Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 20:06
Static task
static1
Behavioral task
behavioral1
Sample
d703539fe6ca81892169c308394a742e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d703539fe6ca81892169c308394a742e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d703539fe6ca81892169c308394a742e_JaffaCakes118.html
-
Size
110KB
-
MD5
d703539fe6ca81892169c308394a742e
-
SHA1
14ba1e66b614b1950e78c8209d7f14f905ff5d90
-
SHA256
f8033fe6a6c1aac0a2fe62503f0084b750813b0342d2fece1d30d316a71d2880
-
SHA512
99382df9987eea9b85133ff7bf82b48a98fb3919fd8c0cabe9af3cae97fe5632c69910c037f16f91eeba4f0c2d68c42cfcdc386f9417684e4f150a0b39112346
-
SSDEEP
768:BKnE2WQhEKTlfIfmE7qrMa62z2bZ9WSkEvtNm5brccWBgqaeyFiRkYfye9bStZKt:CIfmMzgodgja9AX5hk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FFA6A721-6EE6-11EF-8C40-E67A421F41DB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432074256" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005338d8f302db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000012d9fbf438d582bafff6d5f3822f9798aa9ec94db96edeb3d0d71b1f13169f01000000000e80000000020000200000002cca1ffeb208ec8677eda87dfb8a8372d81c978da386963014d4035618d9c0fa2000000089c6b932fe674d17d0575d59eabc21517652cae13165e5733d5100f41addc51440000000f097a0581fec20533a96274752f5dfcb45bef059e6518a0b813ad06ec77c63c059589b84c7ee6eecf6eecc17a0fcb3a584f0e1cb8652e4470285862586e63e35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1944 iexplore.exe 1944 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2076 1944 iexplore.exe 30 PID 1944 wrote to memory of 2076 1944 iexplore.exe 30 PID 1944 wrote to memory of 2076 1944 iexplore.exe 30 PID 1944 wrote to memory of 2076 1944 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d703539fe6ca81892169c308394a742e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae83e04f7078863222a6c18fc8b1a2e
SHA18e4c36c1ca1db8a7219889c633f46e75d502e9c8
SHA2561c3209c4833543010c49fe6e6bc955fbe730ec2594f9f7746c81d379afe898cb
SHA5124fafb3d45fe62b776f144da6d12ed8f802a59c79ea5864fc98deff8fc4c682ce7a02662504a7eb9d865bd0f142244ed45fae977b7bc8c914322fefc6732cc1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae336d7183ab8ce5f12dc813ff77b1d1
SHA1bb7a884f6ca64ed2b63aef9ff183c1fe89d723a7
SHA2561fce2107b0dec35dce31275c641ee43ef6177ccc871004258642d4b74bea08ad
SHA512cb2d33f1afec68645c58ab972b20e64805517c4d06e37750784cebccf5c646e8de9dafa372edaa6aa6f8626b30a0cb0c32b54d8fe2cc82fff7d11768e462af47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d586372e3f08182519eec4b06d37b38e
SHA1f179378f5c523b2e5c5464cbf70d20fbfb30cc97
SHA256d49f4d2be15254982719f856b83edefa2c858f6090c242a0bb77804db3da1100
SHA51235da9e17d7e294d6d2bbc4fdfcc0b5f99c54fcb94e0f990eec6be532a8b1fd1467d698b030592a1d11bc022ecdb45e9dab00ef3905fee640b13f8ce072e80b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff461f82a11de48ace0dffc86ac6203
SHA19697181538101d054458627a36388ec7e2f9c6fa
SHA2563d064e0908223095da614081633ac06f71603b97ef99720848abbde441e65a9c
SHA512101789c50073772373cfee79bf17d5de2e3b789b07b8d1ccfb2ff3ed8ef71a90e49e4fa938cb4c479d865f08d4dcd52b210cd427c0b6bdee0f5258db2d7f7d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3675346a1c434c4b65afee2ffaaa716
SHA1b00167c39f6484844fe672d4b5ac7ad2814765be
SHA256342e0e4afe50e1de2810fc7019149a7cdfd9111b19c8e5f789a3a11b457fca9d
SHA512b9be3cf8f68d719ff10e3ea938be71dd3b295b3543300b867a36f58e5c9fdb462ccf3d83d3f1ba54d18aed3ed95e5d1d1196aa85a8ec450d026618eb63b843fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5267adafc8d7d347da1cb4409d4629c06
SHA1263c57d71f1638f92c07bfba91479f4d51098b7a
SHA256655fc203beac585cb2f6f61dcf77c9d44cd3b8455075c36c5820b985bf3316ad
SHA5122e20fc37daaaa9924a5898573d00e9848077c28f194cd1a9fc96f23c0c715d3a9bdc6b5f70d146e2a0421c6dbc380c42c3ab284eb6055e6b5a23f407d06bafc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5672e7fcc626e793038660e9d72991319
SHA1bb653572263a504a89cf735e4f3f5d66bfe127d3
SHA2561b6a270eba724b7a1771a02bd6f99bebb77ebf71b53c9b7cac9290cbd878e7a6
