Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
884704a1692dec827f8cb522e48dab8c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
884704a1692dec827f8cb522e48dab8c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
884704a1692dec827f8cb522e48dab8c_JaffaCakes118.html
-
Size
1KB
-
MD5
884704a1692dec827f8cb522e48dab8c
-
SHA1
9b2a96638414125b167f4793a6784b09cb0694d0
-
SHA256
f97a2e9d6820b6b9229107f33ab553af3d568265cb17319ccc64b78a6c205528
-
SHA512
b98d489d2e9cf7ca16451fa15a193f62afeb4b0b15557386955a1f93b45d9dfa2f1c294a9db5bda2c91d73c7f92ae1adc0c9dd65a43aa903a3d4ef834dffa2d1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C670821-5778-11EF-9584-DA9ECB958399} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429497807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006010252e3c3d945a0bddf1a129149dcda3cbaddbb43068d4548641e25aa543e5000000000e800000000200002000000094b697e77510c3f924603141d950158e599518db661fd52b5659f9d9e740127c2000000005a52b13441551d063d235521a9077a45548c27dd68f33ccd79d2398634bf99d400000009263f1eaf7452e5928cbbb0ffd005dd0dcb7cb981c2096efc8d19a2e17b9835b1da0cde569d4af5d7a788b7e8b90bb98c7761cccc16f0d51c14ec7e0f3a29d2c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a012361a85ebda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2724 2480 iexplore.exe 30 PID 2480 wrote to memory of 2724 2480 iexplore.exe 30 PID 2480 wrote to memory of 2724 2480 iexplore.exe 30 PID 2480 wrote to memory of 2724 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\884704a1692dec827f8cb522e48dab8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e5b9770317ec68b20e2cd0d86e24cf
SHA10e113fc962a970d7218d675878eeb01c85fcfe0b
SHA25650de47c8ea59180d692df4d6cb1b8c4b03e78980dc3df9c69aaf0411075faade
SHA51295b86719ebde3276d6af2c6d477be8767b3aef1d3ee843e2f604cab84730f4e1a538979e8fbbff6c663c6ae3c6cc41bc8f0f062fe0e00334cadefa3cd575feda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137f30c43338b4de17342c356a317ef4
SHA14362ed3a1ff3390a57cdce63bec31b9510fc34b3
SHA256d76359ac93f80e2bf394a18e332240507cdb88c1d094f8023532843442e0c911
SHA512430fd9b72941239f1ea843687a77691bcc1ac56554abcb86f1a8759a0645ff31cd7c8ccece40ba97b6d5ab1b7ccddb9f963a4bc3092ff0ac1c13ce40a3cc8cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47894e24fb74231586afb26a997c5ac
SHA1e8ef404820b28d4b6b7d4b661a9ccf80efbadd3e
SHA2561db20e267ad84e2f55dd22af61c01940203103d62498e4ee6a7a9b28d88d60fc
SHA512aec0dc503caca234b501f5234329e3da5d27a74b35ed094071e79eb39c9b3df6305e957794301b7203e2e445c61a35ecb139e40e979fcbbec56e8b0e91530a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51854b37ecc22afc50e09a5b84b52fbed
SHA1b94265da9dbc0dec50ef0d7b6567fd890dd081e7
SHA2568c4a68239ae30af03aa496a78881911dad72dc3f5e2af4fa58fc76e85a19bf59
SHA512492ee692c3c542cc819d1669e1ad8ba4548fccd23b5996373bf145f2f24bc22720a472c6b744644c5b8f332d359e394b3f93b7e3de3c75e3b73b67fd04291086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef278d0edd8b4fa3bddc5cb53c7ed96f
SHA1e0fe85c8dba8914801d991e4d62e17e903b18d7b
SHA256fcff6d528515593df02f173b6f968a3fea956c1fdf58c36e6a7f2f0b20874465
SHA512b7da8dbbeedb383761bc23fd66f3e43ff01f54814ccaeeb811c793e8e2df28a2e9d4a7b909b67e6ea11db96d5ce6ac59c975e0f99cf76e1ee4da3209791c8596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea26f00707469e6bafaf4181506acc73
SHA14b701b2d7a4fd11b5605d7065562d408fafdf1a7
SHA256213e31de4dd5fe0abf9c6d1fbd78c152f2df9125bec0d4c96ed712fa4c900df4
