Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
827e6edc83189b2ab24768ffed6dff44_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
827e6edc83189b2ab24768ffed6dff44_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
827e6edc83189b2ab24768ffed6dff44_JaffaCakes118.html
-
Size
2KB
-
MD5
827e6edc83189b2ab24768ffed6dff44
-
SHA1
6e1fe863c7fe187779a43b9b97e3972340491f97
-
SHA256
ae3f046cc441290a4e84bb1e66d20d3fca4758fd7be4ed7a1e7f2bbcb3a17afd
-
SHA512
79bd27b014797218fc9b4015cd0fa6817f63c1b2cab6e6b67f6498ce901f67ec4567d9cd14b6bf1cb3fb01253ed5f5c8c2f5197c4bb3aecaaff8e43671efd3e5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000005572f146711ae1dd450052d0d173a6eb293bcf3fef7c4988f2368db91c683e20000000000e8000000002000020000000322618be455da6273459673e545d17f13bd953ad97c0b8b8ce59ed0b23ce3114200000009e7f33263fb7477dfc15de7f3dae929c77ec040b334d5aff453365e4fa2576f940000000cd056caa83965b720602a0253065574a82e818a335007e7b1595ac9a953fbb4e04a4e3c7174e3f50a0f29034dcd21950046dfefc2e2c494c3f6b2edbd15ed003 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428723579" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98930CF1-506D-11EF-A069-5E92D6109A20} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f052cb6f7ae4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2816 1952 iexplore.exe 30 PID 1952 wrote to memory of 2816 1952 iexplore.exe 30 PID 1952 wrote to memory of 2816 1952 iexplore.exe 30 PID 1952 wrote to memory of 2816 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\827e6edc83189b2ab24768ffed6dff44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cccf9738ea9d2054718fb23081c2350
SHA1f078ecbde150563209ad3f88f368269272346006
SHA2562a282af49ceabdba3beb6b7b415fc0b7c887b4de721d187915b82923ccabcf8e
SHA51275192bb94f79adfb96221edd1c373066e2e9ac968c7d07fec9cbb560e939b26c56e4278b7515cab2eaacd9d964c143b9c0fab2c6805c3ac0b31ca81ae828dfa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98c234751ee52aa08d0a4f6b572aac2
SHA1724ac022c3c9de20959d0c36539e7c3a0774a368
SHA2565ff86dc0595ea3db83e642fc0dccae8571b998b2a69c443be4d4f1116653335c
SHA512f36435acd76cc6a9865a4aba5a441f747f7c492fd7109879ad133e377ed779ef2987c9756c30aa7bad805953a1bd2645497a0f3c66057d9b7204fd6d01d789a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ece569e8f935f86644ffad9d849c3c
SHA193c19cf7955ca461188039b61cc563c3d5b130e6
SHA256d2796036b3236011d0a60f555b796a9a4bd50184b1e15e860259b3d33590703c
SHA5126cecb8ac8941c7fc222a738c94a4d40b0de97c468918e90e6d9559c5b6ce7758327f494589339ba8bb2cbc2ff76ef9778e6f8174139837adf016745068f6fd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41a58128d4576d362d8a81f695ae6e0
SHA131f73bd3e668abff667852a870d94e242ed601d4
SHA2563e79a0d0c62bf93e11ea95403487697b3f2d29710dc5d7cf1e1a7429124b10dd
SHA512bd47793dd44e71a2f092e1c733735c33998fff70be47fd3d05d919470ce99cb04320a77f4a9a1ce2da6667f60a28ee8ae5c326e1c228c7d7c6a7b2701d3821d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa32342d03e806ed6b9ab5d20d9e645
SHA178e166b270956c65f6c0b3fe8a8eff510f2b1035
SHA256f6f6a145a3a9fcb9c7bd1d4eb1f956b8ce4b06dd0d29cc56c5b520a61d4f19c0
SHA5126c9a6c74935f299e19eee7423c3a3a29ed357a1d181c1f1d1ce446e2aa2965d847995f824436274fa6af83998c4c52adf3b5e055194a4cd3267206ac7e7c8cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55547a0b93fc996c49d815ae021bd74a2
SHA18c2b1444e966e8d62d0c344544d0a8b67c237c5f
SHA256408608c3c47cf08250e2e2a2bf8a92fbfe8bff640cb088ff68f462d3a4dae3f6
SHA512a35cb9988d315b70d5aff71136c7bcda9561b5191a1b98d605614552f18e275d094e353d6265034585b56398798b7b6b849964c53378c2767e375760f63abe2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53679a1fee840da275015e7522d25dc09
SHA11d30375c1bf5fa2ae9605cf00002fe4f273253f1
SHA256e327d664f5129963aa7b1f682d3d5f0fef1a8c96f7c19b0c38741d3ddc82811d
SHA512d2827cd1f930ed688d3d01ba3c6e298e321e66087f8c64bdea0e9a395ef5c399b18e28e85984b20fe0561dc119622e2f91a5052259f36932b1186116974f060b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6357a44a61c34d5fc1d8a0ef0001aa0
