Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
81da2fded65d84936601e4387e4f5740_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81da2fded65d84936601e4387e4f5740_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81da2fded65d84936601e4387e4f5740_JaffaCakes118.html
-
Size
1KB
-
MD5
81da2fded65d84936601e4387e4f5740
-
SHA1
0414f08fc4bb79f175cac90781c1244ad41c6d64
-
SHA256
7eaba05c74eb10c65d9edb2947ebeef3391042d939934d6757739975a8b3dc90
-
SHA512
7f3886cf7bc513ca83ca0016aee8fc8b014bd46a27ee09026e12dd4dab1590376f04c189b961cdb54c9a6d9c59923b9c88db6f40880228194a5d7d7c50188d8a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0fa20925ce4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428710752" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000096dfe0b390ca3856a780caf33b1de07b1d50b0479ce5cd6db2e6431df54205e1000000000e8000000002000020000000f2757ead6e840eb06e78d83a5be4636ab6aa54ae2f191a6b169b91ca51622aa620000000aa07e01a91ce54b1efd1dc96180a9a6c63b8965a043dd3fabdb214f4a4a4a15c400000005e6d65343f9c3c25f93707c8bc4a3da50c51845669928484245471eae1608b4b46021546d806b704844e5eb751549169ae32fe9a7d605ada93d4e3482282ae8c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBB03AF1-504F-11EF-8340-72D30ED4C808} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 852 iexplore.exe 852 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 852 wrote to memory of 2180 852 iexplore.exe 31 PID 852 wrote to memory of 2180 852 iexplore.exe 31 PID 852 wrote to memory of 2180 852 iexplore.exe 31 PID 852 wrote to memory of 2180 852 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81da2fded65d84936601e4387e4f5740_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59632e14fb8118155913d25fe19cbfa79
SHA1add1e8dcbec4df6f458d7fff6a1979a317f870fe
SHA2567b5c31a76aa0e04c9e1ecae393410b216ff4059b3dc224973edf8808ab9c45d4
SHA512c3a7c7677c799e883a79b9370b04e134ca00e1fb00873db1be18b35dd10e89880c0ccc8f76239c4074bb382a71e5b08a8f0c1075c121a280f172e8c3f1556a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92fa0e3dc095beb0991ad2cfb86a930
SHA1a9bbc16c60640aaabf74676495ca884fc98ae560
SHA2566b0e09df8767fa69727e8cd04fd3b82413b3e6a3d3d0cf4f2900bb96c3025d4c
SHA51275c236ccd144c124c4bb04fefb26c2c97ab655974505cc9ab4fa709d77f2b77417a5565def376fe7614c6c1d5fcee3ec04596ebf1121f36551b68dc6b75a9938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d84715be7cb3f6b8360015036ebe42e
SHA11296d80e497aa3120fb40274fd933470579deffe
SHA2563aa097dfd88a3ce1dc917688205e99a0579e28563255350b827848b96966289c
SHA51262e9eebd5f0788e50e8412fea77de285809bcf95fc249d41c676047808fc177cfa55fb4289612999bdcdac3c86111445f89bafe1fae02c8e93a124898b5f08a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e0ff007704a59256e17fac32c2366af
SHA13bca61cfddeceae522254fd4c348cd7f06f5187e
SHA2561b7a58840603b4eb7c27a5799297e32edadcc0e15c4d07cff432c7ab6f7c0c54
SHA51217eeb8acbd5df99a34c697d84c01bf43444dbb45671ea2ee1b8ad49aefe83521d5f8ed862ed91742666b23368d393370c6cc180ec69bc26f7b2a0ab81ca7682d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56407b027bc881911e140ba93f92a2608
SHA19d35fb4950ebaf458ea0715a030c3368dacbb8ac
SHA256971c85f9afaa5da370496f18b4fbb8968a5deb5f19bf1b1c72b40ec2e1d3a9ee
SHA5128ae8221d449f639fad57e0e00f5e3487a6fcff3974d7536e4f934e5e31f6627a03a489b5de3c6f14b4e026951e697629505b3ab1c72594ca8f588181512271c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0d8c2d0ffb2a7d8d3a9c3c37c68062
SHA15ed5eb4f852939ab5f6cc12774b44bf647ddedb3
SHA2569fa65e871d0b625e83bbd2829414b041c0ae7e624cb9e011aaecb3d007dcb997
SHA512766c1ba7969499d4c5ac8cd0b32807a7d21e51622f4fd1620ad71e5bd5495200067893ef54d5a9618a0274a3a436a679455960f7be2e9d1cabd076ec26e4a1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ce678d224acad27a304d7720aceae4
SHA16bb6c8b2ea35e4dcad2706e069ad53f74b9098eb
SHA25646afe11adfcefef6527710dd76f16293aac238a36cf956692987d70f1b3b25f8
SHA5123482814522d3a9ac1a7982fa33f43562117ed571dbc53116dac6eb550fedf12c68d1da6b384e6c13df6ea58d9f77e6ee689868f85b10b377866e42fee0a01dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221ed05e49d50cadb9a7de5b0bf6a181
