Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
d6bf88876f776a0838809e1ada22944b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6bf88876f776a0838809e1ada22944b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6bf88876f776a0838809e1ada22944b_JaffaCakes118.html
-
Size
34KB
-
MD5
d6bf88876f776a0838809e1ada22944b
-
SHA1
c5e22173931b5d4932b36496377219f6b9dcd74e
-
SHA256
221b9a2b9f3452c8e1cc3c3edcde52ae0413dbc76d43f61c7ac301e27f257974
-
SHA512
8807ecc8a627af9c52b0e466eb2c0df8d34f9a8c93a2aeebe9b0e9501ab1ceeb68b3613bb4d0101f62f001ff85147415210392cc6e859acfeb5b5042ade64e94
-
SSDEEP
768:ry+u8pM+C3/vbkuuKYbSkyO/d0/xJ8eul:tu8pzq/vbkuuuG/2/xJ8eul
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000042fe5c3f73aaa00224149c1225fc1e166b6d278e7f5011e7b0a83d3bf0a180d2000000000e8000000002000020000000ed4535bf5bfb1ec9c2445be437f7af2f8b151458c4d967b212ad6f65dab94b8220000000e2a2af3824b73501a9695d25cd461e081c32d0c498cd14eacd9f1f0b5f0a615940000000616f3c51637b365423d7ba291da030a3aab029972414e03ee72568898a81f18324354e346029158de69b3e2ef51f97cfb83626d8daf11089ef1df0e1686fc230 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80652617da02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432063155" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26F43B91-6ECD-11EF-8B3A-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3012 2072 iexplore.exe 31 PID 2072 wrote to memory of 3012 2072 iexplore.exe 31 PID 2072 wrote to memory of 3012 2072 iexplore.exe 31 PID 2072 wrote to memory of 3012 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6bf88876f776a0838809e1ada22944b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598dfde8bf97f4cb818823c3c06ab101a
SHA150acce8ff7b87c6f3913887574ce0f4d48a44f9d
SHA256ff201657fbe472dd2e19fe7e1a7964f76a40b9830b85f0b7e40f6535afc815d2
SHA512a6ad9e5a8083dcd4f60ae250307c62bdbf3381cef20733924c3e4f91ac10002df114f76f5bd7065072b655dffc6d8518db8530d067b93582e72c711265b904d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea2cd00caf73e3c241c033dc52dffe1a
SHA1eb4bf44dd47af0d405906d9617e0d07e9f865591
SHA256a55698beb8c923cbc757ca050deadba20cd4072b67975b80a679057668ea82b0
SHA5123488f4442c4db2acb8155cb0f93937b2d9a032f9e95511a56ed0a638f7b027faf8c314b63ca0a137d9f24f1774fdb292246ab72e1c07da418047b5dd4e0fb8c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51847bcc5e5372d92f21e4f3cf146877a
SHA192a41446702fbafb2ef06cc22e889f3ec38fd9cc
SHA256b3446c9c55d2495360f3bfbe5bfe75d766f6c875a56da5fb577a548892318391
SHA512119c0a1f12f962201579f66063a6dadf71030b1992f2b5f0711a9061ac7e4d7ca994e99fac1728195a0fad15b06f5be8b458cb48a6c8307d5ed3e689358e526f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571aaedd94340e80aaf5505e30161cf0d
SHA1b8079a4c036b3042c987655fcb5b93dc6faf4231
SHA2566fa4195e8adff435378b9a495f966566e6b10f0fcb1c5000ddac198eed4fa2d6
SHA51212d57a8ce610070dd93338dd20a33a3b0920bc36a9c0d916a77ec078276de19e824fe40693775356392026d6aecf3af33fd13aced33ba428dd09c6ff63c9fbe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555347f794c1a445425b166e382280fdd
SHA1a6b7cb12914b8e41b5ab3bc7a662f1ec4834ec6b
SHA25658dce372852989cde1023909fae64d53d220d98ff57b474f52109b16e8b0696e
SHA5124f97434bf8e6a8a4678e09792ec53aa4a6b62515d4f45c62cc168ff8afdd7fa1dd2964a533e36d0f07cc4982e310dd606c59b40ed0524b2e0746486f1553532f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a714d914b9b473564963df0c837131
SHA1dfbf3cb951573f15db059a398c0f895871435701
SHA256ab13ae0c8796922ffb416167090243b7d1cac5d40d7cb10f1610f208534b8776
SHA51256148201094914704d622d5374e0835218b87f849c72368478d959a8b4206364e704f2aef4415381dfccc6eaa61b4a454d184e9a6b3f61983a61337b70d1574d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758cb96966c5af544d2cb18a8ea4e1a2
SHA1edd687b1a5956451af8120eef42392386b885f21
SHA2568f73be8f6bb07e126b9259f1756a0fdf3cc6cd2883fc11762ee314b7d8c2014e
SHA512e450b6ca0e503f61feac0660dd2e21365e65a617ea6ccc2d4b6f8aaf6591c0a39db481f085b7d03e5926cf3e7d58c7a4cf31c7566b8146d499e32f91d8d43821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71a63b59d309c06c2a1aaaf80978c32
