Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
d6f0c82185f55df02e1ee867c2e4f71f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6f0c82185f55df02e1ee867c2e4f71f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6f0c82185f55df02e1ee867c2e4f71f_JaffaCakes118.html
-
Size
3KB
-
MD5
d6f0c82185f55df02e1ee867c2e4f71f
-
SHA1
303d18710739bc7dd09d317253ec16585765394c
-
SHA256
cec5a15c726b8bdb0a0dc51ff3172e70f495c8424a40443e6840570ca5892d60
-
SHA512
519acc0e65824c7919ef34993a3d7cf359897574d5b38874f0c8c110db881ef63b623ffdc3085544624ac51dc38851b2e4d2c9b4828016ad042889abad3d0765
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C7864C1-6EE0-11EF-87F4-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432071345" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000001ec1e0a070a13f42ce3e6d543a5f8c86c83e434a7e6dda435216301c6eb05e59000000000e8000000002000020000000c3396b114736f77cb2b31dfe129972ea61074bd926322429e46c26190cbf39c020000000d83b0e51987ff10118e9685273aee300a2a3256b7353fc1c119cff54c7161369400000002d069e5ed1e78ce0b28268e725e4e247a46f89d08b5b4173c7cb92be4b26efc4f19f3606aedd85478f0ddffeb29c30f7da322ce2eb2f7262209785c94007abf6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d335f3ec02db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2832 2112 iexplore.exe 30 PID 2112 wrote to memory of 2832 2112 iexplore.exe 30 PID 2112 wrote to memory of 2832 2112 iexplore.exe 30 PID 2112 wrote to memory of 2832 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6f0c82185f55df02e1ee867c2e4f71f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532cbf125ad9f537318cc19262e665bb8
SHA11e5c19c7a335f66fde0b0c6c31afacea98479910
SHA2560a96da9bfa433c6dfa1588b4591c43fe555c628c34be42d85705f34a0a2c3cac
SHA5122562eeae145ef4e7150a1687f6cd1fa00d3bf9b807542ffe1589308ecf25ea6c5f48a31a886efa6dae7f105608792817bf867bbb8da1dcd1b63ae1578ae3a780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59572f64adf329a7b4a04f14505a98827
SHA1f02d2c1699b33f8b292ab88eaf80c9ec9b15fa4c
SHA2568f00e81ea599f69af4151411a95f9cf298c74d686f837b810446fb6717a11cb7
SHA5120882451d4f26645e3ee25c03d6229bec0eff07ca2f66304aa8da609451b7a12d9f991745b15c7ba03fff3496fc7de598f740d68e82e9843bfb6818158c296065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c7ecea3181056442ba94f9c2a98777
SHA1814b67c2a514625f5b42068a4197f043ff64e959
SHA25657391b2d7c20779d482fa20b1d7d5af52128f33eece34da28217012c9f33c5b7
SHA512c71925703e6afdf2022e21c43210ca2414dc278c900cd5be318d33c0583314e64721cc515ccd6059c3822451746b90c2e52f44d586ec85357439f5c5ee2dd09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335412a4a8b46ef1b8154c3674800e8a
SHA14fba794cb36cf0fa6ef7e6deb2b9686409f586b6
SHA256515e4d7d65fa3b1c47d3d6df4cdaf8fa1c9f971b123ddf1662e6d66753e81fa3
SHA512e0dc720ac4e2e6aacecaf6f16afefe6e4cce4265b6de381bd122ac9ccc0d02181176f370ab07be3b04f2ba3a86863e6521615fcf2f1c80ba1ae08afa748fa321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12a2b8841c27f36cf4536ba82d30bf4
SHA1cf9c9611f126197c7c5d1e8e712091ffba5fe24c
SHA256d4cfc9d7c5087422e9efae0f2b87f706af1258115969b20297386a142ed142af
SHA5125462e26681f68001d5a1068522fc16e02eb8fb78cd846fa9143b2f7d66e9ce5f754024bb73024444958d7cc44ff0c206e3e624333556eb131a6a84cb5178ff0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f55ebf02d3f8a392d12d6467f2b728f
SHA18def87f3ced146663563cfd4ac3b5eaea6027757
SHA256c1a5facb5d9187ff0f41ad42aa3ab0797826d67917835d3f77da658bd1be8d76
SHA512a4685470e0df96078e6c398fced579d13f71d7bc3e7836bf53bfcc4570764590a55ce2050f264b88b38cb4072cc2e3c0cfcad3d7b36420a1e202ff7eb0e6bb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fade6d950459795636cee4882d1301b
SHA1d36672356b0dce14fa584b17c4e97aa91d7a2d30
SHA256c08f2def7a9bf01b31119f3ff486b18c173c9fa513dc7ef81ff70cf0c51472c7
SHA5123ddd991574510f648969c6382b9f3b9826243724a121efacacb4b3c47f3c015e531562dc3a07c4c336803b2b4663d7aec0fd428a4109f4a15e90948c0813c4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5067c04dd7da8e56ab671fe41716706e3
SHA190ab163a859d73459e5f43986f17eb82f44fb5ce
SHA2560a88912027037d3fd8bcd23a5b69cfdec1ea56409353610b2c7ee915e223a629
