Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
d9c75296ee81a55ba45a3f1b539ecdf6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9c75296ee81a55ba45a3f1b539ecdf6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9c75296ee81a55ba45a3f1b539ecdf6_JaffaCakes118.html
-
Size
70KB
-
MD5
d9c75296ee81a55ba45a3f1b539ecdf6
-
SHA1
219a7506fc8721a06af7cff0d7d98b94567ec988
-
SHA256
54824386b42a107bfe4795d44d048111ccba1db91533d66d9d6d4c1f5e17fae6
-
SHA512
b131e334b726e63e303f2dac5be408f4e5348f6dc2ad79bda51cca325bd35b1f16a57e1ca4acd3ad3df05899932dd42563eab8f318912568f7d6d3082e72f613
-
SSDEEP
768:JihgcMWR3sI2PDDnd0g6aP69qDboTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVu:J5oTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000083323c7df0f903938ab5b96603419ffa6a17abf50dcd0684614a86c68855eba6000000000e8000000002000020000000ce19ac9a729967e384a4cbb5eb6f6bc101c8a56c83d72c6c5373b0395e03720720000000b90dfdee5fc471c86d480b8d34f4902eb5f90ce186101b3423bfb3b8ddab4c8d400000004d01eae00a51e8175f694caa61d4ac5fe5d6c90c8a39712cc5ab02e103293d8e163ccc24a0a0932b53950f0a9bd9495b0e7c253b9593ef549c7dbaaf6e3ee822 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432197756" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C012A41-7006-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906937621304db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2408 2508 iexplore.exe 30 PID 2508 wrote to memory of 2408 2508 iexplore.exe 30 PID 2508 wrote to memory of 2408 2508 iexplore.exe 30 PID 2508 wrote to memory of 2408 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9c75296ee81a55ba45a3f1b539ecdf6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a43491426bfe80cc122df4c982fefda
SHA124958e58a6754e47ac624919bdffc64543e93d1a
SHA256be71b0600c2b5beffd6bfdeb3b71abbc3fb4e94bb074d4fdeb427aa89f6513fc
SHA51258f0e1a3129ec54ab7e4e2986c8a676f845a416d5f0d86497d2b6c767df3ad637bc7ca25f83e3507c267cc4e8a455fc333bc45416a3d015d463f9aad4cbdb2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570e1c390b13376e9d358599e793163d2
SHA1435ab19c85c1a9c7aad2a2b8121064c1a098e129
SHA256294e092209831befcc403c7ec657cde9a2998467a17261e070c3e98973025761
SHA5120aa06f9d0123698ba19734b8d683ab0463ba9090c2d588b1d6a525904a7a289ae60a032690970bb87a86dbb5487bee7af84fb426448026da82d99a78e89192db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a88a285525f651db80bbf9bc8abb1ec
SHA1026bc362acd314c4ed9eb81018ad3fefa9008c93
SHA2565ad8af8a689520fd3980c8e76621495808fc7aa05535d3bcb7765d69f54efd74
SHA5121bb90f52d36a7e2706eb356f079770fdd730349c6291063060d65448038bc0405d30cf8a706e2a892a1815cca1f1679ee18425b8233b0aaf95386406598aca2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b44a44b20069b4283e98b3416143c8
SHA190c21b7af8ee233da54f1d00c05f8065195e5e08
SHA25672d6aeffec8ecdd39d9ef00702d8176c8c02ead9eefe27a8950e89c1c69512d3
SHA512ae3bb720d8336bba22ff5d7ff387fed7d50a8148a8231e8a4dff845bd89c69a9d2ab43e53c8b384d904ed1cf30db96291cf30fc658a1a0acd07dd85587eb34be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741d6503bb3709e02fdc13fb2656da83
SHA1f99a5ceac99115cc6741b81f81493c26cc82a541
SHA2563ab72f54ef5c7cd2aea26fec6719aa4901541b579da23ad8feb2d0971b088246
SHA51248d95e2f7ca32d70ed886792e68aa1366ce7ceb4add43fe6c735dbce6a3fd191ef017401a524b34f05f8b26c31d7fca0295a33501f20cd2a1379637c46c5e46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfeea05e3fbfdeb71e021673d9a4e574
SHA1718a99676e8114d5330d0196d0c54692bf674f70
SHA256082e522ca004e6c66fbc00d8c2bec13df0a2fbfa4a05ef306ba0b927eead3408
SHA5125cd3bb1a4b5078ab7f57e354f4550e1ef5eef30bec6fcbd977bc9e1fa7eae4f3e8709282350c0ea807b4dd212eb3d000caff6856e6b6543e17d104804b9d1cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008cc961a979c665d05067248f03abb6
SHA194b6ddc37de2c265efd3cb36b5cdf4376f4c9c97
SHA256e3eaa77ed481e1e8bd18945c48acc53a618baa7f65cc1b244adc6f6a24b8239a
SHA512bd44f13b4993f26587f0ffd235109a4d58480c4fe943aaeaf82ff3086939b01c8ce1617366e43b6cc7b50c0a604b411d012f92a1641e043e08a4bc4b4d519219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b70cc17396b39f410528f670fba4a04
