Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
81c34acbcd99c8d76b99b1ce8d52f95c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81c34acbcd99c8d76b99b1ce8d52f95c_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c34acbcd99c8d76b99b1ce8d52f95c_JaffaCakes118.html
-
Size
123B
-
MD5
81c34acbcd99c8d76b99b1ce8d52f95c
-
SHA1
b986278b2e88792e662aecbaee86f25c32ed7c6f
-
SHA256
66a27e5e78beb68397cf39c962eef507d56a45e0f6262e5313e639a3379f8257
-
SHA512
31138f38cd8d825e73c8c673fb4a5c76fc752f11ff0da63a6d430862176ef92ba4511e5b9106994727ee025413fa09e0eb4c14590ad3c14302fc1f6c5b796683
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428707671" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10041d6355e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000ba99c1738acfc97aa3195204636adbb55f6035ace83d8e1748a4e2b51c0fa5fa000000000e800000000200002000000069abba9f3190934254ccb180d2714ccc97aa73333f84dcfbc66e0dbed783c37f20000000ddcd841947124661f3f69711c37eec9dcf9e7a161cd21677c6c053ea6592c9b9400000004272366e376067567a5f64219d695adb1e1e23a4fd5296547c528c4ae0af339f277794de625adef34c8bd3c6b689ff391cbafb85119886cc0665bd7393175090 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EA9F0C1-5048-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81c34acbcd99c8d76b99b1ce8d52f95c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501bf4dd097b4dfa302ebcbce4e88a7e8
SHA11ea2fb88826860ac1396b8386cb628d543f01410
SHA256fa5f3fd345dd101ba1b4a3febedefaf9648ba932479763f8535fa336dae0dff9
SHA512ff9c672859228d62859b2b80026bab1739e6b5b24907c12341c377edbaf9361c658884945828aa3645f73eff62337171e77b072a620f08a04e918f8234fc5d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51640d838a4ec585ec3626c8f86ce98d7
SHA12c2d764d3a1a0ab71a0f795b1dfa54bdc8510b96
SHA256b6206c6fd7642a369a77f52b0785e6caf1c74ca6cdfb75b8756758228fd59517
SHA5127bcda8faf9bd8861a56951fcbf0cae9b965ae8d5a461514c0e5926d702bebe46728207568e55c9fb20546daf66dbb90f7bbcb999ebf2cf6d9e23bf8be4c2c515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda6e3f0268e47c7fd9d42871aa5514e
SHA1f8d337acfd2d3e2736c374093bbf04727fcb8fdf
SHA256798bf310c34709a10a43905214fff0f5106788e2dbb46ed5e36f2a5a9f7eae12
SHA5128d1ee8169a067959a942fb6e4c868f2bdfcec8eb5f5675a53052a48d876a79c23622fb5a3504c52ff76be705505836f48116c610c9242381be8081ad09f0e51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ab13a794b265d63a5c58d245171893
SHA1953369dc67584b41f51e5a4e620287176f116e61
SHA2563e0e261469a18baa412df49688e4bac12e4d100adf4fc9588550f9bafb7283d1
SHA512cab462023cf4504b2cddb4193221c454c6f40b0884c74990d90372c1d180c69ca9629784b4b89d70fbda5fdb9c63371b6dbc5245f5a71fcbd7aba3cfed6dfab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd5883e322ce1d22b12300dc4126bf8
SHA1b1de8f19e659c278784fccffc7da875daf24bcad
SHA25668f7dbd812755431fd9b389ef625c6bb14ec2246c04415043ff603131621ecb0
SHA512debe11583641082ab84977a534607840d4cec9b309092d1f6b3db6172fe216f22d935a5f5ea55b1c2eee28f3338d22b9b44b182bd930773d9687536f5a1483f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e071916c7a33f6362c2a061848cd81
SHA12a04bb2cae6ea57b453fe79661b008277cb7b3b6
SHA25641fabee62c16621e838f67d00932b2840d65531187654900be8eb178fc8422f3
SHA5128ad4786a8105bc839b8401335ee6f7bbe619746da91d72a27ea9a28fb890b969c73a65e575d1e1af16580fd217bdde8393c95d01de5e3670f00299eb0d027b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57fa6407960b290718535b420513456
SHA16598506cca868419afe1ab4676647245c4448b93
SHA256e442e32c6af643964eb3dd0549c998526666d7c9934775ee67c67f8ef7957398
SHA51256400581cb63313dddde325c03f03d4a8095d151a876ecc594c6f6a4503e5885f8bcfa171328807d161451c33f693b9a9a4b104b5860407b7b5ff44bca0caf21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf1b8aab3e4760a31a6a0fef636b0f3
SHA122d920cdc21ed754d23b4b0170739ce04c48935d
SHA256a7be964f2a0c68ce2c6ad41bbc4d790b7d2b1bf9fa868bc6174a3d279f30f8a9
