Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
00a40513bd417c275ab4d8bbd8c6881b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
00a40513bd417c275ab4d8bbd8c6881b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
00a40513bd417c275ab4d8bbd8c6881b_JaffaCakes118.html
-
Size
2KB
-
MD5
00a40513bd417c275ab4d8bbd8c6881b
-
SHA1
907abe4334a1301e7afd50f9745b040411d3d26c
-
SHA256
21250edc5089466c4868637143551547f0809e43ea91833f4de8d5423e3c2972
-
SHA512
b341d0574779c1234dae5c6638d3abb5273efeb840367067b2cecb189ca7a203e2a1f679016a2f41a511b04d9790f735b2a50dd252899e46720f63bf1c70abab
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8050ac377de2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428504875" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000143d387f027d25c65aa7120904c344e8b96aee0f8543df83514ada9042ec65bc000000000e800000000200002000000059321f2bf4f384044f39e0c0caf4beb5ba26e146ddf4f54568b1aa573d72111f20000000e1241564c88958f527ca652f2ff09906ed20860b9b40a4262a02bc91ce85ebc7400000005b9d91da5e4c4e3578ed4eb24affd3fb72573a4381f223b29282de4141a356799eb3dcf271ab3404c8c53dec8a200eccce644a85629e87aa47d37e8cf7f4ff84 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63184F81-4E70-11EF-A2BA-566676D6F1CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2780 2216 iexplore.exe 30 PID 2216 wrote to memory of 2780 2216 iexplore.exe 30 PID 2216 wrote to memory of 2780 2216 iexplore.exe 30 PID 2216 wrote to memory of 2780 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00a40513bd417c275ab4d8bbd8c6881b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53051b750f38425f540ef51d9fd931ed0
SHA185e35efc02c85b121e3c5d5e3800bf47036af4b0
SHA25646c7fe456a62bc89928fb36fabc4a0225205389aa6cf74fffdc0d20a5b7db3c4
SHA512ebe981be320b14fc8e2c9c0fa39d1ddfee668d9c4a03bcf3161e39ebfd6d01f64c199bb5dbd29272d160459a10e5f94d53567d896712c7df377048e889633a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad92a9735b5d9b080cb0e46d7dac61d
SHA1da13f8bac1be4c6d9eab32ca2c0516e9d0242349
SHA256ed9336e97ffb79de4688bcad64b395887193b4e0105ef9a06a097f777730ff57
SHA5121c038251e7175a8bed51547fa9751731320af8a91662912cd0f029c2cd35c0ae95855335f940f172eac155de6d031e10675b0ca4aa15c7666352fe1843ab46a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508cbb23dea1fd82c18692696b7ef583e
SHA1963a9e6f1e7689a74daa677e4ddddbee925fbd5b
SHA2564e52b05b7606a3ca71260b7561b6eef34dc2e2e4c1e051b36cf70593b87838b5
SHA512ea14f8c120262aed280df1750a127b43e44addc6ce1d3a6c35daa65448c8b6bb213319334392cbd9b55b6cb06c671365de45ddf84b3471a0aefb27e7ca4d153d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547822b5583ce0eba52bca029775f169
SHA133239e8b7d55291375ee0468fe7f420bf3b44ee7
SHA25629ba7b587120726bf39da322bd89c8c08b89b979f5b3ba0748a6f2929da729f5
SHA51279df578d373dd64e97b208fccfaea631997a5dba23fae28df3d35db33b5e56293a55afd483f57b9a54434094fd618db6204515869ffb089251ddccd4610807ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7dc08553387a16972f97be10e76abf
SHA13d3cd04013d729781109848864cbaab26b33183b
SHA25627827d14b46b69e0523f5a7180e30202bfbbf376a5e4c0b66dc75458b6fde843
SHA512b83829b1f16a646f841db719cf0ce25d8ef607b5def8e3c1067dade90b77fd580e46802f1e772bf4f2ad819c062076847c13b995d487da04578f4157b0ced93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f02404faa8f0b9e27b9b66ea891658
SHA123eaceb86b0b2c948d48b85d073dc1495338cbb7
SHA256699db8a2c79791e95a0715cd70ad1ebec2fc02a1c5df6f7df3122a02fb913ab4
SHA5125971702c8467ddd03e7ab007eb18484e0283d8bbf2cb7c2ee8b65bd006ff7c4c1899d1524e0f1f399e60ab15fa11cb25c96604c9b8ce625ceb79a2ea992be537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5c15ecb10b0c9e09b0997afec9324f
SHA14b4e1cb0254c7066c84a7d5cddf02642c7d33ab1
SHA2563d5ceea76023e045d6d1e828377b558573de5476631a0f7b6ffb7e57cb4952b8
SHA512224f20dacb66f58457969a860e5191c559801a608d8c6bb0cf4739091cc408b628221c4439ae4c3f1ba28bb0b76b2a283ff7401d26e83a513abb8becb1eac2ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b696db81dd8bc76dafbc54ff92de1f5d