SHA5127050ed5090042ac5cd3612e63da5024c0722d9b21f4560393af991863fea4200fa77f8ad570e0f88bf2aae76ff40480fbb183c214232a61169a15c62da953905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ac794fb328c008dd45cad7020775e93
SHA16f3187b81236e6e9aa8f066d55eb5d2b6e23f9dd
SHA256e537c87b711b72338b04f01492956152be366c93348599e9b7603df37303a32c
SHA51259485fc52be6cfe05eabe13c40f8d0d9476df87a68e157b84b1de856462d4df6b40cec8d7d7ad46e413b3008b8ae298b36341b028b3a8a89f066dfcda1f2ca93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c050fd99a44fe3770f8881537eaebdf
SHA1d798c138d00c0487a079a2d4bf45c08f3f4deac1
SHA25612130e1f2df95c3256025948675059be4ee03922ff2455fbb9e05306dfaec5f7
SHA512e36e4680865eeb314f7c54c9c60d1ce2499c5ead739838acfb2d62c817de95681d31501d0dea56cfb329bac40207ec13e0d0076322e9118e34b057ddded2ea67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cbc64c6d66c853c2260c4fe2db389ae
SHA113cea31b3e936ffeec9ec535b2b9b0f0b17b1f14
SHA25668c7e688458fc321689ea8f5c176408331535c3c7381474ec70e0830d2cd6835
SHA51279fd68bc3fbc6bdec730c8769eda20c7519a33d4aa5a02f703b479cc1696462f28115a328c8ff8a29aa2a183816007db42ee4ab69ddc8b2a76d180d32e384786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ede3c707aa646c49e23c1cc65b6b2d
SHA14d0d2a8208cd73889626613f827fd352ad7ef32b
SHA25676d350406b4728ffb38e67bd71837ace80dbf5f7e4d54722b70d31f37434dd26
SHA5129f07ff08be67b4c33767c8a0d2b25d6161ac538aff5daae080bdae3e4bd128a2b2bd69ceb0c0ce08957bd54b9b7151250a624563e1218f8a3954e1bff8239924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583bc01ef90ffa31f315b20203a18ecb0
SHA170f85345a15837f6f451ee3017a11576db6ade27
SHA2561ee0c2040645e9a9d52dfedc7abf5df24a1efec1a50cbb11d474edf78f18cb7a
SHA51209c5208f8598d61715b065e2db51660343bae67a539309c6d53ee790cf358c54bf52ccd6e19e0651b645b00cd2ddc76ef14e7d537992bd6c9ae15ed9b6ee2834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170f2f3ba47c4e0f3b1505510715f109
SHA17b334fa98dc34ef9f913ac102fda5ac78073d6e4
SHA256d80763a903f2f43efc29cdb835b04ed79dba67662ea7083c0a2a265a96e0a759
SHA512dc3003b6d4fc899a71d08a592af1293147fe50f6a980cadef5aaa418a867fa07e6b02c6a3b2b36764143e2e693e8aac573046f3d9c0cc2a7521a787103fd697a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d65212ec24f1f1214c8204b10cb7f9
SHA1282b833d8eca73ab3811903804395006b0c6e70f
SHA256f289e4815700803e60267167ca32f7c9093e9b75e7a1007975505b2c2c7cea92
SHA5128774d1a0b34e0013463bf214977d0873ac0a309dfec3dfdb98327508f37f1111afc43d7d39a0189deccf3cf5b12897e5ea442430a5003d532c362faf38b61588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d314caea26842340fa88b49d6aa405
SHA11fa2c4abb9355dda13e1d5bb2d4fb7d81b6e82e3
SHA2566f6564b5a02ef168dd711a425c43674a3b138546101200f2231dca36652a93ef
SHA512d272e2e5a852b8cd60b846323400422a40ed57a328a9ba0773e5ec027161ccc37e8653830e589cda104db815639ce5ee410c824cb71deb910e10ae9e45ffe6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3ad377c706c29bd0bdca35ae199898
SHA1bf6c97185b31f1418cb32b3bbb301fb53d917226
SHA256e141b2a9264c58a2463f3b5ee8e55bb6295a407fb32980c9ec42e4f7fd357b10
SHA512223ecefd78b161e5490693eec83b5f799259a334845c32d7feea202736db9e19d812c4e2bd81110d9961a318dfbf6baaa9c80ff419bbccd274a285bc5a451a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623e0fba92f6c636a12d86d195ac332d
SHA10b0aff02c08dedb254df5d06dd19e20a31b379dc
SHA2564c771af3cf306fc9ae48a60ef59dc2260643e45b9ec67e18312f9b153eaeef3c
SHA512ce95a012739ce235796a300693dd797aa7bdd0f72c9eb01eff19ca170da66d982c11c340b32f785319208b25c90bcbb0328a9193bf8ab65d8700f151a68b0ce7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b