Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 10:59
Static task
static1
Behavioral task
behavioral1
Sample
da31ae7063bc2f16f3ce12213b203468_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da31ae7063bc2f16f3ce12213b203468_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da31ae7063bc2f16f3ce12213b203468_JaffaCakes118.html
-
Size
35KB
-
MD5
da31ae7063bc2f16f3ce12213b203468
-
SHA1
6f6cf3df1f7b2a5e4ae234338c7c834362751c26
-
SHA256
65df01da72ce6729ea0da574380849a043c981a42ba296226be5bdb0daca5616
-
SHA512
c9bca660ac7a2fb9ebb2107313a2666b1fa837550c4c8b6431418353e193aab042a4075059e6e74470c4464891ba8d530e10a864a950cbf70c8dc5efdefe6b03
-
SSDEEP
768:y55a2PAULKu67fkT07X10NME8ZAh9fjhIhSaY62ec/meCI:yDa2PAULKu67fkT07X10NQZ13I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000bec909cbb4ba5091fec96da5330c074a6a4e445005bfef39201c1c28225ee251000000000e80000000020000200000006180f6f3d8af8874b7522806ebd7bd8968f98c8fbbc60a16afe53e2dffd89f832000000073f32bc88555e1a86b43c3cd5cce3208c5eab6548c72e6a633076d653be082e0400000006f5d0957db05b41cc0e1a8a961a19129e29b486a6686b1444df39b25e312bfd5681b1829e9f0fbaa6f1b7a53a1a92fd51c95ade273e27ba38512f5e2f37590b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F31B95F1-702C-11EF-9704-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305618ce3904db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432214254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2760 1620 iexplore.exe 30 PID 1620 wrote to memory of 2760 1620 iexplore.exe 30 PID 1620 wrote to memory of 2760 1620 iexplore.exe 30 PID 1620 wrote to memory of 2760 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da31ae7063bc2f16f3ce12213b203468_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d53f8b3bfe339fb223d3099b1accc6
SHA1893da879511b96892f045ed06e35e7c7b41221a3
SHA256770e5ca452945d9b1e8b56783f073d5b3dd5eecea073377fe4adfd05744e4c07
SHA5128bbca7c5b92fb8497a5792ed2deeafb5b1b9834c9f291fecd8bc8602e5ab93fb75d498aca46ba3bab705b75ef8ffb8796f18ef25d9416418ca7e58d16be9c07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9609cd88b2adc81fac37ed7d415407
SHA1525f5025e5204708dd8417ef3e68234bc2571e3f
SHA2569d8a6ccc61ff26631bbdc9d70fc7ef8ebcf4ae98dea5f74e75007e117d8aad48
SHA512976b0fc4fb73e84e596e17df4166dedd4c7dc8e9ae2c2421f1d810232c99b14ccdd21503bdaece0caeda2e1f6d2b30b9e50ee47885332c154a3ee8c0dd199260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d156fe5edc07719c1f5199203ba7154
SHA1c66f182949552868a23e72670205b379a0184e9e
SHA25646acbfc3cb6ae500829a8b035f1608150be57821bed365634e16262f33ec64df
SHA51200077d9cc60afa38112b2b2cedaec496decc2ca32a33c9c0ef9836099af0638a8b596a936609acd3c22d0cb8a60777ab8447d3b04853ead6cf776d124b3d1cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0084eedec55e386a260c25077fe5d4
SHA1370ad97f8f0e2184b36f73219d8f0702d07f5b4b
SHA256b70cd9b88b3afa9d86b726dcdaca77a1c9829dcdcac2b8f97df373c0c83c2904
SHA512ffd3f9f9206619a9728866cd00900347a3f9110181e556f964fba6c0681b0b7ab2697dc10fbbd4acd6dbdf7a31130b52bd9a5f4aa21ec12404b387da3523ed4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ee660b45f8d7d32aba7e83e07e03d6
SHA1bc2dd44bc7f4b6dad0c917db7a7360c885d6f0aa
SHA256b2641eb16ef0d7b62d80c4bf96b5c9daabfc05379edb2474235dbac69b9c7c05
SHA5127533163df429abdb23016a24180fcd996ebdedd8bfebe85db86dad504d015aafb06f0e27c564c52d8fbb31bc236090eadf3d28d553b23c22612b3c2fc051b14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc50773a2b833b09cf188caeabcb405
SHA1b46599509c260c2f8c2ccf14782e1e287e2b1148
SHA25699d6f2b9f9615aac026fc6b0f5050737112bcf03d64c1d61429a5eb7b523f288
SHA512875f30e857dc691021da28abd2b5923e9363c70ade0de4e3549e72cd650f6132cc6b6be5f5eb2717d72f09ee996dc91b2fe445942e0b6d96c445c88322d154c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab933a38c0de52eb18fbd3de0af4af7
SHA11be83a33a9cc80f65f7904d8c5f6eb45e1bbd6fe
SHA256d5e741c3d3f27ecfcd67bfb7bc50fcf7c97f632ea420f1c095d3560576347c28
SHA512cba9793ad827a0dc901b81a66b4ab35621832a9a5a04e6647f2214aa203b8279064961f40be45977d22a41113fc5875ade162f0ee820968e35f4122f9609a47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97df402fb5c6fbe307074645ff1e337
SHA1e17e37d5c108c0f1846ac2344848097b021f90c8
SHA256ae217ff34faed9e281c5accb78103ef737ab8ae30d7555e5df67330631b33ae2
