Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
81ca504a13a029db2a91f8e39a2d02dc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81ca504a13a029db2a91f8e39a2d02dc_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81ca504a13a029db2a91f8e39a2d02dc_JaffaCakes118.html
-
Size
3KB
-
MD5
81ca504a13a029db2a91f8e39a2d02dc
-
SHA1
c9c9550a0f3cb1426a31cab4018650b22030ab9b
-
SHA256
f9eb5ca73f9e5ead6d40ce3d1e392391c9129e5ebc8088282b216c05c2e47251
-
SHA512
f7aac7e4209cfd79c0ca2174b6281808334c0be400809c3ae95fad70fe92138fa31f56331c40000f57ea44ba0e53d9bc43d34469e8cb2d9cb1dda3677c669a63
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000007825e93c46e2e81d7fff56be1e3e976288acdb8a6851642b6bdd5be48ae86891000000000e800000000200002000000082a6b86a6a7e32cbf37cd29158f30620b8f07437fabce5a4f538af83e494d71520000000fac97e3ef47ea2431c1997df4e4d38089951d8882c175ffb0a97f103f406f0a140000000f2fb3fc02f03ee7265e5c8cdbfe569ff9dcc7a35b790e12a2ebb2b61b6688828ba10a960b269787a5842b14aa41f2c8f7b6c78ba4bf37883a16cde1ae236d522 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c7c7fa59e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21DE6E81-504D-11EF-AE10-CEBD2182E735} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428709635" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1940 3068 iexplore.exe 28 PID 3068 wrote to memory of 1940 3068 iexplore.exe 28 PID 3068 wrote to memory of 1940 3068 iexplore.exe 28 PID 3068 wrote to memory of 1940 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81ca504a13a029db2a91f8e39a2d02dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ce0a12143c6cb1095dd08e274c6a79
SHA171a37dd26d0c64ec74d82b9f0cd5bb4c0a5515e7
SHA2567a5634b7334949f0e27c382f89b50ffd24d99a145f18a60124fcbfda5a5b9f2a
SHA512c1e8364fc8b8199623e16fab316601ccdad5678874ee32608fc2b4c5caa4c25f3ab90bc88336cb8b57a95a2dc057ef9058484efae3341b2daa5fdae48fdeaf55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a54d80ca1d9a337e284286dd999464c
SHA178c90dbef029d2fdcb0dc894ce4300f33d8b98f2
SHA256d1618752682a111a94c09ee575cac5bb901e115016f6ca7758740126f5288045
SHA512b9460762112962cfbf65ef7a8593f6b65dde70e1f35d8448703f605733122db96997874ffa19f9e11764ae4a806f19f8c41ca0c1168f80418f3f8f80f71c6a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0d4e96c98d028b66b610acdf6d7ba1
SHA153f83936c4563d8bd5ff67dd25c4a1ef049906f4
SHA256f85931e5ad4f763ca7069c3d0fd77b400063eec49d86c99dc442b2eb9ba110ac
SHA512e0edb5601c646bdbe9c882a2d66ae10f38481c6475068b880a953f0670c25cafa5785f56bbd4c6f19589460f50e22def77fd5e6e21ab53fa26aba36b31f30208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ad3368de9c71b68aac5b9a7e35147a
SHA14aae7b4e611994e1d9cd9e674015a60388305ae1
SHA256b63444ded32c0ce0a85b97cc5c074a11baa528fd0ac5ecdeb52ee793d59b8507
SHA512c3f1f91028db957884b8bf7a79993796ff3a715cabf3125e067971b6a3541520b4dc313f8a9faaa15d0d9a8318c085c5f2b8a2eaba79d88f4499f716419c0bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03cb9cd60c9377afffedcab3d0f0bbf
SHA153694b92b7d55a22f0e236d9f923deaf5971c073
SHA25601222393a48bf1efe07c7989ebf20cf0e324c3e67fbd769acf3c347e40667764
SHA5127b8fe933d3c99acbe1aa2451605682e821c129bd6e69415576bc56a281d3e9847cf1ce279b0cdeb2b5a33f8ee9de66befed21fd9b428762c2171fa26f2c59978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c877e94d2d2b68f846876a8d4091c1
SHA1c1856f7ae4407807cf29b77fdbc34b417d15fcb4
SHA256f752a244c9f71f9a3d5bf761d40c5d6d7ba8528292b089ac802dca76547d19c0
SHA512c2af251c4b1f19ff252300416685fa3f7a018ec927df4a03461134b3cd5c0a963fe5cfe3b750f51411ecbba25bc7f93d15033779eff682d048b468036577fb96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538d24ae272ca43cd8a17341eea25899
SHA1afb7dd6d505d8e7f585442886df49324e346ccfd
SHA25648ba52b7dc4fd7045d16b1b9761e4c45de87302d803c12db177426aec2b35e22
SHA51217355c11d35ed2442dce195449774a837a978857ad77addce262697ddd1b28d82b6b0459e36d8c85d38e6d6c65e1989bc983fe5f86b7378d7a953518b445ce5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f95df88fcf59040501ffe3caa91185
