Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
84c37f97467e6f0fddb0d4c253808d4a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
84c37f97467e6f0fddb0d4c253808d4a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84c37f97467e6f0fddb0d4c253808d4a_JaffaCakes118.html
-
Size
7KB
-
MD5
84c37f97467e6f0fddb0d4c253808d4a
-
SHA1
53d5724628a3ddef9048b4f2aa782706fda40666
-
SHA256
d4e2e2be19b2587eca11848029a9948a9401d3a217c1566b93604d76c15281e1
-
SHA512
56e6bfe0fc85a00d3bd2cfc27a6fdc39217a89059ced0f0f4e46ac6456397fee68da2c2ef6c124bfd84a83d1c8b88e71ab0d05c5b934db7f689128c2e439d4b8
-
SSDEEP
96:uzVs+ux7c/LLY1k9o84d12ef7CSTUJzfAWRKxcEZ7ru7f:csz7c/AYS//xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429425147" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000974e18f181dfe5ed64844143c72bc44b0df844477ca54aac3477c7fc500f46cc000000000e800000000200002000000066d133a3c22f6646776ed5ecc0e321f765fa6d901a8d15e37421044665c8d67d20000000d7232c5d8b0869c5f41f2d198ed3dc8239795c007100b11ac4153c36e9f6e09940000000c61379b1e5ed6e5e45a1889a82c26b3b0d547147add48431f22b6435f04c2d971d11eeddd948df93a105fe4bd92270e2ceede4ffbf030193302df029af03d68a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{103F0801-56CF-11EF-AAA3-7AF2B84EB3D8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80adb6e6dbeada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1828 iexplore.exe 1828 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2416 1828 iexplore.exe 30 PID 1828 wrote to memory of 2416 1828 iexplore.exe 30 PID 1828 wrote to memory of 2416 1828 iexplore.exe 30 PID 1828 wrote to memory of 2416 1828 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84c37f97467e6f0fddb0d4c253808d4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def323a03f261154fd4c16ae6b338583
SHA1d35b2f926b63ffd61e898ec34241eda9ffee0ae7
SHA256144265457f87d3a4b3d2644817b48812fd90677b93dc2c81137b5896af0538ca
SHA51217231b44ce3dd0bda188c977a8584d3de001f88f8965a4317b1776c37cf8f8d5ace9cd67ae90b78f1d176f7c9d47f56e63758a742433844b7f0d09f61c3ba8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d29d6ffc948e667e604284e6d622f1
SHA1dfe07a834702b4d037e9f082d30e63d734e252e3
SHA2563bfec1eb043be4682b25dcca5016316981e6145368be26dc27aef33664184ebc
SHA5124a7c45778b3859f4acf7dcdb21a34eb47c11cf4d2424d394da9a09d6977869b2f215a1f8ba40308a6823aac6673b63af14a5946c43cc1de21e7c36c2b25e0e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a69ce2264e5e2a47f1a48c4ac619295
SHA1b247c7139a1ddaf73219e351aa487803419b5078
SHA2566ff3ba7bcccdd6379a14317e9d2fdeade2006a9e75467731b4ccbb1a1d1b3d3a
SHA5128f57342ea473e74470accc5d790767c4a1ebe86e5fcdc70d0a03add3784726f84c16c21c1273369381183bfdcd6f8e286bdb91c572ea7b252eb952fea33cc863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51529c295b172e85f8321db5f5b8308a2
SHA1a01631fefe155c8bd8b9fb569add0815f2ee7224
SHA256e0df7673f7a31ab400c8de6b9ff533eaecd9f4de3c61583f2c3900439155ac65
SHA512fb93c048bc1f09bb3a824d56b0f6d41c455488bf3db66400d42a2fcfac417534bf4c2ed2098f52eb251b5f32b711457c5bc447d77357970f20f95765a1d90787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b72a5ccb04e4c021eb37d415251729e
SHA100e9b334f92e0c34547f7e57d1549b71e16130ae
SHA2566a14c46f3b6633eec569db3478475ce653a368910a9b6668c2d6dfc7819622ca
SHA512ef5daed6378d6f96c52113a3b8e84e65c8b21bc37ae420e5bcbdf93762604d721d1458c552b6b46422ccac49980d935945a32cd4e3a43c029629139a4a241d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ac5ac85dd18c228f9817e72b73092b
SHA148f26e084c8e74dba608748abd5b672ec4d66a7d
SHA2564ede76821104bacca2ddce10939183b4dfb73ae83f3854409a2374c677b34375
SHA5122bd52b59dc0e8d2b8cfa80425300892a7419b3343e55a32baababc07615baff34be07ce1f5b43236f249022af35c0ba0841c88ba1da40eefbac4892a539af9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530513bad8742f011548446c9cfb7f1a2
SHA1bef35bafb54c338a221bb6b5101826af8a782138
SHA2561da9b2f1ddfe0d09c295094500b51b3407741f65cd0e820b2a53a6a97d3a857b
SHA51281bf895ccc38a71d9123ca4ac9c73e4128cf483aed83f1869ad019cdadbfc758715ad3a2bea0ec4661e9c6e879849bdf97e3f38dfde1587517ea6e8a445d488c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e688cf8ebae25bcc7bad25fa666ce98e
