Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
84e7bc72ce21c2635b98085ee186854f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84e7bc72ce21c2635b98085ee186854f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84e7bc72ce21c2635b98085ee186854f_JaffaCakes118.html
-
Size
2KB
-
MD5
84e7bc72ce21c2635b98085ee186854f
-
SHA1
336bb6f2573d2fc03136b2b2c77dc88f089387f3
-
SHA256
ddfe1622aba3b411e8a9afb4f3ba90691a0d2c49b55bf0b2675112c9e3beac03
-
SHA512
ef5a93642eb86b334f8848282bbec72b70cf6b2e18632d7e6b4eb0508b193bf2d2b85ede6f53bfff0c43f582b637a587a077b8f90e9aa4d9799e4f98e9cfafc2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60228c5ae3eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000466fbd0d92c337b75fa9bd1dc0b3c31e49047b9f3818e15daaf064c68ae64b74000000000e8000000002000020000000d387c7c2500053a529f7f73c7acfb2c70859591a952cc03e11f4d5075c20b74720000000c28cdd7b60d601c57a6563f9093308d05e40be156f921e89c2bafe8aa38cc900400000003bc235a6536a4271d70d428df2613438dd7efd27f1a53f3beea8d0cf075ba9f8e4e475e6a7c317a50932ea10e32b5089049eed4191679e9c59e08cfb16b46656 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429428350" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8568A301-56D6-11EF-9628-7EC7239491A4} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2744 2632 iexplore.exe 30 PID 2632 wrote to memory of 2744 2632 iexplore.exe 30 PID 2632 wrote to memory of 2744 2632 iexplore.exe 30 PID 2632 wrote to memory of 2744 2632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84e7bc72ce21c2635b98085ee186854f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1079861808ef7973393552ecf96518
SHA1f78cd3f83a121287bfd86ded244575de1e728465
SHA256a9a41bc3dfc57117c2e6606630a308bd23f9b76cc7d83fda3130eb6145a404fd
SHA51244ccc7473c8d86f9a797f74237f522fb31e12b2f51b4f3892c1cd8eda5e469a4dc259a1a79889baf2c37f38414546cff93a61ac9c67194daaac4c620c04e300d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069639e9c949418c4cb9590ae942b21d
SHA13d3cb80b495fa2ad21f224b8315f048fb728125d
SHA256ff10671a0b7fe744ae37e4ed28bfcecf01fe0e45b8b9346a6f27c5282ed7579e
SHA5124825c513eb05a6a6f5ce072b299d1ecdec5d19f5f3491eca922926a39def059d759e5c1fbcb8a405091138318a985771791c86254bc21638749f7c2a2e373fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5674b071ff0f3a7a1b11147d47944a282
SHA1c4e10db86441a43ca58d21a4d918c0ad416b7db3
SHA256a180974cb2e9c4bb8619544216287750d077b09763446b6ae5ceda4d246e106e
SHA51278c4a40113a772432b7027db3de28b9328a9d5fea834e371af1e488b5c63d8e5151d515222d202cfeef574e8873ac2a9b5ae9a17062a608461f0f8e6edfb6803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d2ac656c1ca5a570b8b55009e4bb06
SHA1028445376609e9997eefd69187c5e7463a3951a1
SHA256cc5148bbd7803fe5a5bf6678293edaf79aab1147d4c4bed5abbb9102034416ad
SHA5121fb907f25c4fb2f438648080987a0e50939c8766c9d46bbbcc6bc0c85a0d8f9361173a42c84a7bba60237999e3a0778efdb9e345d4b2c169b7a5a00debb90d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa17bc1c16adbbc6bab55415c93e2dd
SHA1b4bafd05a6fb3b8adc8c1dced4b735d7e129e39a
SHA2568105a013d58c65778ec5129f43a878e8ef8e1d55fbc1777f7bac0872baf53481
SHA5120cac8f823bb288d2b559542b1352eabea7db43cdfdc3dcb91dc41d5b8f22801d5c74c3401669259e33404cd036adf0bdb1eafbdc1a0e0472b29ca0700b5a607d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1a63f37cf29d95e9f5ebf437ea762c
SHA1188568c8e71498928ebc9d01fc9186f939cfb075
SHA256b9e37ff0265bb1112b5bd7c03501f083ef6a0cb13d16bd7cc42af9630538c737
SHA51287b399648480e62dff4dfcdf1c7239a7f28d45b0f07c7770c0757926966fda35b40ef953532e03c5af1ab9de994d154c7a1b7941a33592265de103f0c9e8a1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bda2ff9cb296455df876db746ed34de
SHA1727de7402c40b9bfce5eb41af552be45ce916d78
SHA256dcabd424db9187e981f8bbec6d6022e99a95dad23520450864c54d594ca123d4
SHA512eab6d3c29c266ac90a4b31bc7ab359191b25f4778d7e2e0adfa1c2f9d1e48c4423dcedc90ef5cc1f18f1bf93252808e48f5a103568c356874dff90c8c478998a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a58cce71e902e93ab546d468b17b6b8