SHA1674f33d8d2fb495a90a9d84c319fe92f518417cc
SHA2569091138a087b8f8ce11ed91a0c801e067619d1b9acb0d6b3e7be4865dcae2665
SHA5122ea5efac727c9eafef70e5a2a588ada5add9619f1f514214e0dccf9b3c8e2a53ea0db300ea9e1b422ea08d2e2ac559009378e183f93145f6a72d7c9524821be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedcc72cdf7a3d3ec0c17185e34a6e35
SHA1cb20512f058aff01154e4df345ecc0baac8bffa4
SHA2563536010e4603f8f97121f4d756d8047772c7fd0093329df2c16015bd13f4180c
SHA512e30bde3e49b1c9b8d9879f43166a94521f7985948ed10d11cfd067bf32b3543f6bc8bcebed769848d08d554dd8c9032f20c42ce72eb66d20174501d521d79693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc77dc587908b2a83fdd6933b79f901e
SHA1bca4a7aaf88eb765db47056dc54d8c165a97d1f3
SHA256c8df3170ad8bd894121c2a1e8f1c6851be80271db3e9b7835df1e35b728a44d8
SHA512c220689d3af142cbf2a14b6573b2a392783e23fad52e5ee4a43a5a874ba17a767272711edd49025de6d273c21527e6202bb8b74c06822242c1423a9fcf0ea0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547f41c959b97961c84679c4e3203f49
SHA1c213cf3b7545e70675acb691d32fa6a89b2eab7c
SHA256d7f8572faddc0fd97dd7b3329c0c8a08e81b84fa448a0d1a02ca24d708dd40af
SHA512c9260b29d9a299b3387a87891e62695015d993e58c512e49af48828e14b2f27770b00f58f17c7cd55a826f4fec98b288ff7b7d75b8164e36388baec934527e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300fc6e6c259ddc13849c18006a6b5e9
SHA1765e5eba7f182710dc9b4fe9cfb71aeea7ba691b
SHA256f8c3512e5cd9a0f2fc5287b87cc9dc7ceb6b7390878c42178d92e3d11d60286f
SHA51294c9204891c1268a12dfc3943bb3493d4db0269179e1c197588267db6523b206d2d211271f5bf9b7c7af5c57e583b7d4acfb3d101a546bba9bf988f41b3abb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d33326f4b3e2e311ed6671d0ac33275
SHA1d0469ce58bbdfc1286511f56af73d16c0856ce72
SHA25623cb48d5e684bb6c289b9361895ac4be5baf57b1087846499343d915e40f5609
SHA51210b917ede9a9ead37d4767014e0739919c755143fe6799c43f79044a4093ac7c80e3bf398324b5f9084e8e2b3ba2752440a52ab5e3257a4455e773d453bf9339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a4e231d460421fe3f405d048a04576
SHA1fb3422413fc4fbe77bf3cb078799de7b8a8e12e1
SHA256a918847a8a0547b188cbf7ad1dccc118f377db49abda60416675639bd679592e
SHA512f93f2cccbfd95bee215b7febbb9651a70ef427390bfe95673e3ca188102493a2416c97a3a6b45d315a76c51195e90d310f26bffbb8be9e628745a98a3d6465cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa08ec5fa5346c276cc9ad08674d2090
SHA1418d0881f3cd79ce5c21f065e554b3c3d277afe3
SHA256503d04687fe4d6002bb3d9d0a36fa505c9cc5332a55ec32ac8c23760a4ea625a
SHA512767d13bdabffda25b2b678b713ca20c1afbf8d0b06bd152f6b529781878f2ad84b4f16ec3b5d106bdd208fbf4c6e6aadf31811ad484ad85029292a293d0e8dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767c3311c67910cb199a03cc85241665
SHA15c45b1993e38d8e614c3f2b77589d2b3a1c07572
SHA2569ae68059212b533b85b91e5d3847bd08616b3a9a609737485e99b624e2ce36f2
SHA5121e154f75df2f17a2eac59b779c8f260c2cd86746f342e90610961acb915b7105199c67afb25cee7778e68c9c02f80ccdfef05c5e2e8679de17e91cb8cfcdb2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac25532fe51839ac1ee78238573e0cdb
SHA17bae800c19c00b2e0a794a35fcb208bb9dacc0ba
SHA256e0266b9fce82c3597f4de8275dffb56405052716b3309d0d970bbc033fe2108c
SHA51296da62c223cd22e6ca8ce1013d3d0b3cb92814f597bfee5d02c170d132bb1f23ea3893f510c72a41cfd2463f160f79b5b68de0cf826e3d26bb31e75f28bedd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c794c0fa11a6256d275711652127833e
SHA184980dfd612c4f7eda07d249f0d7afc785fa6082
SHA25629cd70539c607cfb10bb2efe3b11809cdcc74239400bea4e0670c12560461e06
SHA5128978a89878ead03d03f092033daf1ef1d75eb434cff6852b802ac6751ed457e3f8c23dee95a4e421852908bd2c740b212d9379fb9f2c9031cd95f71a480ae34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b590c25bc28edddee228393c91c8c56
SHA10260e7b95a4349a6d7cb68c4b31f898ae703ccf5
SHA256a573287b8b970e8d670b421931776fb69d204a9b943aa4ceeea51dafb0c042ab
SHA51247febec1f0627aa60b6cf5bf0fd741b9f6de8d20e660c9a4a5ccfbaa760ecf6064306cce49de8487faed54853134bd3c73ad26070b10250c7d74f8684cbfd8c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b