SHA512e1f39e7cdd253407ca0ac3fa820992dab0fe80fec7337531a5ea0a76849db3e11dc7ec197a4b7f39760d18b4642b204f589446c306bc2530aad00352c7abf1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e52c21a805ae8790f4c3b3fbf197b3
SHA16b6f996e2fc0f85082d12084f630e286930d4ca4
SHA2561015cc893fceedefb4094685bc29611f6015a3ad32aa32819e39649e8c1315d8
SHA512349fab950465cd028125b174531c9f050709599bfc9266a75ba17d47593e7638a6372d1747abb6f806c02ba69c6702adfb6df1d9d61bb84fc5eebf813bfbe3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b1e644b5ba0f6386b9570ee307790a9
SHA1770adac6205428312d71058b9aaf817f50437053
SHA256915c9290e03e551dfc6de95752fea04bb7df62104a11a6fec45bcac17534cb64
SHA512bed5ec4299cd494273e9659204e8e55eaf9495c14d14bfdb3abe4dceee5381c15ad37f0b97ac6dfe1335cff21f6b632b15268598a6cf409d60fd5436f3a3fc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329d46a23f0e496c234093ef6ef0b5d7
SHA15f08117656f1502443a22d8837ebe5b682a40a11
SHA2568f523db4b3afde7223f11f22d3a0cd6a98dba47af337cedb6c6fc1ebb69f2c32
SHA5128c8782bc684c0e37f213dbf334a47f2aea2afcf9c7100e979965aab094aeb5114504293bf37c6e1dbc83bd3ed8b59a50a6ab93ccb25f791a4408f6852cec4b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299bdf9ffb43ccb9e12efae9bbf3cfc1
SHA178c3235b5e0d15ae450240e279c3b15cf2ad4dd9
SHA25624f077f225649a9e53f516916bc4b96815200389a37f23da37cec13ac0dfb866
SHA512ca1407a350a6256dba43109e9b0d749de698dd7135670b15b6d56a6572aba0078c76d640b6dca8fcf1ad1878270f3a9cef0c03d10f5580f21400c183ba995e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e799acf0520bcb78b166c2d9ffbc14
SHA16c587f79c3786ff71ecbe4faf0608017c6d30b9b
SHA25624e21016275e69cca84d62ade371539c5930db61f3242ff907cae576571c253d
SHA512a01d32183db210f3008e71f94bad813953c1054654f3a45b4446d708c175a56527c7b4dd5793547efca822be27c3ba853a841add819a3b6300a53b4e2c568428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5bf92b7047c15c38d45cf103c5f746
SHA1a04d1e18152fc06b5c0bc25485f062e73245d72c
SHA256787ad6e199f6a2458f01fc31760da12a235f00edd98e617192a0d4ae79cc2d65
SHA51209d7798ff58265f20085c4055e2b351452570a8512a456cdda22f032dd30a30de34845ad10bb5840602c97bd1baff1a02b897fb77fdd219ad79262d0b55e31ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fce870a0bbd64489923c04c7d562586
SHA13ab17e6861e3208ae2d90db967e386efe3835478
SHA2562119e5a70f5d70992be4126ba255d6df658699308cf8dbc37761bbd17a73b971
SHA512eafa2a5588dc99ea9a656d9172161fd46273e0a70fa5b4ffe16f7aedf0a0848d0c5c114baebb5d0dbe2b6cf472cb358644d39f8bf2cec00dae8a27924795cf34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e867dede2df5cc9a5334715e67e581c5
SHA16ff666bc8dd85df3b7a7e4181d0191eeabe58300
SHA256eae744c60c19811d271043ac064994f317a7660addc17d5ca6247bfb800ca183
SHA51252836046ec0aa5071903bba129c9a6b93008c27935099349081fd367cfdbb843870aafa1fd4b4a9f0b089bf76f57b7cfa268439f1909a600468229218aff92b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda17341b1648a9005df19c7403b7f31
SHA1dadf46f0cc117ca48440b3d60c09e6b1e20ae2c9
SHA2568961db519c20d62cee8f197d717bccd7c1bdaa472a59a0bffd883887dd8ca30a
SHA51225ee0e2445c460e7b6c2ab86968045f722d6d940b922b441f6c0130298e0203b93083be485661c4d8f45b2924384d009eeb6712f04f942f7fe550d32ed6ffd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8fd532c2df38261cad36a75165b093
SHA130e701c0c7eda4023bc1f48aed751248caa54211
SHA256c0b76c39e18961d996ad78c4b83c476434356ea8cd787d70ca169322cea5a5c5
SHA5127d1abc8c8359c42558c067c5dbbfd2fb556adf113c3df5b0c9b4dea74df7b7aebe2b463ba34142f59b1bf413f1940e0a62f9894170ee2a89e0d1ef1f771ac28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b858b3b41fc82141f112891812f0500
SHA138a7a625a36b677f9a8e43c44cb2f2b93d2caedf
SHA256fffc75c55865c0d65fb25e06cab7b6e8f28037d51f3db083388cf537ec6adb8f
SHA5126c3b1aa3e52a104a665edd65bb36a61aefde512c55a37c4d87044ac9f03d934090f2562c97507ddb862a99014ebdf2d83341741aadd8ea3bffd25bf94a128277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51839015b2f8759c8a7b52329a186fbe1
SHA183d756b8c8fe02d5e99365f5d4595821cd2f5b5d
SHA2564cd41d41384821bba3dbe537a2e2ad13c6009c3fa0bad616f9ccffe135555765
SHA5126535fe876f4934613238830ef83b770dffe4c61ea10d06150075c6d603d6b93c9d4b6dc9e819654c84e25f825af4f5f7aa6c4ebd402a1b3bb37488aa2996cb5e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b