Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
d995dc1ffbb3f56efbec6790a1adcb16_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d995dc1ffbb3f56efbec6790a1adcb16_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d995dc1ffbb3f56efbec6790a1adcb16_JaffaCakes118.html
-
Size
7KB
-
MD5
d995dc1ffbb3f56efbec6790a1adcb16
-
SHA1
c2bae77de55e7fdc5202c11c56c5e45a611e66de
-
SHA256
4ec8de2cfae949ff89f629f7d67419f8f6a2d986cc24cfee8733483f2567d786
-
SHA512
84f5a0ed26fd2fb298262083d1cde990ed206dbc781efc5b23e420ce2136d345bc5bb5f9ba07bf2a531e5c1a2e44facfed99a8d2a2257f6ff397cc717611a12f
-
SSDEEP
192:O4Nwt5PmqumDFTJmZ/gmrdGn3P4hmUFJp:O4NyPnTi/rk/eVp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d925c0ab4180693507d34e7bf23af1892636497dcb4bac082d4c40c04e2448f2000000000e80000000020000200000006046014e56332d3f7a69e873df29dbf4aa5ab91746575fdb081d0e04bea3070620000000b8ded4f63e1b99557ba2909a759083eb24a300918488cce7df4fec6b98095c5d400000007f19b1dddc1ba4fdd56323b7df36ba28a056e743cd4a3ce5362f3a993ae3ae5df3029537b277a40f3f9a198d4ab68a375aeb0ba98a3c4c3e7195cddab10684c8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40af4bb10004db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432189686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1F46C61-6FF3-11EF-B56E-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1740 3052 iexplore.exe 30 PID 3052 wrote to memory of 1740 3052 iexplore.exe 30 PID 3052 wrote to memory of 1740 3052 iexplore.exe 30 PID 3052 wrote to memory of 1740 3052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d995dc1ffbb3f56efbec6790a1adcb16_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b452f4ed9bf34a80ebc9594551cb276a
SHA16c78cfec8cb7b5e75eb7530c0764c04e536c70be
SHA256ec99123ae64cc853988fefdde41d29e8623fc6923e940cd98452403b90fee106
SHA512395b64532d86b038384de9f5f09f048dc7f893064a87601c07bac99cb99c56c859051b174a3c7439a8545426b5dd14da22d1265070d937ae7f558e56b80ce4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54668a1d16563c02e329940a77099f52c
SHA14aa27eb6260b2837f3586311f8e7279b05ce0379
SHA256222f42c1916936f63e6674edc0438a603c754634d7f8bd7e9ee29530a7bf6d5a
SHA5123ae95b4a0020c41600bea8386b508b806e6d94fe34ec016306f0633975f4368ef54a55dc231501ec02ee5a17aefc4affc6cb7537d708b3d41905573d36dd0341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a028d5a26ad0bebb20a213da127131
SHA10a869d3136beee11ef28ed0c010de8c6f94223b8
SHA2563a9a5a22ee9fea8153d61b047d955ba509bc2e87f1dc963a80e824c9da74a892
SHA512af46afe7a61d72603e706e1213eec6c9701f5ef7a6cd59cf829b917a12b30ccb55d4e9629be55d13ace782400a44ba6638e092befe58c9f90a7c0638c0f97b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0a8b8390566457c432593c8b1dd1fa
SHA197f488f84ba1bbdc85db5cad9c8de6f6b1b9692e
SHA2567acac2426eecfb220cd02298a66c41120265cc91af548953a3a4832ea9b35910
SHA512a97ed5726617cffed4f572565dcc6186f37804f1edba4ebcda89bae9bed02f8c36aa2222d184caa06441f60f82f3e0aa42d7fc36b0e20331b80d3824c8f52a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ffac7149f4746c8c194b8f0cf6806c9
SHA1d13a8052896a71ee148d7e9a84bb16a048201f2d
SHA25690901872da8cf8a273faccd3886db2718d483295b2a03c0aa0921b6dbeaee203
SHA512aa19338dc099c8fdae17577433e91609f2fca3ed95b65f4bb44d0685af2fecb27bc3bc5e35e46fdd769a59979120f6ed7b455026ad7d714e29d1729405b23e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86149ac81da36dafd37b04ac0d03c0f
SHA14dd05c0abe051540c6df7059a540ed163c251d93
SHA25657db74b4ea3a4c027e20aa5e57ac33bb397aa724f579d338701f489148067dad
SHA51276e853c5c13fad64265a4632237ec99cbe537d397855736b014c0e131034c959f5cde7933954cc486cb1f469ba1a9831cd7c80089e1227d4f63ccd278c964732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecf6d843539bbed342442cd38609836
SHA1e2972b8a2d5975f61ed12fb8bf53336d6f59c735
SHA25680dc0ab3160d19438734c0d0def9f193e6b5b4d852c993ac59754444aa064880
SHA51209328d1754b831978f95f68ce1c5b6609700e1cb06cfed22cb5cf11c7f17e40977be30ec51b93f1d8b504540f7255b27044c4f04f2db464484cf03ab15ed2e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522372e4e9f99b0d2e38513b9c773d648
