Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
d6802b945079caf000ddfb6a3ecc9b11_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6802b945079caf000ddfb6a3ecc9b11_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6802b945079caf000ddfb6a3ecc9b11_JaffaCakes118.html
-
Size
182KB
-
MD5
d6802b945079caf000ddfb6a3ecc9b11
-
SHA1
6ab971f7a1ee05da40909351aeb5d1b6b769501c
-
SHA256
6f72030f797ccb07a3572d63a0871c4e1a4e706e1bacf79a241dfbac4a27c192
-
SHA512
5bd43c2270aa51c77ea9b65d760ec62d6657a55edfa45bdac7dee95f4486ff3d81af617f625190e0f908f412d02083ef0d311394c272acefa5d5722aeea09f0b
-
SSDEEP
3072:Sqz9yfkMY+BES09JXAnyrZalI+YqQoc3OSu:SaIsMYod+X3oI+Yq1c3Ju
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61543DA1-6EB7-11EF-B961-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30605d55c402db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432053806" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000db9b2af5ac634b661d391bee21a7cba841219b34fed1473c1cde3ca8b5769738000000000e8000000002000020000000e1390494eeadc9482fe0be96135cdc7af53e035b34af1675583bf51783f17f2a2000000012b166f2d405e6fd69d9b91776f57462e92a20abe93d7698ef00fc926f645757400000000b7a19cec4d33f0eb279bcd5bb892755067b5b82541fb03d8df4bd077cd81e780caadb5ec40385b02be49fc46bdb6cf3473761f068fdec9334db115c42669364 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2468 1960 iexplore.exe 31 PID 1960 wrote to memory of 2468 1960 iexplore.exe 31 PID 1960 wrote to memory of 2468 1960 iexplore.exe 31 PID 1960 wrote to memory of 2468 1960 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6802b945079caf000ddfb6a3ecc9b11_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e044d13c471d3ace57656edf975d43c6
SHA100c4b64a05ee47a6a0f1f9955bf6eee5ed3137c2
SHA25689e6c82d9d4dd1bda972a6974cb3c0bd9d243fa726a5c24a9692f89d69260c50
SHA512294d8e4a0145c4625d81321264b9f9d1a0b2f43ee9e8cdb087e7b3c43cbc5b12a9d953ab9138b61ca3a54265ff46b025fb61ffcb62a439ac9993e34e995ab6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511d1f94f07e5b7ee0473f9ad937bb2bd
SHA1e3a77efa530fa4c6669ca7301240c5b209810da3
SHA256807b4ff8c3f5a5d41d3e4ff90be755338edd8192e4798bdfd4f6413928b80742
SHA5121f64b4d601a9fa20ac05cfd1b513fb821043cfacba27fa86d2d997f9abf7a11efb81ec7244a8c3cb4835d8c62340763692aa9e3d71b9c4cd473fc818040ebda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56717cef91577cdcbb34408c58104de1a
SHA1393125e16be859d4eecb7dbc0aa5e2d7404fee1b
SHA256aeaead1cec81d4e0df7969fb5a24ea3d1761e9ff44b7e42670bf979fb600339a
SHA5127fd4ddb5af099ab3bcd097349678d05bea096c44ca2a2f234a562ecff2115545bdec27cf7d81b2db7215295b6e3647716cfb5d9d518af1bb3ab0862d20931db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580a9c14392e6b476dbb7961abc068b2
SHA105a89ca199afae6ddb40f9a6e953ede970250bb8
SHA256f829706bda6a31f5d9405b2c19d8cef80f9b8db42c9ccbd323ad711aae374778
SHA512322e164a2c4048556930b43d994045b6ffc7c909fcb2c7f156e1510c55935763786bf4342dcd1d3e1c4ffac94c5674edfc1f0a0728a6d47f574bf4e9f3bbf7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1f89cf68aebd59d324713ade8db28a
SHA1a5fd0ddf3f1ba4bcce0342fe44afe8cb201226f8
SHA256120a32b59e30c657cc582d74b6d8e825be72958083c2a786f9b5cfc07b5f3743
SHA51235ba8a697900c4574f0b70d9b8adb749e2bad182cb08602ffd1a5533e75743f6dbabe982e5a6b6f7936d76a6abe934ea0495b7c28fca5b0fac397869b1cb44ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed2a1307188873befde1e43cb06e919
SHA10442e87bbcfcc5ca4ec08587f93d06afcb87b1e8
SHA256f9f4149650f29697bbbd271f312c7fff63d442b663699c29a7a7826dd87327b1
SHA5122375736b024260f350691103ea3b4237ddeeed7f5bb30af5ca7a9b5f76df94bfba51544c964428629368c30aef36548bb6a8012ba611037d3e652ef594b6d546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae588e09a868046ffa64b2a43400c70a
