055f30bb20fd4cb18f96a9319931a2cc7ef8eb9c6824b009e3493623f33b56e5209f0705904696f2196625e9b1ef51bf99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7ef2bf0da15725bb64087594847fdf
SHA1fb1e398194f892c8fcf2b9beefee4acba7560751
SHA25637aaf7f4bac1839ba1e56da9f9c9809912b18fee3884bfc9f411ef28668a484e
SHA5126dbbc95ac409d924ae3210f9fea4f7a31c41fd1736eabca63017ca4f03feb6950cbb6349dff440a3243d48d378e0d30850640ba83ad8a8c236b8fee92286feae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d32614084ca2b826898f17bd293fec73
SHA136b3cd4fccacf0228d84d1c90bd5c9199f4ff71f
SHA2566bdbd46c45ac1f7d3fe03621fc097868b2be2b3eb0d2490f1481c964ab8b86c8
SHA512e0d5d16d7a64a1a4f56ed629cc797e42b2625fcb4b71032a81d80106e9ad02d2b65a257f113cfce22818cbe4451f9e2ed2d8ebaf939affe806fa0a3d0ba17c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869496a6a3780ed5702ab794e20a0aa8
SHA116f06c3226cf2aaf97a8ab690a4b2cd736a83fbf
SHA256d3832f064943977a2b47c46d53d148b3e0e8346c7d0e17de72fbf6c5e477ba0a
SHA512cabbf49df5b20db79a5a069eee541375adb8109757fc58e8e7229c71839f5fe5aa6bd82a65b73f183bed9e0a0931e2ff31387105c2fea7f0bc075daa45a444a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13bc52280364661faa84e84661d36e9
SHA1be5d66864a2e0aa4a7cffc47f993eb1abcd8be3f
SHA256e4d7878deec3ad6b82c3844acec914ee4baefc3c9479a40fb51015202a94b143
SHA51260a8485285f87830062067deadd121132a75234a543596e786350f60f4e5de166728ad948f48b148ccc17c86fa47a86c0ff429afafcb1316936757228e86bc54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522cc60682a11e5148f9fac1a3e429388
SHA1c42a7221aec3d5b157429ecb7352a55549996179
SHA256bd88d05686dddc178f1a4230683995323d46ea00997a41c4e675c7de5c0fce58
SHA51238b178d0b4d440e75029714baff2300983cc04c80500aa02331bc522e1aa99b16d6ed08c4586376d323ffdcb31d758a6610f586fc31955655b7cd7c2e985b07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af84f6ac16289472867ecf5196bf125
SHA1df7e5dba8f8d1c1f72d11b85a1c44b6a79bd3e18
SHA256b8c48c05c97dfe010529df28a07e2620408b92ffbb93f4d7cdfa1717812d67d1
SHA512dd43519e12af30814642c0820504c7a8cd6713ff166a8a95755b153184a8213a28b005fb550d0cab57d47cad55fe5254f704d4459766a1028991599d2966be17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626e9f051cef35ff8544c64082e0c1a3
SHA1b361080c68adf1124cbd4e2e1df05c2862823fb9
SHA256a977c9783d3d7dbf5697da8e49fe1c6def6532ffc2652c59d72ea0190524575f
SHA5127135d0825a12b8bb033c06bdd6fa76afc44e277a067e5f29510a289e59b3efd2538b560548ec042e896182d37903a77973eb6ce23de2e1da4ff592ae30631971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e40d6a267c44c831f7817e2b86c2376
SHA1ce60c4d2b98a2ad8a8f685017f8c82265b87889e
SHA2569a3fc649157bcd8e1662e2d55e966d0defcc41fa6ab0d5335bec38a2c1fd0e20
SHA512b19ec4f12a89c59e3e754c65e62e15245a9828adcc76a9c1c7eead38bee256187a2fa35ffe73e40d9146af873ec3b868aac3ec7d63459d085bd66b8a4e87664f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a9577870a798e2bc1ccabdcf1ad15c
SHA1e4ba40d847fa185d84f7586357adef20095ae76e
