Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
d9e24ac65e9945b14be06ad354a99221_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d9e24ac65e9945b14be06ad354a99221_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9e24ac65e9945b14be06ad354a99221_JaffaCakes118.html
-
Size
11KB
-
MD5
d9e24ac65e9945b14be06ad354a99221
-
SHA1
03175a4fedd43c4173686e4e61e5baa3115f0c06
-
SHA256
a27679c60f6d459a49f6bf887fc248f0cb8d9f7c4ed5cdedee146bc9fa686700
-
SHA512
444431482a5dd82cdd0a116f560d2e75a40e55b7e618a4a91eba6694e2c0569b04bbdeb01305895721f485b2e32344a68a6bc7943270c936a79fc0ed5eaa3535
-
SSDEEP
192:x2Pu4Ew8+QfY26JJOS8SAraBBpQFBNbApayC4H5OswcyytjF1+oFEABfE7gXaS+N:88+Qg26JJOS8zEgBNSrhH5OswnywEfzY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000021ec12ec0d90f92c98e89eba9b64f92c86f621e9919927e08efe023ddc5746a000000000e8000000002000020000000dd7cf6cb230068ddb7d1b3d1f290c99462610744139ae5d805948b206185636f200000008a96a8fdff6b3e8f1a86d5abe3aa57ca91ab40fe111a427baa96573f25615f2040000000c03be2825ed38679fe168e0fa74c44f77c1a130da79c24f39a3a981b7847f94e5692f5335abb31ce7a97df7288f2e3496357967d18d428b9b88b6f284099fc87 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432201940" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500d5b3a1d04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49DE0751-7010-11EF-88C1-C26A93CEF43F} = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 576 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 576 2136 iexplore.exe 30 PID 2136 wrote to memory of 576 2136 iexplore.exe 30 PID 2136 wrote to memory of 576 2136 iexplore.exe 30 PID 2136 wrote to memory of 576 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9e24ac65e9945b14be06ad354a99221_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ea8ec015a1a387529dd974360e43b2
SHA1d5c668066c8198eb46392d0648915d806ab94a00
SHA256ccab4b107c7c69b1ac4fe8caed69388918932c7a0a5ed4b58186b1a7070389be
SHA512e438ee0e08f9eac984ec702affad2192aa2b1b4513bf17d2fd4e41f5d91399da7285aa6315496a1141c4f580c6fcbba1f391d91008300abec769addcd6b3048d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807a82b3796b105fdd9e6b8c1e5c8f5d
SHA1165ce462262a6425a6414588c20e3bfb1a4e6680
SHA256bb4dc67ed799ef4ee825672e2f73781e43a2369fbc6bfc373e49a5ae1ed4969f
SHA51203e4d3e99f5d137dd14debae8d80b385424614bb1fae24830d3db7752f6c5660749a2885da5dec573bc9d5c8a432df517f3f630144c8d00428df6b06de172fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136df9a5366e2f8192603bd747473e73
SHA191429225403f48d9bff3805a538525b2bdee838e
SHA256773d76b3a2e8cf01bed371132cf90cca9e5ca047d3251071f65827d793f5f398
SHA5122adcf7d8c62d12a359d0005745594b951c7486d482c19cecaa74eea1b361d199c97d50d4701e2885a6f8eac09555a115f8cf95faea7f19c0440829d59970b60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9b7262491bf1e0de5475070342130a
SHA1fd53262485e19e234a7843cad7178119496a2c72
SHA256982990ff8cc55e452b5efcdff38b682dd4a8379615b207ed5e0c8e9fc110d52b
SHA512e44a5965dd815b10770fec1a55b15c31ad98ff5a6884178cf05e3a48fc0235cbe9b94f78e48b7343b8482eac077bdb138b7ae38e7fb5a41e491f046e0864b2ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5702d5f859fff606101b6f72f39221cfa
SHA12deffdc23754858e845762b44f118a6543aa391e
SHA25610e8cef3deba7119de5d029007b4115087799fd64e08dbb0db27a3f28f9d941a
SHA512bc1450a07af6aaad472eb49ddd81f56ce524e952983b69a1a7a3c6e82949109b32a574ef5515f97b8b0497cbe9c823bed52f5d0a9bd257d6dad719e0bc437ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2132f6761daff531c720a7683340463
SHA1c78c0219e163a4c662a662a5dd2f2ca7d01de8e6
SHA25649b7da631a41af99064916e98b77d8a8abd6d19409f23dfbcdc0e14d4464803d
SHA512669394c88358f08d17607405d57903087895353271c4af9b0b9c245e099f3ac185e3a96b2937caba8ff5cedc672cafd9e61a75dae1944fbb3bc6c95af28719f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f808656ef12908f9ef45a89e5b7210
SHA17796dc7591452a34cbf106409a792213f48fa4f6
SHA256d6044bf3ab0aff892a9b61e8dd3063183e9b0e1520e69dd8f0936a1b084566a0
SHA5122e31a03bb7fb37a86e3b433c49f4f3f1d5f0c0f99c0fa9af9abfea9abce087632cddc2c22dcb963827d28b755e8fd16987b3c56211bdbee271b5f472c5a540b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61ac200e17d9515cf0691284e1635e4
