Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
d9bb48f2471e25f4f7d2b30364e366e9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9bb48f2471e25f4f7d2b30364e366e9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9bb48f2471e25f4f7d2b30364e366e9_JaffaCakes118.html
-
Size
57KB
-
MD5
d9bb48f2471e25f4f7d2b30364e366e9
-
SHA1
dac2f60bab9d17b34973993665b74c3724575a89
-
SHA256
c0ec7d3097a409ab0063330ee7128a2fef0c91e978a904e2ff951e65762a898d
-
SHA512
0efa047bb3783e3b6f9601c731602ed06959c785e35ba3873f6ae7eaf1e2b6bc6a0839950ab711ec2a046b165dbbd3b01e9c03983c655ab5959eee021a323c2c
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVro5UwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVro5UwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509f59b30e04db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432195745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC2E3261-7001-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000004ae9907cd8f55d00dab3a44c73cd30680809f5cd36ab7dedd0aa1f5bce69d581000000000e80000000020000200000001eb9af3d6f1256f016ee9339d30bbc04c8ab239af84a8ce8ce74812522b7efe6200000000303458559fa880decfd0fc7458109a15e9641c1f01eeafd16e7d2164249b77a40000000f2460cabb99c45988e22b1d616dde38e2617b101eb51d4d87b7634ede4045e3b044eed4103435e85f4b6f5f4f77397d6b4663d09cb6efc209cdab14f326c24a8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2768 2748 iexplore.exe 30 PID 2748 wrote to memory of 2768 2748 iexplore.exe 30 PID 2748 wrote to memory of 2768 2748 iexplore.exe 30 PID 2748 wrote to memory of 2768 2748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9bb48f2471e25f4f7d2b30364e366e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD553ae2dbdc65d8b51c4cc6a3b9f60620d
SHA1e91c1753e7397f53bb7ae8f6143f7e4ec9e27779
SHA2569c63911b5ef9c2ed4bc94cd5e9f77d015a041f2b6c8dc5f84ded847fc424f00f
SHA512815b579a2a3218b76585212cc6a6a67da65bf9c8065f32f55badfbdcbb85b717e77a3b28529416874fb95d9bbd414898ebcd66a2a9dd283aaca6b25e431545c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a26c83ecf38cf31ab10bcdbc352f962
SHA121bc28198b6b73260051317dce86d0671c208657
SHA256f4d0fcad88642a3b20e3028e459dbbb8f014c7adebe416c16f585e37b1bfd655
SHA51232f95cc184039ef7358285551e6131cbfe895e3734b7cae97026c0615538262e61b03b4385a064f48236334a4eb9cd081a7f1e42bc10e4171eed1febe2b6b9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9e5ef1506bf4496adce9520637f176
SHA1049537127d6304f8b203716c250a6cce2120c29f
SHA2566793bfa8c97373ce91507a177b89ea472663ffb984f7772559a96fc102f40ee4
SHA512b894329618db68f3609fce5261c5c6516a4258eaaa8166eeef82a6b4cd84f5b33807e3698e17051d4c2bc0d8c57003cc2e2c16bb446fe9a11c408e5a08f90585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c1d0dbe8a6b1a0ea597d0f2d59d0ba
SHA10ebae5e5698113f8cfecd6e6a5a4f02b53577d9a
SHA2569880c37002070f495571669bd9e23e8c5ec86fd116e56b4606b5726770d7b976
SHA512ee590cab81ad472bde8977f509cf1ae94b72223611a80b192c33b4ea145f1d3ebb9933a3c25305051dc92b526944f71b6483951bd63c6473305479670571254f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a48b657738cfbb549c9b0adcf09f85c3
SHA1f9b08cee7472a5cd72057c1744e680e88e0d0f80
SHA25671aa94d19b70d07e132a74fde12da5b0970ff484f5c53d54ba374fa0193313d1
SHA5129213830e6c2a022af4108ca6a1daec702837c8bffedf8e9b78ef4f041d01a1e3d04ebc54fdd50d32f5f794d699562e8f7512148b3ca5e9bd20332a442f351e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24123466f2bb673bfc229811388baef
SHA18f823689d88c6f5be39ae342371fac3d8c62c7a0
SHA256ab76afd40b3d08801a643b0fe40b5eda43d155e48684b04ae739b35338c833af
SHA512e3cc07f8b1a4871e98bc7ddd6db621f4b5b516e8db1529c0e5bee270a4be987a05cc085f49731ab0fd7f318fa95438361688bbd3829cc2fdb9a9896545ec7235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c6967aaf0fbddc54088c028f898380
SHA16b3659d005f35917fd546da77301a2e9ad91fd72
SHA2561c9600d2082e4b8a6e7b3e4ef17e9a7a84a022ae00c6e2f1a130d67bf7ace0b1
SHA51260e316011097bcc879633ad29048cff426e2753898458ce50316f1a512461d4d110f4ddfc5754eb885a951754736001680bd55395f22221c6113a68376601dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a9c702e8cad9032c3fb327eb4671931
