Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
84b08b4b8c9dfec811867aaf9fa386ca_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84b08b4b8c9dfec811867aaf9fa386ca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84b08b4b8c9dfec811867aaf9fa386ca_JaffaCakes118.html
-
Size
9KB
-
MD5
84b08b4b8c9dfec811867aaf9fa386ca
-
SHA1
fcafeb8428b275b0363dc81fe93db0bde90dd381
-
SHA256
96e73d938ef37897f4e3dcf0a3cc50f5264416490ad73e313671885144300e33
-
SHA512
55b4ef1605f38741dcb89bd650345326d157ea20c0ea6ebda1ff0da091c03eea128f36f7aa5de8069e5568159228eb28b22a0c688614ff363bc1c14c0a50c454
-
SSDEEP
96:uzVs+ux76kLLY1k9o84d12ef7CSTUOGT/kA7pClVHcEZ7ru7f:csz76kAYS/TuCPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000008407ba3549395b0eb03772c739dcb5142d46303ed5b605701e33c9a7fdfdf476000000000e80000000020000200000001120bb2da218f96acf7a489f5401dc11578846c8b57dc2063dd03214b667b08720000000bc62e2cc811e2fbb1c9c7570c6bf3472f816fd4eb49c70fd9c3f45933b38c6bd40000000bf45ade1c75c5e8e24f0b4c58aad159a0a48c4c9ee6ccf1138b3f3781fbd89819870f0390361b9f666f0d4ce742c1b7ee6fc568880db5d227b44afb6dc35b44d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{319C4751-56CB-11EF-A850-F62146527E3B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70269606d8eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429423485" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2844 1820 iexplore.exe 29 PID 1820 wrote to memory of 2844 1820 iexplore.exe 29 PID 1820 wrote to memory of 2844 1820 iexplore.exe 29 PID 1820 wrote to memory of 2844 1820 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84b08b4b8c9dfec811867aaf9fa386ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585989445c670c01e259b5894542671dd
SHA137c86dffb52db1f850117c70f41cbeed72d226cc
SHA256a4b989545a677e47e0ee28b1e24944775abdf92b665016288b8ec1a0bc39920c
SHA51246018dfa5b9e1fe038048c247225361544466601723c807b79e7a70d8e739641e54c591b819776bdc127a46883471c9607aeecf6bdcb9d375771d96751f0995b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41bf77f4bb9825a3e7d23e1cdc1a749
SHA1416b53c17882628d66489621ddd9301d6ab8112d
SHA25630c33ae2bf2cfe273599d885880796da2200670e09adea4c259c5175a48c8b11
SHA5123893cbdfbab8128039281bc053b9becdc5949bb4b6375e3e074b099c2603acde4e61f1a88b4e3027af438dd93bb5fa51e91995d7c67ee944018851d091acad60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25604d6ed7260971dbbffccbb696f37
SHA1ebc22334a9e1cb6f473b0d234fa2bdbcc8a81585
SHA2568e30b7f500a97034ef144d80c4b2cba1347bcb82b85d3fcd8c1ee99fd09eb878
SHA512f074b2086383ed5d5e17e83a360f432bfd273fc65ecfaf495d0f44249d50c8b82014a882d16c9a36047eab92f07f45b20f47eb1222bf91057ccc985da62fe87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50471cb75bd4d35e798f47729a6e4e8d9
SHA1dd8dd720fe66f623c2aedad445f7f3939e555224
SHA25685fccd814d6b9a945f6881145251281861ff54b3f7cbce0a7e7eb62288023e47
SHA5121e4fc5c0ed0167fb94926abf070030ac42e0afd24af983392ea8587be87c6b5dbefc11f7e78e6164ed03b6001d2ae045fb50b5110a231446eaf6c22eeead8e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56700796b820c1cf8b29153056a8ad353
SHA125c89edfa8053c36309d453aecc7ef13b5c84fe9
SHA256a341ae739017bb1db0fb95b01e5fdbf561ac50d1466a4b1f1903d71c539d3a59
SHA512e785d478c2cb6e6b80da5a53065aff95cfb74851a075428dfaab803bc49994910827ce41fb2083a9cdec077d2a0bc052921baf6c79e2aebb1fab19235b8d7520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968f349d51a6614df058d69a0d61eda9
SHA1cf788bdcdffd4ccf4ce280fdec3a25ce99e8f873
SHA256f6e9c2859a14b4994bbf90142debc9023480e7e53ee195193e2a9f39f22a3169
SHA512af3a320332f1b739d749b54669674fb9f6f16a504a5b5b35cc8ce575910d72bc44991de59cd506961da5cceb3ff40628f62a58a608dd727c84ee6f87bdb06923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82fe94294472a8106d33e57b4f8e430
SHA1d71ba3ad1546d808aa3359f180fb7293b67bac7c
SHA2567ff744e3713a681f930fcf5ee52781474dfd1436de7a8d8f69ef2b9c105e8874
SHA512d6e0cf39b51afb07be34dcb677cea3c63c4c576d20860d68466675cda6faa6b252b05c2f1e8a5799c7ec76ea9cbd06778350ab1931a1234d621237314ee7d6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce8b24a3d5f54717d888779e1f1c37e
