Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
b7e6dd653f18faf203e42c884e9176dc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7e6dd653f18faf203e42c884e9176dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b7e6dd653f18faf203e42c884e9176dc_JaffaCakes118.html
-
Size
2KB
-
MD5
b7e6dd653f18faf203e42c884e9176dc
-
SHA1
b92a3f29dae9f69389395a95fe742bcf38c79a47
-
SHA256
a9ccdcd8ddc4366248559eae3d141eea0c86e52f89fd7bdd9d0a22a5eb5c1c50
-
SHA512
d73fbee19d890e06e1f5f7d2d7455cee00dbf92c4636fbafb03547a757236b13ab4911cc836fbde9d580b6fa030f5033fe75e11b3d93e092ffabeee97c8b58b7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430496885" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000047778933eb0051f20d0a6fe26f3943dc17a05a88c9088aa1852e7689a35da047000000000e8000000002000020000000d3fcbdd7b7850dfcda55afb25aef6370ec47e88f49acc3a753d474f403ee66b320000000d8f2e4bd9c3a163492366d1bd7fcb1f3290c5f801b3c3c592f23e2fa1be74d10400000000578faa93fa1fc5371c1d7bb5166ba610e2eebcf0f8ca701d0bc4c330245b5fbdb8fd775c1dd94f4ce67dcdac2398416ec8cd55e9de296c2279263e882bbc3c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65E35311-608E-11EF-B2FE-72D30ED4C808} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c9fd289bf4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1900 1740 iexplore.exe 30 PID 1740 wrote to memory of 1900 1740 iexplore.exe 30 PID 1740 wrote to memory of 1900 1740 iexplore.exe 30 PID 1740 wrote to memory of 1900 1740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7e6dd653f18faf203e42c884e9176dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a20633949b05f89460a26760b8d47816
SHA1673a425846f1f26f0f858f561fefb6713a8a09ce
SHA256a7e2b55ad76e49565940cc86559c22cf815b22ce2aab55c3029d07c9d58bb381
SHA512ed8855fa8eb0d6b14dac32a4e0a2711605da493968548fd27b8c0a472d1f25bffefb20a714ae09ea1869a58710f61750ef1266342bbb0b98d011219d0e7e76ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53709813792b62c78694fd6046ad07caf
SHA1ad1a3430bc980cb49dd4162ee4449090553d892f
SHA25601c46ea95bf3fe78b6083d03e36d8f869ca1a1018aa5d2b842eb5297a351a5c6
SHA512378931283a445127799fc0948e7d38eddedabcd640f3b0c89ae985fef91f4eb60f7bc4f31ae6453bfc6835ed0802355941d805f8de9d2fe5a4c6ce1cb73fe45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52c1a8e81684e8339df27c11b413b195e
SHA18f33c0f20df975454463d69e7cd8688d6ba8249e
SHA2564e0568debfb7fd2c18fc6b1e6ac980b6ed86fd8bd13eac9ff02b105c0325bfde
SHA5126e23a3ac0c0a44b137d11db7a865db8f4cd21987a1ea12aa765ab0e8007d4dd3a52ed6a895b140c28b0bfcff0e79cecc4a5d5b97ef737e848e8c6cd73050ae6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac0bce28eb02d46ffebd854efa97ca94
SHA196f68796dbafc886bda058fb4097015e58685e4d
SHA2562c55bfa05473974fe722cde05f7b531e31dfd1e0a4e73f9221854c39fc6870de
SHA5128ca17dcac04765437cb7edfe2f7aa6401b7af2c038129e475bb0a7166d3652e5eef9d41e0861478d7221ee35c9c65e23c2c207718a83779289d7fee358320a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50f73eae24d853cd46058588c80e5bf37
SHA1358107649041d5e55bbdd16309ac4cea7b6e0c16
SHA2569d7120aa63926e54deab4e9f94811b87833d53e8311c7adbe8228e85114c6a3e
SHA512ed6e80d2281257b3599fa87952496c59c0022cbdfadb049c2d12f6953fca381d0f7b588f243cc3c92702890e22bf64e4df96b6ef1168837efa596fa995c92394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ca47a7a6d209b45926323a9ecfa72f04
SHA192a256055d4e6899f3c788f86aa6ef246ba6c5a4
SHA25638fdfe0e0a7e219b6fc46edaf64ffd6cd7322659d1cb51ad4719df1ac54a05b9
SHA512daf0f4232d757bdd5479e77482f91cf7dc5da546b76f17e56d7f98c67e6db109bf935b07b85c283cc80d4c7d0cd0f28372dea4d2f56895d0988442a3818d64d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5164688591eadad099f197b1c934a5262
SHA12a097b97ad8b09e80e17d69076e8476404c75c70
SHA2564b3dfa93169e64dcb0e9b64e65d186c26f47bad988965bbe4bf8cf3facfea34e
SHA512f36cffcdc33fdcda5cca9564bf4f5ec7ce865986b72118aac40aa783fe6a464450bafba738b8d16160b529abfff3de9746813fbbfcc7e298da70d340f62143e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52d59e39f1625c5e5c7e0b6dcf88145b8
