Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
84e276933c3d309e646de885e93a12d7_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84e276933c3d309e646de885e93a12d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84e276933c3d309e646de885e93a12d7_JaffaCakes118.html
-
Size
1KB
-
MD5
84e276933c3d309e646de885e93a12d7
-
SHA1
9c656db1a344c0026d15a96cf9ad495713917fd2
-
SHA256
7b9a0bab7df07a80d4f4e4c30a41ecfb2f91ebd2d15600907f6311b25d06c9f6
-
SHA512
945525b4253b3202b8c94b637434773283d7d7d8aa1af104c6e1b7cd0f95e9d38678efb23f0c299d11f869e939e0ffcae4f03e4240b9092839e2e2c49856d377
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429427896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000007c995c278be63f58fec91401fa1245f2457efea579076632a7ad03ee8053ae4b000000000e80000000020000200000008cb843ff4ff1f9946da226c0bdc497c2753d6376ab0ac28adf1d4c47a6a0ad2020000000eb5793addc4df534332b863e0f8b90159476d329da1285842d5231a5773a35e44000000026d75de128d7da6075b830da5615cbc5c54ab965ec2fdb2a8c8857eeae2071e0900cc069b823567c53be37d94f80f86290191e78a1c4b378585eedc065d978eb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703bb94be2eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76327601-56D5-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2816 2604 iexplore.exe 30 PID 2604 wrote to memory of 2816 2604 iexplore.exe 30 PID 2604 wrote to memory of 2816 2604 iexplore.exe 30 PID 2604 wrote to memory of 2816 2604 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84e276933c3d309e646de885e93a12d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538701777ae16c651179b3b84d15e529e
SHA1b597d5fd01d6a9d84871a49385f54b717ebaf1c0
SHA256998c06a682ec30c18912d0ae22501b976be24509287daae5733749b8c44bf288
SHA51275db3f5ee872ea43a0a7b955981e4928c1237f02d3ff34df45dcb7c66f2371d92a2009c983164c2e6a0784cbe78f7ef7dcbc1447a438976c66c246a9db2c2738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5978121cd5f9efa23f91481fa6ae030ab
SHA13786c6bc75b8b66d0cf50223692e22969790d6b1
SHA25621f89264b7670c8b5665b4ae98140607e3fec5d653e7914e01c8d96e1ec0780c
SHA512da6a0a95a732dd4aee51100b593ef63e0547044e0e80cf54c44459236ca7c279014a9f5560d1093112af47757b71c88fefda19e3b5e01ea7454797e14e9114f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5266843578385a5e80d0a68e97d0a4
SHA1d99f4beb7956e93f76b6e64a43bd188dcf5352ce
SHA256d79f7e8d7440d8a7b6bd9dcadffe1b719a4a6d54a3b4670e7551ce90a301d682
SHA512db269887f97817118b44f50485eb52859e2062c4525ead408a7786af3dd1f78203abaf04bcc938d96b7b0bfcf1f396007fb633955302da349e5b7c6da9506b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e83bf31e8afcd2d32e50f29268b2dc
SHA14751e76f8a177690b8ac2119042d01119730e5a1
SHA256388acf207c766ac9a593aab6ad45ae1934cca000612db7e9fcb455f6a4d9e38a
SHA512e9cc34ab1f38afdf83c635dd667fe54c0a264acf9cfe5e7519e7ae0f671a31938e75902d7c7beda9b0b7e897375dc4259df1544e83d0513b83b0f5fa13ee5961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfab80749342a9a2f501a273993937e2
SHA167d83a2fc52939192caee5dc693f55929114b8f4
SHA2562150fb7b023702b0472f67a30a2530db2f1c3836758731a21358861c8c5b780f
SHA51297a73bf6b2ac71abb1998e8db0f00059363e3a0297c2cee393a97884103a2361b50ca05650c37344f7f6a32dceab10f7d247b264a11177e1051e56aaf0671f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a546f70b5b1b838d96ce788a9f4d5991
SHA11100c9c9d8384a46e4113b51eee7b8b64f8c6af4
SHA2560dc50fd08e349e86ad1d8d1b83933cc42ea42965a1a73706398ad53a260d5cea
SHA512cbeebac60829c1cd2aa30112fd513a05f29def2387ae781a8a249c42d88272dcf00bd140c80f02774747a5d2477dd1d7d478d260b5c2990657231dbebcccfe7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b2ecbc06726607bf3b135c6d0ebc03
SHA1cfc80772ee4ccc213caefb835c2f32574a858f79
SHA256bdc77a222c4acf34607e83369642a644f8ef3bc79d63e642372f110dd7864452
SHA512d0e3f35cc9e5c3f625e3356e46fd8eda31788066a6bb98c9cab53119531ee906a12ffb5eaf4085a250da4164a46571115148cedf8095d3732803521e7b227302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540787ebca76313da0a387eb33e5a60fa
SHA16057614a19cbd82f9b1413caae51a56f9dfb1b86
