Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
db437b81a077a08c7af1ab1e1c88013f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
db437b81a077a08c7af1ab1e1c88013f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db437b81a077a08c7af1ab1e1c88013f_JaffaCakes118.html
-
Size
57KB
-
MD5
db437b81a077a08c7af1ab1e1c88013f
-
SHA1
329e732d5f02ca1c0037fb7a3adf6f596a9d17b3
-
SHA256
2ed6ad765b401e1e01a5ed3582c921777e11abd20f59ece5eaf1d50cdf31991e
-
SHA512
711cee14dcdb9bea80da9447837cea295bfdc82d22cce66f8b5dc80146010be7089eadf3964560a9959109945cdfa4ddccb81500ecdf32c1d9d6c04cfff4f4fb
-
SSDEEP
1536:gQZBCCOdp0IxCbBo9VyU7/kWb74FEZOvdT8cVFJe6ACUzilUVaTyRvCQhsAe6ZdC:gk2/0IxL9VyU7/kWb74FEZqdT8cVFJe8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432252643" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d644559304db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{560B0CA1-7086-11EF-98A3-428A07572FD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000a60758d97bd81ab9f49752f097265d2d332d4e1f9a2d7546e182ff1ad0f2d174000000000e80000000020000200000002cf934b6edd7d53e115228e7898ffdfba3d4d4e586934c78d7469af056ee1ec520000000cef26203d6950b77385696b3afba98159980ad27fd5f300d7ab17727b75233c640000000f3312753c75c8269939fc9bbdf0c3be73abffe74ffaf004a189244f57ee5020896492a54d0bf02b63e9d6d8f7a3e04a89bae5b5f26b14828769711193f0a3401 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 3060 2236 iexplore.exe 29 PID 2236 wrote to memory of 3060 2236 iexplore.exe 29 PID 2236 wrote to memory of 3060 2236 iexplore.exe 29 PID 2236 wrote to memory of 3060 2236 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db437b81a077a08c7af1ab1e1c88013f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544836ece42c567d806dd95d443c0bc09
SHA1e86ec4518284c1923f3b420eb6884ae8a7d75e85
SHA256bea6db084115410f7b1af979b0321add19dd2b44f3cf023db7b9afe9b4241dd9
SHA512e5867b9ce770e8f97295f1182c18426b44f3fd7f53c0a4b8041cef5fce80a6e233f9b7d9a280fadb83c926182746f94bee85c03905c740d6432dce1682db3769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaabc76d6f41c4faa25b33010e1ce694
SHA1270e128de9f825771d2e726cc3a0d6c7fdf2fb87
SHA2564e32611244dd22fdee10a8add926d17f5ba72eb05e3a166d19b9f2be5bf6aa10
SHA512f25870f98bb0a6bc798939f3fb0ec06773db7c6dc34648a709a04e146614259df2bccd10c86d9504c5229566379f1d55af8f7632636b0de60950382feccce7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c12a140310c6c896450a72528441fc
SHA1dca0da64dae91a51d8d94d5fe07d70a31efae831
SHA2565149d9caaa41568c697b3b0c8aca378464e2f06592a111c9b5e7083d70fb19a4
SHA5125407406851f3bea7f1ca1ef0b93e5c74f65cc9a399de538442304fafc0b4b5e2d0867ef40b676c88f60fd8e677dcc5ba7ea0e295158441f12cb2e2eb9916d06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f62d5ebb6ae4add0985aa68f621dcb
SHA1a2b8e721405832dba203bd8479c37a4220948eb6
SHA256355e09f5808b28865273d0cf6602a5585b500e78e86d9754e5f30c2de02cdbfd
SHA512a992ca4f8070695917ce683db73d6d65333cb90eda935f2e8d9582e2d604816fc75d87ce21f043e05c5076549457d0aaa59b1a4ef289cd4e1ef01b52d38912ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774ff7fa19e6a64e47d7e4ddef4dc517
SHA189b4b5f9172f87e8aa0f06e7cba0aed508351cef
SHA256008e1ce15fb928b096a7398f1845438ae55447d1074bbc50de5ecc52e088fc93
SHA512225240ef0f46047c43a13a4dcf952315016601b4b137728c574f9c23dc61829f4a56bac6189286140fe62e352285931394497cb7c098cfa810b8a29204867457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c707af58103c5bd507fee241e82710
SHA1d2a962267ec36606a3c9529eee70a3966bae12f2
SHA256e15cff8d7a77e6c66d9f3ff3fbe94ab8a022ffb504928de4ce07fdeeb6f8160a
SHA512ce69fa5657aabb9a6a4e0e8c40c3886fa87312c6d3b6dfb0f893766f09d35c9b882061cef5f2700dddcd132ae74e3cb045b1c0c57e9e11d8ade9bbdde6b7cd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bbf53fed39421557bc85167bc31a22
SHA1dfd87233efaf6e84394efccdef0a698738ea02a3
SHA256fe9da1f2202d693fbd08a573193269d3a8643556ce17cf08c15ba1f052df7749