SHA13041ba82036337b7edf8178fb9f1b9c1299a7e65
SHA25654e831b058af8cb0de55345517085533ae4f79a75968a30b455fcc5fd7587a86
SHA51283dd4cc19eabc06053e6264a2c2d83b7152a9cd869ef7b20158093b4945708f2cd5e23402204f9322f7489e65d0d532be747ff79260269a457a54a0c71524347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8505027c0f2997d9867d8c83338fae
SHA17ab9b638b23c24b0f08e7e463cd86ad938c970e9
SHA2567322a115f66a36ac7c23cc27c9d511379d35e0fac5dc34912d97d486f265a1d2
SHA512761ded6a9b7c8c5bd171311d74ffb8ca53dd4509de87ef7228d61cac45c1c5bcc69b0aacffc103b4832547819d2632ec11075eb54f57da8a55eeda02e9d3a596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53104899b0889b928956bf5e4c65ba6aa
SHA1434d8f2ddadeca83b4084895beb61cba66b9be64
SHA256bdff11c8fa93495134f0391dae04cadf74eb4dc583d55ccc931ec5daa89c07ff
SHA512d5ccba30675b3413b1239e5675db683e0997b49e5fa8fa3654bd7bf6db3d1d1654cb6c335da2478c039528199181b4cb363c1534b79cd9edb08cdd0c3ec07dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c534a7a6ffa5b519fd6e6eb5a1b667
SHA141a9fc7ab0ff3d771aaa8e49d0ece9ebf2702c6e
SHA256472abfe4a1259f24f0f42eb57282457c1caee34d8cdb26dcd112b11090d7c193
SHA512a5932c2eff8a4459c125459203fb911455a457cb5233a59ced62b5dab3ef29f26b5dab2d27fe5bc5e4e0753a68674208315cd545449b55512957d5b3b0153668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586cbcbf09faff0faf7cec7cb5d87ce51
SHA117b54ea7fce1786f12d5f0242b77f663bda4aede
SHA2564d87603cc2081567115bc9a82195c5b11e3cbfc3b176f7a11a7b31216838d50d
SHA51233e77761d53145b06aba3d247fcca21ed80d914806c254cb0d6ab7048cb2b111c97bc76e943468e1540e66fb0b71438aa47bc55ef6d629b22258ef22d8f59b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3947951febd2a4bbc21eec87dfe48b9
SHA17e89cdaa5f6e600917d08e889e58493ffe33d76b
SHA2566e0a88367ff43b5803e707fa353d245b87f100525a35b9a8de900aa77f660ceb
SHA512dcb4ecd9ca971cde276e4d66c015fc9db614f908d36423a37a30232f0ca5f5a3b6b479cfeb3dd9e828321fa3ec32c978cc972a539eb9a29a52ee4e64826c06d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50352e4cac86983308a042fcd55985217
SHA1336242e92ce7ee940b7e3acc16def2336f16c9c3
SHA256da66b783d1b47d4914e2d957dcf58f407d5b785098b1fdeebef732b29a12270a
SHA5120e0dc612b33adffb1576468c3b92b6db68807b82ef58e796d39e01df95beaa9d3ffcea6f44fb34690b6a0e9ddc4dfb3e34f4c18889282891a84c3055921a153a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76667113b0e6a8e16618daff4a4f96f
SHA17a64e8231ce5e2edee164b2c7806c528248af3bd
SHA256d49d8ad4e85fb54e940d269684268e0d19e2a812328722ad665bda35c75274f5
SHA512ca1265f53e30f12b3089ca2e39d1daf6b03c8dd6aec74c4e4ba13ccd0cefd2bbaf4f693d76affa2d2a316e83cc661b20686b9426acce17a2f5e7ec4b29000f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e20936f354b9073ccd4f53a47ba7e28
SHA1c76158347f3315bead7e9377f6099319c0db077e
SHA256e60798966fa9e62ea36efbcaa7dec1da390d124f3aeb5812932e0520a9da1e25
SHA5123643284cfdade17319ad1b0338f936fa6ecae06dd0d2ff3c4fe0b1f6de3b9337730a49a37001057dd7e8733ae5b633abe722ec29b3179aabe2340cb55c943c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6cfc1c851c3e33368bd1c955321ce84
SHA11cf07a981d9d49fb624a385862695ec017699cbd
SHA2568134ae24e5dfa265214f09ae79e4de30b0549b6594fa2655a9c4baf4d02f9d0a
SHA512e4c78106d5d408f93974769f51c3bacd38a38ddf7f043d2e3c8e7c5054923d69621b18f4c5a25220d6dd9d4994b07c9fcd654bad268328e8841e56a649052ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513cc4b2131b1fb15439afdada4f9297d
SHA14e283da3137bd1f36d0372497968c920161a42ad
SHA256e7fb59db59dcb9a9eab3727872cb391c8cd18d7a41e457af29d273234019a56d
SHA51241a37d0d26d2bea5efaf5bcc0cd20189da2e9bea7920d25f6566a0556a61ad41802ec3e3bb6d34e122f7f9f5e84ab1ee42def1fd780466979940bd83188211c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d271be9b7eadf9c75a1b2eb44901c542
SHA1a897ebabdfc8e2d98fc2c810932c39be2ccd5d5a
SHA256368c72c1e7d7dd5d1e0aedb9c0b1b8bc9b2384ccbd349bc449f4e494874515ab
SHA512313c60aa3d7f907c5f405e1c32a06d7d82550cf0f8e7b88e6e5b3afde7f4efedb2ae192d46ffad3b9b03efa11e4b3288c0a0c975463044e92b3f6a9cc192a3de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b