Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
d6d5f863b72f8931c32648504f1c6e86_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6d5f863b72f8931c32648504f1c6e86_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6d5f863b72f8931c32648504f1c6e86_JaffaCakes118.html
-
Size
73KB
-
MD5
d6d5f863b72f8931c32648504f1c6e86
-
SHA1
202f17fde0a79a67834d800ea12ff11d98ad0382
-
SHA256
6c892f07e3305762d4bb6732d4d1f944e9d0762d2524ddbc976ff9bda7a2c4bc
-
SHA512
422d9633ed111d04c75311b26cf4847e170e6fd1036e8e63656a10e82940d43f75931b471d9e7fbeff90ab55db84294e542795cd191c09afb9a8aaa963383070
-
SSDEEP
768:JiEgcMiR3sI2PDDnX0g6se6gN1JNwfwfCoTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:JifoTTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1031ce6fe202db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99680051-6ED5-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b88e4127b32c568eac1f291cc7a32d879679375cc7b78fb15e5f37d68662d69d000000000e800000000200002000000090fb1419a5e027bab1c73e0fbb9cedab6a7c282f58f2aa7d4c18e8e581ad7c0d90000000c19172a2b34cd234ee0d04016fe971c31bec8ec9aa54943335614096295d1cc37492bfbebe3716224a02618b28c66a5c2b25d37899acac4a09ef25e5756d7fcc36a1daba57a7a20fb29eaaeed4ef352c9595d27684ae61b6db6c9375e731b8294fdc393133736f734c18569fae465050e634fb82a7d66f29ec2c9bae8f18582ec105089c70769af4e9082672fcbfa60040000000bd17533ece74176a2f00f29ac94aa7807699c3ed20ff2461ab2baf5f5c0ce123cd008d13c2b792ceb8cdeeffbec65493408839f84861a74402c5f62d40e97eca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000bdc62aa46469b53aa217e281b28e1656fa71dfb7b5741e09245ecece247cbb0e000000000e8000000002000020000000803c5b75a292672a94aed3ca910cf2bb0aa86e6123141d6970bc5bdc1f5a120120000000e49eeb5bee995b7257ce7413b4246ac114dccd0c1c7fa0b2db815ad309c6bcbf400000008d35046909f628c38fe98b815eaefaa9b68a2107722fb716e5cfc308f0efdc19212ccdce00bcf59a9e1c4a076ec44752f765e432bb234dff161e6c28485d8d1f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432066783" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 840 1928 iexplore.exe 30 PID 1928 wrote to memory of 840 1928 iexplore.exe 30 PID 1928 wrote to memory of 840 1928 iexplore.exe 30 PID 1928 wrote to memory of 840 1928 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6d5f863b72f8931c32648504f1c6e86_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0d5fe3b4c10a6e3cde96285ef1175a
SHA1c50bd357d855580ae1e1b45e6dd4e523b58d658a
SHA2560aaa8e1134645690bbae52e1b070c4051abf0a4de0b13d74d1f4abfc5a042fc5
SHA512e61cd129301b13dd08b685e9057c56e92c0329c0355d782c6114818b64d78f3b37846695010220a19cd94eacd22cd138728f276939443534247f8f5807f4a87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dace52b6a0507cf35df21ab2411ca077
SHA1a89053ff9eda699b9ab7fd8fe1060ee479762a2a
SHA256b1e4a8a0a64798d39adec6324d753107048bbe3d0a48411f8f22faf129a43bf6
SHA512ad9354032198a1fce0f4d8b62674138333cec10c32015333104249b1ada464f0302062d441b63a2b31eb242b16fac6d4034e828835bba43d728139fea71efdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf486640c83aa2e3290566ff6b3a2bf2
SHA1f09fc85bb817963e46fa0ba9b98a45284111e2bf
SHA256c5cc3c04adce7d36a478d981a8b8a0b04c0b263842972a47ddc5e40e8f96fbc6
SHA512065583b38b65e2be2167df93b546e203727db3cbb0e2e2d82957281b8854cfb93a9e8f3c0e462c0d61f6fc94ce2fff2cfc0d508f66b9fc63e66d2bd1d94cb1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073a0eec3a8a26fe68db7930d8fd404a
SHA11fb14f37fdea8a64311130a71ccd78134cf0b6f3
SHA2569f76a301552ecc18353a5636045e2d1f0207810f0193127ad7165a7e7a63814e
SHA51267cb0039895337f18c6464e7cc2f47b982d344109f9ae692e7c890b289e77451b05c7f3744e315f52c2f19e6d28d05f4e1463987bc9ddab2bc199a7bb0f6f972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdabd7cf033bc93773e2867ee6deda62
SHA1701bde9905452fb5160433e3c1bc4a44531f04de
SHA2564c57d56359a4975003d2107b6852eee5f14a244d6e6bd0941656e7fcd178c0be
SHA512340fadf2c55e3d60a6f94baa73a4594f71bc15476d6d22beed9bed09721a3258f5c7787889f295f7c7129efd87ece5f6c904e51d6d31e77f7633040e3a845009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af5d24e0448ce66ba704c3a0e18bbb0
SHA1baf6b47f944a4ee34030212a7a7fdc57e18df91a
SHA25695df073e663c58025df849f601babf6f3f88761ef5d7358480f600e4fc9249dd
