Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
d98ca48b330426dc3477d415c703d943_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d98ca48b330426dc3477d415c703d943_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
d98ca48b330426dc3477d415c703d943_JaffaCakes118.html
-
Size
88KB
-
MD5
d98ca48b330426dc3477d415c703d943
-
SHA1
44ccff32833532e65c3d8302b64f8a7b792b019b
-
SHA256
29e3564a6b31deab4c2d84ab2f2df1b0ab16b9a9ac9aa81bb22f464c3e04c463
-
SHA512
72fc35f812640d22910e5caf823e5d264bf83ae8640cef13a8c9bb239240327b61bba09520ba8db502b29cab1e413e48a3392e248edfac3acc9ca905d7b2c3a5
-
SSDEEP
1536:nkcFK7YtB225YSR3ieiZQGhofLKPijCVHvFQn7KLDbol:nW7Ll83niTW9jCmKzol
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432188069" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000096ae46bde37549d3df9af62eb9ea02a980608b829e8652a87bf205100d19a7fb000000000e8000000002000020000000e5a08bf25d4cf77e924e3179f7531af40fcddeef42ffa87886eb06ce406db005200000000a8e7f1726ade89d7b0eabdadd005cbeeb857fca27086c89001a9e49c816edef40000000830282e60b161032a160a53997dc26059fc982f208c64654774054ab70480c0470230b91a51edc886110238cb5bdc1d3fbc8d4eb4438157178aff1cd5f5e3064 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD05BFB1-6FEF-11EF-9319-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02f22c7fc03db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 468 iexplore.exe 468 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 2708 468 iexplore.exe 30 PID 468 wrote to memory of 2708 468 iexplore.exe 30 PID 468 wrote to memory of 2708 468 iexplore.exe 30 PID 468 wrote to memory of 2708 468 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d98ca48b330426dc3477d415c703d943_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3af6a5dc1bc140f3587b1ee2918839
SHA16b83b1527062842924059bd9e366e52e572334f5
SHA25672c20f43809a23e343c911dcc58d4a4bc6180dbf39af54071c4d5a34143a22ab
SHA51251f9e703b226a4a50a6a12f5fc7a8fdaa0bbf162aa8faae6c4f2c1711263622d8c96ec04d9d2da2e19a645d8815bf32f6b72a3c1b527a78a2c1fb44432695675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6b40c3e9cd023dfd1f9e2a9c47b777
SHA15c346c512b1f6bafc47c24bf9a8633c661d69c87
SHA25653824b5870406aa06b4af5baca33672b397de4d58fdd86a7d953a6bc997a0875
SHA512000f330e66d8326ccdc90202e09d7991e880e258684d7cc6547c66e8e350ca48e38dbc511c4f0435ede69a4619cd94dee25b0432414d22e7d692533627630309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0dbb3c712159bbb1098f64d6cb0e7e
SHA18b8a27f9c80ef3facaf9d83b89b5972c27384dae
SHA2567b424ac41855b893c80a199b849f5af42565eabcc613624adcd9e2378f187bcd
SHA512593c88ca9982d7b25e4e5db97e1c2d9190c0a715fac4cb6b9a70f716b32a783fa3ccd23273dd9decc51025d72af4dbaf7ff719e5fccff87ebae6058393d6040d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52759965513d437434d138a117f383af9
SHA1c38f9f203b45a228f04e562a582d9a92c7ab0bde
SHA256da18bd006845077ca353e3495809ecbed1fb31b92000d62d82b3ea357277b8c9
SHA5128fe183fbd161b0f2be1118030ee7e19d164370c46525de02efd44ee841afd390ac72ef6178a23cbda2c5fff9417d58704ed000e68628263d88eb3570569a5b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9f2cd9ba39c2006c1cbb7361c05f68
SHA1c926826a9842843c093cb41aeefa1b589bee04a7
SHA2561cd1804de742bf29981a46a258a6e84e72628b72f0e0dcbd3e1ca19825b2987f
SHA512c0e11bf8a298a45db70eb4d47646b2e33aba4e3cf61470d3183f8ae6cc908a7effc7f31d39d567c7313afa40a593439fbcb061332490f129f9efba9a3800042d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc62f631ec9efa3382c6a72c829a44e0
SHA1dfd0a07abe6f90619089d6626c65e984c1a5d97e
SHA25629d79cc4cf6f69b2cc76157b6b539633562cf0787051a2be9e8b82edbf573803
SHA512436664965d6ca33c3dd3ec78295301d2ab04e3b8b6fa57e7dea1926a9a726d33e603a9a2c0f945f249b7426713d06cb0d51c59cb02793f5c15adbfc83028cef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54065345fda6bacc275d97626bc78aa7b
SHA17121c442f4ccd9b637e21647f82e46a8a3cf9761
SHA25628959b4e159e8a3e8c4037afb39309db18bc7f8c5718de8f2b893408f06e25e7
SHA512c1781397b46d35c636d36bf2fe43a3ccf0e066a4195dace1df7a6ceef82d5647dd9b95781d5b4b8c10993e9377f6558cdceffc6bfc95e70e3c3c787e4abf32e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53819085f9926443cfb1b7c214e3aef7d
SHA1e0a146a64157861facc0b89b34e2ad00adbac37c
SHA2564a220c6f64cedf3983777c668353baa7cd80bba4dfce27facbf4b05d7db98dd6