SHA5126279b47df4ee6b0c3edcfa89a54d78e3869a851a593742cf03318f5658251cc294d6094fa88c9ca9fdabb02653ffe87536aff4484fc91850593ee64a05f8ee60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c34f67a5ec2583fd421af48c296f541d
SHA1b786c0c3711a3af55303535ffdde530f963acbd1
SHA25671f0bfab785f08047ad06133462e078408bb31830a4d2b66786429a7da0834c7
SHA512687dc0d87e122f9bb9c822b40431f2ad12cb724e30206c2f4219d3e152f4b9f4f41c66dca9c90f9113674ca51ffdf16685d66c1bd7694dfbae6b4f7ad6bb071f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44f8912ddcc3ac2d828c05135cf2078
SHA1682a3ec417eb0a67a5092e1883ec3ee9264b58e5
SHA25643567d0324a91682a6e08ee222504a18ad6f44a7e981ae4c6b3e6a6f7dd88eee
SHA512074f109ebf8c15acd672fa7d57de8a540ae63d6d4b758ce5c4f1578f8565af8ae19bdf2a99f58f7f4ac235ec3c8c55fed3a75d4639634ea180e760b03b8d0572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a5d48c395e8b5d2e67773cc51a2bbc
SHA1265e43665e8bead6ebfaefb7241007a85b73ff70
SHA2561eb0f4e2d74ef15b95595338a93a5ef8b38d4c81ce4eef8dba0060f9f7d5905a
SHA5121b9ec68e5ada0d07a992feb85438ab692d9000bed305ca5ea7677ee61a0eabda4e66716e08f6e01f5753677b5e65e930c420453d2536148947256adeef91b1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db064667b0c1f976d3600740a398a331
SHA1ffa2b6286d304e403ec836b15e2487f0caed1cd6
SHA256586fb55b989dc0fe1677cc09423dd9b8cd65db9277b90869be1d4c0e94e4ffda
SHA512d3b330ef4ce614ad2fa3d9994bcbd2052ba208e22c60f000d9dfb31fbf324657dabd5b7cb8a27a73e1baba3438c0a55f1eb1eff4d0dc5414d9ac05efca1fb7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f2317b04a28d11d7884e9c0fe3f3cc
SHA1d2b9b725a5a9fda8006f3e7656e503bbda9ee4da
SHA256faf6284ee5de883cf03d5250c0eb84dbae6bc3710bf8f508ee576712a8f4f236
SHA512812030c70ae26ec5708489352960dd1487df82e7b55eb9b46243a8a9dd27da5d7b600e32e6c2daa57791f7c0335f54717c69673b94f7f7820f2e9c050687a0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db999ac209ef668da7e7186de19964d0
SHA1c17bd73c11e05c484781b73bc8c19ce53779e6d6
SHA2562bcccf9aa234db8be211787579fc82f838ac33a7d7315f522f2de77095ee398e
SHA5129dbc7c0f7583a14526cfc45243bf7edb80c8cd2cd1db02841a6097b348b64f6e5d6deb146841b1a851dc12536ab71edc0762b10fbe8f6cf84cd8c09476ce1ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043991a2233e8add0ab73c05805b6400
SHA12b14136401dc2398dbf763b74c974b891d388201
SHA2568b4051b7639abffed614eb56b502a1a3136f02d3451fa7833353cf959e03a15f
SHA5127c78c1afe142529c9679155baa33222b0a03d228ea77329002f397852dc232ab0cd3af08e7f2c2d280016d390eae34ce148e00b5c1854909e5d51528f045aaf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb616d7cee9f9eb5311527d086c6240e
SHA1fad73dd2cfec6780372aa2b4e8763ee9da2bb23a
SHA256c45e64089c9377d00b6ed30c87d6d6bb5005863dafac36e9b0c5025b2c03065b
SHA512f2154995710ce1f040d7f92729d7227d5b1e46ec66bd24a90fdc0900a201c9fd1567844b962927e040c51134c0776c5db093638e68c09b053709f2d88fb1479d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f418deb8baad77ebc886ce000115a5bf
SHA15333b58fec55b460e9a41807e83c80f8674b1cbf
SHA25639dc09cbe7127b929ec889ce8b6fbcaa4d54d9d40822f59d6b7fcc54d95ac6a3
SHA5122f862d7e88faa75f9eeb6fbd343b158a3cd1c429fe9a3cad012c983f334c0d313c945e7ecd8c388258c130ef48a6d97815f276f2d668618905bdd39681b36d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e8fdcbe02345d226424b86a2cfa4ef
SHA1bcdec8461c1b33003c494f4945bd7b51f394c9f0
SHA256185bb8c27589b2e3fb76524c8260f3a85eba1fb488a2e6781ece09fb147128ee
SHA51225abc9038b7081abea7bfb3bd07be70c25bdfcd1832f6c7eca0dce03d866c16e2832397ccd07858299df6c4c7b569e4116884a5ae76569355dd1fdf44dcaf3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64b82af3cab56ccd1f1c9b328fda896
SHA1d2928c224996fa98c6538ec407a88d4289b2e182
SHA2560300287a5c5ca0fd76b19b6475391414366539d2a98a461741229b9b41316057
SHA51288346fb8f9b965418496168cab940d83731a022f0ab4b76a55c57e8d9a03e8804260b7ff5639589002a7a95f3ae3426fb418dcfe6045e4d58a94d58ad5e2ff21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d2733e3f7acfae36ec72b54e05abbc
SHA1fcb241a70828335a7f2e29959606c1248b3f8ff3
SHA25617646acbe8fc96d9af5897b61ef45bad3cb910545ed4550187b1309468f2d3cb
SHA512418d4d8ecc8650b2a81ed09d4757ae94f721ee358b0d6aec29372a6f925273bdc4ee9f619cfdf252d7cf52485f6635801b01f941d26e1589e36ee2b4f9d40f29
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b