SHA256774932dec16e852193abfee570f90c40bf456764ed1ffcbadd4c8c68d2b0bab0
SHA51252affc97ac35a250f2850a1a09d6070552866a0fa36de464c04cc2137254f895b471dcfe72faa8b09cdf4998835b7f6779f10da1bc523c95cbdeaffa2cf84186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d7011bd51f3112cab4a68bdbe88655
SHA1585bd29cb3bce7c6060406c3904c8bfb04265625
SHA256f48c4571d40e3eba468cd5e4efa17f8e13edd64456301cc2a3d76c0f09191480
SHA512761eda20b9494433db884dc74d0631b3493f1169e7e8bc84a04f19ffabe4381dd036302e7c9d637fce9941ee3e896a011dc4f607aa01fb90b026fb7303fc6391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5469329ed4f85f84633b3d092c9830d97
SHA1c77bb8a5f1761835622ecec580411abb7a997db5
SHA256766ea6c20e419e094f90a7977b6971f1e09fbe2a02c47c8e022f85f7dfbdf849
SHA512e03d24517cf3648411f4d744f11532a2f91ac4bcdcdd88642bb71457b320b7db6b952d795ae84cf60e3b0112800c36ce655471a877d35033942fd93cacf4158a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52160c132031d9ebbe3ed618b0872e7ab
SHA1dad859e253b7b3e61f7c7786beba6b78cb47a9cb
SHA256da36ab87418dcd15f6dd9904378c8de8eceb62cd45518104c030457373adf6f5
SHA5121967db231642cc738154b176fdd89e686bbb5b2e477458972a94a1614e0991e4d32b780126539252533c9c9e941ac530a3795af901d21152aa6fec7e23705f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae843236a7b7375c96007d08ac9a810
SHA111df7bb2a3a1de314f92451c90c138544d9d944f
SHA256995eae51b10f4458efb9c0d6db555c3e4faaecce47af2c8213160eb2a1feb485
SHA51299079bcde2030ed942111869b9f5e138e80ede55c77992713a72a3b6ab0d01098b44ba38f2e2a8009a80dd49e76f09d2a8e3314a596b5da2185e6196cf931a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543595859675b4b5c122a6a91a609ef80
SHA141f344cd3d2f51843993bd264e5dbbb62c678c71
SHA256261ff567c5c0da70ed7d9e259837f42056fb4e3f7894ec34de5e0128c4006704
SHA51245efc319164c386908a794de09bce45348873db1d245d7b20d90125488d2033d0fd808bfbe87dad574ebfb06d34f25d88a1dc947e72ad86f98adcb4b43b56b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4141019ce9537f2572a0917d48ce544
SHA1744ed67d1a259af0c581b36e364e4b5a32cbea87
SHA2564d212766076cd8acb7f8cdf1f5c2bf9d6a4048bf8f558e76ee3fd81ff9a315f2
SHA512aed9b40dfffa57028578490560aa9f81e4c70c83a9031e7e5d8db5643a2d5379dc168442dc0d4d30bfe728872631b8855bfc0131ae9b99a929c8e0dc5e0bbcbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587ed979a3a428ddd910ed5c7d8532e7
SHA12b358b29f1cd5a7af1890066f38f13a8ac91b4c7
SHA256c83fcbbd36b4fb0781f1e36234de7f8f57b6c66010b1b3e4490ae6ce0784b80c
SHA5122455db4b6913e50f9c76ea4b218f1a14545da0f9648559f3d9f73f4001e2a03542d75f641ea84252c6bd047f46e296c54e16bfcef0e039e8bfd3d9066c1da63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292b1bc6fed4baac00f86bf462169712
SHA10a4c3e7ede84329aacfeb351823bd398d3ada1af
SHA256b4966eada52b1e2697343a2be5a5f25db1d98f523cd35b41464c7d5a8058a0a6
SHA512bef6789c057e3aab8cdb16de106350005ab1e78e18b00f4f31f602a90e6e167bccb6e28f770bff3b467cd9609e8e2cb88126ee9e947b53d895de19a7b96fb69c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597bef22840439725a6416eb077dcc515
SHA13bcd707a0945f4e9880433c4427c3a952772c48e
SHA25691b6a52f41d2c463af82717b28c650c5aa273613f0fa9ebc9ec65b0d24e0d11e
SHA51234a0aece63c126b610f71d9db36d3bc180fd39b96cbc8c9bdbbf7dbd8871a2147271f699e906d296d89a243875c0dbf40f9185975d56beba28e173c31fe0983a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3cb8754b8082a5635f1d864974830ca
SHA19f4a47f992d61557a4e7ae353bff8ec645bbd697
SHA25620b97e57f3d48a4b0c24e14c83045adc7b45de978cef6840f602ab2ee84e7aff
SHA5126179cbd33661a455eaf8d31bc0fa8b3074f4cfa9b13b682c097bd48cdcf8c8d650be56ebf637775df489dc6331ab41f92eb6bbc81fc0f967270f33ea88b4eb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5b22b8969e841daa32292a52444eba
SHA1342901317eb074faa647d6624a070d83edcd7d36
SHA256c59fb6100babd9fd1922fb1f3c34f87b407f2abb4bb17e885d7e3cfe013fb410
SHA512436a3f6512b2415e50a2cd726d12332ecf05dd0811ceabedb93a1d5b80c41a96257a4faae96b11aeaa1a7725e82bb5607adc8cf24b57afd6b5c438f0abbcec74
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b