Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
d6aac06d4211248f36f71a1580e53aaf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6aac06d4211248f36f71a1580e53aaf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6aac06d4211248f36f71a1580e53aaf_JaffaCakes118.html
-
Size
4KB
-
MD5
d6aac06d4211248f36f71a1580e53aaf
-
SHA1
de8e316988295fc558d122603b5fad06f26b70d0
-
SHA256
e6543038e80dd389dca1a1611bec4fd8dbaef29ecca73b3eca573e25506ad229
-
SHA512
a8727b6e8bd08f8162a05abe39c59f66a1e55fc184cf2f53a714529a714276ca22a93ad0d07b37b7e7442ab641545698b85704c3bde665b13cebbd83cf723e37
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oclVWZQd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0ECA301-6EC5-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d1a19799122c05d97cc2bb8cf0af93c32a6731d357edcb7e7641ce23d7aca86d000000000e8000000002000020000000c8c7d0ec3db1115ba1f22eebea9b34c6f13e5ffbb20a7dda0f2d40ef022af5cf20000000dd36e7d93c79dbd01115879d895c59b87402d43c97008b714ed1e5426336ca6b4000000008c6c82038a7ea73406eedf64c91ec7059430a29e83a3537a025421c773442ef69193175d5e93d4fb20334dfec90ec4444538d01d5195380d768f1da36bf49a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432060031" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303867b5d202db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3052 2976 iexplore.exe 30 PID 2976 wrote to memory of 3052 2976 iexplore.exe 30 PID 2976 wrote to memory of 3052 2976 iexplore.exe 30 PID 2976 wrote to memory of 3052 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6aac06d4211248f36f71a1580e53aaf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2312a2f134c323c06f6d2b0ba6250ba
SHA1c4381c244d0536d25d20021495e393dba2a87657
SHA2562ed75a08322bf708d3ba346e03ada22b4c10e21a35ed583eba1fa8fe42d3a378
SHA51274e8b710b6812a34ec2a04fe9e953b2698e31dee3a4c5998cd86c237ef753528541d6e2e06c3a0afaf6bcdae267f9220d0ff4395476f58a56566890b1bb9f4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b889562d8127b5668a88d115611cd46
SHA1f5dd79f0c16445e7f94117244a1340e6e199652b
SHA2565abb110da21562d8bbe614dcf9138acaa0bf486011b4cf0bcc19d67c6a14c494
SHA51290a1f417e5e54380485c2020de4243dbf73ccf00d8174ea31f969a66cfd28648a2d7e0e2bc0f872282ab6e105d77aef40dc0561cd71db6d4f4cd536e8d269dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a0438499db32c14ac66bcbe6d361be
SHA19c33d2db42386c69850d76b37e5df3934745c2ac
SHA2569d48b50c4ed1bc0cb04e5707b60c613b0a16e3babbd61d42318ed1ebabe0306f
SHA5129adb743a354f5c282dd28b3aa667e4a1b0b05a57d7819514d9422f000f6f58cae9d84f52151135e1d79c5f41daf51395cffab9aa523117759380d018d20d3ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f31a4d08c06a44e946edb6843bc9ca4
SHA17dead7c3f3dc4cea26afcb963bf3990489d2089c
SHA25638dc189fa31e4de227a1cfb745ce989f952bd7ca86ace39d4eb1526d778ea727
SHA5126b906509bcac14e236b9a238f2d5c29fdc5d2aa187f9f5b802935a840440bffad32f4720d569ec9a7fce0e95da426bda86cb4767d2592ffdc5d40098e8bf005a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b416caf76b0842f7b8ba8691cf3415b
SHA18979b7e7dbca1e438f9e151aa468b5d34bf02451
SHA2568fe6a2da6a3d9a2a6d72b79564396caac4d40e4cf7f84e6ba0af4310b1a07d1b
SHA5127772e219fc975d44761fa4b09fd382038f652db33c86d29142867ae7b2b665bebbed3f4b90e62aa1b3d86b0aa710e85cf8c03d2e8292a065aa6c10ec61fcf768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559236680125521c948e503e10608839b
SHA179334c86fb9efe89a4eadc15c658d34b4cb4bec3
SHA25635bd322149f65ba48ccdfc264bbaf9123e909102786f167d69cec6d4888af6a3
SHA512310011326fe4f497dfcdd8f821a903879cebe926b60aba79ef96b0e08393d7cddd50033a5aaf2a042aed7e74a161d0ca4dbd739c8fa60ab9e5ab98d4c35a8be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514625642c4de37d6e8e54f0bad5d2819
SHA10b1152a42e81011f00f6ca20aef43106cbc1283b
SHA256aea3b4d9f93a3f93e8a5b7ba306a61ab461b82e71154b1bd7dd941cc86197436
SHA512cab6b9169c5a85c69396b28500047ac91df3fa8511f360b7557a0ebc41e14bd0a0fec78224b5f02696d96511169d0df81b51bbc1ca3c752b3e3d4bc4291039b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52852ca4465b52afdcb365d3e772f0bd6
