Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
89ee9b9445e7cd883fe9940b4dea7925_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
89ee9b9445e7cd883fe9940b4dea7925_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
89ee9b9445e7cd883fe9940b4dea7925_JaffaCakes118.html
-
Size
1KB
-
MD5
89ee9b9445e7cd883fe9940b4dea7925
-
SHA1
5c9c7ccf69737fb0c5364d98ce9e1a6935839916
-
SHA256
2b279df81b9db33c949e4ef2bf15789bc3fdc880f23e501cb613cf2b2e3355e5
-
SHA512
de80663e9c031ff70844efb698e07f55f95ac2937a0cca7fdeecedebea77fab72eb5ead534f6be5504c5c6470e10483f853bcbe13b179606c95ba45fa10e0cca
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429532061" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDF68A21-57C7-11EF-9730-E6B33176B75A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f25ed3d4ebda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000024ba67681cce314767ea381de1d28d142e1c2b4061a1dacc053466ec3c1ca17e000000000e8000000002000020000000e083026cc636d13335b0cd28015a2b42eb351a38f509d58ca3530d5b66c3965c200000005b5232b3b17c046ca2a3c7ddd5bd82b1650b4a80204764f43ec9607628b5bcec40000000e37d04862c9049697ff8573b8d54c8c1a72c5575cb36d1b5a1d0259560463a36d37c4f6c9b3aa2164f93c408c880b48addda65cbec175b29b80ee274bd9a72e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2696 1720 iexplore.exe 30 PID 1720 wrote to memory of 2696 1720 iexplore.exe 30 PID 1720 wrote to memory of 2696 1720 iexplore.exe 30 PID 1720 wrote to memory of 2696 1720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89ee9b9445e7cd883fe9940b4dea7925_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d96bdc2225aba109403c465e0f79075
SHA1c15e3e4f17c366131b1e912f7959ce8b83ef91ff
SHA25656f2a899bd62bd5c2fe56dc28e017d87182ad31e5a1aef5f7b49f8b3b6391c32
SHA512d7212e16c236c8e44dfece7098093ab127e430605b0b8ffb044d7045f1bf4a0e37af3fb63589728f8e06c56b97954818bf2e5ac75b6acd095528338a07d972e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594218abcb060c1ca827e9c36611c3056
SHA1ef7e3f7689e58a18141b15ae4d7bd793932a4953
SHA2566edd1004e0944fe55dd11e0442e32aa92e132c53082361cbf8b9767c75ccb77c
SHA512b5c1e9d95b70f8e915f4f70e8d1023e9367c31458b9d3b9806d525acf3c947e7ef6cec50531e20f780b0ba21c4736c2c80f1abeeff24c9cf62548edbfb5fc6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520337465dc81f60814192f98f7160025
SHA1658168f8724d55c8950ce0b67eb950f076cbeb23
SHA256c934e9b9ff906f3d9f395f246dc85636f73fc048c7942d2beb55701146ffb0f7
SHA51260c4b407c00748c7e343f536459418faf08ac771c36edcc41d1080b557797cc2c4d553798a0370f3dac12a93ce13040edaf2f561cf2ca5470b5b0411f1d00eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501015266aa82990a9ed4eee76b0d97dc
SHA1d5a2d4737e8e09899b8b171b84eff77a1fb248df
SHA256720aec7b98c23f2ceb2d7b0ae4da29841b7f8cb3ca9cd755d396ab4e603e307d
SHA51201216b74db312175585a41d3eb4c26b5034e990bd0ee1e3ffb4d2eb802ec9a4e5e062bf856a8ab9786e1d939f9f7dc11c266accea4b662f0c80b7a553e30f577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f56a8f477a21ccba06c1d363f86af17
SHA13289917eca1468017b95559e4a22ea638310a994
SHA256089dc2dc8490996ce2d52146fe0d6b43815bdd42ff94033907e00b211cff357e
SHA512a1af9dabb807d700943810531b78884c2ba5aa3b230e608934ca8553fd37d10a41a92727fcc99b6aff3b53469d09cee2949a57952c4ca65f71b10006a2c155fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f0d49a914d2fe687f4fa0713899fee4
SHA181c1f4181ae28347593b00fca0b86f852df5aaf9
SHA25657a9e6ed7dcb44bd0b54cbc9e0edd6cff9dc9db067a0de23eb9445dea0044368
SHA512414b04dc65f4e8150bd1dea572ce4720b2b3ebd5415364d25f0ce3d1828edec5f1f2bc1aaf887b0b3341c62e5b25704f0af1f338c2447c63e4b0717712eaf999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3b67a0cf940ea521c5ed4adfd9be2f
SHA16d214657a61693c270187f2a29c207573b966c21
SHA256674e8b583ca915d77b42f7d94e251ad4db09eb04c64f0f4c85ddaad769d43013
SHA512efb6d9aabf6ce0d4d0dc69e395a4d468d8b7c24f75ef4292a3d9321ff6c11b2696f77bf2a33e86e7fde4b7c25b3474ae685d1411cd61cb7ab93136393b6e88e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b889822af054219dc652938a56107b
SHA16ed1aed88ef7c913c54e11096ff777929b4482bf
SHA2560000841010cadbf1eb08a6986f1e1c5f115082d43b43cf0e8553969bc116b711