SHA5126dda9320a9c52e32c97730953a01d06667f847621d318148a3f2c8f9189dfe60ab93ccf72a9356daed28949e5397a3401fc27435d7502bc30d746a6d2634718b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d37985394fe5b73621a3baee87fb8d
SHA1a61a53b124e71221b9ae1bc37759ece65430726a
SHA25676bf245024a56f79c5f2240a5d84dc44a5ebe69dc5ef48f55272d8a6862f74c4
SHA512228ca60b5334d0c823a6a533eb3f2e0278668c0f3d86b7ec0a0fd41472861faa39893c8b6292f004df3f5cae091c47a477e5ea1054e2dc1dbcb38b4af8e41c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e528be5b99e01c788573ffef3bd417
SHA101071ef5f99991d553f51cc1357349339667d77a
SHA256b07606659cf658211a3d88b8c841f2461460ffbd441ed7364d4e83e038510a5e
SHA512f9ba183db658407a97a66967a51cc615e7d6f7ce4c49fa14deca94131e5ac0a438d4f63780bfab070d488b063ffc4253a4bdf45899bf519be87934512023c1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67100585d9339f5e03cfb639142b000
SHA194385d314199e7397f791b91254427e31e888f79
SHA256269f66b6e8fae5be4b0540d9b49b486e8e84f1db4b50f5e2992ced36c28f1f08
SHA5127a29b837be85b24ddee7f27597e87023e12061e09e678533920ce05d27b6e1ad7c57d4e4ca4941c2f22e6fea4c6e3c4cc8f1e9a6a76c8cea13db6f935f402319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514bdc07ddb98b155723cc50c055f0511
SHA158d1d22b9daaeabff74ef88e19956fab5b71764c
SHA2560f6ab4cba9b442d8e6a5ab911183c48a75632e22f671dc61beaadd94af486b9c
SHA512a0ee554f5162e8a74625c275e52e743e6e7a429a893714edc7ef60ea1008982cd3192a78466b707f7fa51830f9fa5848b74ddc4743bc5a52fb51bb17073d38ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464bfb7040c6030a460bd47a54b2df23
SHA112d44097c1abe52f3a45560093f4b8b7de318ca7
SHA256b38b9068850d83a868d2205c520eed0ec63300dba8a68fb0bdea1c4f659ea8ec
SHA5124ca339b2a03c8d49c9f2e5035334a1d9de476ab8e47c8bf76a91b503873a195a5ae0f68e48a1010e080282a95e7d13af6532b83f2875fa75038d483e7496925c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f75afe7ee7a1b011159fc2b22f6b451
SHA138deb1f1d4a047575078215fbc51e997d9acf707
SHA256d887aca1708a71d0b680487b52675b1b431ec38f7441df72b0aa18429951704f
SHA51212db9b926c09da47203a3a36159eb46d918f25cc4cbac849eb234bfb6aac2aee73106d166b28fd7ba28386d78f7db121b4ea3c449ca4b677a763ee6c20424acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e8870201db4bef4694a320ffefc828
SHA17cc8006e71e6cc827173f75b2ddd2d4bf66defd8
SHA256a3471888f7a89f8227ed7d91c68bbbf8e6df178c30c301a087fd75492cf7d2de
SHA512c3724343338cd206e3701c411e820cfa87a69458414514788c47f717d0acd9d30f5f41d35b5dec6f90d0e2ef0afe454f610107d816af5ff91dc34f624d0e5d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56feea5cba0c0b8a302218842af061411
SHA138fe9f885cec00dd489314adb67a6c49cf7fbb3e
SHA2568d29da3e71024b499926420cf1bd81112fccfa9b82e58ee2fb09c0645e297989
SHA512b9b7638fa0f13ccfb80fc4615ff4f2ba1ebb6a71ed479e7189d163a0cc287249b450f1fe83b84c53dc199568cef2d555a9f2aa382c7ea57264d3c07ff27a5ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54241cc46017ddbd7287dd5fe3d46138b
SHA19b2c2f4624a20cd1ef6adc752feee6f477e85421
SHA2567af86cc09b331c051dd50f7bc0abe0769cdea47a2c29de0ce08c88da83164239
SHA512617a2962e03fd0296b48b241cb1946631c0e4674c7ad77f6c599cc6a9fc2f6c42fa5264e06529c6efaa281c5edf90f0d07d1366803d8ff379018f0c839348ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea653e542a28244ce4493b59be85a5d5
SHA1e594fb48a08987490d1650cafd0088fce77108c6
SHA25633692111d77f3fb4bc8bf846250a22e8a5b40f12ce468f57186609d029cc7a39
SHA512abd6da2e416b195a5e5dfed7efb52df0b4d6eb7153967ea15a5abc9ddee03ba602e9cc7346e887ad502de6cc58edaf3e864b697c28543654479a2ad518d94f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6d4bfa3e5236cb52fb8221ed0bee6d
SHA14251ec12dc2ab845aab994e905c030a7b6d00bd3
SHA256263fcdabedead1087d68f1175bc6e6a492b7acfcabb4fb50d0be431b674b6d87
SHA512acab47dabc18504f8317aac84a9635a61a9de7bf42e6eb08f7fa4611898f826624cd19021033c8388048897e3c0f0b5cb0b61c2addc5f2196ae960a3fb454df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da154659210ed33c7a057dd83d5b639b
SHA11b2049381f3eb19cf0bbd2a79cb8c284c943871d
SHA256c6c651898628213dfad103c22611dd733eff4235138d76051c2654a0abbc5145
SHA5129b413843cebedc9f94c2bbd33aa58fd57f33200fcdae29ac78d63fd2abbf81e0c6b981746d6ca903016c839580e351e386680e1532df4209dfcc4c41d623420d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b