Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
86bb20dd36257081fc0800af115422fc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86bb20dd36257081fc0800af115422fc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
86bb20dd36257081fc0800af115422fc_JaffaCakes118.html
-
Size
3KB
-
MD5
86bb20dd36257081fc0800af115422fc
-
SHA1
e0477db09f9aafb7af2e4808fe77b14f8bc8bd01
-
SHA256
83ac29e38ec382819964a71b889577e76e51aa8bd2e38d288ac2884e9eb83c5d
-
SHA512
9df3fc552aacb7cd81c58b7827ec6ee20e9bb07a96ab1d23d07352ccad85b01fed06c02154ffd32733b43fb7d12070486a9e6f6762e19ffd00c44f75e5956795
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429467782" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0692d293febda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000a99d226602523934fe8e74fe2595e0245b2448c2f51ef880381ef8e60139c0c6000000000e8000000002000020000000ceeebbbc3284cccb12a9e1973eab6f775105b7d2d23f47e256a84fb42938864a20000000f24f8ac990ec8261c3350e4f9ddf0a0db6542a9d21a3044050b349cdeb83422a40000000d3d5e9ac6504f9bec409b2b0bdce4dad5aaf953ec0c67edaf599fc63a4e390230ead5e6aecb0684b4957e45ebc505f70a5405fc097fa523620ffde49109d61e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54B56CA1-5732-11EF-B254-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2968 2652 iexplore.exe 30 PID 2652 wrote to memory of 2968 2652 iexplore.exe 30 PID 2652 wrote to memory of 2968 2652 iexplore.exe 30 PID 2652 wrote to memory of 2968 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86bb20dd36257081fc0800af115422fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3a18ef7dc14c2b4b2335b0e95a5806
SHA157b667b722eaee69421af29913e42dc797d76ffc
SHA256cceb36590edd5f766150ebfcfe1f7d5ce3d0425247004ae2b236357989bd5d4b
SHA512cdfcb7d6d7eb5088fd18f235e43559e26e155774bd9a308f62beaaa0d57b3e4122c72a877f0d178e592090b35ec92b8f2d6811c5e4319bdd7be5db9a7dc68e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae1e1c7e9c63205fc9c915966de0c77
SHA100e30d20fd40188c7d1fc0d4b89af0eba122f72b
SHA25682636c36bf9fe8d14bb84033fda1064719aec9cc319f0c39f28140dedb956955
SHA5125c75f79d78c2297296a0fd6033f6dd7a7da0cd65bfd6b9608f697d1eca3f2f3abd4cb7ddfa6dbc5a3aff5225884e4ee664ba92ece86fed3d0504e51400a57731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cede20d2735dc2949c2ae963e22e661c
SHA1e3e5f57f848f904e447d410f2f1bf9ea30ff0536
SHA256f33611810c77df8408794f25f32143b0dd9b65b3e2cb01f4f9085d5194efde48
SHA51227925858d4810ecfdd96e376a402cf4c1c2a849c7be489e346211505c03246038b7eae4805210817848153186ee006171cce4996b9b1766965f28ea2196830a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a113e8a65e87f731b44f1a1cf56dffd
SHA12d5db73fd47a4476baa79bd1d263b1299099b848
SHA2566a8cd7a9e9073a2693617112df90559514a16a4961d70688828e765a769c7e9e
SHA5126451a6e188f65193e10523f33e76e58898c26e78a462ab1776abcaf6a463956c93593f4485e732393c366f8a61279c80d792125672d5c869a014bd7479bd0e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52435050e734fe57ffb02f15cee893fd7
SHA1eacee693c8553c32782ed0cd6c3553b2136f3883
SHA256b1cd3499dd19a06b43333ef53aed027999910d59797641184b25277eaa5f9372
SHA5124924e6b785b753e5366fc184055401c5de6b15e68f1e0aa4dde5e32c11ed7807d3bf3a54b64b9dae7e0bab663ebfb6d3fc837e67a75f4f581a5bf727efd0e627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa3a568c2187b8230241b78af14f3212
SHA121b209c8520262f736e25917cf644b349d8ec340
SHA25672b7a5694edfcd2d95bece0e11dca4ac098bce70f1186b55cffc7c38209280ad
SHA5122b8bbfa9ea109a0bcac105be35089d19ff887acb19619e00aafe7580dc87b35bd62fb39c72603dd241900cbe5c97d09711529ea54d7eaefcac5590acb719103d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6acd5e57bdd5b61b765708fa56a426
SHA1899db52b6bf8946e56a92af82cbf853abdcd1300
SHA256a96fdd19f79d70428bd6e8322c38070ed7bb242145d04be23a8ad09e58c70bf8
SHA512a0850931ec2d4484b304794e183007eab4f99be11dc7f62954b2feebbad8806f3a242a8d988f00d17887bc7885972fadc2787b7d91c944843a8b5d45d0d57cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645b5e7d8544017b0372a5723f94fac4
