Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
84303c24841d63b96752f522d2237624_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
84303c24841d63b96752f522d2237624_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84303c24841d63b96752f522d2237624_JaffaCakes118.html
-
Size
3KB
-
MD5
84303c24841d63b96752f522d2237624
-
SHA1
8fcb0a0e7e6f8a430d44648518210f385cf189ee
-
SHA256
041d73c3000e56b645989f6bc4641fad48aff93a402f7eb87424a0b3ae1eab86
-
SHA512
8d081cba06e81f74191b82584f7e7e55c03a1e96b1a0d5957a16c5d9200d6858d69a97bb90f79af861520dfa8922523b2aef9862835465bec1c11a6017ab0909
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000e08f0a7b8466fd50cb623723a26373e4dafb069cd5b252196e390f76d58d3dfc000000000e8000000002000020000000e06b6f2ab4c31ae6aecd460b0508cea05bd13616266ec9d4f807123d02bb3d9720000000dd71aa61239a2b38eb171aff35d0aeed7928cf8d781d2f2d15ac7eb274f454784000000094bcbbea2248c5440a93c397635a7b491686b918f3c3faeca59a542c6533335dbd6a7d442dde9403e0f07d5f6946d7166894338ea04d63a3fdd23457c6978d31 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE3FA181-56B1-11EF-85EE-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429412554" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02deeabbeeada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2820 2680 iexplore.exe 30 PID 2680 wrote to memory of 2820 2680 iexplore.exe 30 PID 2680 wrote to memory of 2820 2680 iexplore.exe 30 PID 2680 wrote to memory of 2820 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84303c24841d63b96752f522d2237624_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451454f0d483de8e135007e3e9c0ad7e
SHA1188f1957b952e4b0f4b809707e9e036fec1660cc
SHA25656164b76ca4e9114fd676a328461283738ab3a0424478070c5bda56ae06d5969
SHA512971d7a2c192abc8ab5d4d3507f635eb7e1868d41658a3cec42bc6095df034a2985ffb1addb23b81292881d20e2b581d19853bf3a2d832edd798c3c5ddf87b5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e836ec7606eb41e5b918fc7ba02c84
SHA1912c5225c9d81e21e9592971678497e944ff7aaf
SHA256af452f886d6e6f8b8af9aca5f5bd4b440136efed0981ae1988bfa07caf3093f1
SHA51269bfd8f39bf3104a23be5e179e099418de079625e8e06ebc2337c037693b6c68728b4e546e035b2567a06c185e67a7fd8462e680b8acaf3198735552f6fc5e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5544e5f6ff22f7ff422c8102f9d1ef3
SHA1fe3173e2ed10b04e4704c3e9adc78ccaad5e70b3
SHA25674cdec54114dece377c2a098b76b316afc85f279ff212d9c0e6b5ee5dbbcc1c7
SHA51203a3c62eed29462e9da21f18fdccff7fcf3fc3b3dd6b960d637f770caa0c64fca49753e34f697faf927a94bf4a1e1d70d4f25efb904259636d27c1f79e8ee72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52698afe7b35fd2aa69f26f941fd185dc
SHA19fc7850a13a3a231eb257d8a1ff4db8405cf99b8
SHA25657e3db20579a756ef5da836ad8ef2c6897adf1f208bfb2e6c170e2d366479b6a
SHA51235175136e3afcfae0dc34abe84ee934e94a20e5a54f3a281e8ce0a6e90712c4c5c070fa52b66167d723c695d7901bcf26c80ed92f8ae4c54ad0d951c05eae8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecb5e098dff31e4f9ba7a778542d42c
SHA10a7dd3cf1e417b0be7df8ffc72694a315a8c2a91
SHA2569db56bf903f189df46efef47cb1f0e18d63edac543e54b2afe93d2ec83b31371
SHA5126dfd78f841fbed076bdd1cc0e2302cb03aa41646828081174b369f7acbfae5c0bfdf76e07a6157afbe20ddcb53cc75da24676347d258106956df1c22072fc30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a9b80dbf84143bfe8a0b24a172f3ed
SHA155119ff025884dec1411e9494e55487542e41b5e
SHA2568901b2d25328aa2d2ba41f625d4be5496f64693a6f4dca6efe3d3047e3c5545a
SHA512e5c5360ca4f7ae59af8614d775d9b70b92207a4ec6d71cd57783c841129b4ff28553ee846328ed295a65750636ae168973bb2f45e7d34e65a0b95d088213b17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576903a91ef6a472d35d2033695bb58aa
SHA1ebd1e91af4801dcf89b96af98f6ca1b9c63610ac
SHA256f8929f07b2ccdee63ffdbcadf4041a6b1c7c5ed03e44668abfb5e111c35d43e0
