Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
d9870542a3b1a9329c9bf466dd4c5157_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9870542a3b1a9329c9bf466dd4c5157_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9870542a3b1a9329c9bf466dd4c5157_JaffaCakes118.html
-
Size
6KB
-
MD5
d9870542a3b1a9329c9bf466dd4c5157
-
SHA1
ff9d0e7ea11d08b8aadfff574779d0ccb93cb5dc
-
SHA256
52ab0edc02a7cb0c82fb5d24c0f2138119416dc22f655505e77e7c69b22fd1de
-
SHA512
eac1832f3e352409882f54daf1e263ceb1cd888598ac4c639e407b7bd2140d0084c39f4a49df3017a22290191ad3306959a4e9e5c0a484495b7f344d5d28c448
-
SSDEEP
96:IfF/u9PQbN+6a2FYNUhhG2poQJe/tJ22Wlftc3HjIST/WemK:Is9PQbNPa2uNUh5hJALVWlF2jIST/W3K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432186870" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000de10b56d948df89b833af93693a32109ace57f501b20a9a586f5637393e65413000000000e80000000020000200000005fd102d881d2b4fc428fd10b265015466ec31707935464d14ed59113c4cdc70720000000673bbad43670b363019e2016a1e265ca269bcb484e6039d505c6037a228f4949400000007fbf8a92eaac8d6cb91e7b8031db45f61407c9cbae6fdccd665eb0289f932abefe4caae6a9cdbb3b81aae2790dc9baae1ee533b23ce72c3cbf4bc2c38c4152da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60085107fa03db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32D14AE1-6FED-11EF-A748-EEF6AC92610E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2140 2084 iexplore.exe 30 PID 2084 wrote to memory of 2140 2084 iexplore.exe 30 PID 2084 wrote to memory of 2140 2084 iexplore.exe 30 PID 2084 wrote to memory of 2140 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9870542a3b1a9329c9bf466dd4c5157_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1471f7cbd94f70fe68491c9b061c0c
SHA11987fc3a60c61c56b56275ce8194cec0fb397da7
SHA256db5fb19ee9cafa9d2a5639c41e7b7878f8f1b749ebf171068590d08c1880e9bd
SHA51291a22f57f0f3d7c8518824bd91149ae428925cd476d2c859d2666b73858db0c3968b720629b245fbf4da90aeceb6cc6524bef6b8bd2b7f34cc7d63b4a895b13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf66760b575af8b2765e38d1f6d477d
SHA1d293dc7572e63f48fc4fffd4cbe3236ad9946a21
SHA256e6bee46cd6631459bb1e8f4ea135a9b2d07a74822b4f4ab84c88dc6514ee29ba
SHA512fa1313385035a9f3d67712be909e969e0c5b237a2898541292399af85fe300a5234503a10c691a418f2c9b9bddaa69a89262a55cfeb501ab092b8e353e942390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115576c4bfaa60e2bf12bde9a481063c
SHA15bd78b130b58b72020ae20b099cfb2a460f763d6
SHA2562d6c4d041103d2cc12351011490d72705f9699a56ccd8e79ecbe9f33880dbd26
SHA512b1a0518b2eba684f68b0b497b8b7f367345fabc7d32f6fe6fea725e23c58cc046aa6f44308b66479d618108d6ffb6d8fc421c288b4b589f4a4b1ef54df959fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fcdfda9db10bda3ba9e1c5ece6796f6
SHA10e1ad325995dfbb338116c30864018e703195f01
SHA256353aabac1bde4ddb38b761d86303ea4fb0e58164305ff93546c96f217fe82199
SHA51279793f0e0057e8f383bb5870cf4a8521abbc9ad120518d0724e1bddd5260c0a9ecc9a4bc55f2034d45f09a242bfe25168533a40eae7da08e524291cbd577bb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69b6bd7a8f0b974026574b6ea47c132
SHA142dbd72f7e17e02756d6dd9cafa3837285b4737b
SHA256254df0d74ce93aa9bfe137aadc706cae03dd72d8647b8405c9df779c418448a2
SHA512a1ff03a98f7b21be241f1e23650a50b844a9d04619b39e6357e7d82c83950291617357a97bc680f2fc6f463aeebc5279636d21c5198d52a3d735fdde11353c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9715c18db92097ebf57cd0993adea4
SHA1ffa63ad8d52fa05b74274a9c11aacd1e4a153949
SHA256b03ef5d9670b12201b7278e4728e5eea3f52f0ffbe8bb911e83bfcbe7f0fb234
SHA512fbdc8932c06e2567b69e78ca4b495d854809e3de16435d2630519a1d3fa8229c3353e0a5d13d0b3ce3b59738fe23184dd6d90b2cbc56b6b9c8a41b5a738fbaeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ee47e40aa7b74003aca1eaab5ec4e1
SHA16f016f0cbc764e07503288a4b1b89a941ef57f75
SHA256e43b43a13afab82067023fef96b668ce5e61a2ab9303667754f5516df9615f13
SHA512ec2a6d400b4772997f318f1b442ef49e07fd1c763452aba65ffc6cf899a4e111b7a3c50f79184bcf2ce999548a1b381c1d443e241fe0953f627b03f07cb4348c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a707374db2e897f76912384a3ed5eb95
