Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
db2d5ba466d45290f73d56e362012302_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db2d5ba466d45290f73d56e362012302_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db2d5ba466d45290f73d56e362012302_JaffaCakes118.html
-
Size
19KB
-
MD5
db2d5ba466d45290f73d56e362012302
-
SHA1
bc32dae8a17618171c5525ca98bfe4e219c12500
-
SHA256
6c85e94c33fd7a40c4d599fd68689380f5841c12a5a3b1f58b13dfb86a0f3fa7
-
SHA512
6f931e98067ea32b0943ecf78265405073f78e6c4113917a7a82e65122d35e0634562e7d762b8f2652ee91cc28162c6db2d9efdeea051060ba4da213c977e844
-
SSDEEP
192:I+uY90QhaHvEQ97LLyyRIAAI5fIWHL1R4xlpNlMGDGN8uHFnqfZC1kBF:PPX+ILItIoLfIjNlycC1kBF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000acbd9be739c2abf56ca5aa2d0561e03df383fe1667c67b0af6903df8934b3740000000000e800000000200002000000097e57bd32734e6db9a3a4372228ea4b1fdb6a0d609425c4212536df48714961b2000000035fdf8045e1a645b5af33e5f068db2a49cc6212b0341ed8d6f9b9e1deafc54eb4000000018f62bf98f8093aeaa45abf9239a6c227f9da6019ab80a43f01b4003a9928683b0cf4de1ed34fb633b6092561d6967fb037a127feef0e269f11061c7bb7c3450 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09547f18a04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F579AE31-707D-11EF-BA28-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432249046" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2324 1984 iexplore.exe 30 PID 1984 wrote to memory of 2324 1984 iexplore.exe 30 PID 1984 wrote to memory of 2324 1984 iexplore.exe 30 PID 1984 wrote to memory of 2324 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db2d5ba466d45290f73d56e362012302_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7f25d6d13ab13cd47eaa74727a319f
SHA11537b829ce57a26649f2c374f7f2b04f3b59c692
SHA2566ba63d74c342009ecee4ce855b6c67c169b8eedea0593167f7a25572299675b8
SHA51248ff889ef607363c408dc475d9cce9bd4ff669202eb8904705ff3c6e25f05762adce30ab9b39a688131b4df223315c5ad8579b7558d72d066299373bbfd60802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed691bd3740872d68542854d71b21f7
SHA1e0b861448c297fa85aa3adcf0238f1d081c52b0c
SHA25654163914756b283ee919c65947885c948a88691075526c7a809a6093d9a57c35
SHA5120857ed0f7a327b3ccb1a2364d2a45e0236e03259aa3388456c700092845346d3f89e85c28cbb1b021edff3c93e2b90bc253c4422761a0c150469965826881916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236aab2fb96b09228560873db8afc5d0
SHA13ed16a77b8d8d2d96fad2ad9b9dc4f54ac5b3cd0
SHA25618aecd972129c602f37b720194ab4f380efef2a0b5b7ea921c289c98f7fd3f59
SHA5124dc35936974483da0fa4e935ea256be1147fbb99b0755801a9f91fa280596190cd51de02ed1ce69f2cf2896c22ed90f30f805ddd91a75cc9dd21b6f5d28b6add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5492bae23df3ac16dbbe3eed189fb13e2
SHA17daf32b424dc6df1afd6f33ccce3bcc184cc4802
SHA2560c610d362155001549e35c88f3165535066a459133eab2eac161dfff4b9aa0f3
SHA5120303f07a85280a39cd948149a5557c7f4ae3340d2347945929e68beecd1a58e0da32107034659674d15a31750c413c95074ac4c26886d25e0c8536c0153c8536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574552b5c793590bc712e2b7ec25a8355
SHA1c91aee088dbf9734a033e955ac46a97c247708c9
SHA2569a7d1a4ca99063f088f8009fb349424798544542471fba8df65a24e1bbd8b350
SHA5125fb4d55141ced3ca283e1655bee96c757c9662606e1ff5a135f29297848b2a0926e7d3d1634698615413ac642017b1eb54333f59cc0dec5bdc1b844cb6b6ede1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8d3e59f9488da94b86eb1f9e91c98d
SHA1e6fcaab15deff1c5495d197481cf214954ffd283
SHA256a390c6e4cf95d0645807efb563ffdb7277054b6caaa223e233b38dcb974cb9dc
SHA512eda689ecbbdf72842a8fbce43949447138d28d930d040cfc49d2b5cf8df03046f6ac3b0967080a347fbf766b5328fc474d11f6c96a77bf52574384cfa6be4115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dada0dc944d13a3ad2055eb27eb90df0
SHA18066fcb3031b34e5623ab5cfd6b8bab0c473516e
SHA256aef6aeb6d5bf6b16ed2c63d0bcf54dd3699eb971cab7cc1d52c81e0af53511d6
SHA51298d5771444e7094f317807ca5a16e867be501ae432b5ee9e158998aa8e2247e3a92355d05a2c74354bdd43bc1f42150cda49da5422efea5586ed1c3832e7dece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a70c05a951259d43aef65700bc2682
SHA1d0efe7511d3197135dd50e55210d7decd775434e
SHA25666d6ffb9e22379ac2ea509e62a30862d0b7efc6cb9d3d34cb9b34c6cc8550c0c
SHA51241977fb6af18b79f3bb6d338e050ad3bbe98490fe574f11ab2b0ef25bf8497de13c05d29e94f8ab12489210dc9e000a99f8ba4180e119d9812656027817902cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565673ee37752bb00cd654916aeccad4e
SHA13360d8008522912abcf924a6799031f03b0790d5
SHA256de553d0d5791fdcca0139db94d7dcef68ad60b76f7c0c7168604da5886f86bf0
SHA5122a00b4854539a45b7e758c5572211e525d456411bf1f5aa2cf013752185462a97b2ede0f7598d9423081860ebf47b5ae9eca98470040e3106939453ac8e9202f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52bbcb97fbc03649a71a93d404765b7
SHA14a4cc9d6f5f506ba7a1aa7835c1d6f96311852b2
SHA25652f11cd56d4cf69519c9102402a6046423fc5aa2ce6c2029fa689f3b0a72d9b0
SHA51271570ed5398709d21bab0d25a985493959fc6002dd692320cf504038b1f4f244c003e0021b1b25e268d6fb486bcd35274a27fcd5434be4aa49a08273b46c4287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a3cd1e104fde15756d166259c238800
SHA101d9f8df5babefe1e3372e5348ab86c53e03051b
SHA2564f869f0d585df58cd5e5d4f166f6133b81a3e8aa4e131a07aa962771f5fc9a3b
SHA5125956c704f82c0d50c1cf862f6ae336f3d4cc103196366e661e2c8bbcc4af5b21341af32a1ff5e312d876b631f175a571b6ecfa922465fce621cf6576524001e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c16601c44c0c01ae68f76337117d1c3
SHA1fd4e9ac4f70c58d6aca7d9c70d451b32c21ff307
SHA2569d13072c7fc2d71e3860b608098ed1babb22ea7b7e54fcace092822d67e89f68
SHA512a4ad12ff96bbd6055c00089e511ddaeb4f230723446a6325b68689a213ce27b81aee88dd2f7e14eefcfb603ad4551b29c0658e132d3a98459028088df55c52b9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q4648X1K\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROLMKJ86\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b