Analysis
-
max time kernel
137s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
d99eddbf63d3064e75a82160c7fe1183_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d99eddbf63d3064e75a82160c7fe1183_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d99eddbf63d3064e75a82160c7fe1183_JaffaCakes118.html
-
Size
197KB
-
MD5
d99eddbf63d3064e75a82160c7fe1183
-
SHA1
56bef9548544faec462a5022db3ea0348f7ca0d0
-
SHA256
040ca93961201e6bc78af21b1b5533af7c4a142f99498bf051d913a66f1764e6
-
SHA512
9fe0bab03f75af76290ae811ae4c2863af7c357a9395e857ffbb2843786908d8c732239aa4bc85f905c1624bb3949797283c31414c352cfe1a69faa675bf3386
-
SSDEEP
3072:M9WyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:M9TsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432191199" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60128a5a0404db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{467A9A61-6FF7-11EF-A1D0-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000606b648e576f45a1dbb4bbc8922fbef37c1c9fdc1becb8766d2abf22b6b0d8cb000000000e8000000002000020000000696e0fc7dc1804e7915488c7eea613d5592ef8e2cd996c96b9a2f7f79656c8f1200000005c68a1edfb6e52f18db4d367aec4249693c4e483dc32e70ce4f9ee8f5d62ba3d4000000089c2527b91d85f42ba395cb88342665e7748075633109f976c63fc3368e70a9ff06b69a2f1abb4984324cdf2090895a36d26457bf8acbe500e12bce7d707ff8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2616 2640 iexplore.exe 30 PID 2640 wrote to memory of 2616 2640 iexplore.exe 30 PID 2640 wrote to memory of 2616 2640 iexplore.exe 30 PID 2640 wrote to memory of 2616 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d99eddbf63d3064e75a82160c7fe1183_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50282521d990fd2948c452be33d0141ff
SHA12defd02db70d74d96ec0b2b4f9f7fd755e497f74
SHA256a590da8e5852ce8855444419730fe6319ebd0915161e9f1a607bf2206dce2950
SHA5128c75eb6e3540e89d410698d6b9e71d1e58d5605602ddf160e20cc82cc5c5cc305150e7ccd822107a477fcf4d71e960e7f9d7fcfcfab150e2a25ab88e0e1802cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0809878c5ae7fba64263d73448c06c8
SHA1ed282f92999199df66e4903ea23f4ce75b5fd889
SHA256cc27c0398699b197dca4d13aa1c836e18ef501bf91eae8b7445c2a2f65711410
SHA51244330b2fd8ecf6a35c0f77ca00550a5fc5b9928b384adca7bdf5c61e6dfe2a920eafa8e952e20669e80ab32d826a8b1d5ed9a72074c1d73c72854efc7b310e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d6bd1c0adde4c0f70b22877ec5b656
SHA1f057d314824d8acbda52ac0d3a64232ae02709f6
SHA256f7af466e5fc0e2721d1ec6a46fe71f57bff40ba5ee44912b8fd8806bf41fa5ff
SHA5123f393669dd75a547a002a67ef79bf013536c916ddb4d8e6556de0e837e7fa93056fe6237a6fea871e98974bc00110adf2be5174d511bebb0e5500dcba1780578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e173bb43fde974fdc0dd00f48040c49
SHA19e908e7b079c34be92344ba322d37d8a26561d3d
SHA256055734b184d6f70a838125c6fae2d9ee4add9273f7b56abd6f8cd56e0ed09c22
SHA5122206c9f99f05580322d345f8b6090cc6cb12d310125a1be37f19114f0970e743c43bc7eb77b2d7a4b49730244a6e2729942c3d69d79804395c378ca97e9040e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57521d5f72b2005813007f2bf7c298ae4
SHA1d59d1b57d6b7cb99a44c684de5c34d6d006ceeb0
SHA256415037d20c9ea485b084e09f5230d819eb8df94f0cb3cda149cb6add4fdb2d37
SHA512047139e15b3f71cc84147294a3b238928515aed7800f75004d2ca0444a7d689908995082f565d707b551f44c6d728c49fe833a35a4cd497aebbb2592ec656d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc9850103e457162305fa6dfb0c4920
SHA1176f5159bbc9c9668a6620197e0da529841678e5
SHA256b58ca6965e8ebc3894a54b49b297bcd0f79984d37312a8146076df20fe9ded27
SHA51227fb8b5e5b2bd164b115fd4dd378f0ee3abb22cae69a26533403defb7d5f66b78da436826358f8b2d81e58a499e773f2b153f8e9af285ed02f466b986fd2cf30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5aa5ca706ce7147af4a9f5f1c8917c3
SHA18888392e89398fc3d0ed55bf53d6279cd3961064
SHA256be23ace054989ba775ade608dbf5a94e0784c55775f8bb5b33e7c4fa59438095
SHA51259752e44c8da5a3ed1a8004a508572c842cb0a8e4491e0afcb8eb1dcef030bc76d3d50d7e1e09624887d2e4f12578636928dc9b01d07c569007e026b35c0459d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20c3773c0840119f069ea239b36944e
SHA1eb3ed3a025cd3e73917336065f32c8e0b2e70601
SHA25648228c5551eb70f237a4686cd2737b2d41a78aa63995f192744cecfb0da3abc6
