Analysis
-
max time kernel
138s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 18:43
Static task
static1
Behavioral task
behavioral1
Sample
d6e48d6ae6fd7898f93146801bfc74c6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6e48d6ae6fd7898f93146801bfc74c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6e48d6ae6fd7898f93146801bfc74c6_JaffaCakes118.html
-
Size
140KB
-
MD5
d6e48d6ae6fd7898f93146801bfc74c6
-
SHA1
f89c54a71ece959771ed2093faa953b1971ca455
-
SHA256
4c1a3efd3b9a8098c53bccd4d87a6f8bc7265f7618775b878bfa0cb7f20baeb9
-
SHA512
1ed9d888a2f83d9e06f94439ab3750f647b5e68376a4ea8ef22b8a04723a7475f7e254edc30106720883ab13ad20556b0ab97815b62ee87ee32464db9d8779ff
-
SSDEEP
1536:SoN1JYiljxyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SoFJyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432069304" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77211261-6EDB-11EF-A7B5-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000004ddd15effdf804686a7c8e73ac86d072ed95fb97dcc2ec085e78567270fcf8c4000000000e80000000020000200000006f20009af5149add84e2a506864469c4b8b08b20ad5aece49c4d25bf247ef61f20000000a8a1e2b367189ea50fd864c71c878dde04f147a1245995b69b325f607dc9a08d40000000be89bd9b3a8bf96afe5b50a91b5f81293ed54e3882615d371cc9fdfeabae1ee08d691ad2479e2a8e190504b5a7fd073373ec4e44e3c034a2c029d58db3192be8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109a758be802db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1960 1992 iexplore.exe 30 PID 1992 wrote to memory of 1960 1992 iexplore.exe 30 PID 1992 wrote to memory of 1960 1992 iexplore.exe 30 PID 1992 wrote to memory of 1960 1992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6e48d6ae6fd7898f93146801bfc74c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c67e4b7afcdb8c898d666140657165c
SHA1f33f1b3514dd099fe78f560cf551d77e54da9cf0
SHA2562647b00f45f95a1f4ad4f91da37e96bebd00e6e91be61eeab3a61d71948ab2c5
SHA5124c3d579d5f2339d748a9253b1dda42c4c13313d31fd6de358bd054985b25acdd152a5530d8169f55d9468eefea41dd44d32ebaf94c09f75b62a845c46d255fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd56a273125e5b79bbaea0769fbfe7bc
SHA1c6827e28769fe4e3d0870c83c463f9e876035ae8
SHA25618fb687c30127620b11edc757b3680c6e55d26f9673023bb7168a0dc8b48e0cd
SHA5124f95b3361078d6360322b5861cd65a3e3ce3fc4b00b730d532c95dc9e40107ae68adc735cc6fe3b6feb234f93d1ed6c9aa3d989445f91c5beb81671313f91266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c734941eacfe262a02ad9956b191f95
SHA155be37f66d25be1bcb34879c6f3d8a8e2f188c22
SHA256176131374e33cd333a811e062b0a2b2540b019564afbfd63d5cc4d3f5262b346
SHA51214ff96ba020f5d2264539ed7329502b46da9e0acb22e8578b9bf69c76036e86c7c613b2a269104c6353fe990c0a7684e0ef3a91b48111ba491ca6f888c666013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a58dadf374ed508f7301a47248847db
SHA1aa999cf2f375e34855e5d8d9669a407a3d673462
SHA256a6da43bc462972b250b6c90a891e68a5c35b27876cfeee16c0fb182b6c1af785
SHA51292e47be84455e3b03196ca078292c1c25961bff49601fdb607ddf0b977912ad08291b2106a107f61e7fa1ecb3a979f47e3bca5925ed4764da020a8540bc67b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b263e28b90e9c865aa5bc124fe717a2
SHA1b916c982fc1659cb92321030ec9795694b7b96e0
SHA2563b133543b150cc776a40821b1138ae2ad1ccde46ddd477772bd35fa36508746f
SHA512150004aa8729f06816ff8df1939c513d55a021e61824b5bbb4e343d8c18df1b451e66f3724bafbb8280410228c9b175b15b43085eef70cb1ffedc2dd73643582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d209b506126ee131d35d5ea107ab21
SHA1a9a3a26fe84b8906d13eeef77478ae217e240055
SHA256ffed08078694c028042afe7fc28bb292ea828e5d1934157bc819900ad968c777
SHA512e645058657c70c145255a4bf5b419cdbcd948a82512f044491a526c8854c42884d21ad8816164b13d5da2eeb72f053215866e4b9194d43a0ba182d86613ed5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025030ac266c078d07fee53e2f038b43
SHA149a7c5472d24b25870bbe532ca5c7e590cba44aa
SHA256cff4f16476b916554472c3ae1e8eee2b87365591e44750561c1ccab5f80a5674