SHA1078938ed694d98d4fab275d77a6d4107bd15f585
SHA256599cf1d1ab24584a92a45e0214d074f4135fd0189306980ac8c3ae58cf9a59fd
SHA5126d6c23ed75380bbcf72ea1889fcf3a45db38f40e7975683c46aa64b669d89a6a175cba49b5c6732578ec6a63fbfe859de90d8aab6f64a7f887bba07e56dfd3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f80d98642ce7d175d3c6348a83146e9
SHA1851147872b7dd464ef899a2f7eea6844cd0c0c8a
SHA2569496582d2e4628c0af00de94f95df17d79c59bbc3ccc96f8a92a1e748c795748
SHA51219194114f2c57b38e4fb0460883b4939223923c01da573539b3415a3881c7d97fe19bf65c3a06560da4629d46bb0d2186c5a5a8beaa433b91cddf02c529f9213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53167382afa427accf64db8eca08f8448
SHA144ae38344d423f3cd1ed144d2c6910598c0d600b
SHA256c15f0dcdb8ed40faa4256d1e66e64b05e9990439e5abed319514ce6dd1a53f24
SHA5125cd305f3e76624d32f80fb824d9f537c3d2ef1a8ec3afd8c3eb451bf2c0824c714d37ed66b9e76fd2676ddd13aeb48018567141e4e040ff0f39599595a238b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b191ef88d7d2244dc4760973dceab997
SHA1c71fdd09ad2f276209a202461cdf550c89265a78
SHA256e3d27cbff66163f184ec26163878ce5ac08f464b44ce1033127aa3c70d9857bf
SHA5124064d2d9384495dc43f16c1a2dff3a31685d1498e98cf3d94fa8c9329239438a21b79105f5637d2843d2ee4d397cef5869b6d135c0db263ee0663930a0402bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c89408de98f9ad9c3e070b4171493766
SHA1f863a2f979e73996aca483f401cc494cbd36b41e
SHA256502701f0f3ed9dff083b8c0dba718f3eba8bc31622a7d47901e8dcde92a6a464
SHA5125e7ac493c6c3b7af5bb28e32c64a0832aa010fc472a07f479db71b72d419cb9e1f12fa4b984d4b78015ef219ca43097fcf5be9e1b76ab2709bc2bf4c11369cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9a9c90706a855d8c360759045fb588
SHA1587c7b0d0485789a4f8489aa266afe8451fc7420
SHA256425588d1d078b952df72c58841c3b6890a65fd337868fe550467bd03be29d36a
SHA5120980dfc95de610837de9a57cbf7a08171b196c587b5a9ba43d3391fab89d94ee62763f965baceb3182c667eb40920e06ea0090125705ef583af0fbb8ca8627a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a1de84f6c82efc3a8294327384c4f3
SHA130d6c26adf1af2d974f58c43384ecb13673a77ce
SHA25637159e7db5450e93ab6574ac3ba2a53717b0f270bdef9f5d502fd0a7f53381c4
SHA512c9cc5ef32ed7dc0d60c0d3fdc935c9c67e938a506c021cc2b4a382d7f1c5e29b273b246885c18baced9485d3fb6f471becc4dfa817b258c3e8d478934e517d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d0d6939caa6672f4ba229c0bc0f8f56
SHA17d9aa0d7cff71c933d807a961891daadde6d5b25
SHA25613a9c58e5cebfcc1420ac0de529c263e75122a805537dac8deed14852f92180d
SHA512a7ca23b506f43f831289bd0847a1b946af17c3a1950317440a3735445c9b6389002ee8245c89734deed3ff670ba9bf8daf3795b3a6a7cd2f7f893160a42c5f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594246c9e5d9a93e9cffd1eb4486ebe6b
SHA15ab321d040bbcf4f10bc196249e9ecf5ff24c2e0
SHA256d8af05b631ea66b2a3c162eb15b024159efeda4e2c77b0edb89a8674832c6b49
SHA512ab9fc49c263098ffd48e3bcca47c9a55fb1ff5d8b959e44146eaeb28118fc91e21d1214746a38e33889e42fad4246eacbb4f1e974c48000ad00d6da4049932ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487c6b9c69c5528704a04459cc09b73f
SHA1b55237dee13471443842fd811965c6c07e90c27d
SHA256ab2affe9856dd517aaa3506f8747427a54dd188c3ccae865c938d2fbdf62b983
SHA5123d7afe040841fdc1b25ffc5efa65401d527e7b17f9d6bd970d9793cfa0ea4d06f4321c14465c3f98f9a27101933dec66f50f440ab207ef6c1ddbdc90def7bbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac84e71360905c87f8a5c094443ecaf
SHA126154f5d603685de99c2332f1fde8e3c667c0954
SHA2565fc6f770c57918cf9c8dc685927e851e5f26fc5e7d5fde83693547239c47088f
SHA51284fb09861fb84f626202fd0826c5a29b5f4efd69d32988b5529a3f4412407858cc894e7951b97a85b21b4d0f7f72ace537d9f725e70b8460c955786d59991031
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\f[1].txt
Filesize39KB
MD5caee3c788d2a1ca1043607328bae27d7
SHA19c5088b6d3294b72088aaa965ae7d75cb330d985
SHA256d671658fe6853ad62d541ca6ce4df5c37a6e165801b453fd44c3387e68f0fbf3
SHA512fa3e0ef32fa3c6ce60fabacad184960b29c903c83b86d9b9317f98d91e2cda1900045d636568c39e04bccaae63f4bd424a294fc7218a546ce6c45dad5824101c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b