Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
86c9dabdeda7f992adf276ecb64c43c3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86c9dabdeda7f992adf276ecb64c43c3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
86c9dabdeda7f992adf276ecb64c43c3_JaffaCakes118.html
-
Size
2KB
-
MD5
86c9dabdeda7f992adf276ecb64c43c3
-
SHA1
a94bdfecacb226fd5439e29fe2a1f908dbde4a7f
-
SHA256
416189750c9ba9e0a36cf77c023138f784aa9c7f540adfe8b01967571de24bbb
-
SHA512
a9c3391d27f8bc4151f19d36180e4c83e3f3c7e589f59b3fd7034b13c4270f0f104abc6874f2254bdb18b9e14d0b6fd7f0022afe8ebe7510ebdbd8e3a3dde634
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB9D6981-5734-11EF-93D0-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000eba4c41921b9fec506e69296cd4f8fc6b1119beb14eda275e9fdbed763988119000000000e8000000002000020000000e5809eb098b9bdc8e5f0a828639a904ac36b36874b586951a5933fac09978927200000003ef5ecc19b815f5cf2faaccfd4a4998cf7b61d36982913abc623c0c688f08f92400000006f14dd4fe1c62878d99db022ec93e95cc9a438bd79085e99fe86a95107dfd424a7aa14c0825b9754e3c8ff39c58d2abf2788aa16c3b6df67c120a589d5f68994 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429468921" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20381ed541ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2968 2516 iexplore.exe 30 PID 2516 wrote to memory of 2968 2516 iexplore.exe 30 PID 2516 wrote to memory of 2968 2516 iexplore.exe 30 PID 2516 wrote to memory of 2968 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86c9dabdeda7f992adf276ecb64c43c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b318fa9f4d5938d2859b033e230a7309
SHA1a7b8783c07b7121061db8e145a6fe1616c9368f9
SHA256e85b2c5b2040f38aa8000f3efd78a94343a35de59df3f5d4bbe1540e41d5c96b
SHA5127970a4be3b6ecf5cdba1efb046301b24ac34db558fe51f790258682f8c8d161f207ae07d7b44fc586334d1a89691fa29550fdb58f6ad4b5e058aca2e874a72a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170b2e443b1946974dee51d49bf6975e
SHA1cb454be84d385747649967a544c0169da2203643
SHA256ba0794040045e7dadd2311a9b40db79b209db94c2283d3c076190cd5e48d67d2
SHA512ef94539e7b44460172e1373a1d2ec9833abc12d1f876ddb41ae29f903244dd3a3510fc4862b1f5ba2a13787158815a6cc495b1c00aa4375c28300d05d3cf7304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e70db0e2babc39dcd4a10f50ec1054
SHA1f8614dd0b053d6ad14fda16b090d59c4eb710576
SHA256bd3339a28aca92fc2da6de2f69d28064b4e2ba07fa1c26b21c35160df687d998
SHA51291e5bdc839c08c540a3d8cb898e6c2a1902d7da22f6400c01838fa0319ed55f512645b018414f16890d0468cf0b79fb8d44f72c6531b524283816ec4bb5eb418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b90690303f7ce16a672892fcd5ebc35
SHA190eae752632e024e7ff2960d9222d612e677afb3
SHA2569af5b23703969b98a4c03c2cd599c60537cb72a1740686f5821f2f6de8a7bd6e
SHA5126b2404e3befa167da80a2837fb2d96b4b1666b382aedbb5ff845f9f7ce02789d14a0a288d215cf46aed9bf44128dd1e4cdc31c0a202936a020fc2f663d539b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592347cc791745132cab5c7f4531af6af
SHA18ec778c9667f97c15766e60b2094e4b50efd4101
SHA2568fc1c93ba21f001a635391902fae10517fcf1187c76511ba3d408fbde1ff16ad
SHA512c046c23d91b513f3617cbd8375feb43d121c308feff1de9bd52f2b8602b668a967cfca7d08d8aad6ef54891296ff893d1625b3112d3d76de80969a38b33c9b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff113d0dc4989960adf79912d3f83ea4
SHA17c63ff4703782838f1c3e3e2a181813d8794d7dc
SHA256c22544a638028ec92e095a30a42d7e44551ad0d8ee95f03aab3c5019b35cac8e
SHA512f96de546f1daf229fafeaa3f613c59228c08555b425346bfd2204b539fb98902e4027b5f48e9feae4df7ee5956784d2ec747d55337d5c48730ac61a27310a527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11155988d18f16371b793712bd3916e
SHA150178b199d589b71f51c7bb6cbc3b0d7dd85e95e
SHA25682c8c9961f992cd89527e8e39f90ffc8ba4d6f0af974fdabbc0d33f5c69ae36e
