Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
d65d839517b3ec85b21ec581b0a8db2b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d65d839517b3ec85b21ec581b0a8db2b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d65d839517b3ec85b21ec581b0a8db2b_JaffaCakes118.html
-
Size
2KB
-
MD5
d65d839517b3ec85b21ec581b0a8db2b
-
SHA1
d08aa02abdcee2081095c47ce2c0af66d6d07282
-
SHA256
a6932941e7dfb874e0ccaa19d95abac751c9865b0f6d19678113b1f022272a31
-
SHA512
d4e0cb2e71878bc4a33477995bd7f3e6c3924c57013ebbb83f84cba8ab77252e33f7a41b422910780ec60d6df894187e1aee68f98e5d0b07aa4824345544af55
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d3e59bb802db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBE85821-6EAB-11EF-8287-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000029502416bd036f71e8e077e2eadda245c49a99417ec8cf0deacd56a2bb191a5f000000000e80000000020000200000002eceeecb18215d2e2d015581b1575b85f2c2a83c6a998463fc5578495c006b722000000028ef3aef7f0fb340bffd8de2e9debbf3cbe3983919c8f16fae14290a57c8f6a240000000b4fb3bcc5ec2bd6574a380a04caeb61b437962b8184c8e586a780edab10bcc1e0949a314211612bac66f668376ddc42c15db2daa214cce31448021a46e700dcb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432048802" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2968 2388 iexplore.exe 31 PID 2388 wrote to memory of 2968 2388 iexplore.exe 31 PID 2388 wrote to memory of 2968 2388 iexplore.exe 31 PID 2388 wrote to memory of 2968 2388 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d65d839517b3ec85b21ec581b0a8db2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b493b78c5791ff845b3aa08aa34794
SHA117360ae34f77a861fc1997b748411e2ca32910b2
SHA2565c167b1ef19bd4090fee9fe9d28d09be63ab01e38f316288e36b4abef6c8f9db
SHA512f9eb621e430637a2f61ceba7c2d5d76250d9ed236d3d301618a33040b34dd7ea870cd965bd98368b60dc7d8855e295b934d37f4f16760922f2c116a036eeec28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50baafb91e7f819ee25bdfde28541c892
SHA1fa5c7b369bc4fd5ea6db130e043c7be0d3fd6899
SHA256221f605407f1480550c72ced95b3332e88aefc0b9cebceda730e73ff038e3aa1
SHA512fbb5c589370815a293582638fc5c49c327e91f2ebd306f79354edaff97f396c3471409580f0c7147e4fed8ea1e46c9400bb2a9dca4b0d3fbe5e50f2378d90f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55943e1155e59ddb2c1ce86346957a0c1
SHA1d8bf17ad29ad6cb70a046620bb494b65da6bacef
SHA2567c8fab073c1c1c6bc66eda26d364b23011bb7fdb6da41cc5d523a61f6c3846ed
SHA5129c0a842cdea304927c3deeede2390386e107affde4fc55ea1ff642e8a5b2cb50ad20f76953821a02cdc351c2fbff9cb753f5e1011de44ba33f57f069a5b75859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6e20d610cd5c0b24e2cbf5d37c39c5
SHA16dbb8a5887e19926b6de1a0e40771e2993b8882d
SHA2560b4719ba0dd9fb2dc31180e3d8049e42d16351c4169f8602c6e815e0feaa93e8
SHA512a303a209981aee061006c7aa88972ee06a2106ae024955a1b58bb3b7a107eae53c53efe4016655866c0adc5cb672be94cdd7caad3fa47a3a717caf9a87cb52aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ecf38752f7af6d74ee9a9ef5b1e4e7
SHA17aaa4395458492d377ed62af57412122d14c4bb4
SHA256d5b70441d60a48386afc51921d2622632fe4bcfa0da0fdc48ce9b24cd7368e89
SHA5123025fe91160cd2e10b4e3eaf6797328ac03dcc5707cfe1a11d95b3bd5ee1d1ea8dff37c2f401b713e28b2512e8a637126c0bbf31d2360706cf38a134b390ea82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430dff186babc27d947bc735bc6f68f4
SHA19c3f012fad9b21d95c09e15c66eb28df0dbed2ee
SHA256b5b135d85cd9c1caa67792906c47f394d757ef007b17317e736f4c87fd7ec6b6
SHA51273f9643dbc3661c5af79fdb3c4ced26eb6d42aac2568ee9a65fcb777fc97f27c2306f78e8f37f4d2be3e3470c991f410a5974d9404e81d1145ddba3643b714e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957e8adf98ff42bc034e8fb8bf7e55a2
SHA17e955c20aeebfccc3997b98113b39eff93b0fb3f
SHA256c259ad16065bd24cd3c628eb5c72cda104c850555f55a719a7994828bc47baf4
SHA512803b6edb7eb2537cc2232272bfb1bd0ce556f582117e509ff3a3273290aa527aa306bc95f23a5d0482e0deec97195f86297da5c9ac25780065d12d42841c93a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4d22452e6eef9ba967bf1c860bde1fa