SHA512f87caa57ac22919a2d3d18bd97f82e9da632518adac2cdda1fb16920904be02523119d5a756c0b3684ecc05304b2eee7352e00c14ab064515fd2d2d9a77be22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd45909f2e689824b5c12fd69d9b9ae3
SHA1bf688fe2d171adc6427ba481694d481ebf7ea0fb
SHA25668b2cea1a5a794b9fe337e902fc55c3cd80fc8c1e391e1c0e1c1a559a0bb74f9
SHA512198285f1b7b9ff704c379319b194754c2c2f804a0d58f8bb998312d65fc10e2af44636aa7f65c6010581b224062b1b6b1a9d4d8d52deb72e523b58fe36461f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1da7d9227866c32499b4535e8be9211
SHA19b1e250dae9c020f6fc53d40e93797950a1d658f
SHA256a8ba5d657ffc6ffc4cd76921c921f685feb78ef08b45f52c4c12058acfb42607
SHA51277adb4a3467c3739f738cce34be32e6828e4b2df1f91bbe5652911f8790b7f840e86088551dbe8c66f2457685b5a2c3b0004e24813c1533eb7dc87ccd2e8d64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7624c03d266ad99cf235f0c500b3d2
SHA17703322139ba17faf528e7f05ab3f196c1774fdd
SHA25662db4b22e43436e30c7479790d67f46ccc794b57cdf9c5ad1af9db4acc699ee7
SHA512c266b1de25800616cc002d94bf2cc7162ecd66f70b3101e1ff4097a3bdb377916e9aa9c37d24ab214360f67debe1f57f5a550dd4f2cbeb895a55d14580195eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542253231ad22b96aebca1b4758e44a0a
SHA10e85df47c67ad4842d33cfc0afefb4a3b9fd89f8
SHA256ec60710c2dc0642970aec01c035281b075126e578a11cc70ff45f110bf62c112
SHA512855ab5a4c86c1b9c7461a3acd911ee3411ed162fefe052dfaa2a2941a6766e10f8641590de832b1b5f4c7417c8ad06577edb21244064d9dc404df4280bcf2bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed45e914630efd9647a36ea99a8de3b
SHA1ab65f9bc9c722f9a49d6d1a8ac89027e04ebe139
SHA256d7f725ebd501047f33d1d80434c6aaa5f6e6f3cf139d30e2a400a4fca8d6ad42
SHA5124ce034c0e1f7f44c1ab1e12b3c296a921716bae5c8a49b0e7107c60b5323d7c9766f0a8f16ffcf73983c17e9d9ea28826279281989311e6b4fd20a6dd7b35b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecafee0f699ef2a074a6642de75dbd2
SHA19447b293c7310df81e76c41da2ac6b2b211023c2
SHA256a52f75f3c9e1abd3732a516d9e20a6c8d42033d79bb9a104aa538dcbe4a9d357
SHA51221da6725d2355eaa07a06c2c7d18150eaf9494b5c65d08ac721e4f01157ac2fc24e36c9c7de712d098dcaf9b8b7360d4e625bf3a0d4374ca4d9980fefaa96ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d4cb5d02fa459e67b4bab8b0ca8881
SHA143660661dde8f064505828b8ff9e6b562fb728ef
SHA256620705504bbb113c4bc83212b7f184f25691844ece1cea31c1d64aa6b0ce2ffb
SHA512842c90c8ac8ce854bc675def9d99102485d1686af19507139ac18542a53e4574a1d45eadc6347c2fd9fee2865845eef124c17d2d90cf3f9f1624bb79af1d554d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55675e443decc3c00a68f77f2da0454ce
SHA17897c930339dbac12339b971a53c4a461ce26cba
SHA2565cf4e6b48ff022d82ef6bdc862ad9358f1ecf2e34ad24805852a782d99a1ca04
SHA512c6d7524b6a7ff35d23d14a62a9efd292b2f5b0f492352774efa6127f1a49955a9461f5df66220fbf15fd79de94b29d41c5863b5e80968a77bae4bf1172f34905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53afd8d3d05bf498b49e5f8f275b7f7b6
SHA1fb6a39f58bf216f7c70ce3840e870e65eab5f0f5
SHA256ad0a9e0168fe1c11106ecc8e830e4ac453d6492843b8efe5d386e49a00444896
SHA5121180fc2d690e5dd54008c88994d258f284b21d88cffe31bdb438f567b50c57e4e33414c332630b5ba2bbd0b9a7cae04b7d6b9c10c2e04227991aebbda2646dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5195a76a2f40fc6da2640fd416dbe7acb
SHA1c94430f551eccc05c863041bda598e3342a5363a
SHA256d904faf4905906207d02339840f94391792ee2f777586f0c7e2d5a230427b56c
SHA5122431383430eadb9099ebb226ee7ab442800b2bf5743836388de4515581c5bb47a0f61dda68d3e01c42d202154334c8c4d9ae2f1e7f29b5eba7a72aea4e5b1921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e30fd8baa6ad3a0fe931b1ee85018b
SHA1c1b8d68e188612622096bc8accb35520e60b79ef
SHA256bcc84e16e48b9d028044a9fa90603bef353bfd3eae907a12c3d1e7c0a8054bc1
SHA51286aa6e78daf016a2a227f63ece0d996efc7394ec68ddacbed61d12eb5e8fae5592d59bdd5b5348e3508af857c2cc9be830a9b9aa624364e07fc7c21a66c5e86b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b