Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
db3715d8c55309c761c245be62e0ccc4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db3715d8c55309c761c245be62e0ccc4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db3715d8c55309c761c245be62e0ccc4_JaffaCakes118.html
-
Size
50KB
-
MD5
db3715d8c55309c761c245be62e0ccc4
-
SHA1
e2646ea267e1e5cbb4991bfa202c9e9271715a4c
-
SHA256
b2171de9f73cc0cc5d2a314949820d5c5b6b0e78f2776d81eecd1861df8dd00f
-
SHA512
423ade5b364f8569d06822a498fc8d4102a776253b0c52a2405efc6fa95eb2e625b6fc90b77481d62a8948398033b5791629d0d55d4196968986cfa4d39b86e9
-
SSDEEP
384:4nqnpnz/4Aq9BDG9DXcYH8+fhZrAw8IoNgvmmOikmhZ6BFyTSHqDubrxocZHBpe8:4qpz/4AqHChZv8IoNkkmaUtBHBT6vB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000000e3e891c18726bc90ad1f7a615900f269ac8665ccd8159b37612d0283204e1e2000000000e8000000002000020000000f1db26b3f306f753de20be69460c5255ca4c56393bacfdefaee0be9d8be74f85200000003652b6080a179787428f8371abe3c7f437cb81c7dec7f99d2997fc44ba34f779400000001613295ed855806ee3658890cb33b53edcacaa48d352d181b535c0ae5ed8e04da2be0d38dd3ebf9228fdb168d2db58388b3e990d20c77a285c09d6ffe36bed70 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a6c7748e04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000000f962d70adf645f635a8844940fd312a7d86ca3725567760c90b4cab0f5d863e000000000e8000000002000020000000f6909520ccf02efcf0037898b97989a5adce5c84e93efbed0c1a2c3656aefbf1900000006be056f7b94a37b84751fc2a260b84bca897d75f72de3beda852363be7d2bec3387e3fdee0fd00320426920690e2cec3cbbc92b7485672fdec86fcacba80f11b0cf44f5ee0adcbcfbe4bc64690f440572e08b6882ed4def006ca7f1cdb0cdf69cff04e80022720bae54504c8cbea93788e6ecb7ada235c78c5afb81d798e5d6cdf57039d027f54667f43a8b4bfd03cdc40000000dac9a7c9925274a787fc9d75687bdb2be8dfc1719111ace7e400168e24bd8c1d0db8ee0c3ef53733e2ef386edade4c942004c874be17b50ae5ea58bee5774c8f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432250614" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D3DF471-7081-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2316 2512 iexplore.exe 30 PID 2512 wrote to memory of 2316 2512 iexplore.exe 30 PID 2512 wrote to memory of 2316 2512 iexplore.exe 30 PID 2512 wrote to memory of 2316 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db3715d8c55309c761c245be62e0ccc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50316b1c5eea89134ecbfeb8675dea3fe
SHA133505f316b984ebd3259670c5749b952d1a95e8d
SHA25645143f27a756f75fe0b796b2fd91b50f2a28d3007ec31a51446dcfbab6a1ddcb
SHA51264610cf579035948b05ba5e37826d16812d077a65437f3bbde99f5135c49b1bb0bd8dc49fa94cdf3652a615d7db2c395039142b6cbfcc952c5cd8e4271af2b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e34fbc7dc9623379ad016c25835aba2
SHA10057c36404fa1addce0d6aeffffc5133581331ce
SHA25601e6433465c285007606c0f32e8fc065d76bb8c4bb446a52fdc0fd3402fdb237
SHA5120df8cbb9a083ecc4dda7e3be6c831b0d3fa5f3182af6f26c84a3aa865c20f7ea386c4f5445f5a9ec600ff34a008f6ac490bc805f3fc62ecb5907fee387f1528d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce2d7a787601ff0be2874b12f65b88c
SHA15f3ad191514228acd3585922eb612fede3b5ea89
SHA2562ae5ba94972b82d413a968b797fa8c763a19b0df437ed9b77adcfa8032d7db72
SHA512bdfc3426ef584624582c6f5d9d472e9d38f8fd13009fa9f91e2d3598e9f649c901cfe007809194e4a1a70c2120dad4770d9ef9b6fde00a7984819d0390b94290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5f9625e12385bfc33da7bf543f6b23
SHA1308f33faf81a3b1d2656288eccf0131115770148
SHA25613fdf0293d72824b7265b3abf3ff1abeec047088d1d47234c80c47c0864107ca
SHA51283bbff5432b5657c95c3d86f202b7545048e111a658b59cef31ac9f7ccc7e9d39687bbcf7ededd41b593e17e293ce632fe5b55e79ac043140ad371dbe83e6657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca78c7bc8a3a550bf8391eee84095c2
SHA10646eff48f03a76188697c937909f1c0d58dc81c
SHA256759b45ee0a4e2eefa338991a3edbc3de49ab90933fccefc5e6704204ddd751f5
SHA5128a7d828d720cbfc41fa215fa2a528ce6dadc6eb4c67161de182a1a9e44c5985a8a841a8c1fa1800ed34bedaf7d05aef0a3a190081ead13875af2b845c2090dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd926db7dcabd406d51842a23816cc18
