Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
d62882a3f6102520137ec12e840abb26_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d62882a3f6102520137ec12e840abb26_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d62882a3f6102520137ec12e840abb26_JaffaCakes118.html
-
Size
26KB
-
MD5
d62882a3f6102520137ec12e840abb26
-
SHA1
6a6706ba281a1971732714efa7e9295cb01b48f3
-
SHA256
0ee11a156712ad37ff74443d867f8b988d732f4494741bae3f43da2b28946da5
-
SHA512
76bb778e1934a7264f4f672f54b3ae4c0024556c6493432f2449f3d8a1ce2ae5f32c0f935685c9f27b9cf57412096f60f4aff8e4db03b43c976414adc118d87b
-
SSDEEP
192:RsnoduQb5nTnQjLntQ/UnQie6ncnQOkrnt+RnQTbngnQT+x0m6Cr12BPQl7MenF0:unoIzQ/ZYsMaIBO4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b1ccc4a502db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED9AA4D1-6E98-11EF-AA6F-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ecbc73c6c1e042deefae2a80d5a6a4b76fdd7ddfe894a0e136d8164eefcac4a8000000000e8000000002000020000000f57735421269dea0de94958c2c4a5cf8ef86f4279265fae4bd466397ac883cc9200000003ad1a717635132cd4b8444ed1abcccd41a338bcfe346b04bb81977a5500d90f840000000dd2a913c0fe00eee85d2b2a656c54855bed261111cb2339c5166004759b29e74a50cdb14e843219a4915fe9c101a3dd587fad3f0df4a92d6a568b8b0fca8422c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432040727" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2184 1960 iexplore.exe 31 PID 1960 wrote to memory of 2184 1960 iexplore.exe 31 PID 1960 wrote to memory of 2184 1960 iexplore.exe 31 PID 1960 wrote to memory of 2184 1960 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d62882a3f6102520137ec12e840abb26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b565737af428cd6b42ddd35946a87724
SHA1bdce4a359c741a0af3f17f95240fea2fcf75edb4
SHA25678ec9643a5dbac754ba0090c4dd13ae1b568979241a01a476370db04988aa23e
SHA51272126b47b9f46e4afa2435a59bc005d68f8b51463442fb1e5086a9978cb58658d1a3cd65c725554dd9c48056381e70c713a1a19a9644d5211455e204f82200e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c17ce6c4db414d06d36862a9fe731e
SHA1c02a1773cf573bead1750f759f0475fac0014f22
SHA2568853258285ad4981877e890d240c6f15d2ede7748837f312b8a148ef5477d893
SHA512ce0389e82ba2d693072632a3f02be3cba7e2eb99b491616866fea0665a290f0deab3e09618325bd6c6fa945081f110fa05158b4b0899508230c63a516519b966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b7ae3148982638e1a226977527b941
SHA15e30b031ba923a23d84b966dbc702553dae48636
SHA2566fec95fa457b9ed8e83d599cbe885d8d5a8eda3c4594ba3100f5ca9e20d473d2
SHA5125c84be43780fcfd40d8a1c71b8e1aaad7d4dfcb1666aab8f72e82ca16dcb66f0a692cdee6fae68e93fe3e373fa8ba988c7460fdbe7fc97164e0fee80d0749552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee7bf2135e5c67caa2d3d44b595cdf5
SHA1043bfcac107a7c84543b9bcc6e080765caf633d3
SHA256027227c95cf38fd92ca6e905ff6aaeb0596eeac00364b9f5a99231d4c4a03445
SHA5123b29e904ee97bef4b61d514e6e5f4bafe55b6f8ccc0f14e3d1153989f59f99c8170ddc944c4ac7c917b22d0300f9905a007e8b1e96ce5fa6b3aa5dae959b79fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd1d8c1cc83e16ccc57a84fbdcdb356
SHA1c7de8b7e42294142f3c8fce6e0ce7beddf063aec
SHA25628c400984add8878f310530a3b22c73ca9e89a2df7d9b537018f87ba6d1cd8c8
SHA5124c62e477b4ef1f5a03c7a66cb9b8cc68f70405511e776050094bf5be27578dd3c92e06c51f4a5141fd64173f6690456365bbdfe494a2b6345edcc17998488002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508804cb6d9902fa85f5711c8a94a08fe
SHA12a80bfe7d44c27c56e1c2b0fd95bbe797bdf6c66
SHA25656bf481a8857c284c7dd7f2d223758ed30cd9032e24a11d71e843ebdc4d6a6b1
SHA512dc9ce417f9f17ffa8fb2a38f158c512d3f328bb188333163af4f57985c47a7c52b69b2c861a7cfe965c2a52040e2d10dad0ceb999e20a6921b92bf66d96a2179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811491674b4ce9971f4e59b81c9efdc9
SHA1a963f0991886818a8f6b96e4430b7538236b8539
SHA2565be24b5ed62e8a53b5e8afdfa8608202920bccf96b03e1542e99caf0bd6e805f
SHA51281188bb8fce4e7fa9fb6c9bffc4e9ad4dada31c1173871c52a1a54aeb17a4bd878d5e20200b06c6ba0a05e007678a64c76af5a2f4ca7f22e56d8c77150018ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cbe83967440ad92329daa4dc1f79660
SHA1ce5846e89b306b3d0a643aed7e9f7390aff4d78c
SHA2568c425536e8e7d49e0d219de8312fb8e697dde4e4f534d5d6c84f5fc541b8da00