SHA1eb17804ae2e552ed414d1d6ddce6f0aa0b731b8d
SHA2566d4dfdff00f3c0df4a7f0a5c2062181f88f48b7d0a94485f30da04b4b9e940bc
SHA51282688dde4b42d73a172edfb2ad002c308a57b7d214eb6862ff7d54705104eb9b543f2b89f8c695b72711a1ad9bd7868ab5d8fbee8f5e5e45f8528494367e720b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b713f8ad9ec16897655b5e7a552a4730
SHA172fc3afffe790b1e14d8e5f3ff93780b5a1b9d4d
SHA256ca5cd722b4b6200c3e6e8c497b920fa932766986707eddac5a052688c1905e7d
SHA512728f35c34b4b090f0eec4b090b9f1c8610d57836657f7533243f4816f01ff2342265fb1d8cbc58de8d82b0e1d8d9343d0e07210f8173831e57902f50e12ca353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d295190172b7e0d9f0a41abc2aaaa4d
SHA18047ff10859794e96721a66b6f92033e98155f86
SHA25645f8e349f6f2a4f47b1208154b0e0b409afe1cacf34e22ae0458cb8e456d541d
SHA512b6647a75ff76fd69a6e84490a3170da14a568c70b7dc21145ffb97147675a9d70197dd8dfd52fa53b4240815b620798ea75dc073cd0902a846634dd5ebe42bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9b21d9606d3c6a578f57c24d5e8f960
SHA1f2bb11290ed38431c944e605d83ab4e9162b9959
SHA256a0e5ddf454f8e3aaf301a14a6e76c26178377857e1eaf5bc99b2421e7e517a1d
SHA5123dd5da5b0f48e2ce1b8d4a402b4ede30501462248f87f3987640dc372085851a07f67342c3099ea26f1c214aecc91fae89ec20dd71d3c5c2ebf8539cb254096c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6764c565f312549b38523daec6e72d9
SHA1ce92ee2e8f1eacbb55fb6916e985246315f979d9
SHA256826a8084f7a782ba935ec910c09f7576d27d289ce6eb76fdd80ad62daa3cc853
SHA5121257040faa601ad6c6de25cf79153af8e2afd075fe964fa76956b7743dccbba51f0aebff70c064d9ae1c05070522288441b3a7d61e0bbadf05a2763bb9f6cf91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582abd2676339f5a5e85083dc396a8b6f
SHA149406a1234edcc9f3bd60b2736a85448d25b976b
SHA256bcd1cef452d04c6c0913036b68053f602291bbe0d3d41c9b83d5f4d622556539
SHA5127b43b2962de292a52eebe2adc4133fc54b8dbf6396e812e6069a68d1bcdf8e572bba8233c89e34b3877804cef93d8a9c2f7e8ebcb7b0ac02b71aafdb19f416a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7bdd82fbd1042e57619e6fe726bc72
SHA126f491dc0dccd1085aa5200c2c0aae297f2e350c
SHA256852b5171ad5caf32314683687fde8069f567efb6d3f991e6dc5033987c787c6d
SHA51254aa88ad0428585e46510f3ed8988e417b986822b5af111d6794c5c338acc5594a6c5783be7b6c6ed28bf54717b5d3e72544bc311f5c80bf65326f4355369067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de080121cb2c854d1462712225041763
SHA14fd208e19b15a86402ffbef38ea6c6e54e6b6aff
SHA256863cc5861d668fe9e1e8ff03531130f973c96e71444ec30a3d53124673f9a044
SHA5129a89b060d3b20531fe5355155382de77a9dff38632a528a3ceb2a6bcd20d7720af2253a0fbf112b6e0859cda75c3290fce37f646c9a433c8256112763d797122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c6b473ebccbd9897b4ec3333b8239e
SHA144f5925418deae6eec664d91e48c34fb9e8457b1
SHA25647a0d050aedefd17cdfeea6c3d2e6799855ded13763143a24f9bc540b08a544c
SHA512de1d41e9f225b4ea7aef2869cf85e3bba0f99ff6b8c7f52001564d1735b295f1db867e4724ff194edd2b880842478d5b0e2f1fbd5dae3032c00f539c28bf263e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57617bca12600b3fdff53188d7b58b2c5
SHA119e09bfaec06e3d601ee09a53fad01bbedf9641e
SHA256c5fbb3eb9c8e72c9a2168146729a7b3b38cab095f33ab1b07467d3fb856de78d
SHA51275f6b97e8c9f39cef1cbe7f60b1d9593b0a87afbf64ec4f132663424e74a2549403e57dfba0680c96ca828006b2b890f34e473cc2c9fc1f7ab47b6b023a051be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106cc43d1ef7d899b4c32713a4165dc3
SHA1877435817b48198da7c899a7069401a31bfde119
SHA2566bb07dc43b8c75819da039c450e2f4799a3e107ad53f8ff60fad2fe91fc3ce01
SHA51265303db4856a7a32e475440148730b86e2c3bb5cd5d9152f11733c5ece8d150c4184436bb688f400835892877ec83d3ae090dcf62a1176618862475241124ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55366013e2a05b1ae24878472debf2c4a
SHA1fae737d819792b84692dcbf2dbb77f2693a07ff0
SHA256bd5b3fb60fe1fdebc0de53c86c14168c51858754d5af1e148589a28734ca8f8e
SHA512bc92d03b672061649af4f79cabb0f7e2fe742ce4b47f2540b0d75098562250cc86ac12fd1dd2ddc47d692d07f6537a78a6d3b9616960d7daf2da66ee28d90b6c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b