Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
d673fee856992451061a883627581e47_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d673fee856992451061a883627581e47_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d673fee856992451061a883627581e47_JaffaCakes118.html
-
Size
4KB
-
MD5
d673fee856992451061a883627581e47
-
SHA1
207f77b32b4c57980ac018a5489e3897902592cd
-
SHA256
472349115f335c38cae173431621bad1e39d0635cde61c2c6abfad3930150673
-
SHA512
b3a42630c0ed7e7259515c5974f10c0080b6a349ebece2bebfefc025fcb81e1c141b868520ee6f74e22aca1af2b90577728342884c45667e9b7c80ea3fe47a18
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oLhq8d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31BBA0A1-6EB3-11EF-80BD-DAEE53C76889} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b96ea0c1e522889bfcdecf0acf1cd255f5658ee5c410fa6d349e0b36c3f9964c000000000e800000000200002000000024e4632c85b47b5b7c7a7d4705ca0308d3970fa4c8c02c51656a7dd9f7ef59a7200000001411b5feb5a2de10ff8e398471a23a26746191e646f0cec154cf18233e5be54a4000000011a684ea0b817166e31ce1f154791ad5b8be20766e6ff92d5875128689281002c874f4f98186935554b92667d6a4dedaaff3faab89844c789caf98d40df427f4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10424e06c002db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432052006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2548 3028 iexplore.exe 30 PID 3028 wrote to memory of 2548 3028 iexplore.exe 30 PID 3028 wrote to memory of 2548 3028 iexplore.exe 30 PID 3028 wrote to memory of 2548 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d673fee856992451061a883627581e47_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bb665d00bdbd7d337673ca5e3378c5
SHA14f7a3e53ca3f351735e363ee2443075021a679b5
SHA25634baf8164b093c8844f9c906f55f801ff3f1e62508c14a36fe24da8e530567bd
SHA512ffbb20b52446f9740a728b28bfbf91928665b68211e68bf84f39d1d1df827b2107474b57db60700a1623bfe6977c30157c6ea7b4373303f279f12fd5b111845a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea1ac73b452705daf730166721bcab6
SHA1be679407c1e152a93046120441a1b168b0e7df3b
SHA256587902730e03de01cc22f332393d5a2f9a239425cf144fd413bed7ec665e8498
SHA512c6e4103a365f05399ab3d92029d9376f49d138fab9568efaa145c535faea39f63bc7b487a4e90f3547e2d8d28c2d312fc3a85780b21033158b36ae6be4fd28f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536520ac9e707c4aa6f1d75d6c145a0b9
SHA187c4dcb4ce5394455f7f5b9c214e22faab077743
SHA2569518c13317669c26fc70a0a4e5b34fcdd2ed2a395df70d64e2b7a6e3002a1385
SHA5124ffed7eabae9218a77b7c4676c2e9f74ce867344763f57dfbc716749d2e6d353625e5d2c3057981ff1efd79f2e4a86b4e82715b3945ea1cb32c4bb9b86daa8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51668e64846c18abab9663f12fd0b1a12
SHA14e5ab93474c852f16a933b4c01ae203984a5b49c
SHA2569d41ea06c1e47ad2b0133741cac3377114a014c67b0dc55394f6e87ebc19c6a5
SHA5121ce9f531d332d94f71d54a733721cc3551de82c4f18e9acce573ee5ec099357bf38f82730f87a48de6eeda07b213dbba05a514488f3f7d99712b2b4e90f7a652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b2021f1cc6479344d6dbf1edd405c4
SHA1faa1656aef8be02634917eb08062897f3b0aac75
SHA25681d76c2b762980d5081f319d1d1c5f48ce5bb7867371514d2b06e84ecf1ee52d
SHA512ebb9fd702402cc673085c45f99d40f86bb620af40936e6db6c3a3ab6878bf417b1a62a945854b51a854b34e5ddfee57c3817e47836d4f0fa9109a46f8f3ff659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5803af6bcbc91809b2c636b48fa55ccbe
SHA1e6562db1a1bb5e8942762b979f6f55bece9ab650
SHA256fadac3ed6be4475967561104cf440baa825ca82e44461b6146b7beae91ea6fba
SHA5129975cd6848ed5db2f11d1f7bae65131a233f0e42463c600f715654438f25864920335ed57b6bcdfe8ed20a630d387e4334531bc1966b37fa77ba18bf41a0d04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c58c4182ddb66aa1aa4627a01c093b3
SHA13964e418c05ddccba405d9046ee39141ade1ef38
SHA256741eaf0701ae18fd7419cbfc757310244620c8afe88f4a4e8c0e614736bf4c62
SHA512fc5c234c5bb82b94417a436d151244e05270fcb2006c4469bdbe430b411830293282ce3c46764e306b16d855fba1f55d593d3b2b9424a2d398748da46efc68ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c63d4fb7471840b16cd8b901666b8a