SHA152efce8d5d4628e83df407cfde7dac8effcf203d
SHA25604ed703a5e02e2945158e3d2f5be7ebc0ce0f974fb633b5142ab6247d8b6f243
SHA512303e90bd87149b2f34d7a24b37d3ab564feacbe3347c6b387bd9b31eb7ae3708aac64abcbc3d62f3f2346c68d9f79a27a907b864903a30c87184926601c9535a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409e9a1f76f06a7a83892d50ea3a3ea4
SHA16b05b9a344e4a761765ff2fb99b498f59b9b1276
SHA256784626e9f038a35210ba545cb53be2a3361ec17c3173a393dde2c3d21dd14ccb
SHA512da1f134b1f3679f987c416e5f50b3303eb6b7d48160e6a6a945d5859f7110236175b2fd17b08b6a1171f8ed47c27a5c857726875c89a7bdde9a857bea67002da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9391410983e211e9c004f9452d51dc
SHA1413aabf8b0da62a9150ab2f71301875a55841133
SHA256faaae263da3e2ad695e80c1695559d97f1acf4f3d8dfad724112989f26db513e
SHA512789a6b4fd84a3b0d1813aa8840fa6b68cafab2594c76999d12bed5c5b505499efa7ca4309f3bd8ab6f195025063f3b4ec525fbad58628e7e4152e9c498ec0335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e09483e228ce21dd12c1298f3e41edc
SHA1ff488f25ab21c91eb51e7e81502700f1bdc0b22b
SHA25603f47cbf060a9ee3d1c035f6fb65ac29a7090682a0a3b2100b43b9f61903f896
SHA512a128955e8fe3665bd906ac05d0be0596562d77eb5c398e5a577928d4e69d7c0b1a182470e6900d270393331392b4ec025cda29385c28a08043cf6f41eef480e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc10d91aa8c4a9829af4cd6977bb76d
SHA107d44d301993e09c8aa11d0615e1ab83e60dcf18
SHA2563c3e91c78ba958967383274d092dc17b123f0f0828997c7dbfe51e8bbe90bcb7
SHA512fda0e4b9c75d96774afed218e576f7105899ccf78c98ff9d864298aaf17dd1fa190d86f10d75cb39e7f44460460b9a8be81cba5d7db8e9fc3d73ff20d407ffc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc877b3321a8952cece9046a410f6ed
SHA1cef7d07daca650e92452055632d53408677eb8d0
SHA256c00b9c3b59a93ae06c3b060fd4ead7a0756155fc234d0eb99357599c20378353
SHA512ba121726704c9eff1e0f3bb4652e3f0972d4ba4ac046f3ce6e943ec329186b716e8c8b0b193394df41375e8d0315cb6ba9f8687edb7080a00c8092870f3dacf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ffb1081bb64177b36dad1915ddf3ca2
SHA13a464f7e26fa2d1fe2bdf58f503693d5d6991eb4
SHA25638d3d59d1d312433d8542c68298441636c36b20a75b60109ff037c3d727c50ba
SHA5127ad93ce2fd3c6017f0d00f5cc46c0b22e4e9cf4000b4ba4d596403608f783e0b535c41605cd8470732fff6d07ef801b5c095a5987ceaea54513de7ba0e2648a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b5b45aa78736ef298a238f091a1ca5
SHA129dac5155ce2d95e7d65e1190a959f6f23b74722
SHA256e3b7c3e502a8d1fe52eb41154826ca62c915de387a8b07ae8fd0e53c452069e1
SHA5125ea6e6869e5084b780faea1e311cb9466ea155aea46f1575a385b1821dc3504f58d4c044157bb4dbc3a63a0a755f1f0cd107fa47d4eca6cad1621b97edddb875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53738b0dfe6420512b3855f6b35b0b881
SHA18a421c61104918d7cdfb2524b778406667aa035c
SHA256aba9ef78b7fa9aa6f094f9436805bdee854c8d64ce185196d33b447ff8db9136
SHA5121bc41aaf3beafbf914166058b2d2629ff89cd742223dfc7498807b6e3b01c6a3dca4ac8f7660e0a81960e7d04e2cab04d348710c651bb5c04dd9b4000b5413fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff65aa9a78a02ab19b91384fd7b2127
SHA17b7c97626cc593b138d42b6ff0ff7d4234cb7c78
SHA256992d0912fc114c14d878f2bfbd3f032c66c9ff691ea0ec33007ef2701eb9829c
SHA512b833506374d6f5b4711f477511c976b6067ff1bc1347022d88388308e1192d109e741770f444ab2d4e5121950a5ae39eb1849cd3c4efeee47e6dc342ab6fbb27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3bf6f8287719e661051b3a943c48a41
SHA13a843c7ca69c87427ef48df6d0d411a6704b7866
SHA2561768c16d626353f0aeffb91578c17674c9e6aecba065b96d8d592f52f44c67dc
SHA51222139c39c0e0d192d47afc4b7c108a94ebdef97a1edc054744489c99e45c7e7d5d0f399f43d1559bfa2be06d07f8e2403f8233321c00799af100d31196c79888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080b3ad5cf99f78c590e0ae7e5ef0416
SHA120b52f929a014a57244d7f74de561a6499039111
SHA25603f56961a116240b429696827bd9880225477fb4e81f2d0a92fea58a1efbedee
SHA5124e4dd15c1190c54dd108321d25edf51bc54b4aad780aab6f151f89c63a7679226b0854cd2425e8cfb071c3a47b25ed85016503ab3ed03e693a87c54eb820618e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b