SHA18fdf671db121f18c9a242659b03425ddac952b50
SHA25624c3662c1f46681e30b378e04125098fc4165c1b60fa421b3c5d2f392c31f204
SHA5120fe14b07df00b730ddc1a7085e0b878a5452f665413ce9ed67d32c796664eb810fb1b67ef7df5ba2b310ed4bbcee8572c94da97cf4bf7169183792d7b983611e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52520c57ad76b5e5446bb50211249752d
SHA1c9e43e6a2f5e11386185fc282ee4dea860975a00
SHA256d98ff10dfd42b96b052fdbe09dff779fc5f7e6b43c8fdce820dc9b4e25732592
SHA512211baa7ebdf21fb428b0008af14d2ac00e24e57c3e852e6f030ef9b4ea316df9893f400044eb10e44c8be1c3bf2b16dea4d3c2c811c56a719a0666d7594e9e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52393eea4cfc4a84b32b9fc497d66ed80
SHA1b9855d10cdce32229000797f87d2d28be4a0b17d
SHA2566ccd35e9cedd630e0592d8c28558380bc2276f9cb1c04f425a067b71a66d7b73
SHA512cf0da71323bb40e6beeb7d04cc3958935c8e8af417dcdbbea416c45fbca4832e28b1d0f754b7afd8403a881bd389cf9970967afdc7b3e183e1c9a171775ccd8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c552948786a7ff179a988eb31127e44c
SHA1496f3b5e85fbdda88b52f481e4a1c5ebfb0994ad
SHA256079635de893945afa5d5875692574d8094af47b5cff8918e3efaf2f15fc0c7d4
SHA512dbabf91ab190ecc7d57ec81772ef7f08df4b1b6774b5e5716fc87ccdce690e8e377786fd419bc555697cccdf33ef0c42e0d1ab9cf3b077020acf446279dc080a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eeb4fe11e260c9248e8585014abcaee
SHA1ad3ac8cab9266b3e69f2773afacf3ecd53d23efd
SHA2566bf51f6935d9649ce2d6a2238280d64da646ac7482caa51b71240a4bcba292e5
SHA5123620773e7f22b1d8b20c5512ea04300c098611e8d8d5607d0a3902cb41fce2317f7c2cfb72f6b54436e748efa7fe7cb25127bf8689dfc62e0eb631b535ce444d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85f1fbc5d901a958634859920019357
SHA1179d5e7868ad3e0dc2bde1f47e221a28bf5a0f3b
SHA256b60966ef205cb64e3b9e73b2856acbe7392b4359f73c715aed256f6de45c2a9c
SHA5128a2a43306dfbc2a44d4832fbf31d8bb6c2f6fa77b66bce49923b488fdbe06a81974d5cde7fa03b86589c44bdcbcc15e3997372acc3adb7c26e58e5b96b46ac8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5038ed4a9eac1e899221ef2906d4c71
SHA1f29c40407687fabe3acea5c9e7509d0c14996425
SHA256994f543d71661dab53fc44d681bbb9d92c95ff7d8b19e03a7f408f45b6821bc1
SHA512308a3a0cc88283ebebd8078fb45a531c2f4b7840b89e512af39fcb0ba9e90ba847d2ac18dba371cb34c529edfb398551798c699cd5ae6f0e16d0318c1acb0d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ef4db96bde99893ea8941d75c8c420
SHA1c97ab9132ae6a53d465135b4e7d7980f9c37fb13
SHA2569b6419577f9fc851ba3d6836d1b5142233f466a16bbd3df3cb0541244c792668
SHA512848d463297d80ed677d9d9b1000ca1005bc9c62b8cf6c8b4ebdbe63a923067904cd741257852e4b3039dd3604b261195213884baa74096478142736b8f32e69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb7e96d272b5bd498a7e05474aabe8ee
SHA116e87eb4fef22dd1f458a648820b7852cd7a0e7c
SHA256ea2fa03f97a57608b88d3e3cf74718467fe8ae74aa81fce50df10653e8702008
SHA51275d34ce6ee3be679f8db53965d26e2f6935275dc9a5286dd2b379a02a26e4d2c13056e46c51b7d17f4d5efe57982bf85b9e4a09e602ca9e62452d872644e6ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c02baa456f268bf8f7c0681ce308cb0
SHA12d2aecb546a0d0749d81738f29170164bc22a90f
SHA2567c3cc69d2082f2a53b8fa825cb0e30d5c500c3b0b7b1fc7708d18b8735bf27b8
SHA51210c77b5d3178cdda26ec98a6ebdab0307d75783329fe70e0fa5475cf2c64468eafb501ef82473abeb63d0b426c7e291692c711bcb3e97ce97a8ebc2cf455543e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61b101c976e7e339e036e47cdedc382
SHA166b705d755ab78a468a080ac34c4de126dad3dad
SHA256616a03d8e818f41630d589922f2707f36df67da08b609d1e0208f0dc1f532698
SHA5122d4ca6a259b68c6ea74e3898fa286aeaa2b6e5777c7d944b532b80e5da284bc84136f25a9ecc14cf7b75368e5db9b128d865f5d07d8ba0e8fe32eea67f744fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c82b32b4f4c1e76b61d0c8a3a2e518c
SHA14fc6de68bd55647f7cca1f6d1de984638da1b7cf
SHA25645b50cf64e251b8cd85d409d0f8a99ec8c864d134e2c8e13c91dfe15ffa72228
SHA51208c3c1ba4bd4a5bee8d08da70bd3f1a4c52dea9f819ca0dfd1baeb24a07ad0a2d8bd2268df4d924650275d79ad935056e03f266624421ff9221672ecc233b743
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b