Analysis
-
max time kernel
70s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
d9f8498b52847cc088ab4097809dce17_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9f8498b52847cc088ab4097809dce17_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9f8498b52847cc088ab4097809dce17_JaffaCakes118.html
-
Size
17KB
-
MD5
d9f8498b52847cc088ab4097809dce17
-
SHA1
c5897bae94d495372f503ad721ab2c708efaef4d
-
SHA256
a0190930433fc1d957c2957f23298ab389aedc34fb4116ed067e2f92dfa5f91d
-
SHA512
2aeaca510571a458c184ba6eff3539c5ae5f6168f1224327054306fc020efea4b768a102ba660b3e3fbbb8c8091f8dff6de16863766a665a70bd6cff163afb5e
-
SSDEEP
384:5bWyW4vcPBzBpOMbcMj0n16tidx8o8Nq7zaqVlNFwDztxdX6sugvNkWgIwjz:/Us4XyIwjz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432205646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302820c22504db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8FE80F1-7018-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007e81f6af78fb8e464a6eb6257bd835b0120c33ce54535f0f3f3a01eebc0cf4b0000000000e8000000002000020000000f907f94deb7d71f4dfc4a8e89722d4fcb75cf8f56a610c10f9b947931813794620000000707f94eeb040613849f044bb7d28281782e4c55fa4988e43e7b7b5e34e91fc0740000000082bb3554ed61f43b0d3c678de22f6d3d3d64a3b0f04769a51fc1213dfe9a577ebb9f9f4914af6fd036b6fd8fead7fb95d4e23c503483b6ff980ad97c1903a28 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1464 2256 iexplore.exe 29 PID 2256 wrote to memory of 1464 2256 iexplore.exe 29 PID 2256 wrote to memory of 1464 2256 iexplore.exe 29 PID 2256 wrote to memory of 1464 2256 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9f8498b52847cc088ab4097809dce17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ba2d5bbce80783ef7a9a5f5229ff80
SHA1e87566db0b0fbbd7f5a5f7e9f3690c61c20f7cd2
SHA256628a7f0e1b4addfc3a4c5351ccba6d7d310951c6fea6ac2661d63183e8658e84
SHA5121cc11164a9c5f1cd9f933fac0c9d649766a9255eff56959e4520b723e395e1a5d569d6e5555052a40daaf41b404e6fc4eb2a3539b354d730e90ab73812fcdc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e679208c8ec9a5dfa73185048bb9e8fc
SHA173d3bebef01abef395b0290a194e958c2d325008
SHA25662949a37f60719536e22c9ddfd91ca3caf81e25f6b36d10e049ac39b41aa0a09
SHA512581b235817018ba17438610a0a06979f108fb9141ee95a355fd1b4f999adff7bd9681b85a91f6a170743469c24fe0ca4c45d0124ffd751c47abe39106b1232a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52783b18b9073464511ced44f9c31de07
SHA1b92befb46b3e3190739f17c3bec5b6fbe9b88062
SHA25601d7faf74b9c79a049e4bce3a280619053f232f60afad8b3bf44d779fd6c833a
SHA5128568ca9686f1d425aef249fbb5a26ead0884ffeba741eca0c17c04af83ca811f11688a99d832a4a854f5a7a6fc25a7ff3ef9796be399795e5a179f9bb10ac450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576af98399f49856a76c308e1c635e49a
SHA179822a2ebaedc2df897fab6ff8dea32028e9ad0d
SHA2563bf033854410f6d5ef881285d43c054eb9bc3407dcde2d2b8b3ed3b5340d9c78
SHA5128251e8a8109a6c4abc1ba96cb83031f10aebd2c21d77e97d6af7ba104d68622d39250f40fc4191b8cbacaceec80626cd1329da3b138eee25fdc72a9babc941b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50799678a6c19b863b24faf5db85d3895
SHA1f544a6e38404ff3dcba4ee7d6ad0e7755abb1e2f
SHA2561f040830fdd1ba14bb8f704900326d8ccd3dfa6b37aea20042fadf022f44a5a5
SHA512ab752de5d87f1e5a59be30446df2388f1a160e8c4371caba59e69e8139428aabbff92742886330198120b94167028024772c448c498e5f3d1dd0fc69a179249b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5324b8c370a403558844badeea4a05b83
SHA13574f3a57405af50f2a6c4eff762a90b778ac3a6
SHA256093a55473a26b411db4e4d8a6ff68578f65d5bc7c4d5f7485f8bfe63a4f178f5
SHA512ea5f9ea00111fab738eb250ef739f6895ba5ab54948ab2cee26da63a5b952931fd1a50e534f9c4723705bf0f4fb32b9168efd98861c8e6dddb0f927e0ea68923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167f38b8562fda20399e04c888792c23
SHA1f4e25b714bc53fd634c6d35ba314a78ff188d089
SHA256ead36cfad68f4f0cd670b87f658dac0694664746188ceae175acb762efa3eb72
