Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 06:41
Static task
static1
Behavioral task
behavioral1
Sample
d9cdb60ef5be8f859103880cddf0d863_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9cdb60ef5be8f859103880cddf0d863_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9cdb60ef5be8f859103880cddf0d863_JaffaCakes118.html
-
Size
1.0MB
-
MD5
d9cdb60ef5be8f859103880cddf0d863
-
SHA1
00a66a4fc5cfcfc2cce872f1ccbb78914c8daea7
-
SHA256
22cffa94457025a558955509e1a5b11457e211c178c8c6b4d14316374722cdbe
-
SHA512
a4bcef0b4971130a58344791252d6a8d52239c6fd7f4e40f99edef0aef1aad71dd9bf7942cd6513eda1f05e8486098b5fa7b7d7cb2faad93d9d6ae8d3a23e216
-
SSDEEP
6144:YkclB6of6dhNE+0Qq2yP17rBMj3zeH0yWe5nEzDnxUOaElwdyMuLVWc:YkclU26ZE+0Qq24rAO1jQL1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432198734" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d682a91504db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000da5fe1adb605316a70959f9e127ffccbef09578afc6a1127e368699d2483a133000000000e80000000020000200000006ecd506849963030e719efc5fe30c5bed03685bfd1e1f72e058a211c0af034f320000000f64e2ef79142b901e403ab449573d4827f75369aefe35f1f0a0cf1594eda56c740000000c91ef310f736553ad14d1b608e212d7ded32c623aff8088b01c52c18ec78a8234e9a47d3ac9fb4e6c68ada304a73eeff4932d2f23f0b90875967ea88af5c0a68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2EF6B91-7008-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9cdb60ef5be8f859103880cddf0d863_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551da6cfa2f17ecc7498d368c50d23703
SHA1b9ec5eab6090a4ff8d0c7ded3ad0a8c79e02b320
SHA25691235da50314ecd31c57e5585923670e88fe6ed3bc31b7878adab17077e01194
SHA51277520154fd783b9342e8acdb1d1acfac7e162cd22954267723461b445bc002112f2150fc1997ebf6e98b15b8d457a98ca3ce0fc50813730c8504cc42c836ac38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ad2fa4d86cf79955dcd0becba695f2
SHA15b906fc8bdf10cbd39b2a4b18f17fe502fc47174
SHA2562162c1a7e1accc8a0e2fe1e6ef68aa9bcef285323f3fe5ecf402b3e6595e5796
SHA5123773eaad03da9af73aaa4774118d1daf0efa53f53dcc08cb5bccd91fd405a5eee32c143d353105243463975bcfd8b89b2a7a5c67363747d411d1e5148988e9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ca4f646f384baff4d2fcf74d7ae7b7
SHA137c6c49af202826e8913ec2e4e75b63eace92229
SHA256078e99d98767c910ca0f1290df0996e6dda3e257bc9cea43fff34d4ca80f87f0
SHA512b6288d6bf040976df7b9af1a760e96ed32cfa4baf53bc7670aaac7ea19d62693b04af212c909a66ddac1d3266997f46930b2063e709389050edddd48271f604c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5697a360ec495057b19364fd563cb5fd8
SHA1453aac565e933a1fed4297eb0497083cc7ddefba
SHA2565146cc9deff6e192aa924e848dd349c87be9aecf4b78a24647e839dd9ced23ca
SHA51299d6c5f4e6f17ee2e01354a5a5e60d4dcbcbd4ba6bf24bae90be90a6091dccb7faad5b10ff1b10c43e2fd2c162523fabd2c4a7135ccaf09133c2f056d9340f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55351ca5b53a7c9174a55ef077003af3c
SHA1dfdb99962b6ad4141d8ca5a77121a284f080b4cc
SHA2567f6992813c2e19ef1aad16fa7d3ce0dc50a9a8da9612f35a6f6b87d3849f3346
SHA5122a79ab4f3fd6c6da6eca5971ce765fef5f9bb299fccbc01c0a75792681615afc67179fec65d60e7115517a98feaa2b3365e78cedfa1b83bbcb0e72bf94ed6872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8f3b228f2574ae7300c88a0efd865a
SHA106620c533f4a5e4b493af70639f74372ace1da4b
SHA256ab3ca2a7ae1a3c38e8fd5d2b25b7ba9d7cdcb2030773a79653f433f079f8f9e2
SHA512b3e53d669ed3e6dc4a98e89bc83254b4ba5e8db097a49e4e7db8e3eaf4d3eea02bd093b02e22c42621fea30a35b76b7ac6f91ee6779331709a62d5d4fae51a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa480bb6748e8a856c61375af2f7af3
SHA128aca461c01e5106d786fecffa1598ff62decb72
SHA2565e4e0d6f224ca856181339c5752a1104112132cdf814e6114ece0423a64590a3
SHA51299c8b61744a10f1e0e357bd28ab4afb558a55519352cea43cf137f28b822a8de7d785f7333217c77c6fa597e05f45318259afc2dd2c2c063a7fd415f5efa93d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16c7b9ea00a744afa721d06e97db13e
SHA16e3f5e85bd3b0a6726bb779749df989dc358f145
SHA2565da1c0f8b247aa57ac6022c50b2d5b1ad68eb104140582b1715790d992459ac2