SHA1d796fa608079b2ea57defa4712cbc2733a3f2b2c
SHA2561081e0356896754ead795d2cea9ff22f8e913960b223b0b53f873a1b79742f84
SHA512f8978e435e17ab67d920f90191094c05bceebd43bf3dd47f34c57cdcaa2fa149fc33d3d9f8055adfb768c32dca7f617a726564901890c1dba0bc0e9c5562b294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b4e9a2742f12d84e51d10acbe4161ee
SHA1baa22a015e835e09e70bb2cb174d6fc2831fe061
SHA25602addef5723c9c1693d7322090b20b6154c3fedc509425266b7b7d96415db3f1
SHA5129bd6d7795584718d2e6395fc82e869ea66a29e576cb7d8ebf2de206c8f601b235117711f822e0b011dfbb9e58b6b88a02e5ccbbd245c4c494f743110d6dafe42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095cd4872330389a8992b9803a07a805
SHA1f8bb8d2920db09e693991cf21e64967c93eccbf2
SHA2561e64cc14fd7ef3bc3edbac6bac34f66ff44351c446f5d2f25d590153ec124613
SHA5127cefc51ffe03a39f9fbe36094fef84d218c964e8ee615bdc9d500ac694a95f57e69733eb66a21e1bd62c211ddf1c95440b99eab4b913858764f274a9358c76fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed45282e93e9c419587e85d05b16b478
SHA185ab290956cee8349d7f147aaa22bbfaac4218ac
SHA256c622f22b68fe108ea23c4507df545569177420189e01127236a13863d9151f80
SHA512d24bcae197c69572781872853863359bfd692821ae1460d1d9a6762346f2039e8731287312816fec4a909fbb0f435368d3f9caa43d4bbda83bd0bfa5256fa560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a1bb04551342c35d082cb0b95dd5b1
SHA1c1bba638539bb5b088dca00c3e1ecc90141a3b44
SHA25603d4a5a5286b70830435634725396957e3bacc687487f5952dae1dd029149632
SHA51201b967357504a87ff6f92974a75b10de8426ff51beb7d9064e2e2a2570db4b30b3c1297c941ad61d0bfae845d8eda54de68af887d52e6312be459e415d6e741f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589771cf75dabab85eb217f4c5c75f4d0
SHA11d79e678a6fd548448aba00020c72b85c062b196
SHA25630cf040e83ca0606775283d9fd9535d9236c3a4b925e8b655e4735cc71c72f7e
SHA5128417d43d86e09b1843c1975c76d8ef261dda53bf4afa7f7e8a68b7dbd0d18acc89e2d7f38224ca91f6a07cca5d88c43eace2769a8daa089e8a0cb3b33693fbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523251bc730c045471cf581cad56aad97
SHA1284d9c1e8935a83f32726d542e2e2284fcad695f
SHA2564e927bb2eb3f1eef8bd841b7cf22afd2344504e8ddef9337795274dd0a0050e9
SHA51212ad1db2f3db1a1e7387a4d24a799dbfb9e1df5b3303b100727f2fedfdc84960ee70a447ea8e30a21873f3eb103360fdd797f4af1eea1dafe313d8c81c3470f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a5fe5a74d9798425c864df3faf4221e
SHA1b4c8d5632e344006e9ebc037599985813bc12523
SHA256d9a16c01443669fe553a45482176452cbece6373e92120b0b848cc2ec6f1f71b
SHA51201fc994963213a72345780774b58129b4a7a233aa7e0cdd0168874a049bf928b1cedd711b5b53b37dd9895738b1ffebb4723ddd63fbc72a64489094f92381fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aac90bc55863c98753ccb2bef02b4c7
SHA19f9c6b4df7628560b9153904de16b2788cbb8f21
SHA256b055ff402f141b08a5217afa8725c74aa48b2c3017852cd3cc5138a92220158b
SHA51238bf739ef4279664206c5bac3d71cd328fe5044c1cd94ece0dc4a2073a751673932a2ea9422c0e068c092a4d3abf849e9329912eaacf0d26caf31ca59234cfae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a76e8192fde0a65761203054f8a0049
SHA1e4a16b73531168cf4af7681ad6e6eaa64c65d2c0
SHA25636a62fd6fe4f2e1587f16cdfe50b557cbef2d106693894d153d4bdaf3eccd4bd
SHA51274eebc5d4cbdf54fbe23a9f7330431062fdee2ddc2ce06d9890ace73a04b1cd32a10c13c75008845ffb1bf37778ff95d989ff83be47e446c497ceb29c6737993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff5267f1da1f380792f60fdb510104f
SHA1eee1a362bb65d3cb85fa5e5de0555290faba8d7b
SHA2569c54a03c3bffdd4ba430ad90fb5a085c99991abd67273f1ee1c8dad4b21aa826
SHA512f5f2951557a0766b46765774361eccf7f984dd03dc14b33ef43b0c76d074aabd9f4766de591e4742485966294c8deba4a8dd10bdebb228921d461ca21b1d709a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e5fad229b9313dce47d3052b23aa28
SHA131f6a330512180c17434d58f2b34bc450b30537c
SHA256a076b48876425a7f159cdc5836a7080c2452cbb8064b4b11eee00f828db2ed32
SHA51272bb29c3ac16594b27cb48cc23ceccc99414357506fe8537f2159fed7959aa435e9b3d74dc81ed1cd22b81b1b4046a54bec86b498a1228dc73776d54ee4884b2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b