Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
89612beb1213300a45046b6d9de97d7b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89612beb1213300a45046b6d9de97d7b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
89612beb1213300a45046b6d9de97d7b_JaffaCakes118.html
-
Size
1KB
-
MD5
89612beb1213300a45046b6d9de97d7b
-
SHA1
13da11b2ce40766b100f7f99f9b00db25eb929d5
-
SHA256
d59391fa52abce281daca5025864a377d1cb8481307885d3ec390caff8d354f4
-
SHA512
26d288357750157613454cddf99913538ce5d1cf4da226a0ab0707deeb0d98f710825ebca605db5244e0fe5771db831f1f8d741d703b80dcfceff17eb21b4319
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D184FDC1-57AC-11EF-98DB-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429520391" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000cccaf5b5093df28f2d76415f26cf526c49b0707e11b1dc10e4cf9a2fe9053015000000000e800000000200002000000035eb451ccbd145f0f9af5798c886edf16cf24922a754a58f7f180ebe4bf2c650200000008e77f61c482278741373bcfc8c96894b87d1133830e9785b191d6d975171d9ac40000000715b758b7b0ecd57c4c6aa96fae000c27599e43be2006dec6496f2d357b7c2c482525a8b464c97ea76627cbf3a44b8bac578e03d7e37e40f0651809c0e886e67 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e024f6a5b9ebda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3020 2032 iexplore.exe 30 PID 2032 wrote to memory of 3020 2032 iexplore.exe 30 PID 2032 wrote to memory of 3020 2032 iexplore.exe 30 PID 2032 wrote to memory of 3020 2032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89612beb1213300a45046b6d9de97d7b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4921be650c8acc9ee524952373de79a
SHA166a3b610e24538a0d5ffdf688b2bba92d0ffc041
SHA256b0fe4687d24367cf2227da1f68d23f0dd2c964547ba4d23ae61ef3978b082394
SHA512f07c8f634618992ff835be56421c3ad647ab1f3c0fb99405e8142c58b89bc10f4cc88d65d0b0acb9eaad80984cb762c1f0c36c0740511d2da4321fea4de19f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a3bc69640378e438b54d4c342b3b20
SHA1b8f4e9c1c84abed48e1202033c67f2affb7be1c4
SHA25612bfa68ca32e1be6f638b3d1474a787ee3f6eeece1b78e4f240c9315d96da487
SHA512062a5b451e6de030f624556ac4efdb62d1f1bd2d695d508a6c7b3f49275f4e4e0f974e89dcb980da9a2ee5e68023f50a4c30c9162f57f927bae8c12eeb022f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f507d0affab50bad68f06f05c1694d
SHA100f89b0ca20084c85bbffe5e95dba5ef4e58210c
SHA256125216a4370246e37c0ef30c4f1a7cdf8e6d002ba08762a09ca37b8602a089c5
SHA51284051bb69ca8be691e9f7e31fa70d2a480c89e660a6deb1a19feda7b99b080a55057cc2f968bc7b2fcfea0ab3c482e789d359d731a2312016a45e8691d76dc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530e78d861fd9ffcc6acc30b90657ee3
SHA11c236dceca90bf2e0e62562628a804e35284eb2d
SHA256a02323533cfed23237ddba1bdb40679440d8508ff2ffe42f65756bc7251e3e2d
SHA512a0fb5b211e99fe38624d604fae028344cbb162991cdcc3a7a3a8d9d21838f2e7bb1faef76ce7976aa054fb636288ffacb79ac8e77814f6f64b554175bb94385a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dae7f243415fd657618951043f08f42
SHA1f207d8afabe51301f5abaaaca1f96dfff222fad2
SHA256e83608cdeeb91b8f0850d02cd5087396a576ddab08b32b35280dbfab36b30632
SHA512f9d15fdaeb597dfbddf153b0828c1d1b7789729859cfb44d06930a12f40da15ccfcd410a5dcc996fb198cc2df010b4a17cc3456f67f07c7f79706b7444f0a27c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9645cd13a8e6af89e7f1645df84bcc6
SHA10368788cf762c60d0b73a9317e788c1109ac7530
SHA256378c7697c57c0bfe9ab9aa25f5af92f014d9619829bec13afec157acfe09fab7
SHA5126b1b0163c5ae97284413c1578e73e2e2694f1409150eb41ad4b934009648ee969d51c18745c51852575fc3422910d0df5ee1505823af4620958d4359995c682b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e1198d3d1f14780eee5bea84477efc
SHA198949b2eed51699f2d09f50595c57c51935b0777
SHA2564b9ded1a64793e5bec3ed1cee09de53cb137cde5aefbd372f07775ab877c80cd
SHA5125b5102e2bb1ba4f18ee6c939ef0c016260918e42c578739b3b1844382955021361b9335d52f9b5bcdb934f0f7964cc0171b878d39e8c383ebf6170edcc97f2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12944ca074e425f040eea07c89a21a0