SHA16bee27ce37926fec9c48cce2cd4538729d69dca6
SHA25603718fc6281495d4113c6f229977e4430358a64a1f7fe4539747000b1ac57ee0
SHA512c412c681fbbf4302200b6125655e9afa0381a0e7845e5e03bde4a6d95f238d4d085f1d8e58613cd44800ff8cb96c102c58115da458a221846e9441ec76987af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e78e1f44eaba4d0937af883c18faf2d
SHA14127e91169f26fea9bbf052555132e5ebee8d289
SHA256ecface382ad78972a90eaa355bebd79d2e1ab62166dab199bb1af2361f49bab5
SHA5124147f6d008881f1180ec489769877fca87a2e10c6e186a769de6d702e6bd7bc0af14b3641ce6a4ab880c326ccbb1492467a4b3ac7799fec46a1c0461228bbb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c1f71ccd0de17893257743e4b6088ea1
SHA187b8c5db07333baae45df127c6328f05916075fb
SHA256b6016b0d750c4586e4c92cce26f01e0619254dbfea5a187a3e8e69d6a39ec5cc
SHA5124664d509c0380a8a8ef92bf48cbf0a2dce727863ae373b5c16dfd50fb87586ad2bfdf33a95794befa00d1d5753016562c16ff18113947944d502bc3b9fe3339d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50014632719a66826dae597c830f19b82
SHA1dbfbb8523615d1ba1ba1c63060c2fc1a7d8c380d
SHA256088f721878bfff56e67a473b73f12daa553d0c2651580325d5353dcd56c94889
SHA51211100dc87c86c18f6bc48f07c1cbd0296c036c2342bb260964c6f935fddf4f7d7430086f90fb97b7f1a50c6d11d55ad6eb581264f04c980c3c1862b52ed9a3a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bcc5a3c368fabba7bb6677f92bfc3540
SHA1409130ebe9ed32ded847c769d5e812f1891e34b7
SHA256cb22e9fcc18690e72159920966f9028c8474964c76c96d98fabec4667fdb3bd2
SHA512761306bfb57f0d7d2766e88224b314c2528dd70ea2cb7be2125fd1931385fbc685bfb6025c5adc18be4181f546aa3edd6958d6dc287a3ea0c6b1667e0dd89beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD522b731a8afe7e06c7e317697e9fa6e55
SHA192388a5ddb4a0c9eb1d310732e87dd889c57046d
SHA256d2378bab38d3935cf0a61789e1ac48484015c9dbcadfafa22c1c16db8ed0a9f5
SHA51204fdfabad6667f1319bcc15a3aa24e0dd659e138aa6e63e29c862a41f9af2b11ebb48e29ec1f13989e90ab3d1ff94d1c7b8da64ecd9821bdccf9e0a873c98a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58929c7f2d97d1e4f2ba89d0da388be5c
SHA1c51753af0f8bdcd6f0c1f2b7c7368195742e72a6
SHA256f0f53d138b4cd331bb934399a5ded91abd8d36df284697001a4e389ff3bbcd81
SHA512b97d65fb474fc1c1473503b09ba6bd41f2e3fce92f8e81728f190e8df8beb882ef8b7b4446f615aeb8f88737ffb5f0e42af0f82b4a1ff664b1a093feb6ba9336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e1f424bdf0f15b61412cbc200037f964
SHA1d69450261c11a68e1faa6afbe5e8b430d959dc5b
SHA2569501ce6d4794f1e10cf3dc35c737cb2610e52b52164f352cb891dfcf9900b94e
SHA51280eb6f4e3e739f684c90737b28b2b72c134439b2d2a4f9df260f9854fb989ee841f58942b8e4b9ad66fc2fc5a9a12c652a21ae92a04f69da38dd97df7510d91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c73b646e8b4e4bc3071c6f98677760fb
SHA1103bb8efe4c0f75131ff125e654ccb3d30ce7455
SHA256223566b646955a39b1555fef93b718a50f8e05c37157208461bd1960f98b1385
SHA51232579a732971e5469d801823c79519e9e0a2e5831b06528e926991662df651e40fa993d4c3fc45d667e25d27fda232d774b2d418bb12b7e7f0102207349d029a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565c6d4778cfde44abfe092a0da70a360
SHA1650636eb825c3bdc6e25b6be0b6bc7857dbf86a7
SHA256aee63a4a6a9e8f4678157620c165b367a10c4e43a701c13e34878e12036cb4d0
SHA5128d540786d090baf332e296ddc609f971bb690e7cf22476b63371208e7d394938833e22f65c0a49c3f8122c7756d9264dace83a20beb57599c148e9ecef23e87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5244cadca575d203c7a41967309b140c7
SHA1b90421749217283c6dee37991f4e69b39cb08d56
SHA256c4102ab8b6a4901a01f421fa1ff3373ae9abee7ffe170360cb22202ceba7893d
SHA512acf2c7cf01beb66840e04ac20382986412f2c99d8e58f39bd241cae84e100ab0b0fb40a11bec8c4a6a5cccf87047e43ae5ab3d8b6585f3876926d0aced07dd1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD521a8da6d8d90b93b5b560c540424a1c3
SHA17fba0fe7ffbc4cc5db7d02149e3d2c3c525a6671
SHA256a16b270bb2750ddb6f120a197eb1d0717b29de91076e0aba2fc73c5b2f949f94
SHA512cfad16097dde188886111c77cc773dc44ff546c03950d3c8f42564e7c13bd9f2835cb1cae6e2f1ed23280192496e00bac2db12c77168766a8498e52a8f667609
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b