SHA512752b80fab5f04146d9b606241908a51ba8f1a4cf17cc87ee31c1c9732e7d02046b9e98d186098801e3e1f80a4d7eb4e68692d70b272204c71bc8d2046e04ace9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c391bc469e087400387ffdcc26da695
SHA1bf121a8631300afb6b9ea92db3f1dfc028c433f3
SHA256bf35bf07cd3a3b1b285e9f608bf5312a6d917945a7e88b82686d659925942853
SHA5128c04fc68b6b4f82a83fc184eb8d2a8155340c38689dcc4ca2cf6f663367ad15f03ac7d6f4514eebb5ed6cd7034ca6d26dff5cd6b48a3252e3c08be3770a4761a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983fff6a20c336f87bc83973c5f9bee0
SHA16f79127388fca9e9a9e6f369094128fea7e9ef32
SHA256c1966f254eeea527c0129a1fbafcad423564fb3a67a78da9ef24d8b0d48d214a
SHA51210ece0d87a7a0ad36ca90dcefd1fd993777671f3a7e23e8b210f35a9cb9099eaf4888732965b96d71bcc62f12f1ce1a45a80d80749e9db6274c8a795874af262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f4a9eb15fb219c863dacf4d7428f0ba
SHA11021f2b71fd989de83632d06d1b3c9580e492625
SHA256e081e3b02e65809e475c8040bd4ce08e668797a423e59ebeea38dd08fd182020
SHA5122ee404487714952fd36cf2fb71a2650d6b3a363d55f44ed2e301c498208cef51e665b96ca8e22124b52a7ccb03d0c475cc71cc6b19fdbc40c1e4406694e0c427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adbae9cb59f222a1297cdfbffc28fd60
SHA157274d657805719c63251c45d6d648dcb1330bcd
SHA2564aeae989cf5195b9964cdaa1d129db42188126aaa701814f79e20a75d8b2a2a3
SHA512aea0fcdb8470e99bac5cff8b64e3fddc192f8edfeb828c0245221be3ee423d8e9bcee310e8bc9864e1f63afda31080c00324ca8bef91658b9578dcf13badba03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1f4e4d510f022a133cf9405c87749b
SHA1d0153f957c79598a237463e072bf40d8e79de503
SHA2564b3472e169774cd73b1850c97112023255df7fab96b78af98daa577dffbe847e
SHA5125bf83122b376d67db94071769983f83a7f7276a9618091325fb80eadf3aa19d4c4f5cdeb7d1f764c0471a4440193b50267e31c2c643fb053ba65bc63fe08464c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63ef74e984a88896de6c1a9aecf687e
SHA1c91c7734bff868e5a3c2c856bf08343ea97d26ee
SHA256b74155b602cdeb6b11232f016d80c00cc92531e879346084d39ebafeba236be5
SHA51290eeacff623d1cd7db0da17db26a18f5f3393684dd716e6135ed9a9d92071120d4bb1209585f9cec16cfd9129849e6ad650c4815263b0722dbc74bc509533e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f35905f24abecd4f13c8e21a034db0
SHA1fce7b8f2f4d5f57e2493e0df6081e160cb798263
SHA2565f038548b074bab4f6e8837876dfb18d51627abf8a5d0a96e22401a539d3cffd
SHA512472f67a5dbcaba6ca2da051ef20ba63e54cfde96f427068faa54c6b614a1689aa0f2c886741036627aee796e8f322f26b5bc8307db9fcbfcd84a2d1637ed7614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6b10f2b10267e14a8f995bf6c46694
SHA12fc02200bc2cdc6757736cd9251676905cdc60c9
SHA25643cc31930da392309d9362aa545fd06c744ca128340fb408043b4e2b3d39c6b8
SHA512cfa10027984f19fd9b49788d05a49ceed34143a4bc677757ea1dd67d05552609dfd732cfcba46b294cd6e587cfe96c4795ed8487d34cdc0b9fb7f21f9891a9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d697747450fcb09e380cb7a458ba4d0
SHA1e3531dfb285a605d85e52464b16da708dd04d742
SHA25638c1f6e6a49f32ac510e269b2117173d576c4de7bbd77deb4f3303ea8f394404
SHA51224324cdf41886619ac4ea4e487ca48cb752b08d3f9552b32efe397cb7d0aa0b82850ab09603d4454908fe7e883a402a2498fd224269d6857a5367b3d229fc020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55315f53dbaf4d61ec67ee8feca76c8d6
SHA1a179d2858495af9605dd4ab45077f7881a67cc71
SHA256b21558a926a750f99715480bfb5a6339207d893d5d3e72bf38973d42e2adeca3
SHA512ea8496284a56d16015b7dace48a9574406ab1d257ba7334dd1c87238c0b96e7b2d87265131b33c692427d9eb0c5781a4ca725aa365d35752ac2071b04f587b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5facf0a21e5aec996defa83ee918747a1
SHA12f49b615b6e3f2bf39544210640590d3855c2d09
SHA256c196c246a87389f23d9c97cbd9ec4bec34f7b3cd621aef78fc4ce4bb3d36b490
SHA512e9bc32f3f1a9d4aa9041321ed7315500d8621c5d55ec637b68f3dfae3caa926e49e81ec632c822491632509423301ad0acf34acadd59f7139a9c4cbb1aceecf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a3d325fb7e81f9500801dae2f741543
SHA119d91654b6d572c517a6cfc27cd7186a1867d85b
SHA25643d6f8343614a1366623b7126e2fb616c7b1a2a1d0e312bd3a7e86aee59222e3
SHA512a7886bffb6841a9c2e8c889e7a9538eb63a6c420ac7a297cd9f2118a7ebf948a5f63932f386eb62a4b62f1eda80c8384021a7be595265f915e165e215c08a5c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b