SHA512afcfa97e284cbb092db3b98887c570e6e5c1a06476b5e86221766eccac64782e9095eb20924f50d5e3d83b868fd43034d118cbb641ceb5e87d679b3f1c90c780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d271139a2b86f029ecc1a9e49c1dce
SHA11f3a8033b6ac8b8c4adaf3759df4bdef18cbf74d
SHA256d985e2beeea369d5e3e0e95ac23e0cfe5e4e381444130e4454758d4a66c74f32
SHA512602196af5831b4e34b92d50cc744215b91ad0560b0d88dfef6825dd983ded2c3918450ae0d8e9f59a9fd48862e272b0eb4887372f840f0cb92b89a27ea700dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50787f8074c2c7eb1c209db4c943e6cae
SHA181deba9dedb22986b809b448aed73ec7c09b71b8
SHA256043dbd0d668a5e02ea82ba35c2837d5398c9ebc015341130e46780fc081eb3b8
SHA51288aa8e0bf2f5100042756ee5f213247aad54e0f8174cc14865556e6b5f29bcba9259d03bb3e3e22597664c97e3615267c90fa4dd16a64ef291671021fea63954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c71cc95f9593593910553459cfe7c53
SHA15127e7ea5c19597c7625f66ea2b1c0f55780a048
SHA2569755dde5685bc630cc55d73ae4525256e517d36bffab2bfffd2ffa942757d936
SHA5124df59a9de44c80e49b419deda612828e6eec52b777642333222cd56c84658c8c7d645b66a9ca2f250f5eac9cd6643ab1def5de84ad0c047afb9942bee66354f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f6d9ece71311b30ca52ec245b3a145
SHA1271def884369edcb1ff374fa78347dc154dead9a
SHA2568fe3c1cd974989cde4f79fbcdae53a47f37c8db048ac80455d784e3775f709ab
SHA5125d5ae38c44683dcd0f725073e50cbbc48cf5577ff7107d1010f401802f2f8b0fe11ecf8d824cb35f1aca61c03983449262db4331ad66b7934bcf0b7ad12970ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c380a1cc69bca1660acbff51367ed695
SHA1bae800f342054548fe292c4ffedb9ffc6c41b4bf
SHA256a274e5284837cb23d109bfe43928d5d01b436619b8ed7c1ac3a29c144da260f7
SHA512413f7985f38380689e75b906aa4b988d65d5125ad2a81be6a3fab61a8085cebe9a9de0f189bb8c13c4f0e3781250dbfd8e1c104ae441783c3a3f4e446c1d7db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5571b880eec7c3f836cb7fe123d24d295
SHA11e96e39c0d8b98ff02c89d55f2b6206078b9ef16
SHA25694571bb133f3d36f9a1aff60c9dcb3008fa20b84345b11ef32d0ddefeeaef808
SHA51272e92641dd95ea71b578bacdb65fb49af95c7d987236fc1a123aefd046a1ceccf340c72be84c7f31ced8007032ed15124a7c72d7abb1660a58f50b9aa19d42f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b657fe7800645eff77463287bf733e
SHA12159e1bfd87eae1360a7c75b03256a57033f3e05
SHA256155ba31e7f155cbece420fe9f1a7ecb1bdf4a0fc943dbdb8f4485c8c6f823641
SHA5124b587008853b2fa5768fb7de603d3f3b43bbfe8bd4aea3b5d33819e84fff3d7412e9681eb68c59f544e00f776447fcc6a8186bde17b276cbaaec0c83541b1bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd1cce45ca57813989981ad4a9de66a
SHA1cb18532b960ea85d0532a3be5d643cf81b970f58
SHA25666f5433a537041edf9739aa587234aaef75a89143621932fdf258ed07d1b9202
SHA512fc5e96cafdb3eff2aa8c94f1cc050e621aace5f0f653bde4beaf6b6ca57820d7c7937c0fca8cf47c9371e054c381d380b7e2bde294a9bb80064dad72c1425bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebcf90647bfac6b011c145e94067667
SHA1440bca095f215c37a36fa5f668f1bba73ffe4f66
SHA2566b8c067c1e640671595e822f4fa8d3ec386751d398fdcd6ee15d0fc76122640d
SHA5125305305b467fe66c81bf6932d9841a738b303e99c53a3f6bccd0a3f3abd7ce624409202d1f00c8911358b3151cb15218264db83340cbbe2cdc95dc281170c4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b21386ead1fe3d8b1b67e585500248
SHA1cc5866e82135c254f525331611f314559a088475
SHA256c2a73cc56e354bacd8651706ddba73abdccbb38649306f11b731528c1690a7a9
SHA51270c747146a5d4dbf0036b8ec83782d41a32a17a07dec633b72ade301523fb8037ac9a970b6e057d73ac56065104bb936d706407709a6a8191ea51157e0116954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272d2afc5d9f4d3d1a80f16ea9fde099
SHA1266c96129b7d747b385b9c78f2c7aeda76eb0e68
SHA256c660f72e1340fd72dbb322e4cbbde8bd99518e2f3bb08df2baf72c1c7a5c15e1
SHA512065429a0b6ac3b5c22029d9f07f42b96888f0257dfaf401f84cc651388a080dc670e0ab2970e6734641b37e7638f568b9babc21134d19110fba9ead44f05ecf9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b