SHA13535753f3a3e371ae254c51d7d233dea629a0e76
SHA25650af813a44e9e9f0e654bf8dd9c6218e9b430e1eaf776dccfaf1c0692547cad1
SHA512a3fd2f96d6b08353d1df18bd8c88117adb5590245be0789b53c271ef434b2faae769187ab5735fcab542ad0e0f9f682e0b00dd301d240a180596eb5c1b5b9fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c65f92f3515e08b3ab546152d3a963b
SHA162e215ffed529398d4acdd0d028910a85cf8a55d
SHA2562316f845a0c303b562da87acdd1c54853e62e9c751e44080824019bed9484da0
SHA512dd644ce1bf1f99a09a21eb27eb6cd046bcb2bd2985d04b98597cba074e87daa54b53e25fd8e79b07098eefbc951ac830df5804c7d0a7d2c533b17ce5e8ceba38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b734fe9acd08147b1cf8e10716dcab0
SHA1824a40271adfb878433362036479bf26164063cf
SHA256ce5f0ac46b195c55f0d18a1491cbdd2317f5cbb323722bd363474916787b8bc5
SHA5129e71d2ffd30311196e304f37aca525413109b8db1fbad8b41ec14da5d4d3978fc4939803670625ce1101db92bf4a5b2ce5552738e42a0a13fd121e3fc84dcb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d89efd360ceb1662ac5a8071c904622
SHA10a7cb0e07ef728002564dfa47f342c65133d4a48
SHA256bb32babdb465fc196bc1c6b720e3d9a69e9c60a8f549079e5f632dbb5b2d75f8
SHA51258575040d265633870b3f28e3692af416fb3fa6126f9a68325cf1a96db6701273534bedc7910f58b911ee8fc48c0e107bf79e52530fca0d3b1e160c7c14b3fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e972004c6f86bc9e5bb12eb403478a7f
SHA135d9c8509de199bc32de083cb0fa8c52c399de46
SHA256f9a442195b9f07b37054fca0c312b4584e4a7badc12ac48afbe76668f492fc24
SHA5120d7825fa07244c8e3f6618b29347fbbe22fb4d65dd8e891a6983e9df909300b3801a829527c7a9059e4583fd07712b01d026efda8ab72f166109bb9444b53e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f511374c1b00f95cb22cead25cd430
SHA13cf7d35e6019dafd8be133c0abd672619d017360
SHA2566cb28d1c0f4cc7c2e8e72c5a6cafb824436c800d870566a233d70f9328552ba4
SHA512b481472df983d10dcfe3a8db9b2d570b51c156965a130120137725f1030bbb0c805a66b22e3bd681a6eff08fb160863773c0da7a3b487b3123218bfa62f61d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c11f1fae55b125ba1bf976b66486c64
SHA16e8169a94bda7a90d26adfc29f60b397494a609d
SHA2562fa21de1ddd67362d9bad8d959077ea7095f7f5b35e93b5b0b180ddad2a2abf1
SHA512aea56a1b465d3df12b4bbd5e798f96cb252f92ca532e8cd7a106467feb70c3c93bdf8b50fb7a4972e53675abd33b34ff70ac19b037d909ca2a0f21e97059c101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59add27a5f5d9561add6350ced25a729c
SHA1729c131422b94fc32484174a77cd329fa245b39c
SHA2565e35570badcfd319b1c947122ea9de3336972e869d09a46f81082bc5e498f488
SHA512efbafa96891e6d2c0948ec93a9d8d0f05ab1850ea2553640d78376d6ba24538ea145a90a9aa94c39b2d6e4e12f4abab7ca788792445a98591c02a1cca4c75564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58713c5bb02ec76b3d8974957db797345
SHA1e31c5e54e95b44da475e9c40f067d801a44655ee
SHA256694d49450393744519303734cc3aad400050db55e251a560e57c594ed38d4faa
SHA5127eb500d358b99599580474e83a05ee049198b411fdf996678f2c87005aa5f17171aff166d29b33b5733f847aff6adddee7bd0e3a476e896fdb762282af5b6672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf23e12f87e620a859c73bf5fb3e15c6
SHA175a8be262e09e86ebac6deba1b294eef635e0948
SHA25655c7b8d6d33bdd677b82f1078abb18e841bd0e5a0d601b90fe46bf4200327b89
SHA51246228c3a91dc0e7ed50b7466713f7ed9ed38cb0b0f9afbd2e842d37e620956a1f9e8ab7a934270ae55f5691b113a65ffd0c914cdd4da75e1a43f32d9dbd6a4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50592918d17cb57f4bd8e37bfcb782a43
SHA1e931ae7ca706d2bf00f959e1abffaa132225f9bf
SHA2562a9a6cf1565a559556bea980baf6124cf74805350703c4105ad175d64401307e
SHA5120174f3f1abbc47e276df6b1d11f03bbd9679ab6b35ca22a766d01c725594c29304bc39c385a696129350b6f6710e1522bdaa9cf10d0ae201dde135bc62c59684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c866b358ff14d1f1c93f91bc3bdec44d
SHA11ebc7574839a596e97660ee7f4338988b5f00df1
SHA25604c04953ea50c91e319fb353d425d8b981035880f0b845660b372d9deac71076
SHA51227e1d4554d5f059c42f1a2eee7eee3b3145e4e4267c9683adeb0c64f27fe341ab1d69b2ae0f19f7e23a599d1ef80a43e23414093fd1b8bb053c40779ec84e1b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b