SHA1b1f4f8b6cd54a1161f5663464807a11b8da8ab53
SHA256232fe1d7cfaa75f512e9de75851bbb6b7fceaf71744ce2484709e4a7551f2aa7
SHA512452807abfaae34799aecf18d633339ff95c39c5c03ba9f176fd7e3e29f20438871641bcd0d3422d777d6ea0489ccab13702c9907f39874a717e5351170aff9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba79f703a68e0d31fdd48bbe6c909867
SHA1ccd143f8945810e0e0010fa37ac7290f4f5f3b1f
SHA256e2c00390e2a5c9ed6339bd27f695e747682ac197219eae0197157108888f240f
SHA512b2b903ec2ff7c4182f092ab8b42828da72e2faeaef572f101ba326c405d722d3a8db45a71fc7ad2fa4ac6a1e1e49dde96616162dae832dadd221434a082e1731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dca86cb0ce237f23b0eef5a5d6ee1eb
SHA1fb11c69916515992facedc60dfd3e0f47e96b13f
SHA256377de1b5c0a6e0d5e092a1b8204a108ed6dda5ad0f69d6e75f2235ce7fb8fb29
SHA512792d12dd749b2b43a0cfeb401f09e986baeaba5f77c0cdf0946b56a1a91150e5ca73ff2e773c5c27ef8c1c8e8a02688c145d83b578f355849bec72a07a37afca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9205a08208c130930c7ebc8ad5b3b8
SHA19397f623551dbd12de34a9eea7e2d6f00353d077
SHA256678661ba5c6f3d53321226f4b59b0d54bf28d2b446678725457f109b4f539da4
SHA51235bdb3bd6ab71e0d5a84c2c6db813ac0beb20f8d9f6a5b0f7dcd3a57f363b1b2e181e386a2c90b00e82873c717dc7de5eaf347afce633ef5cde7c15fa806eed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8601560319e8049ec84a22a5907d847
SHA1500274aaa8e87837145d4becfc5664244ed00b34
SHA25643d1d4fb5bba6a1b07260bed156e3b7b1e9d14283b2861ca30f5a5de75030488
SHA5121881a890747c0007b08b7d474d799b8ba0e2b85e68bbd4e53910d6341a682886af2cd684a752a5309bd7f53336a92180cca8dd96713e06fe1d408c02e9661cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b04081108bf9274e9e0e7368c716303
SHA192e77663b225e536fe2a06bd4ed178a05537506e
SHA2560011afd2be643e4152fd23d378ffdcfda619ad0c087eceb1773b4e37749e760c
SHA512eba28ec2b1a02b6de76329e4d35967564e6aecd3d6c80ad1758370531b34d1685d0f25c53d1ebc102b78b9135a33448fc27ca4b129eb8acd28f65aa6737cfae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f467e6ab8b059b962d06f2acff80f4
SHA1ee890d7ec3d3a0d90e42e9a91517968577cdd618
SHA256c883f62575683f6cbf5f3e7f7efe0a9c9ab6e755e6536d8dce60bd4ce9b282b4
SHA512cbc8f02e9a6b1bd6bac568c60a25e325221a3540fc525bb31a3477a549508d097a1ba2278cc99af34664e5c81acbdae867d58acac543afabdfa666358c3602ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b14bd0004e566ad3d017b64fd72060
SHA11158575211c8bf54e403cc90c93b72eebbb39da8
SHA2562c535a913dc5610b91a219c679775f7836701db854ad269433e23fb3e1fb62fc
SHA512aab4641d84ab9b5f625e3251afce16fed3157ed7f8c005a2634e223c6ea90527ab1adfe917b572d7bcd8eec19d232ecf7c762c51f5ae2eb96ba1e6c5a9d05dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b1251ca872f887460d459961b29386f
SHA1bb5aa1cce6f5f1773b11677c8a699688d819e0ea
SHA2560355812cbfdfff1ced042f698549ffb03a1574cbe14046e9f6f666b13cba732a
SHA512accb8e744cf52aca3c2a88ef0e42530cb8959427bbaae56231ad0043b121319e0659295651683dc38db4a8ffe99b211cbc9fc76f748e51a2a7f2dfa984d6c287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee735191e36d808fdc1efa9b4397e8b
SHA1375af9572b5b5f574d45181031ae9356624d137b
SHA2568ef390ca2060d9faa104a0a541a91181978d32902a4de804d588ec359c7c8ad1
SHA512ae938701cd2cfc8c09c9f519dae5262607392cb0ad9620936fdb8a634dfc8bed330f7d08bd8d9f35091560e2310ed9bdcecc82cb0cf7c837cc572ec73366a9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cf05a9d03ae21c49ff370875df125d
SHA1d05f2eb9f259de7b4da89efaca411de84f14dad0
SHA25616404fa0c534ec91e28df1678a40ca3129c23fd2710e07c1317f6674a9d6b745
SHA5120040acb713df942fd499b03ea776adb2aba54e25fbdb6afc09b0c65d02e37b2b92eccf1574afd8fe4640db5941fd6e37af6ebade28d074116b50d0972286f374
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b