SHA1ce47a74553779f76a6d8064657481519d8dda2c3
SHA256d1f660457fd1ee5dea944c6fabb3ec2e23c2266c6a03879dc8c7cf71213a7f90
SHA51244d75e81dc3df20a711c8d5caf2c2139a2b381eefa742849a093307fe131579c66296d5091261efbe62f28541f09305c0ea7125bdb94f00e9ce3a8755917a234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0a476b86749529f7f304ddead12d273
SHA1cb8278b867ec6c06b324acee2bf0ba95a86627f0
SHA256df4b6404b0fc1c51bd9751adc78095107b1be4fbc3ac06c23f8801c71fc94aee
SHA51239216e9663b6ca8ee54ca79e340500426cf70d8ffe2be11e3ca416f8e1cc55e55fe7ba83a6509cbbc0bb2bfed024c761ca6ac50e7eebd447737037ba22aa4666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24a3284157abf6b96ff933098276bd5
SHA1d0255ffb619d7a07a5bf1256a0c6670239afa395
SHA256d9ce2f68c518b6abfe92acd49cfa4873584e230e34032becdbcd1796966296ed
SHA512c10083eb58dbd97d1e6c4e2a17e96d5029196de48236503fbb98c71a52fa50f507a459f7a719db7c39b4ad9128fbb11efb1f0f65b73c0315d71c85d3f9d92b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1cd461d0fe35676967a4bc8e48af356
SHA15ca7a7959df564dbe65534c74a3aa6e9b5e71e9e
SHA2568ac8bc28cf212c425820d1a934bf5b07b38b4d390f7f525c050f6d4f17e2d580
SHA5120680d0ade90da9e2db6e73ed0f6374ddfdc88b465622ed3f0126b35dd8d864126a3a634655240c5c63523e9a964c0b69efbb2404c11c2cefe29095fc31463333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518e8c800475006101cf883ba7b51e3e6
SHA1203e3317561cc9e777791706288db65bbc8203a9
SHA2564f6c87ccbc99462de74254696dbbe696f202e5699ee9fc4282926b54ca2d88fd
SHA512b67183fa46aa616617f77101af6aeb1621ef20fbd3a63a951d68a23ee51b869f08094ec777b793d978fc4b80be2b1f49bdce76a20f2c44297039f5cff7505890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522805c5f9cec7883f098c82b933281c2
SHA1dabae0037cf338690d826ae2881d9521820dd614
SHA25635125de12eb7c6841ab747ac21a9cb4fd4424b4be07534977e0deaa5bcde7195
SHA51298335e29021330b045677881c2a5041c3ffb253dc1efb9aa06ac75c83b7d933c9ea829581891641ad9cdd6b2c1b9665000ba2268a0e085e7805333f52f375c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d2b4035e66f32e59fbc67b69b81862c
SHA163a8e152f3ef3d49dce360e60cf65361e34c2583
SHA256a89c83222368a8ad2a6a715f05def8a28a43890a17c6c1b7c82ff03ff33c077c
SHA512910afe6a8ae7b17a3238fb8324d75cb2e92d173118428ef4f4981956cbe233b9ad473013171706d6aa513d71417161a1dcb1d95cb8d6047224427a440ae1bcc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5016857689fb02458350e531d356f06a1
SHA1953c18bf21bd28692b93192d72344b5c759ffe7f
SHA25626619081b61d7660c8106bf859b2d9746833fa4b2729ef1489ba27ed9e59f887
SHA512ddc380ea88c9c28fe7ae3ac1ce3e35a0f0c5860b4378ad9f7beec0a86543567594ae9b7dcff1b381e6f8d371b3aca3a2a74b327e3ce4dbb70347f00829cb4fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1b7c57665cd6b9ae1ce2665c295f9f
SHA1351abe40ebf3967058dac96366bfa3a204885ec6
SHA256be450ac59bce93b5c45d01f646c1a844c2ec77f7bb7fabd14cd066e95ca1a9e6
SHA5123ab310691e7cabdcb80fe4cb01eaa60a2fdf25ebc329672b2e953a564881a20436506b33dfbdc882f4b7dbe6f2ff5dfd35b30fc387359abd62e2dde15fce5cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a928605e6144fd6272c91bf1eba2ac9
SHA1a94c91437b5691c33bd8c31d5da5aae688fd3872
SHA256eb39729b491389bdc6a4993f3346e0ca87df90479d6d7c368fe375f48498ca9c
SHA512a0032246731b8fa23cd14349210b407b79857cf52d93ef0edfff2d4eb6a0037af55a0db126325a9619f29a68957140de51b2b5213b387faae83e830246455303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd6d03de7b0cc5a9460e91f39f36439e
SHA10d1baa9b3ab291c8dcfb600d3f7c9c33e7fbcae6
SHA256f30e37f9c2d87ce654750bb41108601704f91603f0c9650ff10e109181436be6
SHA5121ae62eff1d2c4bc34638ac92534ab1ec5fedb4c64f30f7ec56c3c7f973e483864f23354483150618fb57d2525ae1e75e8b71a1eb826771202befa3277ad5e469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ddceafdf298d32dd825ae180d3f8c8
SHA1f97c7659790ecacdb6ca370f589afce64f94b12c
SHA25687401bbc023f3bdc89dfd76147de1a454c4da619356c1b503c137d605f57dcfe
SHA5127581f6c54b272c21aa6bc45708bfcbddc6a700192a64892a68a620529791a642174da2485554148a7b78a86d95360de98d503186bfc79c210e1bcbf6269feefc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b