Analysis
-
max time kernel
70s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
d69eac7e672daa2a4f7c7c69dfefba2b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d69eac7e672daa2a4f7c7c69dfefba2b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d69eac7e672daa2a4f7c7c69dfefba2b_JaffaCakes118.html
-
Size
460KB
-
MD5
d69eac7e672daa2a4f7c7c69dfefba2b
-
SHA1
cb3489e08d335dd73010ec3f234ffdda9bd81908
-
SHA256
e07a760ce67d2d0de0e081d83ef50461c1ce7ee3c56cfdd9050dfed691778dfc
-
SHA512
f2dcc50097a0724f75a9ad41b89a1f0b3c503d088daf8be75c251435cbb964f9c5281108a1fd4b260253908eb6e40670338d9a2df4fca6b2686f6165248232a1
-
SSDEEP
6144:SSsMYod+X3oI+YNsMYod+X3oI+YAsMYod+X3oI+YLsMYod+X3oI+YQ:t5d+X3X5d+X3g5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17C00E21-6EC2-11EF-9218-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000084b260ffc19ce3f451904781582bf1ef1242bd65cb3da8feecaf1a1133b7bae5000000000e8000000002000020000000c048c958914790c777237fb021cf06d8c0f77af4fe17e01431b71c7851a477942000000098914af40ae84f0b7be356fbdaf2784489701b4cbeabd9f3931a8a9a073da9c040000000064aedddbdaccadab4fe2f205e83b54ebabfa7ae0dcef049fdd11ff8239fb7cc92c9b17c82a97831c81819c2fc176a05f82467bd098b343e27f6dfd52fe01a39 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809fc8f0ce02db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432058408" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2744 3060 iexplore.exe 29 PID 3060 wrote to memory of 2744 3060 iexplore.exe 29 PID 3060 wrote to memory of 2744 3060 iexplore.exe 29 PID 3060 wrote to memory of 2744 3060 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d69eac7e672daa2a4f7c7c69dfefba2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2cd1afecc5a751ab771ba451ecc595
SHA140f4f772ce4a8e6f26ff146d11d606bfa2f715e1
SHA256644dd512df4d8f7a5bee3210a967d90b8e4795c957be4ded8c4d11e664b41599
SHA51294bee1444477903dbe98b901aa7510b09827e5131468ba6b46812a8d1782fb1ef02374b182b0319e1460fc8c4f95e6a5e8b35d69d15d8274d3e0075faf9351f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548aea028770e167ef3f17ae434078839
SHA18041320540355fc5e53288d4d1943490ef9fb7b7
SHA2562d6f2b270465a1a4ad729bfc94f14b7502fbcb7f76bbac47fd7dd990105130b6
SHA512bf65e8a9c428053a24262c92b117133c6f26036702affa1a00d3f411a78632e99271e7efd2f679203580ca0258772577cbef070422f942b41f478406697539de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c58eaa95a24a0c8f784174d12a059b
SHA1dc5b463dd4a4bbef34d5e657461b758c8589ed99
SHA256d95ffcc3f51c561322ccb9f9f101741fd9dd6ca2d0e906931674b39db1f8e1b7
SHA512bac5158e192c5fc6a33c3f59c84f6b2c33498ef986fde4e155741d98bd42c607962fea72d4e5d3451467789a379c85abec71c113f582d14b2e18d6712e66f256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca623e252aae99f91b3aec9134c5f956
SHA112aba3dc0ba2dd801dd2c5ba3474436a152668c2
SHA256294731a838d7c0ccada805bdff526e58ea5b2ac0db0e82d0d1c51cd779970eb0
SHA5125937202c1f890101e8560e55e9eb720f5ffd8a9deb8a12800035fa12d7c51111739b9f6fd34bf18f0aaf72b5ae752ed94737e9332078567c5ca6b55b0db2a3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379067616b40ced0f7a46d03158bfff9
SHA149b1a65b08c5cd75e5f25b54038acc596b53f153
SHA256a81fc4b3e71ec7967c2b89ba69412c06c90fce4ca75d1156bfd5dc262fc40d9b
SHA5124654b4ed20bc415afe2da092a6512678e3daa09241e6b1a83a9a12796449d47987feb21b7a14b9fcc03953652acd715c963300743dd9f1b572e69df301e9c5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58546b5b9b214f37040b173d0beb588ee
SHA1bd2070f5e81111ac1c0e69114fce9844a05c5ca3
SHA256a81dc8fe0c0fa79b39dd003e60273957f537eed8f0ca477fedea9979ef0d2c20
SHA512aa4c45581196deeeafaaa1b7fd27592772dd260cb4e80ace7749db802b138f4bd467bbf04b647636b91b54d6e0358459f701d63e33d2ba2849a6dbff5e0df00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56211f96b50f40e24eacf2495055b20ac
SHA1696ba4a48273140a7f39f7ab648622c43e8862a1
SHA2566cd0d5c91d948d1cb06e22f186dfcefc4492620d1e9f2b09f5f070afc7d106a5
SHA512eedb1d08905f546dc32e7caf2b24ac185abe3add47729c6bb9fb1d92901b932d03f595b7e4ae131f722dd64603c8fe0f2e8cccfba3ba6c9ac78d0e5cc2949560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59880b2ea63ff78f3729b095f50dcb549