SHA1dfb6c84f050f4bbca920509117e431ebc9b133cd
SHA2560a8cac509123a432bfef4f903861b0a218466628c36a614451d3aa8660fc5f26
SHA5123a1fe297ff289473fac7ec77b5f1248b5cba750463c5282ddf2bfb719d021178f5bea503e7df4aaa18fd0f3f81d4e96b86f9792fbcd5b7636ea4529d4d8c377d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ab35d92932b41a469e26c83f0f0555
SHA139b4938d2ac3561348b9679819c2f3f0902cef15
SHA256aeef5114b10d93a9c00b102cb1945ec2d41cc5fde1035b410481c89bf19b85e5
SHA5122b81e06c0ea6cdeaa95915bd913e1feff82a3aa92cefc5c6b8436d2e9c23352dac6e97c5601487aad8df9a0515d79ee42f6f95b6af876a4f802b4774b5c51465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de60322935810b7fc9241425410011c6
SHA18088f45bd5bfa67688a90fdeaaebfc61e054c8c1
SHA256d4da4a58f09a465ac4d5bd4684608eea85474dc949a904ba1ebbd2c734036b21
SHA512d4eae2e0708a93045042d5cd88bc82f062f77c955c9dbe74e5aef80e88497d55bab404a87cc4be09c6c6412ca466b8852fe6fa9a302109817aa442060286eb28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da92a5d9d5cb1f697ba9047fd750bee7
SHA1edc44547c3167be732609d2d9f9968867591b52d
SHA25656462d21fa508b78793fa167f3bf99fdd5001909c97192f73f0e5c093c4a304a
SHA5129302bb5f18113421c6e8df525628afac77c84560cb70a8d8077c4861625060c7090f4ecc85e1b30ef24b9094cd80a85dc95163236f166c6070e0fd4a5713dddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc89da6ae9b50fe96aec8ee199253815
SHA1912cf214df32c1efc1ba4d6861df7de2bd04e2b7
SHA25650afba71117d57fa59c9574a6541b52f63075af0d81ece3c13e3c85de0bcba42
SHA512a19ebc28cd30946419723fc23be3f58b29d27250fc42e93605eb9d08192c7b4de248f081858691ed00f5bb6ed5e0075904b5268d47d20f8f481e8eac81821c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffb3585db793db1bf1ee6f03fd5414b
SHA1382f22c27c2f4209b45b10306c85feba736963d3
SHA2569e8c3d713181230e6ecf39c7a580baa5d1cd65345a98401d0682d15771327b32
SHA5122ef54c8f4f9b24ca368171491bf9101e8bb4ca6f7bd2ac8df25efc0f0869b9a862ecb00f509dba5ae66b4f91f54b91fbc7f10df58bae7f39d8e7a2b5b98077ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad4e3841620ef6001e61a7431caaa3c
SHA15e6fb611052298065750f9b94cb1af45cc60d9a5
SHA2560682c4a73cf4ca7549ed4391f514614e60b4ea6b79e0655e770096ab22ca3978
SHA512f78b17a381f09e270fa9beaace1a600da1a7305b952cea5de2037109e13509929d6d1642802f8c0940aa0b2365177f321256d787812d2a32373e1bacc3827471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588de3a43f83b14c5bd924a5a8403328b
SHA19abfc9e94ed2a053c79a8740fc5fdb1094f19e23
SHA256dae527d0b0d3fcbc716ebd2029822fea73911200b676b08668341951813c565c
SHA512367fe67bffc10f83d835630a3f53a852e4757518864ed89b6a15bd5e6618001feb88bb1b3de0f5b21db6ae892784bd656f2ee5fe002e99ccb4439208f9dfcbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b8d4fc242e5b9f3bb350dc836c69df
SHA14f32480a0618888a61f92f8307fe5ce2c40f2ea4
SHA256904e2e43706a17f9ecbca19095573ca9f171b2e088522986573b6a135bdcb8bf
SHA5120d93ca85c04b7745ef39cb543129aa00110a497f6580f668d492f934e629119dce02f98b1614f045753ed26e01f64bb96d2a52dc75da008cefe8445f68f832b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845dac24c83cd2a75acf4b86d2af6b4a
SHA17770c35f967e13ae94d866272374a43726ea1321
SHA256688a62824ba366796d0e0fdd2c2f3ca26eec732f6e13a7956d54f62ab9056858
SHA512d0df4bf4ca380045a4ec6e28ad17d3236f0f536e966671b1da68864e79d7f81e2b81d5a952dbe7e2753f5d891dcba36263664926bab4baf853c7119d82d916da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597aa71e54fe6dde5b67e82fce43d15a0
SHA1079c0e32e04e639237f03cfa549f7546c8bf49e6
SHA256fe0bccf235e77ab3f69137f9b05fb15f8e3f1830304c3e36dd52a4b70a2044d2
SHA512c2519e38d3a8fa42a471b122e34fd1fd7423c49e1b8d7da31aa9dc42921a69f707fb318f10d1e47984b878dcb99c5097b1a8e18aead5f10d7a88a1e3328cd1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915d149c3fb5ae9688d54bb806cc57be
SHA1ee19568c9c84c866c57aa021118011dc2ecb3498
SHA256b43123cd41aa8bd5316bb3bd9a63a677c022441a1b32ccad78cda955f3ee207e
SHA512896e4777bd9a7771eb47e0053a5f23699c85de2a6ebed35406dcd861b649b66c7e315e63716081848bad691614ce8fe7c38a04da7cda766a080178237c73fba3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b