SHA512d149dff18132bb89501f7fa9dbaebb73a8be8ec53dd1fda52295516f5ed78dae857303f7df62d61a434b0729ec3898f9bb6d7a3373e8559d4e7742fe6ee05aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b7b613288337b027f6d99e9b38c58c
SHA10db3297ff1376982b043552d14aed5bcb7222af5
SHA256d98479c4f53464f118776a2c84e14a39d74f0531e778e128978e13276a8f50e5
SHA512d2e3fa89c145ff4a40b7ec383a2a61e7db36839d704e94efcb921eeb239202f554e9f8c56aa329b3fdd32d91f6d3e4cf2c0c73ca266ae6f29a3900832fe95428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dac3383ac96921af0234dddbf924f38
SHA1cfb18e645ceecfa3c923b0207dd097bfa084d7a2
SHA256d4853b625fcecdb9c6536290afdff8a4553bf51399db54c709eb51081ec37d6a
SHA512b1c9e280b05b89034ad41e62ff51caf505f65345e8b7802893d6ba13b20f1b354371b31cc22c9acddf83adb491570bdc98cb341fbf2dee248a44a17d687d6b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549cf7f309ef2336a5472b1d7d6a41615
SHA13dc1b0ed6e0b539354157ab74802b9c8022f0174
SHA256d09f7209ae5aff7fee2668698a31996031fbcbeffb3c35852230a300063e6e04
SHA512a9d2e35961f286f895dcc9d0c9bd460b0411d73e826639173bff196cc17fa16889c5480b86e29ed67e72ebc0af69e6d9539e48d2a72e20cb36f7085929e0a4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad037b1f9fef8fb3064b0a1ea4d065e9
SHA11154f4ad8f34824623a03e68e98505fa04ae0b56
SHA256e594e61a504c49c4ad73f080fa40a523799b651dc32c1ae2c47547f1ae936a46
SHA5123b0c98edea0356e9e309e84c87292054c980ce1b8029b8d4e275c29edd5eac5b4828288bab7bd12c21003c389746edb9075b5d2eec6b48aff9c0934ca2242595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531288cf683e1547619c9d1c2f2e9a025
SHA163bd0873c624c85013ef423a7191335018a63384
SHA256138a9c0799c41b10aeca4710636d805caa96d03277398b5356258d240a6175ef
SHA512868665d9280c79b448085aef6d59433625932ee3c52abce2200721bbba706e36e999c0203753bcf9b0bb9122519a18a35135ff5b4379ae22e6853b4018667ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc301123e4665e70b19d3210753ada3
SHA1a08fe30e6bc124268c408cab57c7754697d79d4e
SHA2561f0f2ec81e76f2e11f2c9ae586d8311bf66ed611e20ed720ecbbd90a00aec73e
SHA512c8d82cbf64764f37c98759cb2a6a181cbcb4eeb7ea3ad1916537abab309f0f5e8ecf1faa708e56dfc2dfaeb30fcb0a82e2e65a4af126a3f522ef67e04f5380d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5419a0fee33e4d9d1620d15a2ce3d9c27
SHA19eba5f53275047d474d7815a369bac188a6f2bc2
SHA25699253b00b459fd15da4616565ed540d3f2de0fd4d47986ac35328558948eb5c6
SHA512b0cec09b1c94e63ce48032451096daaf951beac2f26c5356c77f8718cfd03bbc93ef3dfbe483320c62153b34fda21dbdb81ad0a9b5e36b12275041934b937925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ab25dc3ac8b48c823b7a84dad0860d
SHA1abdbfc5a98ef4cdae6e29a9bb031186f71efaef4
SHA2569bc7995be378f935cb794f2155fe64dc682c6ccb0f95f1b51b248ad09a5fb1b5
SHA512b239e35a8bfa20917bbdbbcc8196ac19e641d785cace9d3e9f25bea952f2c457254e453b696fd9012f8fe5fd5714300510c7f02054db68ed830782513d15f353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109fd2f8c88609633a2121b26a3cbd65
SHA136b936e870ce65084eb0656a1bdaea320087357a
SHA256a914b6cd46f4a2472ec80eb081aa1818bf5275af5a93c092fb0df9c1914678fa
SHA51286898147b6f1a09c2c6b485c7c9e0078b02bcf73bd319685f30611ea27b349bfc701b3315af8658c386a8d99e7a0ac855c7ed31599b77e2eeacaa8cc10694668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea6573886ca8a5c783e79cd905cfc71
SHA19655a9095ad9d99dd370a6fbaf789751ab2ce990
SHA2560ee4bcef268612bf8e5eb2088ed1e797682edba733ab207242001ffaefc12eed
SHA512d36bc39915e23b25fe38280ff0906b0c73a705460895ffe126b9894b676b6e0dc1c3b0cdcf6ed799721c7c8ff4414fea5d2a44d645300a680594a876f6ea62d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfaf39d18b61fe4edf45f976d662616
SHA19badb4daf1c1082db467fc3d2da39cf8a412e5de
SHA2564eb13989dbdcc77f1b04cb36a92c5204fdf7398fa69f1952dbab68f35babaa3b
SHA512303ed53d89dfbd0fe2014ef460fa3305df5832e2fc94b4305925e643bff426881694906499c12cda424d9e43c3bf1c6763dbfbbdf699872417e1938f5071562b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YTZJPBOG\f[1].txt
Filesize99KB
MD5e67d5a88368125a30404ba5940bade57
SHA164e6386f012aebea64b8b53993d750a694226ebf
SHA256c822ef0f5bd7ac69b4e5b9a74da8ade4a0da480eaab149c46cadad5587040774
SHA512ccfa7644503666faf7cadac83c3947ec76cc3c27fe66e7c2495b68a01137e07e081d6cf67e602a9e2cc5d345ac65a9b1c86c764e08c91e0c0ea5a8363a4b83c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b