SHA1f4162bd421a03497705ecff4e6eebbf0747c0d07
SHA256df9a8e4d2b9712cc28b76a6f396b9f9b776c129ee01cba8e51b6d32cd4110069
SHA512c5e163b77a04df6cd2d2f9afb2a6dbf9110810284adf5430df9225b7f99f6a8e35cfeef7d23db1b534e13784581ac1c3a786d289760c469d4cf2cd45b1a7b400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192c42ce414afd2d0de860e5ac1c6232
SHA1459c70dabbe2e77b7b570d6aaabd955703a876ea
SHA256db38062bd18b1b0590799ed23c4e9b2a93115d815b7c6705a033226419322380
SHA5120da922a2ee9e81967b90723a54228eb8b37ff1f2184689265e357f71e015e31a405afe15ce3ee77a4743204e4fc8f1c4d3e21e28b48b95c2a58962a80c9966ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9f5199a6c6126a688f7803f7d735fc
SHA1cb5ea0477f835f86892e73d96ce42a5df02093aa
SHA2567cbffa5b16887db125629917d2eeb42fe54bd209edf6601dac0d678b1d1da737
SHA512894e48d72062a159066d698cc36a12db73b18b2681c2e6641e831844fe5d7e62a125d87c0bcbbab97032c5485e5b36aabf6b29f08af1c07a18a2a934dc6882d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3096befabdac57566a51949bbe2126f
SHA19ff64d0ea38463163f6c3759370d2259937ec90e
SHA256b2745b9ce88cd7753c9255e12f542c2d07c4080d54df889f68358e39b3b3d7c4
SHA5128c6b6f57e0b8cb8a94f85420cfc40e07604d382a9498f12bf930f92f2f7e87fa8d1e7371f657e13279b5336c1df38062910cb8d4ae1a494d9b229000569dc422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd828b6e65c893f5cb8d10d902207d59
SHA10db88efd7004aa9f949e4fd67ea54cac8955d837
SHA2560186704a630aed898fb83694826fb7274bde5cc8c30ca11e2017caefe4b4c243
SHA512f40da2ac6726c4b84525711845152600d61e7600c838975e60931cc1f285f4058fb2819c40188b06bd9b984c7675b0df46c44ea74d3f8e03dd45b5087f6e88f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864e2e2d68c4edf8265702fcfde85c74
SHA12fb741c8c80f0aa563cbb0204070653a3ba54150
SHA256caa06277120da44c7aadf2ae33af469f821bb0412b302f2b1c27722da9c84518
SHA51234245756b7c393b9567e1892a8800de909bae6827132ee8cb92ea15362c1822b88db9fdc448bbb30277408f0a8b70db3b6a39f745338e5f6aa8e9ddfb79f7ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee585b42f3de5409cc273ca0e3c956e
SHA13b0c40dc8d1394448038858c07b6af4ea8cb8040
SHA25695a101a171de5e46e206783dad1720e0e428767d5f632aa099fc352fc7273a15
SHA512e178c3c584176f57a99196ebb817c3706bc5c06b7ece63d60f9f1ab7955dfc951563b2224871d5e4d2dbc416aa9f442dbd4517e48bc456c2d84a658b07427f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516995b0a2cf52c0e933e739a893e5dc3
SHA19dbbf8d801c29ecaccc78ec3279fa1ba73c1471c
SHA2566e48523bafc431ea3bae3040820292376430cfcea9d6c6fc83639d46cf7f02f4
SHA512f058c88d3af11e90170081f4a5e039c381213d963826b0245b4e1b9047499a14cbe4a5a505560fe54ad00e6ca279ceca5e8c2d453c11d3880ba0419ea2944de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8dadd060decd8d7e233663eeec56e92
SHA15c9283d2addf268b3d41a9a9f58cf44a05138c38
SHA25610b4432c03fc592b03d750dea4b60b9d16afa933fe5d39ef5ff5d524617d42e8
SHA512fd511ff4805e825da424ef34c8daf95d47c26b76cbe07146ceaebc430fe0fff7936a1719110b8f07633175f9a21ddc7d5c034dd569d9489f7122c3cf0d5a03a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e477609692a9e27175708db8479275
SHA131841684d94edd3cadffeb471158d84177582379
SHA256f5e90831c1cdd6b81eb6fcd6a8e5eec6df0e9014acb27b921239e640d3920cfd
SHA512b32f2946480647c22344356fcbf630135b8fa86043a4bf298cbddfd9367911e5c89b8ce63d79d03afcc91823b4bfdf66a489a12842055a7085891f85865a48d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750d0c698857ae4525bd206025137e48
SHA10f8d81ae57823195c2e4d13652211f08e8981f23
SHA256ad1e9082fcb172218b5dd299afdcda2e375b24c6677869f5fcfcd879ab377c09
SHA51265e4b8f0e52df90984b93c559ffa10e67f36c07d91074b359d428bebee2e390d7a5401414e20ed9fd93bf25dc22863843e1b6c13bad42bd848fbe7eb56ade404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b22bcccfbb4f9326d96c1e962830933
SHA146440535fb99a57350366b340fbbb636ae30a277
SHA256a2e03cf4cde37f60c3f3d559fd01800549b79435c9b3c4ee771ccf34a1089c28
SHA51278d3349210ef2e0caf229c9d6ab5127f5bfa1c04da2054514b919b13c758dc4fd850b46d7936ddc8995a3120394afc99dfe69f240ff95e0913e7efe7a20e3976
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b