SHA512d4f1ed46efc811a89931f476447e58e6e700d2067326ba628998b6f88b207a60e2c1bb3f89894aea7a1aeceb4f6cd7d71821bd8fd97d3cfe432b870cb1eab975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55754debe4b285f9e9fe65cb121469df2
SHA146e8c8dc69d3ca2226b2154dc4d5507e5d34bf6d
SHA256deaa61ffdbca030223b477cba048beaef97b2f59f4ef1a7ad19f8457e0ff5a04
SHA5128e041319357cfb1db42affd3a9b7176b9b972ae27e758bf41040189fc37e77a605acb08916fad4ba84b224562b3441a95a8dc5c879baac7aced2f352c365ae7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55055f7d9e417cd2c653d18e78e19f605
SHA1268a973f7b8bb9a53861008ec209d79692991c83
SHA256ac0156b21a48dd01db52658ee63aa160ac01fc4ca11ba9b47d6209aa0a24d0e7
SHA512ca39875c8671a5e8907676e77ec5914f2c0b5052662c323de3081589122e8a54b7067c19b2d101e86df2f04db9261074fd17c800fa87284440e74a4fdc14266d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512fb2512803c61cbcfe2a72a6f50d98
SHA17e84dd26f40e01789845dc4c428a0566e602e2ae
SHA256c7ad33e8b118abb02cc26db7d4db84af83e24eaf3a2e8a7508ba8fa27880889b
SHA512fa34d7b16317d491165bed62e6932f17e3ac4b3e268b89db8dc1433406ca1b351337820fb709d8bea5ae88f9e8a088c8c74e29125df40fb0344634a99d701a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17b63126384474cb7b3aeb801aee835
SHA17208a2eba7b8e957088e2194ae0a460e4f3faf23
SHA25637603e0284f98949b82041ce12a22ede1a0225bdd52dece294fd9c52e5f0a861
SHA51281f397131a6f18ab8feab6204cd5efe11d9e670d53ada8bcb275530dbb768dd06505fec1a8bad1e901a96ae56055dcc0b0f07aa0b623436f2ce5ad22118278de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8bc15f15978f777d7e0b1ca30c99daa
SHA12c06011fd521e1937323cb6ac5b8d271d489153a
SHA256225cf599a090146707a70e28ee45959ed49988e48380feb65fc05951073be00e
SHA51276f503a4cd447640ed31def21016cda83a72f6b635849291f3f7a1aa110053c4473032bb82f398071e0f8268ac9b5961a75701983e17b5512e0b46634142c4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b179524a79f773becfef1d868aec765b
SHA1ec265247fff848d43d6615f9ae8861366cc0c9d7
SHA256a654b3091aa86b9abe83484238956ebc5a88b79d2b1c9799a3d05204e475e541
SHA5128f3e6ba622b9d40c18b8b3edb03fd683ea89ef2b0451fb413eb9cf5fd7ab33f32c7c2ec3356e8ed174dbabe3d8494656d366ca0efdfd6ad7396f75983aa58259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb1c795b6bc2f6a2c29f57527a2a383
SHA1bbd83228e22f4c7b332ac55fd41d61340637355a
SHA256d02e9da06e4facfe71732bd28053eb710856887ade9b1a528231b8326d66086c
SHA512e4d77c8e3ec1c954e43e7ab6b890ad9b8ea838184cf4b27c9d75459655506240e2a6277ac2a25b58024ba3b0a684e04b9d3e6063f3ad3a879a107c8721aa533a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9f94917ee2653941ecb580c455a7ce
SHA16118b481a03122b9965bbb5d0129180a54170191
SHA256b887d639191800cf951a8626741016decea93bd81f640f5f7e72b89ba70f6f22
SHA512e7a38bb51775613e7038ddb2b8cd2fe2239cb25e0f61aa421da614310e43ded0f902d812082fef1d7540c59ce581bbee5f4439736246865406ca1a005e473d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97abe8fd7bdb64e18f3eaf5c8c9b2ba
SHA1a2fee1f2d8dcd461b775f506f6005a69de41516d
SHA256388a14597ed580d7ea115d61b3542cfc09313d90986d46d540385ce324d3747c
SHA51291381beba64a501d68897df6b596360c00a1bbf777d29859f5ccb89a38d00cc7fdfa075506198eab7c127862548eafe99fb34b194d5246b61291ed9138b77e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff040dcc99ae2a0e508fd622271984a5
SHA1be883592ca337945e8e4246310eba87e7e5536f8
SHA2568711f83e094ebc08da96cb1a4f9ebd06ea6ab53812a714059ce118b5931c087e
SHA512cab51aadb2fbfa273b69e2d0fd0d33f242c912b0f468ac4ec01a660042c94aa9f1a610c3c87c58824202f8d6677ea11ad635c36013f73ec2a297f4b7d400bd3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6fac128f2da79f84fc912ff4f4f037
SHA1aa65af42363d08fd29bd200be16e18a3de36cd0a
SHA2567ab8835125170985731eb2b2d49606b107a7ed18d94ed4495395c015f977489f
SHA512733746c5a99f793292859de55160a4b371fb2f7b3f43d877ea747ee81c3b21fd89858d29bbe106da0798ed699eb1b836d081055af503d29e14f70894f4618815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a6baca8516cea8d82c3eb1ecb103fb
SHA188d937c699c1e98a8ab3077b6040061e98e1150b
SHA256dcff0216b99216d39ad75e1efc3b4cd45446141e2fa13856d3cdd8241026dee7
SHA512ebef7d8bb15656659ef658677c224ff4a276713bb19258c4d5291929087a4656b10e88ff2675d3cab22c348c312019455821841c2ef481ab511a1a804ea05a84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b