SHA148b7d9496a1bcb69d409e89ff04fbe64dd2b8467
SHA2563dd91224003230dc447a650e102c7c226dee94045db36ae80ca5cd6d9ca1190f
SHA512425e684989ff9246fa870e89a3135aeb177fe60da7012d8b309213e80a5db4c45c8fd5568729bdd79bd58b5ee0bdcb93159bd57538294fe3e9686ea37226028a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52199c52ec45a02d56b0386d5e572acd1
SHA1115dbaf677642f602980f7ba681329216b8bb953
SHA256b76b499c73bc5bfbc85c6bde6791ee0bf04ba60dd1b6b452bccdda4da3458784
SHA5120caca5f68f1f5d63a6989b90757a2d505a10cdbdb1d6ee222eeb9c3e605dd9b6a91065b362f004758f225bedc053d0d214efaf045ff5d8add53710ab5678df4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592bf13e05ef17af131cf5e0bfb04b4d1
SHA137867990f95bee93da42cbf3853a6fd815d23dce
SHA256736ef1a98fecd0f826fd0c19fa3f0169d827ab91f9355c3dc2120706651dff3d
SHA5128839923e5cba7212c476e6a0134ba743be019eedf80ebdd9ac7eb39cce0654655f6a873474bbd730bb1647eb7bb40d20d0f1a5bdc36969715d1b4604b555128c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c271da51c43ec38df09370405d9ff1a2
SHA15555df20c669d0635c30c3aaa85e3a65ba94a07e
SHA256018400d4bb75689fc8a6f2281484c3eaf31a5ea73cd74e0f4bda55f37bf91ff9
SHA512e3d3dad8a867265dc430dfbb920d101b525ad1f664c2e40592cbe6c5dcfaf3d7d010d5e7f4739dc4bbfa4de7e8994c583b28e5b6f820c47173001779d9091da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f4a77e77916f811164099d61e7ce860
SHA1c05b565ea805ba38b80d69cacfaaf3385e2c34a2
SHA256b7841be413f38c82f49c6c67cfbfddc29d06f09007a92c3f778e6c3d77c99d3f
SHA512693e6f901463d2795d57502d5ec3bc8286cd9b206798898228916d9d3ba4feedfb7f4e718d9dd9ed66593014684efcef5c3e720f98a91622c616911ebafef235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5406f9b83d62e8cb1fdb11dbd6c5123a4
SHA186a77d476b32615d11a7eeecf81003e8eb66ba36
SHA25697c0ea12bccc12ad2869dfe19603c318ccf660f8093ba47dc4351d711eef17d2
SHA5120ac5781833a93ff537cbb60431f8d08daaeea287cdab51400c80deeb38246e1b527bdf802dfebc7a81b660e4ca8cfe8d74e9a32bd6dc831e211b4627f1d1d9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51115c8fd7e728a37ac19451609adfd9b
SHA1a3afb755dd7233bcb77e3705e9b5bbd82a4dfd6f
SHA25690ddf69640c76e496084f67ee78d35d5711e497fc3331faef3340c1338f0a460
SHA5123c88977b827a98a08f0819956d455cfc300a041a90d7d25c9223996c840921d2df80ac0e09ef5ece22abe05863ed9ad740ef3be4f57b7195c07edfb4a70680dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518beff1301c007a595825f93243fa87c
SHA16475ffdda2de80e09ad23364ac8e48e026e04478
SHA256342afca4f8d7deaefe9c8f45c2fabe0efca8eb26699e6f2b21199dea085c5b32
SHA51259f5c227197983097684495324edf65b6a904e5e30b0a3486a06bce3e9540bedcbddda43d61fb964cb62ef2c920fa1082a8335d435db8ddfe28fc88a5eb003e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbfb6f9d26115568325875abc2b2d117
SHA1df0cc3606de2533c62cc9ea488eb841b5d11cc37
SHA25664e0a988a6e80c066f6f847d878cebed35795518b883f74c5cd7c091088f4608
SHA51275fe2a0160dce4d7eacc4b35595e9ca4ef7e0029e9b61fcdbbe2acdf0d3e1b9ee318d0d7f1cb66a34292404a94ae8242604bc3b953140a80e47e5a6952e75a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d1dfb504b72dbeb62534f767e41c08
SHA1b4d08e4b485e29316414ec1b29bce3d122da1b09
SHA25644749b8035189f45049c8c378512776b0f6f285a6a1200826a4789df68f02ba9
SHA5125d779bb77256f01c48e757428753dcf88fc99be3359db4e379ca2dee5d4a353ee9115f6dfa2c0bac42ae00bcf18ee5967f37b50b8a6df00d865a2de85eac89bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4ece8166eb7017a616ed53a9a5cfca
SHA1483f4372a27ebf5cc257fa04d02c316b8a254ce8
SHA2565afde81d5b4a24d2d30ca8bf331df081cb43558c89cb11965085a29470aa5919
SHA512abaf12bb9ba4f13c25565b266020785f4e6d416b409e7e4dfc27cddbb88b7f7a3a982bec8f5cce2dd255695c6a466fdfc47827550152f01f4c5b6eb60039edfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739fecea58ab5a96d5d282c8f55f7650
SHA10ef3c36f907a4bc8fd9a6718ad5d67c0cdd9d12d
SHA256db6aafd48a8fafdbd9d08be238051666bbd28f4de0badf503632d142d1165d16
SHA512d48f93a9721ba8d75c0c482e9bb838433e7540cc0e85f09b51b3dc40f02ccb49258d37688d6981e0f2e06d491c0a9dc0289bca4c8faa4633db793f7bbae9c2ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b