SHA1b892e8c6568462dd369ed47ff7e692b709b35235
SHA2565132a737fd16781712d104d9e8fef637585816195afc642f45967d83e7b5727e
SHA512bff7eec69f75d8410cfd9738de3a860fbf2832ca67c3208ea3bae4f036dc896ffb21f91063d44d0d59dbe5abc47a911eaf146e7a4758c500d36014867fa68bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eee69ee71ecc90994374c2758b3acaa4
SHA1ca81b3bb4a41a8d0e682685f28bb7e18f5d5ef1e
SHA2564bb35c808cb0f95ff5d2d73c5c0cb2ad59e72a147cbeafa3c4ecd38606f1e559
SHA51214d4d5452edd8238ebabd8f79dccc0b30944a1eb3ce67e104a60a816957dd2388537dd4c350df37e1c99b5f183845749b9e2687e3b503ef1671ed338a4e3b95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b64d287eecef488bef5d315dd786fe
SHA152fd48e0d4cd8a73db5d6750c7b5b17942e98ec8
SHA256b70f8a420cb3c1202cdbfba6d8cc234230b6425851eda5849dbca09fcfec12e4
SHA512b98e040b7a895d278fda7e9fe4f6657dd6dbce4fb90f2575262ffc57d684abb895dba737693883e5ff7edc1b348171786b4220db97125138a0f3fb8e4f0ecbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55423348f8d98a6556efbf8f358e883
SHA1523bbb8a40a44d6cd7d20e5508462ac91cfa110d
SHA256c1789460d72141bf950b2973efed3e1e74ba3a27a82a8d44f137c52cb47c7aab
SHA512c217653ff2715a72e5a9376cb8883b8d4a13a1c973a09bb4a2ad52d19e0a23963b72d98fe6ced98cc8cb829c32bfb6d44403923f40bcc9174248fff96b109746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50044e7624c2cb91926f7ca2a79a75550
SHA1f5c17f6f7a004f262992fd78085f4c2e8288e41a
SHA25670c1e5e30bb0501442ef02d046d165c0007c61bd1314a825038ba2aa90ce3703
SHA51251a60c68ed3141643fb6fc385ba662361ccd82d480fd8d7a664ace4c06392ecddbb474035ef4582aa736d1e863363207add9b187beff8d2bff7b5bf66821cfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8830d79d6043c14cb1b2dcc35f8438
SHA19304b503c8887449c79d3f4f8c48d0b8d23e32c5
SHA2561d515355fdb97efd8363d5b146c91da584bec0b9d1387ffd7b6e3f82f3857506
SHA51256e3e2584936da30fabdbc99e22663da1a3accb64afc5245ae583b6e2769aab0637418546748b12ec2213cb9ba927b4c661cbdd52e05a0218947ab64b6a94850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cafa1dbe1b334484ec470a372a2b9ae
SHA10ff3462f33366ad1b51562e85f523452e6cd30cc
SHA25650ce679aed4b789ce10e480de0e2e3903643373d2527f21c3392b9a4d1ae06ab
SHA512e2417a658201cf821009d71f2b1b41399ab1169025dc9acb6a3a6e5d0f53fba96d7f35574c90f2750fb23271579e5fde6c350fb52545adcee48f195bd1867f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f1984008ddee071928ff0972ac54e0
SHA11b3449fd54497aa3be2eb98ba2f02ccd7a95ff6d
SHA256cfa29c82073ab21b508a62f70da568702a1261e4fdd3aaf026d7cea1f4d52d72
SHA512571b76bd118b0c5435857b8b6bb7d6251e4f90456770376f8d49d81a326c694f139d718a6ffe7c79d8f89e54b3486ba120e30778b28a2f8a6e84a94cf9a3320f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e4988b97fb95814af3fce4aff1976a1
SHA1468df628ead340bb10581177e8b6d25f71d532c9
SHA2564c39d15c680c64680184259f2c48cbcd03fae2a53bab93762e65a8d3e64654c9
SHA512d5d0423bdab01bf31bd9a1a48566be5fba59157c655274ec0c068ee98bd899aae3f1ad77382f3dbe1d59f5bf0baa7b085d1320f367863935caada7a6d6b30730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d555c322a3282beec4fb8367562a44ac
SHA124cac270fb6577e3745c853f55517dbc4095ed09
SHA256796aabfc44ab852838840b191735b8c708985a3dba2abe42478b01c127976c96
SHA5121864766cf681a128223d1a22118e5a8d8e467d46a57658d405c9adcf5de2d2ea21bcc38522bdcc336aff07a274be0bf173488102f57a94a6482c7c47aaae162b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a7c6f597aa4d8f93f9438b6f9618d5
SHA159abce5bfa642ded752b3a2cc60d0957692e1bf9
SHA25624e86be6a69053205deb370f1a3c5bdb97b860708372a0f7a2add6ae9314073e
SHA512f1927d4076b2fa7abd6da8d2cb6105526f94fffa558217de2df79f25fcfe8139e6f48a833ad758dfd7d31846a75ac216c6b83e11f24584383947b8097ce53e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab4733d0636d26f53d8b5b98c356516
SHA163db5d05d23cc0527ad05af96c794b635d07443a
SHA256662423a71b3c038e4b0e6a63fe54c5d20b44c6f5e1eaacabc4a1146bcacf58c5
SHA51286e14088ef3b0f7a605c2548a21af679aa99cbe889f36a1663faa4b4effbb5362657802d50b69843e9b1ef1b029183dc54b79c7510cc1001fc22eb2186398d87
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b