SHA100fd6379fddf9065a7aa8ae8ab76ec830a3ba4ec
SHA2566243437f0ed86beac5161e059c59ffa52ac4bbe0081244259a870d91b07811f6
SHA512d42972e79f42a0cda44d8e8691dd7b81ee0b6442cbb540df85eea93b83c80f0ab90e88db168717972a9e51cd1e28fe01aed6e8d973f11d2de210ee11bf251beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af470bf3436fa05236671aac4bad8bdd
SHA17046bd02068863f318a1ccf7611319365384af41
SHA256ae5e8aa2cd194edf126a9afd3b0a0a4db2813c9b4f9cf3a778556a0cb04a85f0
SHA5126dfe15a40532cde5f9a08140f55708bfb6e6e1476e6623b4cf7b4007849475fade3dec2fe727ad6a44ee4d24dc9f684b69dcf5cf76e68764ca05cd453a7524ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8865a044fb7faba073e4b38934d22ce
SHA10de7f5e799924b900ba52bb6182e6a70c283e58f
SHA2563d99bcabe704b823d551b52f5866b86c5957119ad751681fd8bc3510b00e9b05
SHA5123ac9a1fb75dd6c487abfebf6fdecfce1247d8ccadc5abea261f6250a2d934cd5f0700e1309bfdbf75906d8dc5a9a8b00871d83467b6264208effa960bce2326f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e5d447cfbd07e5734bef00a2677e4d
SHA10b847baa92f63cd67a19968f94608eddcd0d29d2
SHA256002e2b3b57fe8df1127d7f3eb7fa6fa2973a14a5831fa81262ec187369cfd495
SHA5126db89ef8c6f663c9b8ccfd7a1c1d8608a9ac2582315cc98bafdb4693828471f3d3e171176d0a803ca1f1112a5c36194d2cadf8ffab34f1d5211fd6c06cb22da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe587e33ae3a47aaabe14aa0a0c38fb
SHA149cb22d6ea91423b5ff4369f928ac07dec63b8b4
SHA25652ebde59d94b24280a852a760b4cc53fcd9f615f0ce52cf6ee30836ba890b728
SHA51217a37d1ae66ee804a3a4f82a82b0e514165911cad5c44662752d059b7921bea599a714483b78f9a006abd402146ed98588ba0f03a7aad181d5ebc0fa545b4fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c035fad9e53e89c13a537dc09d955828
SHA1701ed3266d212231fa0d1869f02495cb8fa5e481
SHA2569791b8e60793d2c24079a22b24ba876da08a44ead8c65056453faba8a77b5b1b
SHA51276b5cfc0a6bdfdb2d6fca8a27264b22b1f352cfafc8141b27bfd5fc8937fdf2e288e537e0da526498645fa450e448385c90eddf64785780039dfb9da59ff4354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b118eef45938f2b9236d9cf053d014b
SHA1fe7e83aa0009781c516b6ea253eb23976accab0f
SHA2562196272c7234a8f818831dbf582c2ae28dce2035f0b279813b45aae83991c188
SHA5129ace67c5529c24b2d0c8d215f02faa89cad2f755c3158f0b9af1efba3ec2146b4810ad88409c53d9d1a53ba8e7073239440c08c0b3aaabc0505d9fab9a576ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21651ba9649f6654e73d337cb0ce646
SHA1e3c6ddf6ff147102d2bcbf25f27708aeb9058f54
SHA256efd8b67e9fcc870121fe1161d983fbcf697ad521e9e1666cc80a40010d2b1438
SHA512873d7fb910ba6d82963217aaa75d1df4bbb8ee6a8d0ddb7b1f76061d7b292cba307a57b440e8372ce80f14669beeb3d65f9153d9f48f1b7d703b2812f8c924db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43d941f33c148e66b233175601fcdbe
SHA142bf11672f134ef2255c4bdf3691fc06b1d3718f
SHA256318aa27f171a7a9ad446b05464f83c8949726a73eb08d97956f5c409abee738b
SHA512103c2e958d5e589b221705b3afbe917ab26271dd6131bd07b8f010f5a1d089daf0acfdad2b118adbba1a32d775a970f69c8ce6cbe08c6d5585c891d02ae43988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967377bbf71f7b5da3492ce490c3d18d
SHA13f06a62777c1c4c279c9c3a54010c532eefe32f2
SHA256c15a25022ba468ad12a536b00e566e797ebebb33ae63f10180515bd9dcc8be21
SHA5127c7299c03097a4a15051d75d9aed76c6e50935771981151494bbf92ffe0e5f86df440ab9cfa35351b83d31f3cdf70f8a418c61b4ac19568c96a233c0c4f035f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52484a065af7b8d5c9b830bb6637c93bb
SHA112f3e2829292d516ad95e8d69efcd07667b3c439
SHA25640662303adb36a8ec7b12c0d59cf1e75a01eb127e532fccf33ae30aa4f17d893
SHA512a049492b5d99cf606bdf31469a46cfc71c34c52580ba319b5e8d7e4e7984a75f43ae61c7403e86f5a18efc4459c390a9bcf31ca2f05ad935f4bd2135dc241265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e23959bc04239670e4430e191b3ffc
SHA133b033581f12d1a346741e9442b859a684a32aa5
SHA25681ac70173410ae6590b20a144c800da66e9456fcf0ccc18dc86f02e318f8d026
SHA5128fb9eecc78c3be60609f0fbf11fe02b378bb80fe094a112b466805cd747a93d0d37cc0c93721f77daa01a9a961eac47df64eaba0b4586d96a359dcc2e0a53267
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b