SHA1a640d5551ba12ccce9494a6a7bd3423ade941056
SHA256ea4b53b3fa278a6cf8dc942dae2f6494241f0998ba02fd489b0cef3808715fbe
SHA5129c87d6d263489759f71eecf8abb799acad7ca670ffed1ecf34877814596ebdf0eebd7eb7ea4c62edae6ff982c76e0dc4196cf7179e328a3bf892b036140a3685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8d792115bc57c626f148ae2c7ea7dc
SHA1588296ff18efaf6cbe1dacf293a7c93da847a486
SHA2569da05893f52267ac67b351b59febcf7c3efb4e4fa8be625309b64da23505d612
SHA5128648f458f019bf02a05838180edc0de002075892ad778a4a3fbc2b04cfce5031ce60d0142deeb238898f6faced77d49a58662add8315ec5d5cda139bc5fbda04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51798500d9d916d941a736f55820af24e
SHA1d740ae726d2403a1c8c97565e92807a75c8b8271
SHA2561d9c874e81b87102a7a87bb8a8dadeb65214ddcfcd7931f4bcbcc33b3e7a07a9
SHA5125315892ace166721969d9252fdcd42cb775cc621feadeb4c7009c4302a3176b11c6ce2d31788ed028ff5080534d1999f38d08e9254df933e00dc4fd73be11998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035f180748c4835d37bac5447361ef34
SHA17d4872ae2f3af832f357eb85786d0f26fdff9a2d
SHA25607985ef88b9a1b22277e9714ae3fc9d0fc3592de05f674bad017298c20d469b0
SHA51209275d39c6ec6947eeafb3c54b3e9504834c783c31a88b3a4707ec0ae7666bd40de13f5cd8c04d985c795559c587c62075d062f7510f0d56e215a12e985b8530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8d68ba81612fb3f540bf234f1f740c
SHA17894158774500d9d287cb90be7c0fc0eed680aa8
SHA256f0da8f693474f8c20e30e08ccb4853e1d6c97d45d75ff26db4423e14778e037f
SHA512949400c5539548a0232ca0eb7f95c0734a6f03f2a525d84c5917923dec076402cfc79bb78b4e18d2a9d0d40f23ad3494ce6932231e2a62c7948ad0fef482decf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d7c6867c3f7d514bcd0ea1e9cdaf42
SHA1f6565fdbefc9b4f81ec32fa8bf01e44918488867
SHA256b9573ffed33a72f9fa74e3fce1601051a2d5d05450546a84e8822b7d34c0d1e7
SHA512ae2df2d35e95478621dfe45e9bf9f8c55777a8c17ba05f36672db941d321a7a54ad416820d8164e73d84d6c724d95b322dbd45c9e310aa41d1a435b115711580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ee206c864c9286bfd50cafaa81a18a
SHA1cc4f6cba13d9b93cb39b666c472aec823b97947a
SHA2561ea663aba515dd65aed54ce26389137e63cd549c44d778e5ac0c5c1aefcf7e2d
SHA512b1621ec6c273cc429bc501ca7d4fabb73bc2da1d6740fda63d39d47d40ccdb83632818067f6103ddd7f9b2073e504fadef0e08faacdf66e2ef1dce89ab6b1597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9cfb8ab6f805e3e7ca419a7ec93d129
SHA1b134d2510e7d82a359bfe338e6b084181da80d93
SHA256be805489e29de27b899e90f43a11a54e83875b48daa654fd40516459ffd9d71e
SHA512a8e1497ab4e77b11716bf873a5518a8491fa09ad332f2cadac0958f346de64a491cb36fde15eabda57d4d4c92145a2193e0788becd6ea1fc63664400f1a4aeb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38bb2b5ee0c74b94bd6c8f98f0afdbb
SHA1f7287497fc8858aecd7e0ad5aa4cdf8ce29339f0
SHA2561877cde1c98bfa7e23a3e0f9d5beab813ec1f9833814d66f1bdaecce663cfa22
SHA512e03bab4a99829e55e8efdce1246e6792af0296a225e96b4f244f606aef913795fcaa403888165f5d6a4f9e2a7ec6fc15a56cd3fb8e10787193f1c6813134bbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57821c90b7b23db8fa93eb119136bc809
SHA16a68ff2e6668014c407f8f79c998859bb40db7ad
SHA256b5ca2c1c446181140f0a10ebcc9d9503910bcb7ed036d0179d4e138fd0b82239
SHA512e0d48a49b9fc2fa4a73ac86ce13efa0e5939c34c8e80af759da2b6c8eef0f732046460eb3ace74c9768e531cae80d4ecdb4dfa143c5c93f19935551ad2a80733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07c86e36782518ed5961954bd7451c1
SHA126acc0329b31d4c4ea33b216f5512c7ba4d64234
SHA256c1146d9fe00ea056ddb75b28695b47a332d443de97d1fe49af34966791122afc
SHA5122801870e1041aa765d08a2f6a2d214d567dbbc2e606b7de8b4fcbaa455435d7974cec51cc581866c35f4dfc6bcb1940b704062b358dae83280e62976b8278fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583421fcf0fcf87a70c0a92b6431e46e3
SHA1f7356ce473446931f692637cb414752977663fe8
SHA2563d8802ca4f4360759adfe8d22eae8396715dd873f4651788b471ab41a19be845
SHA512d8361b2d7723a71cae6cef8e21fdd3971cf20f628ff06148776d7fbcd78021f4336a41ac5e94f11cc2bf0d888f02aa1454d8ab72ed76a80fca54b352f2c137be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b