Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
d98a25c0c0be99d2b9b8dbd50d151d8d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d98a25c0c0be99d2b9b8dbd50d151d8d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d98a25c0c0be99d2b9b8dbd50d151d8d_JaffaCakes118.html
-
Size
69KB
-
MD5
d98a25c0c0be99d2b9b8dbd50d151d8d
-
SHA1
4d7e3b203dd1da2c992ed64cc60021d212f15ca5
-
SHA256
979e17225c75178b8a2b4c31eb8c53fa94d2a64862585b07abe00c6682d7e9bc
-
SHA512
2e5899d3736767d9629609c413d5697f8b387e516f04c3ab3aaec194a617e2d1a1c1ec5901f22230cdcb49b90e56678394c18e721306b79cb2f67fa5192fffb9
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sx6I8uYK6oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J3WvITzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d6c9a3fb03db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432187561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e7a9b8b7a940372444e6e0b7942698fb9e12f2df13c33a72c1f95dcf939367e2000000000e80000000020000200000009a068053e4ce4660493a775997bd2ba82d63f470fe8a8d117b89fec7a3ffa9cd20000000063a78e40ae53ebf32402c08fe1b0f330daf16200ce9c8b06534ca946340b84f4000000082fd4306c7445c7fbe0f58ae37fb1e445201dcb20fd85fddf5f9584ac2fef909232baa245024365eb51fa4fa0c88154203f230a91246d4b781edf82afb985d5b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDFE66A1-6FEE-11EF-A1D0-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3032 2736 iexplore.exe 30 PID 2736 wrote to memory of 3032 2736 iexplore.exe 30 PID 2736 wrote to memory of 3032 2736 iexplore.exe 30 PID 2736 wrote to memory of 3032 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d98a25c0c0be99d2b9b8dbd50d151d8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b56ae00e78b3536c3a24327691d4605
SHA1f53dc1904e856cd7406ce8bb1b434c69a0065dd5
SHA256dcb2d6a2a20eb059a0dae531a59f6d5dc5ede17c653304297f248a4626131407
SHA5122c2b4a14e0635130ed65d6e7737414d59b328ecdafe384b4873b2507b5df433217fbb58cf251e15516bdc6683c0d073ce9080829d6543a35ea5bf4d4b9152542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d52f334285d0cacaea0ef5ad21a6381a
SHA19fd3e7793749d17f1ab82909ae2b5970ef14a248
SHA25633b90178a14aab22536ed167ce2e1786dffeff9d13bef7f86cbb294bef6933d2
SHA512eae2f808260e73ff22e7733ce52da94d5f75ffb46876bddd5aac0d8e47f5b081154f8794bdda693583b90a9ae6a74e3ac03d1e757f1fec37dec5cf2f2d47faff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ae18cb2cd15c876d974b32a0fbaef3
SHA14ffbe6283daea1aa40da3f4e1bf8f863106344f2
SHA256afa83b4cc0eb9e92812d45621f6d9769cbac64547670224315b30d8239f413fc
SHA512a16f006c1a1bc9f3a3f649f1a1077810524a87b6a7489b7e1f857cc2c79b2e34732354525547ad0dd6f43e96bb44943b090f2724f3f240c38f9dd2a5ef7e624d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def3d1f86bbe01d15aedb7de2c301e4a
SHA1b0b025c19adf7cb54e915295ef6ad023d981bbb6
SHA256d3e5ae5850fde72c15f8692d4acd91c3db030ed7becfdca94aa329706d7c15d6
SHA512a5d4e15a56c324897366d791c53d128e718decb0fdffa5ffb3aa9e7a56ae7dfbeff75cabd0ef6081d84b6fa7994a0ee7c1ce6aa6e62674ba1688fdf34afc09ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1babc8248d280f93714ffd171c607e
SHA14954094b65b608ecd733e70de6c98ca05de23174
SHA256016c94424adc7997723654f0c731d386403432cd7fb2a91b77dc8a5bf5ceafce
SHA5129d80f50b99335c3e7a33198f7a6c51ffb512469cfa432cb595c958f45f582fd2fb27dbdc0765cfa6ce3f78c81ca6282337e5f8fe45fed25e01a0445f6eb829de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b973a426cc1b8d00b088d24919a60125
SHA129fa44f1c3b9c842756ddcc423ebbf68cd1bea95
SHA2566eded40699a7d56165a9b958170f7520dccdbf59820cdc8fc23e0a521b3880c0
SHA5120fef6a0765eac6825ff6d6b811d1be01efe553b3b0ac596a7bf21c50f0a07c8357fdd9c7036223d761ff68abb4e895829faaae82b43b2d492866cab3db3e59ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51600da4e973a63b36ecb5a76065356e7
SHA133c6d0f1591ab8927b6b7aabd061dd36a9009f44
SHA256f88357875b0e964efa14117a840623b915bc64856512f121c1dae20d62622037
SHA51229a13839fce67889c5e0cf5689f605699f45030c4abaa8760257aed1db0e259e645ee0accd2fd8e2abc533cdda5d90e14f041c0875e41b66bff83716298d6081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22c78aa2ec9f8aa5896de35ee18b520