SHA256749f467b64d3c4520517cb4d64f09d48bf0d0f73ef90da6bacc42153ebf46e11
SHA512fe46463959871313e2fd851addc32fa1d0f12a144ed0128706acb616adc111f710d147e093a37a4805a4d5d8670c1f6349cfc50c5a8c61e015e427858f3166af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52362bd3d91ca87745212a947dcc26f60
SHA1e5b63ccb46233acb70549bf576b60c5584ade3d5
SHA2566319f20e4f95c362e80601004bd5a93545afaeb359f1414741788669c0c8aa81
SHA5120ccd0976eb4cca106fb15e8419cf2eb026f0b7bdf940f857c67cae15108639e031a2f1e098cfe22b6ad1473f80c032a0ba51adeb59eb3691572aa63245606b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9826d7288da3826836f9889363a998
SHA11fb23f841a916481a179a38fc525bfd8e227b8a8
SHA2566676e425f683046fac4eaf55fe1be4dd87daf9870b63e52a6d447e9ff862b720
SHA512536f9704d620fe41c9b5f282aea7ee04452e579be38d54d2065265271290124d8e018ee0984aaf0ff38efba3cd543d1d83ffcc84c7cf8809dbdac0e7c817d360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551588581b71143817b8e35bf6b5f40f8
SHA1ae9650c45abc0866dc196ce119e34d39842a2688
SHA256aff4eda81b486847b99751ea6969d2b5f5658b6ad607e43466a2476483817553
SHA512e23dc2d25d204528539ac12a244389c7554115df7a6472a4a225a3bf4a37fa14840cc7ae6d35c0651ec41ee6071cbd22afaeae98d0842682ea6e6b6f8f0f20cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9175643cd09de86c5e09de0c5582c62
SHA195c879dd31a73320fe9e2ae4629d1517d89d7c1e
SHA25663c12d848f7b14086844da1e804a6704d8911b05a78af99b4e7483cced7b5caf
SHA512ce4a02b7a1f2123d1a92405514e1c48ec4dcf7de2ff41662128ceac57a81538d975424f62ed69fc216193913e2b3c24c3f62d62b6ee018732d485d825e5f5e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc54a1aa2ab7f9e38211b3e769e5e87a
SHA1af6ac69f7192c188d0a2b448df07a4fd84e93cb6
SHA2568d4a3f8d5a919257cfacbb2e2b269bb9b638b9aafae2adffc2d8849ea69cc7d5
SHA51218ae847deee17864903f47a434930650636c95324ec367eeba3d18832b20a14757417047cda1ca870639aa7839b0f199e62de76e7dd13a780df7dbf145cff388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff72ad76b6eeecab47f5cc6b5aea133
SHA1cd2729eb50c94439029a3e895bb3ba1a955db4b5
SHA25626b0a4befa41fb73d2b8e5017ac81e41113f126ff25855bbc512a02ba03ea9ea
SHA512b75b59f387a3d61ff15b172ba6a9dab1b3a2a44ae571436c5ce59d1b7714db8e86544b925566dda4ae00946506c94aa9cef547fde3f12bb01280bd0d769891a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b926e51e7365a10d19d738d02587ba9
SHA1b455ff31f6b9ebba4d7101729329f6a0646d0cd1
SHA256c027ab3bc8cc95b23b79072be62dff518a41106d7ecdb97f97815c6598bb7a57
SHA512442d26634a44d9a58ab0db081443bae9676e04451c95d17cf2c8acca5345e454ede1b97021c2a0266b65969caaa0bb676f90f266be00bcb1a3cad009ea1f1885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b26ec19dbba331e6b2a001ed7e3c4a5
SHA1c4a02457ad67e991a236e4d26e09cc8e5c936793
SHA256a7ef7655fc1458b8e61c9b8c6ab990e77066718756f1ebd67eac33dd43a4cc42
SHA512002ea0a81caff93baf5f7dd7e01d12617817b00f71c7e11700f3b8661f6ef4aebb4c12f8f40aedd0d913cd639358d038bc4a4ba93590e84b3c8f0505dfa12bcd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b