SHA15a7fb196dd719b86f4556fba47e2bcc5c4bd87db
SHA2568d9c1e62ecf9e221ee258a9667fa41a175f29bf995cdb4eda49369e77db8a025
SHA5126080d3408c186b0d248aea0b1baa4af10c950e287791d1551bbdbb3e13772920eea9e72da9002733397fdc64d16b626be030d9583ec5a7f5133f88cf05313dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51adabdeb716005191c2252171ead780d
SHA18a91de00bd5bfa5c9e4475ca32b12533a327c7b2
SHA2560d0cb87a3057747a68b520511a6ead6faa7eeb283cc47cbb4658b4c9dda59469
SHA51294eeee43e72a2f75209580f24ce2febcc999966cb66d4b8236d172e1370e977881b32537e7b3fe2fc7b692d75c79e828a5dc72becb7a06c7be86d2c326c7db9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a40000e95b9b2fd83e5f4398477da23
SHA18b604a8c22f89ead5c7dba40ac94a791299a96f9
SHA256f8c922b909f3291e2e6e185fd230d8a122135706596eba50e90ea76ab6652099
SHA5120defb6b2436f95f5e2e7289d0466275cc65e15e2276394b41de4e581bc36cc0ec31c0fd6fb736458f04d034f359bee1884b6b329e8736f8747747b247fd24437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abf0b8b74b76b4a096293d0287a4610
SHA1e56a4edd25015e501b7421831eb74d3dfeb040b8
SHA2561027de391220a25aaa6378513141876bc5b1f4a413dc8fbb4da36b789ee6aba7
SHA512211a28ab6b04d519d5f3eb3b99044cc22ceb5dfde277365e3ac8e38a639bb96e22c3952a3081a1ee63a3e4cd8361d16349290534fc9564417dbd426fa3cf7547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5247e06906d28778ab32dfdd83c7ea54e
SHA1178d68b12b764dadc2ffef87af59a3a8342ea46d
SHA256d566d51b5df79bd29acc51521b5df5fce4730f8b48d807376c6a780a56271f07
SHA5128a0a1999211cc47c24e32ef81c2701b2c8840cf2ef5f01b97066be3b34b5fd03c2b161956d2bf37b8ac47ad46194f0db885f84946b29327868966905ce1d7c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f377b9d0bc132413b7a1253b46f03517
SHA1b7f436c33e6fe25af3a48d76de5a1fc2b93af61f
SHA256f1ef1ebd44fe454fe6d0cfc9c8913091c08d531c2d1780b708207c29db2a8b9d
SHA5125ce93268c0f55e9e0d43786b1752f745889b103c9c2868d87e55bd5135edd418c1a0db54b0507e803e7d55bab49967aa01e437b346b2160035fcd1cfe144ec35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7fcca001f91b136fe17ed6574bb2f81
SHA1a9b3df992c7b676605d4deef50dc541d7e32134f
SHA256de1455037d7e511cfcd86fbaedf676d7a40e07bd628069c5631718e77f277b4d
SHA5129841809f0e5357609d4e833778226d7b60e429f538054258267935fa6ada4d62b254faeeb6989fa89fc647850a49451fef184796fb82eadf07d8d020a9bf3076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b270b90b096edeac78cbaf4bb291c329
SHA1a994490a274b3d98a91019e18c8fd49be1544f9f
SHA25616c198cfa45c7dacc05c731bd26988687001953945bd529be54250760ad59f8f
SHA512249148b5908946d4328496ef79aefc1068d76ced4f4494e7ea4af9a7ff4901708e80a292d4d77d8b4b0555faba83b9aadd84179a0f7e321ac6017c6833702e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59006c542468390203c22292359e953b0
SHA1898898df55382baefbb712bf1f3eb91003e6c5d2
SHA256060a8bd08df1d1b24ea40f12a3366707cdc7ce40d7370fc1bff37c5f0e039596
SHA512bb44d751ba7aa88c0a402e86ce9cfc643d57f756c18b2e2f20b797aa2102df7f81f6b03ecf54808517c5ff34e63f9255b3334646ac6d3e4aa360895155f71403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b533424f50bf7059082d3a278cfec5b
SHA1e688e104d59e3f3d45161198825c397c2aa32102
SHA256a9847853285c7ac641731daab69c5355868adc57442537d7e2ab970d1afef492
SHA512cbb5e9613d412e3dfaf1c161206f534f18aa4599909f5785bcaf4922c2457e9077196026877b8e4c950c49f7a952a95da7d0fdf348499dc29b35cd858a2069a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb1f255a9b3255e72faf63bd0c44196
SHA1d8d661d085e0be1856ad0637c836ccc3730974d9
SHA256162802f031fe192fb33dfb48730ee06ad4713de4c9e1e1b41fd9cbe7e1fb69d3
SHA5127599b54ab989209bb1681d79cbded326a747e0f752513d8cc3781cc181f2397675cd18e3ff764de909f7253a12f78d628cd42e8d3c09dbd85dfb8c79c8eb05a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2de4d45c9cbe3637a9770c3d26a2b6
SHA1a218e2f44def78701376b6ace1ad257c1449bd5a
SHA256dcd05b578068ea2726216d3cffef3370e5019f9f52b95c90cd6325678697d788
SHA512edff4d7dc69a65e6f209296e07f67351dccc05adc9090e8e85ee613327e15ba9e0e97b7c0cb2ebfe62e101e3d29d648c54ac3d97353c3a75dc42b599e66d8f8a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b