SHA512f7779798fc7f0459c58aab524976d57263eb711b244df46cc653771d4b7f95b5fd4ff3c7dfebd0a124a6e3d79e0f83f64551da6a6a89331cef155011f8b834eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c4248d4489cf8cc393b18e1c6be3010
SHA1ebbae8ed30402ca83092cc635d089e634fccd139
SHA256ab3d6944f0c429390535ebee8fca27fea267064a364dd5fa26965e2d056d025f
SHA512e8bbe26bafe8f62b973dedde0f564d1cb0c324d15b85536f9f53e1372d54cce6111d9f0903043d9ce0f7cc2a40d83ede859f82e00bdcdd864ca9a52d90e60446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643a88c8b82de42c8d8c4b805af7749f
SHA19b0ae61f64e90018a2f3f713c907fa30aa3600ab
SHA256219e65a75cb6aeb918951fec7963f47d58107a1aa613073612130bf329eda177
SHA512798e594c49f4e1a5c840abf05b6c7443ca26cf7224e7e9e951caa2a74dc522d426236408f13f7a744b97d7cccd24ea671b1a1cffa6f0ebad7edaf0a59c6e9be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6737fcb57990aeab156497a9100f65
SHA1a0bed55ed20b2ec1e70ce6b0371c49bb69fb4a7c
SHA25602b814e0d456babb7f056693d5f2820bdbe7ee2bcc87e79c5ecaa0457ccb9d02
SHA512f0a25877eb972e4a2036c4ef88475d47b3fbbbc47a8508f65858049ebf2f5e4a5541255cce3db489817dcbd40052a4057c1db988cf0ccef803cee152870477aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56870cd823841097c38ab0f8b9134d158
SHA1e680ab4e9ff214650c0d318e4e116f348f8199ee
SHA256444e6acdc6914cdd4f47aa80ebd54b23cde8ab6905c40baa59e4539ee19d6bb9
SHA512d450f35100435afbaa6d04e19705d5f46ba874b77d0e43441c516439dfa9549437f5316351754398524aafb6c21c145969f221ece2e4d27afdcd8e3aa0223cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d7b34c33aa6a51d947c163c6d71139
SHA11c42390c59d3b3856f327ea088bf7644f625cc89
SHA256d8fab12026e3391022ececb8179461d7221b4e64cb70c10abcbf7febfc5bd340
SHA51229aa8710a3e4b6f578b8f7f2cf4378c0b486688e10672e1f9f8b33784b0661436c003775f664934377e36e68998bce0dbc5e768e2101b44a6288efc9cd236be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5486e2483043586a8e570b7d5aac8ca72
SHA14d77e654760f594f7163f28eeffdef023fe70467
SHA25678f73f177b328106af919018a337832fbf4617420c04b9ac41715000378137aa
SHA5127dc77e813bf268ef91948b93207c56f71711153eb7af8d5be39ba5ee676fd454b28c1124b03cd0a0f46340bd4c7df401510f84849b47ff25d89fa564525ab113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c2464a4fc3b8dc9ddf7c2f1648afea
SHA1ff5f1c84dc8cd5d5533b34f9c1ab16600bbada92
SHA256817361a4c6c4e23b966a6a581784ec8e1abd3f43c95c14faf58f26545f1075a0
SHA51298953866eeb3ee42c57df0b4fc17ddf0f7d7a688a57f78ba42ac8588f9de4b07760352c17a7b968fa70aa0ceab00fb5070af8e8ab9f94fee4c9d8869ed0005dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f08452e2846c0b4ac2c393d618c24887
SHA1482049058a861d6f53ffeda4c0d967fbe8a5b3f2
SHA2561a575cbd4d242ebf1e4a02daf30a239c9252d4f693e65077ab3d71dfabb08535
SHA512382e5be3a38398dcb0257c92154f355d93ea91d056a41e37669255b7944c439bcdf2b3af944a1fa58b12faed770255216e69859dbe7c4a94f04991b9bd33c323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566f958f9621d52b504cd8b0ccd924f19
SHA117203b47aa09bd0ae6b0f233e703295834ccef92
SHA2561b6e85a381ee237cfcca127391342a5ebf1e6e534fcf9b85da2652d1a8a57372
SHA51219efc4966f1328ec5a7372d168668e999410cf022981a8fa42adf0749a129146318c452438ae2ea39c87a92fc4a520158e5265b884b3205c42cf6adefd5bc327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e0b142ee63c9cdd21dfd475916760e
SHA1424dfbb6c4a87f24f198286ec3ee071596ea752d
SHA2568aadc75497f1777e351f91720156a941ed30a7f7e27280271c9b2c23db112166
SHA51223d1bc95cd1a3ac28a92c2aba5eeff2ce3cf8942ed3c39fd18fb018401a37c4848e3a410b1cbd07c920fdbf08eb86bce7fe7802afe872a8fe82061b9528c3a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7f59222dccb8385d44c1f0fe5f9242
SHA1aec98285357c357292b0db66f60c94d3232b25c7
SHA256791b02d2bb9cc66fea8c1c0ac72af9cefc37868edf32f3b104222e9ee586bd71
SHA512b74e770c9d7cc40eb1531fbb9749ff5bf115a823eafa016367acb05fd8ab80f2efc988643dfc756efad361e06ed2db5f66656d4e90ba9171e89caf7f91ec34e0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b