SHA1f5ecfca1ca43b213f2d5fd1fa172a40b4c77d06b
SHA256a6b84aea821fb1d2aee08940552e881a5fb3bcb8bf9343af2ef563ec6d1bb3bf
SHA5122df5fae5b69f92b77ffa53df8a2653995abcd7b6dfe8c1b2c96cefbc2319be3ecb25ff37331714bc61d6a4bcbfd046b379133233020104d0d1c1256d44fc310f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2f0bc527af4966b2278db7576bfb23
SHA1c02cd6514a4413b532e550212df216f228ef8ef0
SHA256e8b85d08c218453b5d945f0bc3616b95044a7df50998588775df1bebf8d10183
SHA512797c80346102067d384eda438cdc952ab7e43cf19e2d817f6ff9cec9fa4c61ed8216916455362611e51c5d0e59d5a71c9e6220799f1a351272d77b99680f9a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94e59eca1f94c4a7cff490770f4d903
SHA18d5a39649ff07d0a6d5bffbf5bcd834e77e0d417
SHA2566e7f61ab163bc9c7b827605ff98c98b908f2335708f173c37aa593d2e520d083
SHA5126f8a606a72ca042a57d8f27f49f6cd568e32188230229a27cc8ea5332b0c4fc6274b302a9f727ac6763e6658a604ab595f50791a79da9d19437f59b0a93ecfee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a0dc7e8052053fa55b46e92f8d03a9
SHA119d5b6c1ed35459e019ec55a524956aeb0f87414
SHA2560da41e3d15bc1639b4dab6b6ff1295b340528400ab7998e47875a0a5e617c646
SHA5124b441e9af017df521e3cb1d4502b9b9564f401e4f4dfc8b09327155f96336371bd59cfa863a228bc4e91d92c19c0b19d3904d2337baa4226e6ef6780580ef5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534361c057e62297e36cd05afb4ba8700
SHA11e072aa786ad75bb5eddb3acb996f80c92053a88
SHA25698b56f8337a6554006494048adb368946e7ef6cdb78ade9c093e0b6688aaa42f
SHA512c2c0a12fa8ec0d0b600ff54ffa7b887742b2e9670352f260d3ced5964925c8d6aae70900938689e5804f876e49e0ffcfb6234cc4c64578b17371e7115683eb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f717be7eba350c362b9106d570b029d1
SHA14677883477e1200c8c88b8a9ee89c9f972a6ed57
SHA2561cdd8c6e99424dd2dda323ac0e1cbb7f9cd73df1e2fc24e6127bbe5ce8e762bf
SHA512ab3641ee2a3b5c18c07d098c8c62997966f1ad22025da0b7ab9dd2ecd6f5316724f158e487d5688425a18c07a1910466305bd05dbe9c0899bfc9cbf4904c1995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1ffb7200bf31f76c5e45fa1ad7609f
SHA195da4ccf6bf86e4372ffae77078728999bc22e56
SHA256aa534d24b13be772d12176e9e94aa2cedf0c4ec6789eb4f84537981d4baa8bcc
SHA5120dd58c240bf5e7ea8810624b713457f1f360c78a7f1cf971dd45209cab38a2416018765113e13b04ccbc0ef4026a961bb26fd66ff1b41f240ea37a9656a73c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51204fd89c1d6b0aa69280c77f40a6dfc
SHA12ae0b9b8e18c19ad2bb3a3eed711f0c21c83c5ea
SHA2565c07ddaebd24b82fe1bdb04a84b6449eb70d7c8ea88704730d3a899091c71a11
SHA512e49707c86c52ccc20e99098862263ef81fdc54481dc5bbd240e65baef4a55206439fe71d2c0963e295fc6f47840e93e90617823c3fe39360e23269a5e9af70ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533219c40453a84e7d7bf0005fb4b7a7c
SHA119042b4dd6a738e0a3301fc13591c5266cc4e42e
SHA2568d69ec21ccd9109c477082cb78945b044c473c71c24a2d7477042fd4e1f8d118
SHA5124105df682a4d210f1901edcc3749357998de5a4723a7f47acc3f98deb256785de90945f777842495b1e5b16bf1a59b39efab210141960a44e38a183167fe2046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccfd54a91428ec30a3a6d4740ec70bf
SHA1abdc282c03508878f0875e5a3be427f2d7bd4d82
SHA2563e18ac0a24204cc60dc41cc11ca234032f45da4c4f6f408dd0e09503e0de33da
SHA5120864fa88967e35ab4836ff27263741934e50e77c8d90120373e1abbe9664832557da0ffa22f647ad9f96010e5659f5dc7452e49bfdc2c69661f9ca6348564d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee231aeea9f3d279fe5ce089632adc4
SHA170c023745456e625e3adb7b1477673a8c2d47872
SHA2569e86b6e4ba5aeeb850c1f4859fdde66a4352b7f667751325fc1fa11d73552d63
SHA51207dcb76a1f47df7436736564df66147d660e893b0d3a01943e259f10b21b9f05fa5874a81acf5d728a7bf3ad28ffbf79a6fe43a1ccce7bf85dcfa3738d46bb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abc9729d07d52e48acf198ad934184d
SHA144d8ca4f520b0c6fc4cbce4a594cca69dc0d258e
SHA256df96bf486b57f7486b0576db900b967d64e2eccf9165e2d28aae153e33a087cd
SHA5120a7a04afd6ae048e46f9a8be06026dd33501ad743421d7ede0eb542499c7fe57209eab8b56e89f176a363e4956331030539d1056346badd7efdb45e47beba371
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b