SHA512ac5c9d5d11e3335e2853c33bc085af16b143a97b249b23877207b6da105b602a72bf24902fb2879ed8eb67e0e4717a332b728b9cf94118939692ec0e7a43094b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5a1fcc0a7c9462bd79ee67d331a1327
SHA1d88867e2a599dd3f2e4d2a7a51dc5bc2c9902e27
SHA256d2c368319739d4886e8e01b4521e968b0eeaf756d4656f259f8be28410634c4b
SHA512a36031a184f5883be4b755876d052968b1baca21caf24e9133a5d34d0e424c33b15bab684df66728bf585757050ff7f6a94b17842d01c91f4101541846fc6110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5762c726048c80022d6c81227b513da27
SHA1f6ed2aee81909b16f038605ba344779cd3dcc777
SHA256a4722c42bfd8cf0f32c6145608bdb41212637794e3ecda5dea0c8159e1abdd28
SHA512731eb3c53236ed04f69fef08e7355205b3be43bd54fa98f8fc460ac9007f1a08d5b72bdd740c8bdb5a86b966b76cd21ca7608309d59822f471100ad805e15757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578711737a2b31d264cb98d325fd2de33
SHA13cc975896f86b1e57adc420b4f962ce572980b46
SHA256e6053e21f129c0dfa119ebe6e3316f79d15dc66fbe296ed02d102eb8f81448b8
SHA5126ae27ef9431624474a591eeca07f5f9863deb5e9611a6f70339ec41d909361346b5e76f64c8d9f5c9a2a4453b0a4dd4b96f3384270b6e163c7fc8a2634581574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c7a434f964126001cc04c6597ff92c
SHA1bc03f677ab96c0ccb991ed9b5b374aa16c406c74
SHA256134f3f61667a8cc958d24258caaaa5ddb56c9385fee7330b3b8a678e284d4f70
SHA512e6edf52ad73a296d2f26de1d0936be1d885b04947daa403f2ce7ec980665ed129b0ea9f113f7a69a9d1ebd7be726359d031f61a2bc0b532beb27bf279c4f1ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9139967e26d043259722c428a4bafac
SHA10d2599e827bd28de09a0f36bba36dda5221d6807
SHA25629536c567b15cb78dd1a6d86bf9a24d81a2cf07c0d79ceb88104130090469cfd
SHA512f72c92b1670cf8ef8e8171b3ec24f4255249e6e632bf0ac4bfaed0765c4801878a6f20cb8a851bd17d4baabe22714ad71e175a0d04e08252f85986804b87990d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896657f02a128b9be20723198f4026d8
SHA15f6b0d9959c56d3b11a2eb33cf4df79e7eb519b5
SHA2561f1d1af0d28f9f901c5f6ecaf8d8923232e268759a5c7c55bb51404e71bead5d
SHA5122a1108d3e14c4e9c06bdbb5ad252c4a440cce31f7d9af3b19658a23677063a5905423a6419727d9196cb55c022d38048e973d9a161ff1edb311689347678fb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa7291b2451a0f5c1b982e6af61ac48f
SHA181572ecd07317cf2ef52418b7c9fd41d4471f197
SHA2562d63887cf9b89792fe1dfd69802b50d00be3db361f435f39811e132d34b3abb7
SHA5121bf52c28071e5c8161d044e23e1604214c7de519aca5ffa6a416b025fa9ab4c47802a9b197eee83a75ae0fbde348fc5866979fdbb3ab6eff4ee7d3c690279fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b498f518aa2a22f78f826f6c23e76b70
SHA1368ce34aa29cc2abab72265edc21bf3069e3e9b0
SHA256a1ee8987843553d9b6086fc1fed5ddce3f49a0793811649903de6906bbc31a17
SHA512dd1c29591013920aa28b6079c962970f45edd63bc4d3e5abcc58e2760ef5ad36c95fba69ee5bcfdd26d212de2e09131d4d17c9065211e930ae8d4658c61cc1b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d320b3bb932abde73159a75c333e0a0
SHA146969c3a56f53a63cd839d6f8fa0342da9cb8e3d
SHA256f0103c102c6f20daa2abcb2ea6f1028b851e400e89beae2a9e615a75e786a449
SHA512705829ca0328db15583c5b52bbe06ce75e0a5b956cb1e1d1bcd7df9ec54b7d4ca957c31f530421744ad7ea73f4ff4a9f7bc7dff800765bdf2ad8491532f0e776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3912846a84c5189968a817e92f1da5
SHA1f5e3d2216c22027f74e05bc776b48e2861eafe4c
SHA25633b1eb878dc6bea4a7b02a7b916ed24f9acf028cef101a510d1c13a1c4d6d339
SHA51293a16f9894e4af41ba6110f4bceb0f9b6db387214b6a8d9fce84ffdf6b33f30ac51a5a600522849282cf14a559ab439ad3d0d46fca7c65cc86368faadd52c9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad3708bad06b65c6872a2716e63b5f4c
SHA1d4e4ef48e38668f132c9e35431f7ff3aceb3d4db
SHA2569e9639c67b070321aa309df21fd99e37da838920d808e83aee56aad32a9d499e
SHA5120ba862becc0b9a2c1db2f0ac44415fea23ee88fb9d7debddca81f4dafc587b37175dcd82e72886c38d8dd7063dac2568bb929cd98d3714233a987b5dc0a08573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c2a1bb245c031286a03267ea565ecd
SHA1d4fa30ecb5efffaa5e4e6d4b0b0b9349d88e6f8e
SHA25699383ac47c1bb45bd8dc94533aee580841f3a3fa80ecfd09d9aa27aa3ad2e3ed
SHA5127d3a7f65879beefda87afeb97c65a21d050c2ad92e033baabc70c7f34088e5ee183cc18b4b377024ef80fe8fb4d9e8278018568a05382f2fc7c7dbfd57798950
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b