SHA140618568925c002b4c3486bcc8b3ec1c5ff848fc
SHA256e04bb8a1e14192ef140e088c30d00392453142c08a9ac4ca340285bd217c840e
SHA5127675f8256bdbe7ef744529f7e0d2ff868b825ac0c1bf4315f9a747253f463d3f96b26724ae0c5daad999e784bc823861ac880714091f02b9142c21a510051101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae1bd6f2a3308bbef159c6d86c4a82a
SHA11a938623ef5fb55ed68036a65f03cff2d7abd046
SHA256fbf9915b1ebaead14739684129a817f865ae35a258eadb8703989e61aae29680
SHA51226c68b91e0de2aa5530714fcbba08b2fda49e5a61f4d97d80700089a44d5b93b1d6b8c3db13d1ac4ae73f04d0e0e5be5de2e3610ea332e52357acf2c7feca572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a0ec6d79d80446a28f8777d17c3217
SHA189b343cab57e572d6658855af008251556e8a173
SHA2567c423f2ff4b688b02fdcf4952e8a3821d244819b14b6ae2ae81946730a2a554b
SHA512b66892ac777e5475e4c93ccd79c1fdecff8a8a44d6ab8e6aec735f80ed64dfe4302e061cf5bfa57aea8cf720d8048e0eb5116cffcd45f297b68bc543010419dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54878067e0b3ba329728d0e3b14246e3e
SHA18e1695eb3e9b0f4ebf919ec8f9a427183380f201
SHA2565acb082c2e42445b824343c1a299af342d74b20668b3cb0bc6dff37082b1a587
SHA5123d23f0a1d2df70b76ced3da7fb902f06a5a2cb28ac748ba0265aede5cb07a8131e4063b4d7bbb2bb630b8d97354f6b5da7ed888c792265b9ccd2fa97216763b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8d92699d560d5d8233a7b0f449fb8a
SHA198479bb3128c74b0e96645f2beb94db110eb9dd3
SHA25624c034db701976015fd78e3152672cbce49d1bfabbfd4cf0efcf75944d4b5a04
SHA5122e59b7951b216f0d7a169acebd8cdd77f2e51f0e822ddeaedc9040e01c5da59ae239d612f1ab222ec53336d56bd79222fb3a8f57d1730b9c3e648fcd6614ac14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58a2e7ecb8e884412496e4b8a604c7d
SHA1c6d9ef9bc1c7728e77eaed6c885bb91878fe6938
SHA256b1f916339aaa8442d4892918945f19f78a8bb966fec97b1de970002ad179f875
SHA5123e30308b7ef78008753b98033c5f13d1be3bba2fe6f268e5e5c6e16853ebe7e9adadb6bdbaf131ed8025568bae85429126a11889018a0b20fa9aa8b6766dddc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b988aae2582f26b8872a2be1cd15b4a
SHA173f00a5dbbce19ce7a44d3018e99c78f2d051d67
SHA2567915ffe9c949c56e4bd1eaf7de328467e0e7959b58a19587684aabe1a35594a6
SHA5127305c70ed4888ea7ea8d1308e858a916d1f00c9669995c0c60d8a758e02c63716159fc2905ae275de1f9e2697fa7ff9e69f96b24c830008ad1a87e27d979f32a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502becfe34de2dcb58e3b7bf80d0acf94
SHA1337988817d35ab62a4032ced1ebcb2daa97c0aad
SHA256b79d32ecbd8a38db8df072f6280aaa4b52bc706abbe09e5c1cb9fdc1977321b8
SHA512239ee414e8fe886abe110e7254eff5a00a6bc16285ae098f9eb2b72e96d42da0e57355187a3c9bb2a76b22579685fb21e9521b3b92e6a96818d659bb3f4b83cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31502445e4ad1e1c2812c095eec6c80
SHA17cb05cdbce2b3f8d7b997c885d0b68616c99ec72
SHA2560aacc50f8de628ba991b2fdbc40e34e4b8fb8a3fa51294aebb22398402acf959
SHA512d00a549bddad7dd51aca21730321abba6a9198f25f550e108f2a018bcd348e004e5f86bfed93e639873cba3d8febdeb8d00cec72941869dae9632e540d0271ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce5d4652e132d50524947d9dfc52310
SHA142bc19907b371faab910800f09058b76649442a3
SHA256ae209d1de1ed5a463e32c613beac6cd66f1be337e1615634d562b32981aea964
SHA51220deaee1b1f0f9fb7af4c2f27b4c3a91bdb46b24a4ee5922ba43d7dd765600381cb279de4eeecb11143bc3fc6ddab6264f4d0ecfdc5cf24e672746615ac98447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a9f61315a9f650e31a50cccf8082bc
SHA1e68b5d12e84a038a3c8c7765114c249e66530cb5
SHA2561551dee34964fdf8dd4699305c0dd2ed59e7eb04447c0de3cd66759b2c9b4954
SHA5124ebd99866c254331eac1e186dfeca0393f9d2d2816e807f0de582886011a312f846a67f5fcb6d7978fba4878bc7a5ed82ac465d8a98a54ad929077d0f01f1656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fda23726a89959bd8a24141c2f74f94
SHA17a14462db0b1bed800a85071a5680b9f7a4a5b1a
SHA256daf8f8d4744c60259fea1a3decfa95694b15e6a3088af78dfa80618a4c84ffcf
SHA512eba1aa4ac746442da04f3fb02d98f81cc8794bcb106812068547f68805f2a33bed7e61dac1a77530c29641e33a2e24ddece2c32e1c5b3ea21f2c9b0d3437e2df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b