Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
d99fb7fd0e92e8f299ea1afd041e0caf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d99fb7fd0e92e8f299ea1afd041e0caf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d99fb7fd0e92e8f299ea1afd041e0caf_JaffaCakes118.html
-
Size
4KB
-
MD5
d99fb7fd0e92e8f299ea1afd041e0caf
-
SHA1
b985367717a1c13ceeb5f809748df1b3a0254a59
-
SHA256
8959e3c2103afbb490626e1f4253680deb7ea22141155c97b55bcc5204d4262c
-
SHA512
010d4aadc5665a82e1b2f0c953172094d8ed1f43c1efd6a0b9097086708be103a0221055020c69d46350578fd9279fdc105278138a814f31c4c25c42ec64d9f6
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8owVz4d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000005727617bd98bcbbe7df51e9ffd3e934a6d4f550c67c5574979c72218e60ede85000000000e800000000200002000000018204bd21bbfd6f209c80b1826cc7e432cf83879baab9a278142444e461d1929200000000176865b1c0d5c0a57522bb237b5a6ee2788f92c853862eb15ac3d16d5fb7283400000002d3b2dc222acaab0320a139479ef2c8da323843eb03d299ddbd34781eb5953ac7632254e6ac80d2114a3132da7a04ea71db36b40636f42303dd77e27bd01672a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f043806b0404db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{970C1761-6FF7-11EF-B692-6A8D92A4B8D0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432191333" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 532 2396 iexplore.exe 30 PID 2396 wrote to memory of 532 2396 iexplore.exe 30 PID 2396 wrote to memory of 532 2396 iexplore.exe 30 PID 2396 wrote to memory of 532 2396 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d99fb7fd0e92e8f299ea1afd041e0caf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543268c21de195434639afa6fa51d917
SHA110f2b470eee19d8ab4be922816feb5b3a0b1f4a4
SHA256b82aece7199b47067a3244066e181045ed634e9829dfcb17b4ceac6361e6757f
SHA512c92725a03003aedcb73f147c3cfc3600943b5dc4cd382ebd294b5473aa3308253166e77d78319082bdf5e6d79f8be0c7d2acb7e0e62069cbe0c02c3c50a4a1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7237b8c54d16af4c6127cad4845094
SHA1dbba7496ba5f674552a6692464361900a7f06073
SHA256f300cde873fb92d8e7d31ce9440870d8724e2c0d5a0c14a70ae7b7549d50f450
SHA512996c2ae6268ac825627e6d9984a479d0da3b05c685b0ffad8600ae6a17180fab860f6b98a9285f323a18399ee5246912dabe387eb7f7f9ad0218aea17b3f31ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ee2d1bad80f593ce3192e58594a8a1
SHA15117a661299e71ab7fc95a99c5558fcc270c2a60
SHA256e67d70a48a67339c403adb290936f089073c58cb6fc59e0515daec18d6fb11ab
SHA512352fbfd7c79814e8638b05aeefc833bf68245b3a0b137a74606e80dc5f07d1b220f43189134aa2348dd45228eaa7c67c6672b94892b826d4538616215ea94ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e140f6586145ee119965be3a2cd5ed
SHA10342eac616140fa1ac3effbef2f209f4d61c8eeb
SHA256f8de269cbb205f4d263fe74b03ec86e1fdf691fa7fc9c0fffefa3a85c5bf5947
SHA51227e1ecc94664642c34fe67f20d0e0f351a041ff91c02a2b3eb2d08324ecd4247b2aa380db1197286ca5b383bcd236d72abb2721038dd9c19a7d4aab7f7106977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2bd4be77f4500353a85fa3eaa863ca
SHA192765c3a76a1a55872ced659ccb08f5e89e55da6
SHA2568d09d5abf32fe6723968f4cd93e9c6b6d4b23a54864e1ee6669f58828a17608a
SHA512815f4658eb8b3ff06c72af4cbb69b1488d29289102ace7fd83c2f2e21abdae3e53e3c3ec20e0db72d5ef9679ec2b86ca3c7da103f802d22e50760a5eef374173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323b99ac30cabf94eab584930091a57b
SHA15d65f296ae707fe22a6e5583bc1b1865b39ffb5d
SHA256e1947ca7103071422fc68f03cbd4c681bf27a167083758d50c0f39f62406d019
SHA5125382f87c4aa2ed0b774665b2124fd5bf583723060a60e45549f752480597c0e88e6db7a8ce6c7adf6f6cb472fd28a97ed6e8ad30634497b678fd7805b5a26b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e1d48e4043c1077ad8f4b13bc0982e
SHA130e6a28e0c2d341e09f837be0d128d8279a5599c
SHA256ec9a04d01cabb10b7cec71487bd80bf6dffcfd2fde76317e44fab25d09353ea5
SHA5128845da7e88b2692101bf566ad1db8dbcaf63491f5016411fa069cb7dc246f27ede482352bd0b2fa8f2a6f6b100fb60431de5fb2eb34a5b8810531b4918b9dacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e019ee6dca5430a76cca69c1c37b6a6