SHA137d0936a244002f997d26a581319cb73694a260e
SHA256a7805c7152ec981358a6210d4f5127e36e58da4642cdf5a88acaaefc0da0e326
SHA512af651e95138d4cd84f1fd58c320bab031ddaff1c6967f6a3bc9985c9ed08ad33371c0e7ef1ce675144efd9770918730d989f034f3b51d14233f1b74162b5847c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38000eac9d03f2662cbd0847086f5d2
SHA12b5df3d254d751c4ca9fef9cc95c6928e63bb50a
SHA256a9fbc79771c65a5aeaf0e1d04598d8f843be5a02607c49146c4392d6af7e23e2
SHA5126cf0c43e04a01bd8ac0380e052229db125bc27db9b5d76f026bdfbf10311a8affe1783a29ee74ddb1062955df76d13670f4e1d2a8c3bcc84cbffde1943bdb643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd364b78ef3cf0d78659989484a9badb
SHA105530fa7fc022a850091959cc06ad64fb44b32e3
SHA256b430c085ad3c4b20f9fa5d1280f52b8a362f1cb928088349e23cbc74ca999941
SHA512093d1f5421d35dfdaf929f5b6fbf2aa8d2cd0744e22ad62b37e732b87c58d1a4a1061e94707d23863c711b40401ef72ad7da003b42bf87a6d9d95c823610488a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a202ceb0e0fb4628d5dd8c5d284f855c
SHA1cdf9d7be10df92b09f84d7a9dd05c54ddf188f3b
SHA256d130123032280b5988a0793b2d1c410d209d049191e0630d46943806cad7b7a5
SHA512746671e884aca2776d7d206eb61be4233b0917527cb33a2fdfb07f933e38667dfd2d14b3e0a1c82c2bd50694f457bc8711d37683abe07d62a2237b01d2be2a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b0eb85ee8f63109239b0c3b302d899
SHA1dcc7d1ee67d792f3ed6bbbc14fbeb617a0a94e22
SHA256c3d643419322610a4a78b272bcd533bc2496091dc8a94e2989df1322e1cc4b54
SHA512665a6b0182879af0a3c79b9bebcb5255e98bca3431083b1fb075f5dae62b458b69a944bf921fde02c16f14d2ed72245cd2e9995619e560ff72129cb1335b01ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd46fd21a9d70b1bfefd2c456a1e13c
SHA18208fe986173004d2323c5463583f65d3bb190e5
SHA2566c38e16d56ba70fe43183d34fc6af52286ca0256fccb652a61c99155fd922fbc
SHA512071919a1fcf7ee3430b0fc5e90866afc258ea024fe4fa2fe17ab14bb3e6b6623ecc4aa1d695e7e4a54601eb6e69f8fe4c3adb8734d45e544a33626ae351e4b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e5288cdadb4c77a7edc1bfa6a2eb48
SHA10edebb0965f05a9be8ff44d80761ff7d0d49b911
SHA25679737541edc87344342c383e1662b6ab4aa5b0eb0cc7fb1e03507fd9ed4c1809
SHA512d2422f36a85b26cc99a8305b0df135a197acd933c5ab17a4b58ecde1bc5ea8a384d9844e1f2b55715629856a2c767ee7f401ba0a2db7f225d3ac6f26c6016308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56746da071325cd1880836e94a83648a5
SHA1b3a664722ba0c39e9c40f2eb47f83f9d211925c0
SHA2566596ca088df8ef8e550ed96e2dc83cb153225c69144377d2473902cd2f3d8078
SHA5123d0a0845d6676691b5a1a03b06edb5cb955f1f9e90b36e479b0f0a89b788b4894c60adfb153238574cf1145a6f92a4809139aca16df3b4d9089d8c2f44bc0477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11d87a75184f5a9b42bf9d25849ec87
SHA120c4f577d488fa7e128e76af58080b07f20b31fa
SHA256d6f5bf80879eec60fd933376cf564b33ca8da176e8bb92d21da2dc3031dda7af
SHA51250c9cdaa782584fcf0aa95558e3483244feb8c0df7897222cba4e541f7532166521bc587d6474e13bbb8e554993e8e227e5f74ee29a02d684e3a2111a0c72511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d1a28f3f1278fa0e2f4324cc239242
SHA1d7106a4196bc488c6ce7b162c71a1c25db88d6cc
SHA256f2f774059eb6be81c92d3bcd6e4437a68272e75b1f05c3914adca048cd74a763
SHA512bdfa333e2f5a4624814cb493fee7c2b9587a44b6d652766e9b83c6b4144cbcfc38a71465e10d6629616a770dfd9f757775754014f4239704549b8af3840ffc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ed0795fbf92e383374da0ad4e30971
SHA149d7b0b14c8de9ec45c8b0a0e7fa09f9ab2fc8e5
SHA256697a1b37aefb1c5b071194db1bb7164d8c772da34896a3a093d2993ef4750719
SHA51203e490fd828e6201a108930b753f3b8df987633aa8ac912d4e62ded4d1cfe7c1e6edaf07f4b1530a1e8a1879f8cdcbdeb1ff5336d82a97ad99a9c7ed7e8e683e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b875ce114c07bb5e3f0d65df79e3732
SHA11512d69123727a13639882444b49446382b46a27
SHA256cebb56ad0f19b32149acfe8fb79f6b13aac071d8602e3858d901c114b3726627
SHA51298fb097b33ac6ab6372fa8bda3c1703580e60176dc62572c9ba8c42dcc4e838fcaaf67cd1c891addb01411e7ab27a923f33425c76daf6cd3ca99e0b3429e03e0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b