SHA196d76c3d43c1104ef081ec56c1347f2ecec45530
SHA256a1d10c4a62f1f4cf293c0ca8e3e43acd1a66dfce000c0af81af35b6c59e68aee
SHA51295e1edd9b2b1a617c63cc6875834b04b2652a8abc8cc8722667cd344efb5171397e23fab5750338f2cfe30fa692a8adc37cada69c4eff39da14d77f91e9e5ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a393bb1fff48987e901e8400a5d25437
SHA182ff097329488975de1bcbfcc27884a20fdc90e0
SHA2565700874ebc9a15e251bd21621a7165e80579bdcc90ff63e69da7f51315b55fc5
SHA512603544c76dbd7078404e0e7c83e86eedefac10b3063cac7308e4ab5c3a5b12a3cf1aea29dbfec9ad80e7ecd8e66224d71b093e0a272c4e6021fac7b0521c2ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54446c242cdc33b64a55deaeb549399cd
SHA1ca7271f49c8d20ee2e80ec49777958a2a3d02982
SHA256656b26559fbb81d5f07fba40612152c7c14f0e9c9dcf2db7664173479024a4fe
SHA5120609c93e604ada88b6824a37d939d0f07c3fe894d6d4b0d7deb141ea6dde8d50e997b5765b31e7401c1ae525efe9bc822ad53a0de9d844744f633a2071ced0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27c927bb4e0930ad6d1b36d9b14eb04
SHA1e6a9ee1a4568d1261ee86cc05aed0f2c7238c92d
SHA256ec5ac2354980cdac15f145d9bd3332f5e0efedcc4db6a595d57ed0f8faef6467
SHA512b20cc18308e72d84c81cf55754fc702618d8784bd6be0e4eae0d75ecd57aa2f1ad30468102bc1c47fd46070a181bc2637ef4291e6e9d0dd874780e096219cd5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18ece9390c89dfb08c5fec6b34f20b5
SHA1e96105e75403534b02bb4e9041f3ac4c506a9ce7
SHA256386210ae1b05f0342f7b50b2361c5ae144c1b8cf911c5443700de351420a491b
SHA5127890489738b1d77d5a84a67a4bf96b9cfa5489959a929be4088af27132c249bdf7235f1696610a496d260c0827d5456b70c79b2ab026debd33b53cda7974d11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff62d17d0876571d0c2c2617e1b0e1b5
SHA13d588962b2ccfc5e32ca4ac7fd46ffaf246f8d9c
SHA2566ec74145777c437db8f5fef67ad7d9b4d13089190aaf23634764ce34b6146a42
SHA512c436a77102a5115affa1106adaeec8789930659a274689a922b4a9b2265ae428eae194a12dbe191ccca42e9654d16ba68b39cf24a9805848ee1e10261a893169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f12e954dc80b6d436c238865fc195fa
SHA146b0812cecae5e4e2683aa41fa944f441accf05c
SHA25697cac98b33037df7240a286f5bec9c288fdb3e1b20dc03713076fc8706b4006f
SHA512898144ec8afc6ef33167db759bf2c14f36b1f6c4d4a322b5f35cdc34c81f12f4fec095ed23ab19908b18813fba575b570e210cd1290217257ea79e1cb1cb39c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a14cce314f4f741a2db9a273a7f8c44
SHA1fd86601816485d9b3af7fedf40eacf7fecd9fe62
SHA256b5c5f044164c2665a78a8684ef5318cf3d08d7ac1dd34d5c45032318d74a1155
SHA512fb55e177ab668b7f681f2561ec1408aa4e8a48d4b5bf21b54ada3afe16a7cfa74b070904f34a8c5ca5e70aeb3ea14989e54dc4c6f51c560bc0e5bcb3d9ee3673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e2a437e07854a8cbaaea488e9a4dae
SHA1eb24ecdb458ff80ee62bbe52049179bbf0b4ca47
SHA2564006d12374ed59cd0791819471b92416219d2cce091fb77bb0094d08e479a5d6
SHA512ec7cbc0a2dc0d37c6d00eb71c4202d8361a5a0c7d883d8df281b0f26d3a41c0e53378f64ffd3b8dd9895975ce84b75a1935739bd47e2704685d3db5252cfaa6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ed10009137ff0122fb1bf3d2305f0f
SHA1c27e2ffabdadf10519996510e5322463b6bb1978
SHA256ecd32c5a901f1c2e6eeafe7ca3ebc3993fb2f99da233f4bc8530fffae0c28fc9
SHA5123fee28f9d4b49c4d7988bfda7cfc111c0570e5d0645a7f55e54dd08b5d2a878281af53dec25a53888b0c1d9b090480bf338f55090f99e38c510b51975fde0ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f754627c5a82b2951717e81e4f92c0d9
SHA11fc5786a65fcdc31f9090a2b34810c39ca7814d5
SHA25679a1541086ec24fa359bc4e2a12feaacc4dd6ff4b44cf08eb7c9f4bd9fd87de2
SHA5124ca7760b59631967e4552926cae5d57f63229214692f54c0c9499437fbc2463e44a4763e6f7d0533fad2527601cf22160a5f68420bf7aed05abd06bd014dc118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5809b2321d7e1aa74ac0af55d2607103e
SHA1b71ddeb1da617037edff60f5d7e50a5061e2a8e6
SHA2561811262b07957bd04c3d6ecf1591539f4d2a71681f2dfe2a0ddc477f3cc7f9ea
SHA51216723416feccc4122e1b61840b9ba99da10b51b002fc36a19c2327517b087b1ec48ca4216344eed867ab760c9aadd8a97c0b711e75deacbeb777a2daa8f4aeee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b