SHA512c4ed4d0c9f80ecc0b7ac9765098d7636be720845de4e8a4a5b7374a7020232f7cce3560b769e2c8590c9862fa951752257464c8a25e748a3a23153004db8c201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58660257c9523adb789bd95acd78dc91e
SHA18a69dce4919b71c689da8a04136f979edd9b9fdd
SHA256c32d1887d3bc14c849f3685a13f90ebac448d32d58401bacab9d41d72a34aca9
SHA5124e31c5bb5e60a69a18a5f61c94ee8467cb3000bbc6e4c64f9831b5ffce1d0115fba13e7888c796631b54490c3f447a20c93ae456270ac3b92ad91acaa7ef72a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251ba54dd65b5bb76d495681f1d057d5
SHA19c4863be0d540f72add4691566b45cec96b09469
SHA25613f648a14a8006bb186d0887fc965aa051495bc099117ee4f4d949dcde45422c
SHA5124523ec28118c5501d5553c30cc6f4e3bce200b16864928a93ae28fec328c75caf98b951467a39e3f4f8a5cb89ffa3f00dc6944fe361266cff2d00e6fa5d6559e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b572d00596b571514cd19d08b9f5ef28
SHA156d93cb2ccdfbf498bd64d6d0c753abe3fddb211
SHA256f36400f23275e13851ae8be876920e26ac23dd2c7e8766f5e45ed89ec1514b08
SHA51223cb4d319dbeef1bcbb60c5de0845bb18f828db9a30ba5e85cd48138fbd9e3f3e302c9f1aaa75814ab94e74ad8197b1a2d894f0a89e33175501f9cf7628cf9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55984e996cec8f9f558252c8cddf68b5a
SHA1751f9b0d27468f31618f41e93b04c1bbe54f3cef
SHA256af1cc38199b960685f5399df639c2ff0554b863c110223cc1189283111347f64
SHA512db57ab287968f14856d0d7c82eacd931413537ea088ef8727218bccd169bef87d75b727177051d80bd7f7eef9c69c85aec6679bf933f992ed5941b13937f291d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb2d331bd69c0011b8288efb8d33d3b
SHA1a54675d5dcf35d2ea29a99e68a9bbeb3f7bbc9a4
SHA2562a003a0330dc189b64c91c7333b7b8087064ed2191af282b2ab96740d8459509
SHA51259d35ac3ac80ca3e6dd56af49f83abc2ef41e35740fd189efe1a0d02a972fb0249bed330ac7591303da6546e00fee221c8a78c515c4a82340cdca4ee451dc89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50efd838f0206ef9d5e24cbfc262933c3
SHA1aa765afc6dd494987e148f59501f8584837544fe
SHA2568ffc9ffe8ae667107e6ac49cc843593909d439eb26ecdb26160d7f2db60b06b8
SHA51207a631581d5fb2abb81140b0eb367532db431f9208e21e557ad06713096ba9d69f49053f763c764287695ac3a9fbc53ce02143a5a1466ef9d649626e126c882d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a75cf077ea9c2cc651ed09bb2d43d1
SHA124381eaf714f0ae80b499a0a14c6415e777d943c
SHA25683a120c3e6c2351f1f05947e4be768751339662e1da0e610266e05632526a1bb
SHA512daa78ef41ac619c6d52ac46bab023ae79d3457cba38b1bc1e662d373bbe489df6ca80e8a91f8f6d7d20ea273a37384938e59dd70d94d158e70be36796766a838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5927b418e3b0529d0e2155f20389dd0f9
SHA1ebc1937ee49d7fd1f48f3c335f54cdb496925556
SHA256d2891014e1bac387fa528aef4f346634cffeea206f1c4e2c81c0eeb20cc13009
SHA512665dac296fb9f73b76b7041df9cdcfd8b22bb0acb2dcce711c9e3f7df54baa4746478dbdd7e9b5c0347c2147ff2aa5a1a76f2738a7bbf709a77dbda5121d19f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748f2bc2be8395625fca7367a3e19608
SHA192ccb4fed02fa8630a8ebb7de9216f19cbb6ceb6
SHA2567a79de66e75ae2efe6f62cf8737f84f3a9478b23beda2a0cb16b95904a6bccc4
SHA512c11c03cffe5c8bc0c38111d6fc870cab6c8e83213e5203c740232b6a5c881131fce3981c819e4f7915424b023209fe1457d5d6c266b7fd1b900fa689df90fd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3a4d904f8d667bd9af12d43154fd05
SHA17e352a878b29e377705ee887c41852d26766ab33
SHA2569b234f0c3cab5d3a79739fcb41dceb6f3cfc188d9ffbfa72afdb2cb857dc8379
SHA5123432913b0ca8d5886c2cfa738f51f1ee1d5266417b59b830a485742fbe319b25924726a3fbe5260405bdbab082668e7e5185102232c3ed5ec71e930c576289a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397a4c20b2d9e67e1f8691ca26484df5
SHA1ff3878549444563f6c0ca11e6996dba34ba98d38
SHA256514101760350077db871ea9681140f2ad719740e21c1a8bf225c4fb452228c41
SHA51259a57dfc802117eb83c6d58ea3823fcd3decbc7a5cbe33fa2e18b17562e441237677fa730b81751ead53b350dbad4c8fba9d13ade4fd3061a2f1840adfd3e765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528f9559b7258c678d267866af2e6d04
SHA1a23740ce3709f61b32855de64c0657468f3890b5
SHA2566060bf77484aa9a7d0ef0bb9f16dc8b9d456c6d9223165ccc106dcb055c27ed9
SHA512352c2e0151bedffcfee316f9bea0e4f8b9d50e7105a9525cef37c506169e5ab0aba261cc50652ba99896c48648ca94017b574bebf95afd6361d45c8f97d7e0ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b