SHA512723ceea8c84b9faa72aabb406247baee992f4ba37223d4da6c0ae9603f0f7025ba98fdc4afbba55768d7ec149a4337183af6b17ef111bf3af13ba275edaa515e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea59286b11c00588beacd13e9bdc3cde
SHA1abf6db97b5a45843bd90133e170ec414796b43a5
SHA2560b468a0caa47055c2d29e841cde3bffbf0bf414aa5769ddb0f5d100ea3c0a459
SHA51298c67565983a36feed20504da4710aa2fb374a76ce4cfb407511688ff33a9eb50b42b2eb1709c1f171e038d22462151da43ae91821bbf8c74e7a0f523747b43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16ba92eac735034fe83ef878208f9c8
SHA19f8bb3176ef5ebd83f17568bd61f1783e1af427f
SHA25654b1bdce922f84172d7dd3c8f02af28ec7ed9e185895cf6594212f0e1d945609
SHA5129acf40359d12a871f8b03c817e1fcf2148e98081e1db627a56ab55726e562732676b858603b05f033731eb4776468386586449dea42adc7a896b631ca3ebe92e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55307231c2653a3b2f45dc80c2070b464
SHA139aded96d564117ee0a238309c01eb6368ccb0d4
SHA25646633d696bfb12290f3dae1bf48705a88cb2d35fbed2572c7761a5ffe770d80c
SHA512e279d140dafa1cac78f3916f7283a16ce5f8d47911f1386df1dc47e6d259be621cf390cae0f748794df1c9424b22efe4e73689527a31cccf8f5bf10499242fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c08ede9993e986d26f3e07831235dcf8
SHA1fad8c7d93295bc96752be85fd9b9307f42d7fc4b
SHA2562cb3fc5ecb07ad4a3bbcd9dbd79138f255ed3b3237e431c767ce42bac8aa9e20
SHA512dc00e27a08f730732a0f858db826ef04c4a1e9e8ca3b94c6c167171d9354653fa5760fb61b261851a4ddba47e531aa492ae645456a4440fd8d0b4489db189b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6fa4395283c286d02bf8f299b8b809
SHA124ad4868e3a6e251d46005a9cc3e9b328d7080b4
SHA25653b7ebadcdd5595590133788902af2e788dce65b13c0a47d8783bf701594068b
SHA512ea673d065f0c9a63fbce4c973a3b21810f46b019e0a973325b993887108da21e0979bf316d062a668fe7fa490680d6c496c09c47ceb953a315b905fe1145f2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744543330f9db21c6491cf211fbc1aa5
SHA1d99fca8dd2c8f93b347917a120c3260ea55c5a7e
SHA2560f8a44bc16d36c829425d5d8e5f7d5ea223433006da584ade5ae6e290adc625d
SHA5129a495b1095dc69c3090df63ff106360b0c2b59b1fc8f7c0ee166e6e30d99590aedefc74a21953a6668803fae89373ccf494843b03f437dac90a998e1459afb49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743b7f91c1222b6966e132966c33f21d
SHA14a74c62cfde8bea8b7eddd3714b4d7d29362762a
SHA256c001cf0d52879d24a3564c52166d4c64b3b8c289e231d250f0251c49e34994dc
SHA512e46b777135db43de7e2a72513b443460d221d45845a9d0f3be26a60e26615ad2bcaa9faab9b5ad86f9d9ef2dd50f9784166b5469001fb5118ab659237054d4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaada4c06d24f63f291ab1ec70bcacce
SHA1b32ea6924e6de3c456e636652f640f3b3169431b
SHA256d520adad09f6ceae39671251e8ce9f215ce595bb41bf43d4d2894f25e6d264ac
SHA512baaafc2e6a7341ff048a0709e9b88ac36158ca094d6cdac068b91f7baf4eee35c30b91831c869c3d4cc14ab07a2da5c4b2d8bd479f26e51a35f6531075f87894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc28773ad54a25f45d41d09af8d5d388
SHA1fc0458fa5e10779835862eee239d7b29fd3f1922
SHA2568655a26a678c771345ac668da1b003c332d61ed3bd82ad2764efd9b7a6b2039d
SHA51214600422a13581687027926b9f4a9a40c31f299c52043ba8f59bd29a589a51f9979039369791885fc665e017c80fb4c1610526aae3e738e07a5ee0e9fc11b497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056db2ae69ebfd7201f595150a1475e1
SHA17e102e7689693edf9a4385027124f2e49a14a307
SHA25678c6120fc37188f442604e7c5b6cc618c8e2615f60d8a156b72f79aefa534bc0
SHA512a4ba2bc1c9026b9c1f7e72b522596a0f54373586eafb79fa72d1639487b3e1b92024751c8333695faa22dffc2dda577eb68b868d14ba7a4a6f634bc743e4b81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b291fdfaf7e300707db8febc22757170
SHA1dde55c14e196ecca01a7fd596a2772ef4338d1cf
SHA2562dc1be74b408bca235b012a262a1594c50e5a06a066c4bf6de73f59213649f66
SHA51234d8590a30b66bbdd62af698d8e1ffc9b1bc313d3e49d8ef573da69c4fcb43fd07538108d864b24f5e4fd480ec34a5eff4b0b1d10673e31109ac6ac2762c2050
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b