SHA5124f1aa574ffc755a480bc5c5e3e68cb0d26622a031cddc40a7d2f03c583570dc0f9d41ec3735f36f4d508fdb4a48f652cb3c4fe059ca8e6ae49a5ac62ed63e9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53768ef45aaa043d5578e8680b10c85bc
SHA14064e7fb04dee29f752ce9bcea49fb9b49f7708d
SHA256fc111b9106574acb922e7f55a842eafda704b621e78d307a7fbc90cde5df541c
SHA512c964ac963ae87f501281916707c26dbb5dd5ceea71067b04a22e937c6b24a58596df63eafa38846554522474703a480853f97412ee73fb9aadfcb03494ee3b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a123e1184f73489f882e0148dd22009
SHA1e28c7810d6184fb95937031692bcdc830dddf893
SHA2564636130bea864e0c2510b1077b4c90b9c372c938cda4e36a65b70de49d30c0ec
SHA5129f0a1ba76bbc4a729f70de2227dc67cdc247db7dd25370e7ab83e6d0c03ea1914182956573336c5cecde7a2ae5a673a5b72c1a8464ee053461ac8e18f39bf0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0dd798fcdb2537105b96ef415306bb
SHA1456b51f2d8fb457e4121ab74d9ffbe7f8e0c2f8c
SHA2567380739fd9daa8b943ea144353e3a23cf87dcbaa52318788a8525ce723fdb20b
SHA512354f932af02529866f3afeaf19007e2ace4bc16002bcb7ba847a17e196a4ed9850e2a9cd8f5321b41a7836bfcb7043aee64f199d91b074fceadc39024c49b997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4e0bdd47367607ede98a9a58389ebc
SHA1b3349c3fe09dcc672e11fbb795c4b68cee05241b
SHA2567a283bd06c3a3fef14e63a1ae6ddf0476f4dfad1fb6a21ac9ac51fb0db758eb8
SHA51245ccfc7a5c71d559e9e3b02973457233aaed4e6ccd9a5c1d68916084306de7b12643a6ad285f431b2e11f558f6e5344d6a5758923d115ebae3e28194607eb388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f5cc0fcb545c950812a41bf35ae819
SHA1b32559e6fe3ffce274f9f6ec12484705394f1339
SHA256df5f95e760e651b656bbf9dfd8a2704c0dfd37e82e70358515daec02ee150d16
SHA5121ae1e93e073753f4c2cb9367a7646aeae2125bf11255c97bfbf79772ac786d5943934a40ccb166df20b8c172f98030aac95ccc3957ad04325355165fe6698942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52995df00540e8e5b08d9b3c2c3d28243
SHA1e9eef9e3ca5140f7729c0f6d2f1793d50130f34c
SHA256c82d646c3f2b303c9bc789c5d3f269496fbd49587e6256db865e7176e3a45b27
SHA512e46a255f05c8f76acc5341e10e9fd52ae4fa68a701d5d13457b7743fa90ed935d4349bd03e0dd47f6799791eae7adaf64e792cb3066e8857d25a8298d4ca79cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508cb02c0d06154227e789c43bfee0bb
SHA13221cd26dd526eb291861825c2258c7f4c41ca2c
SHA256a2721af23264a8656debea264c463c515612c7b58f58d4ffe9a52ae640c4e38f
SHA512b63f860c666de70d67095434836221407db35a525f3dfe4ec0ee954c92d12e325e82423c0fd33adad53c7924fdb657546e78b8c778e90ccd9df3127288acc661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15def2a9570766699e45aa5e9473152
SHA1eb8a510b07f969606bb6a5e0c04aa20b710d6f37
SHA256490cf671351bc7e8a13336d6076f1130edc5fdf488af4b661073cf9dd359cf44
SHA512895ee53ee7223825a830a904f13f426daa9ab48043a7cf81ed5fef10155af22384ad80396f4c1c76163b6669838dfed4027372ef0a73bf092a51cbe71b898a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573cf2986daee9e83e906f0897f97c8bf
SHA12f72fd2a90cdc10b7b359779ed289e04c8792592
SHA25612c54e21e3e129a7ae7477852fe762ab4dd476c1e5f926a07c4cef0cba61208d
SHA5123c14c58dedcbd8a6f87b48327b91e491596e5007c66e716072bb3ec97fc1e853ff43cab5b769bd6f11ec343bdf5230b89c672facb1b198af5a0f141b2265d9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57bcb993795ae1f486fa056faffac9d
SHA1e5b17e9b27098fdf9dd8ce016c68f2587c5bcf11
SHA2560cbfeceb7badc95df855f4e8b8e6dac23b79189831a539bc402d3a039bea83f8
SHA5123bb4e6525a4ad27f4598925eda7fbf7f721a32147b0eaec2d20ff8efbbc1c6ef2bb92fece078822fd9023785fdb930605b75ae25eca9f62318508c8a452bc67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4abadef896d66e3d5101ab0d5e0c5d
SHA10ead18788a9869f0ac53544482d8f1329bc79143
SHA256d4387e9c71b2d7ffc3187ec5bbeaddb97b85865d265f5f52d76326d7565b0f84
SHA512d8d492fdbf139f124b9148b6f30015efaae8dbf58154634f14e6ee25e030e042f3c8e5a316de236f3f0ee1193399abee56d41662ef038e76d39473b1fbd49f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9612090a282d10a92eb7f527f050f6
SHA1fff6e7ca2ef0aa153e3d3ba5c7b6ce68f8f63f06
SHA2561b56b80e0fc6949a55a50a6671b8c2bcdd4ecf3d92d7a01524f0d835684341df
SHA5121e1dec42c9b32847f90201bb41c2487b24cb3dbe285a80b03c7d0fc52021aebcb768642bf0d30c84b6e267881bf1190917c61a5fdd3bce63ed7720b30e7114ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b