SHA5122644cff5b6e4d3a3e896a720526aa65da8f561d133785b4da501d23d77711b43c11c357bb3f43750ae32696df0134b8eb7bdc473c3dcfe86942c08b6ca5821c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2495597d69a0cb9bbcf6a8197a59483
SHA1eb50bb41acba63606242584ccb3def5452446df8
SHA256fd57df45d19d0aeca9563db2863aaeb48220c8da2408b77644f09906b626f96b
SHA5122daeeebde4d2738fcd2fb64319a399bba9eb699b19a75549935a062eca59f28619a0979afa4daf0acfded9d89556ebca0cc332cbaf8b259f8f0a82488d42f8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356d33a4df79d2e0be5834a200009dc2
SHA1aaf576943eeea84ae0de8a7e11ca944ecc7d278c
SHA2567b847c684a24fdd8da297cbfbb43f5b197ca1b1310f3f4c4671906d916969202
SHA512cb234d8d32af5206730076b40a368eae47b2af6fffe1feba1f7239a2e40a983b6d154f9b2b1459763f8240a579f2394bfe6ccca1f7a2b28104056c231608f041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55449d7e32ecc018df5973b23f84c74fc
SHA1c49119216554539f30776f1051f8f7e7407448a8
SHA25664b57142b68cc12b962fe260833e1b8da977cde1a8bed73bae710aba5c1ff5f1
SHA5123ab891bfee0eb3ef9c9f1700bf28d2c9acea37a97a08d6be6163b1c86a7afbc8bd7dafac5fd4aa80f86a63bac05a73b663c5de14a8432cb5726bd3185b407abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b69e71c28c1a3a4e36cb79ec767063
SHA1d2d7d62bd48665750b5a758b58e586a9d152c040
SHA2564f0833f21925c64901c2ecd5c00e958e39858e97716ca7a3a163ec79597c7221
SHA5121a2d69366a2c32cd4a36b3d19cb72e982975816ed7ed843d2c2dd9521174cdb1e99e1acf2e14e447297d8869c9f9de9625d03deba8d3794bbd9e15ab44cb063f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b5f5c0a29de789dbd947fb4136af02c
SHA11203bca4fbe6de0949e12568d06a4251e6977732
SHA256d510a132b5f6e280ebb3bd97c6389cb979cfbd15c497e3260e8c7cb48c6859a5
SHA5124053131c0ffc8833ce225e5b69a384bb7e0e060d27b228fc01144c31441b05f3b3c68d77cda2d0265b462c799fda5c9fcf0a26d42e51762e0dd9f92dd7104e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d96be78622183089b6473f3484f40ef
SHA18fabb5170df992ef452a7fe8347c3dd6a9604289
SHA25642e61bcdd83b36c775bdc653cbc6005e9ac41abab64c2f1ecb4cea304116ffa4
SHA5127dae330395378d5a14444313de37542332401996396d0cd545ef0ef5469be6ee6892f2b0d6958ba689341467ffd5d52a9e446debda174b9a9624dcaa49e49e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31beb1c7b1ca052ba2dd23d7c4e407d
SHA18ef82431ec17e14f0d4a1cc387130a7374f58286
SHA256808aa4d7bf974b81e2ffc5c3ae88b3b7b74015f529bcc16992e025a5c10cc0b3
SHA512363148e198630f108ca0f7ad93f5ba62c98ddfa949ef7a6c430c3f8ef970ef971bc896c2ed776b7d24a4175f66da49b35fdd426ea171b30a8ba2f90c6f8ce8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450b50c207b770f20cc0d167ab74bac0
SHA17d3b87a3cccfdf7782b6b55c1a1054b55e8997cb
SHA2569ae129ed2e72baba490f2c31695ddc8826849188ab35c8c993359bec3c1a9cd0
SHA51201ee38ca45243b35488a9435989d35cbc9a22921ea6299732e38b4ba028979bd1609cadf873afbb932dfbc4aaf4b582b5a7bf0fe52bdb44908bb73ecd50b328e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56832a3dfd5ff322280b3645e6b52da87
SHA110515b71088288ccd77bb288814da590fedcfb8a
SHA256e6c790446fdbb7da6dbc6a673d7d6b58cd349cfafb593b8ec6d9b3b63c109d22
SHA5129b383615052d0cfe9a95d4c6fa67152bd5b2e38660f4cfe8e587196c6f5d26d627386ea4175492226b52268a9945624304a7340fa8195bd05b29eef4019ce2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de0fc85fd0e32152af75080cbd28367a
SHA159e02b2e27ee5714e669894a812642bca5f2b2d8
SHA25672bbdfb77b6b28311e1fc614eb54a98ea93378095a4648ac86b2f79beae92d07
SHA512fd985d148f282d781ee87f20d75ba3ea5519a828e4064934efbfc950ec2843d74a640ebe082779f190ed3e26c12f3a0364760c49b5a42ade516a4c03e83f8e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6a72eeb7037ea4552ff85af6fbf852
SHA1c9546c98463de27e4b8c914e6a38463c79d83c10
SHA256b4ca2e06adfdaf3f8134566e0855aff5ab07e43b32696812fd730fb43c164044
SHA512933eb6409cb412731e50009eaf947fcc657eac04cc4bb67c0058496ebe8eefe936e4ce4182b7d534a8a104ba323e7a2bdb4749862caf33320a0d1c0d600d0c01
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b