SHA512d24277be1c8bbca0aabf09f871c8fb27e8b515a97f4d2c6a039673b8898b6ef8df090a058e76d138b285bd559ea4cdce5d7ec33821ea631e042c18867817ff44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2434103d92390761f4af10b41ab519
SHA10dcfc7a1e67b0b66714d4933dc5bb8bcadbee933
SHA2566ed237378337235b58ea3c76435c5d42808843f0243fc845e39483ee5ab3437a
SHA5127e31e2411732421d78c2a02698b61e921f5c97069961fa62a60948af91b76ec345ddd800c8e7d41a2675ece725591b2c9289dd685cd9fb25b6b29436d76f0155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810ad6a4432b0c1754c2f8fdc1c3df52
SHA1e2cc259a19e8f0b596cf1eba01947f6c27a66437
SHA256d0259fc01fc423933717f1074d563f5abba2df116852593ce530b787d989480b
SHA5120044f6563126cc40cb43c62e0a10519f1111d515d5fbc15e46ea056fa84ff7361109b900f8022b7629f4d8f856a891c9291207ef64f240e8e6e82c5f2a2a89c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2334e66c1bb3cf7edd49cc13c82eec
SHA1a04f03ddc3b04ebc4b8c96e604395393f101a0a4
SHA256a61d7d119fa0e7b06b9fdc361a28f710e9e08f6e012b59f31075452da7adf99c
SHA5120bb2d2eed03600dc3532fb2b8b8655b1ad8272e7b4f3bc8fe5a43450b47a9cb0638bf596de20af85f4c8ba87096bfecdeda44651e934e80e1d1dd71ce0a3a29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d64a8b59a951a845e76028f44b4a31
SHA134ab23a5a92abdcff0179ba90a6c9d280861bdee
SHA256dcc9c1550183ebf988215ef2044c943f2930ab3a56e78ac85fc22d9295557d9a
SHA51240916604ff7384315d99f54ba47f269ab0e80ea24de465e22b27b58bc8379edce480906cd15271db81b0398ffc0ee9b2507f76e2d76a65137940a4c010d84473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5156a75c3dcbc074d8f68b1fe202d2f30
SHA167f38099fa20d7da9f8448f5798f4d24bd8016bc
SHA25695946774bcf9be0c7d0428f46501d23fd7dfb656a8351e747cb10916fd14df75
SHA51273842b6044979b0d19eb464bf6f102f011b651b89c7c247e4429fe0efc8b9cf21a58559cec30ec5247945157c701959c37fd4556368112b796aeeb6626527ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a349511e681d9b7c31ed9a68b1321a77
SHA180ac26d276ee7c6667e9254b7d28eeeecfd2eb04
SHA256b143a05e58e8a69b1a9df182cae1ebb9b972234804540ef6137ed4e3d56979c1
SHA512eac972caab04dfc3258dfb6dc85476f188cfd375540023ff6c3cf24de974e410d58e2454957e41c55f041577b30d79c5f8520efde40078ade40b20eab2258181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54888e2bdba33ea3b0452307e4383cadc
SHA19d040249b9f4d324c409a62d9c0c054e225b3fd7
SHA256b4ccf72090cec5f541cd9488ad8fe1fed56acd0424bafb3ff814d358df47076f
SHA512f129623e003b193228629841f1bcf6a9a8550693d522efcbd900bb02f6d289e9871c5e00e8c3db511c580ef05c4f709faa6f8baf5c88881d79747511390d599f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a266743999bcc0332b1ec6e2f440953
SHA11e3da64a8c9477187d1fdb37565bb23799005d6d
SHA2561eab30873574b4886966b51cf7f0c245443f4b6ace702eff8452975715f836bf
SHA512264fc11d46d1527feb5f2ea049cbcec769015053930bbe89517698d787984d7dd5780a0c604cc2c4f4858ea9f0db2587395209fc3d8edda4d77a668555d5018f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de971aec1d478eae7c635726f5d1367e
SHA1a327c21a601dcab597233ca4676c60f57488b8df
SHA25632205baec9d537e947da7c4d080052d50c59ef76d17ddaf4666d3aeef74ba011
SHA512b792f4ae545875a0077d23804f775a19ef244b23451a9bb5079546fc4d3212dae8c36269bca6815d95393df51fcea304a6cbdb2d73ebec0792d5efe8a630b2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fcbd0d511a800cbc3d4b1faf0706ee2
SHA126e24567202a28ebd091f72cc6196514938701b3
SHA256dcfad076d82f270e3516daa0dcfd15a7ad0f0a91cbf9e3fdf4863ec9abfb0643
SHA5120c6d3c03c62554d796ce59fb64fa72bd7ef0d3faa7e89477c9c0861d60cd4540d0b12cfe3551ef20d8581d50b01fce2ee170bc3eb1b69e79821cbcfe30bc3bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1766fdebaa617a026c614de047283fb
SHA140fa8d2bd36534028a8243e27d4a5829c6144705
SHA256bccec05cfa0264197a1abf7476ee5b964c3d45ec365f8fd07b0936f7801b54cc
SHA512888e92bed7d42fe0ba1cd8f4a29ec85869030802e72ebcaddce8ad37bf73e1b0d21fce94fe9c4311c77927ed941a562d8b8b193cfa34bb383916116dd95e4c28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b