SHA1ff0f593327bdef7aa4d1f15ce6d24e5d6b5971d8
SHA25663902df3c90353e53ec0b6f318129891ef81265a0d976bcbbc9cb383d620c794
SHA51228b807e40f16cd13e95dd1d391412cdc99ddce4e738e703969058d984a2ef57dfa585b99f731af57dfc936016c11242a493c3aa93cfc687af4fa3f8795c3f900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d5cbf7e9740587dfe90d2c0314868a
SHA1d0f893a2ffa8eaf8b2d4332eaca40f7aec9fb4c2
SHA2560b90e4e38de498d7e9ab6f605b6e1216cdb94845ee6afc6879ff0f10ed6ccf6c
SHA512ca65c1e0b88ea8f63f7c53133507167cee16612c6d7e560ece5d5c68cf6749ddd791196c3800c3c7b8022f4e6dc002d642d75fa8497a340f969fb342f1f9436d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75220d244799acfa93e82ca06c53784
SHA172fc3a2ef8f7a97b2f5786a2f9bae5c4a62def03
SHA2566ea7a52836e25b060e23d4952e5a40fe3db6fb6f5cdffb56d28ef205c040da19
SHA5121ec7a154b706d82e4ca72da2b139844a9ae8f75624c8e6df9c3c7d22e18001990f0d679a6611e21000c24d05e93cbb645ee594896ee0328437a31ccc3e5131be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c30c6389aaa675f4be3c66b1f137828
SHA1fce50a95f16d98bdbbedb01f6e4e0c42da095a2c
SHA256e4eb7dab0dbd1fb2a2701e93d8dc3e22081bcfc4cf3081f93c66747e9d05e264
SHA5128fd74de2c9ae7217a5e451e60955537cc620571e759633af86b641fe9766db220a7fcbadee9d1c855863e888121669bc13aca88bfe1c2ea16e85dc359ce8197e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528766b1fbc7de9bef32813f6a5f33d02
SHA17de24698ae216092614e8603c53ea4264bf7ec48
SHA25652943a98a52709caf79b064ff2e53265a4332f405e2f61d91a448e2303447e67
SHA512a6632197cc2f535de6caa75140f36f5126b93c3f3a8c44ae0d503a4fedfe869357ddbf4dbbb4fc92fcbf18e68f5f73ff2b3820d829043a8dd3cb65644d5f0df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c26faa8613ed0ca38b3a3553a19e7ac3
SHA157c63db003b8cfddef7c0db80c91297101abf0ae
SHA256e0f77bd5eacaa00ec766ee2b2e04f48e63ed516f65b33779a5f1b4662b68613a
SHA512c8ed869d3fa40353a2834a30671121be707a985c2e28b9220db019b128054737471e63791902be970ab378d5403dc15863c091e71dd91422503b29f276f8ecfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ff64b24526c6b525dbb6997af3ba6a
SHA147094a977182333208e08d21c09a3dba6283387b
SHA2567d4357f6446085c9ba1c03f2feca47e2a0b1e1181ae8c85d0d6033610813257a
SHA512498a14730d571b6888887670ad654d63d32038e355283661b1c95561d894ae68b1066036bd3ec775a46cf7d079e45683ac41da67da7356bee3ca6ea5777f242e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b66828951d6e9fc673f8d1298dd55d3c
SHA18b3da50665a5968d3b26f5aad2d59da6877ea16c
SHA256bf58b52ac8a7c94cc5e07b895cee7741703181d53e1d10fedfad0fc9a1625ab1
SHA512b2b73492bafae6b50f8aafce37d1798edf458f876e81641eecf2223767c4414956044779cfa1a1555a196e05ec3adea5238f6a59713f84aa5dcfa950c26cd04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07db05b8e138184b917477d2e70b8b3
SHA1ad0e51981658f2152cbebca2c2168e0777fe268c
SHA2563e0d5d8c0678b6f80ddc22b028f3c070e18f5b07c47d50663b6d6e8f77e28db5
SHA5125f8e4d719ca656edc696ab791203633aba5f5e63ef037949c827cdc1417230580039bda7516e86c2fa1c58113f9e9808b584cad90b8fb97115f26c123f850b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec59da0e6de2d54ec604c4fd43dbfd96
SHA118ef7ed13dd573d28a0e626978bd8274315191d7
SHA256348dfcafdc5df49f0c6826087d53674b7ab46e36d01d1f9f30277869eb6346d1
SHA5129073d34d1a8be6e97db13bfaa1d067fa56e8178745edbc3d14171f068c2f71d23802766d894103d02770ff41f2de53b8429367b1c0c155eba0d53cacb3eaa055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f6cc24e489587b50a9e34a3f7918e4
SHA17320e778fc6e11f5d71365ded6f50aa92ae17074
SHA256d39e58356ffed3efbfd0a196b0ff8aa065f35cbd58d4fd063b5b2f0bf6b50c90
SHA512a42c3ac99d35420c8902cfe7028fdfa3ae2bc3ac11bc45ac65514921e1a99bc4eb0a882af295ef40a79355a8c125dc4895a06a8cb0411a3eb85467ae85c6a7a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2bd04b6e9d58f83097445bbf4654863
SHA12bc5d0922c03dd3944c156da824e668cdbcbe513
SHA2567f16063deda9d282e62c0d27da16f0109b5318d5591af5a64eb45de6ab7dbead
SHA512c44a323190091815483a2ce505ed935ebef92ebbe52ca216de2c95dccd3bbe3caf5233ec18e97528c74a31906513038372e5e0f5574b01d4eb0d5930cb51d81b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b