SHA11a219effd0b499f52b76ddcd2054e57c7a608abf
SHA256aca6fa3afeb5e823f43f4fc15d399d8c33792333a39dd945bd63397fc5398761
SHA5123014cf98a357496d85e326c2b8377371bb987f61ccd69ca334f0d28555f4d6409aac3e01202c40d02a806635262e4244ffb531ddef455e9aa6e98883392f9fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538db4c87dc87d310653f8dc040fafa01
SHA1d1f71a69cbc3fccf3ac898cdd473d97d1a1662b6
SHA25630e0eaa2926b4eba2592dbad30620faa7007b6998fb66aeee7219bc2d6447cc3
SHA51232c2ff5aec1b3b049d9a4b5f9ee5bf0b843eab78433dd5754d3fab496d3708d50dbd94d1ec0081724ed1e3011ae7e9621707e4e428b53da9ab4a4c523c3cfc00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ebfee2e4e5c9a32940b612a256323b
SHA1fd99671a838c13c1c854db9cd1e6d58caffb840c
SHA256572d9c59fd89bd0140c111c233faf395384b461c13a9c9ece1baf1c5ecf05490
SHA5126e4371b184400760af1524485008a2cd31002545861be5555649c4e87f15eb9d80a10b2b7710636fe13a853984c2c99d1cd8c10f8a66f1f8cca654a9a2697d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbbeb78ba17275a52c214d34606af7e
SHA10e51e18b0951bb796c75f31fbdcf002cc5086a87
SHA25694adfa5b4858dcf5715f79fe409e0290ae6df4d32451b8d2a01a0e3ef9d9f47c
SHA5122d80a64082ff778f1112a9963926686d67e364488dcc62810604d3ab5770fe6e01028a12cf10ed0433329475e650027b522d5b6ded8899354869a7835817c3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56ab83e8b1e52fc1315d079637f00fe
SHA1540701306f9a8c06887d7041955c24698082e600
SHA256348b141ce3584efe34aa01466b1ddba8510b6b8475cc6647227376a9b8ef2bd3
SHA5129aa3dfb718b027d2d7b1f052c4bbc54ca78a8bd2ddf5daaacaacb42549c972fcd0757c117505bc26c410e55dd83118bc04756433e28178e1fc1f33a6cdead94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276af3f10808f989cef008a4327ad21c
SHA15ce0f867e98c224c73644da89dc4d332e3abf14d
SHA2565882c1d34d29d06f6cf023651d61d75dac264a4253ca5abb53c4888969c86cd5
SHA512394eb38cb68724190ce9d4bd1cf6a3319fa8c695f83891557a2cbe96036f673f3419355d8789280f337399dc44f517028d5531f6c34a40504d325ea25d4ee443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c9a228334ddce1b9675d12b0ee2a90
SHA18c30c08675b3aa766875d91331a1b24d511f96c0
SHA25670ab9e6bde4a8b821a54d75a735ec2e7dbf0d27bb94e4e1bd499a583a4b8d62b
SHA51231bdb33f087d02030321a1dfadca0023536fec1dd2c08795251c71fdd6d809170f7826afdf9bf86db458e57b4faecaf13b0ad812e26e9de38a64ab0ad8d93181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f10a4e335146398ac8325c566b59a67
SHA1437fe665cad019810a2af2172ad11fb57b9ea603
SHA25607cb6dfe5737133719d41f02e96bcd206eb2d5583ae08685cccf020bfb7a622d
SHA512318576471bedb4a62ccd2fcf945bd278ea0e1671df3912eb3854c6650130faebf8375ac41f9468ffeaa2bb9b3684aaaa6cafd3740984ba69023a0e230abb3710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f239807a12ac9c491fd0ad207f64cf8
SHA109440499d2d0bdc4fefce992d9dce1f560fb50ff
SHA256fca0a108b90934670712ac456e522f6678c9875a152f6c4407d192f533bd5999
SHA512efafc164247cdd808122717f5e38ef5007db5ef810437e5466dca0066a633042b0f8de75944a35cd12f01d39e891045b28da3607b23858e44a3e455cc78b1c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea2b5ea4ddd809ffa6bc34d713cde4a
SHA1312306863511c1de272d22b79419bf5081b4c835
SHA2562f06cc6dd7b402164dbdadf7ff2e8907f196ab0685ce77c6007ae4d035878dda
SHA512037a632199eef18588886841941b6ec014974fc0ed18f41f48b5cce48c87dd890b0204a54dd851c63ca54e784317bb3598f2d0090f7ff0a92a8bf5cdd01c3bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162e3f7671a1b8c7b95babe131ad6bf4
SHA1db3ea3cff0bc3bb257ab5357e217c514736e154d
SHA256a0881f80ceccfe486ee98912757de8d2ba2b9eb813467a1733efc16d2763e5cc
SHA5126e92d15f9ffb196bc5ef369f4790f6b6273395b4f154600ac8d0c8c9ba69787aba6b8176fdb4e0e096289bfcced63c5a7c1ecb589b79be14b7ddf8749a81e272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e38bf3d74560fc8d04e0ecd9f421f23
SHA170d4690dbd9f0553bf05155ba41af4b51f91af9b
SHA25678b8518fc12fdea67238e07796c012432b61d07c604cf311142c2e92b6523c45
SHA51231ed9dee8842e3a24fca03c7d1197256e9d316fd208c226031a38e47fa4c9177d52fd83cbfc0326d327c62efdbd3b772f1e83603e51486a0d75da9f666ef8054
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b