Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
b7bd5d89c16e42893f0ee40a5c10d6bb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7bd5d89c16e42893f0ee40a5c10d6bb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b7bd5d89c16e42893f0ee40a5c10d6bb_JaffaCakes118.html
-
Size
3KB
-
MD5
b7bd5d89c16e42893f0ee40a5c10d6bb
-
SHA1
7f52f44ac26c5694be16fd40b02dc28ea2dd9248
-
SHA256
4ff00239953181d2846b199d2f580f7f4d8275351516e0e0f4a850ee3dbfe5e3
-
SHA512
05806345fa4cd525aebd6c11b6a1a2c0b445106466c067f87b1ec9411f8b2bdfafa9b24b97adb02c59397b280b09b2e2e41afe0c9ad23c99da7674643cbee4e4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402347c393f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000c30523b5de76c0d7d5f10f85eeea84acb9de3dd0ff09852620bf8f9018468442000000000e800000000200002000000020b2c568e17af86b221443bb369762738846a905403331e2e7a5497e4d6d74af20000000b5ab2f7c648b240f7a92909adbece8c5161987c6bb43d95a82ae2cd300ebc15a400000009fdedb8411ed57a654f53b678e8cb2b1975c801621563fd599d233cfbaf4819643d2d34e734f50568f027b817717bc96c757eafa24ac3ec4d266381cb10aec91 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430493676" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC90A001-6086-11EF-86A3-DA2B18D38280} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1676 2420 iexplore.exe 30 PID 2420 wrote to memory of 1676 2420 iexplore.exe 30 PID 2420 wrote to memory of 1676 2420 iexplore.exe 30 PID 2420 wrote to memory of 1676 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7bd5d89c16e42893f0ee40a5c10d6bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f37601cec40d71f37222c4e8526b4a9
SHA1a8234c5974b48b13af1517c801efe8785af6a071
SHA25679e5ab198dd0bb70d87676f8f18c98a18e33b28e3e287e08b2c19405ceb2c9b1
SHA5122b774dba7eba0796fa24710c4893a0407da4976276f552e4c95858d9922463e99b0f179a60b5148bf5d1892dcf497249ae181ae08920029c8c71287372ed2dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511e408a02dad84326f87d37f141cfff7
SHA198bc87cc1c7cd54257c56724189e648b2a2e1904
SHA2568ce80d9e9d112fae1f052895ed6ccf1761ef70f95e78679b5055afd993856719
SHA512d0e74af2bb9cb7737987ddf5e82f22acb6e37f155af878bd733ef63a9340c31f17f9f310066cdd9028cc418fcfd63ff90d46f5d58a396310446c655333747526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51b7fb46a364f4c9b28786a96bd62430b
SHA1b6797e628742df2404ec94fcba49a9d8a643d32f
SHA256e423ecd808835b967ee0add249ff2c2e76c333c6ee5af0eceedc5f096b0dbe92
SHA51218f7df9b436e25ee84e0ab45e2b58cbc1a228e5fdf1654a407b351df7c2dd0beeb21b5a385e055b267aa6839b5aa959335fa18052340026aaa7a022a0ae30a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510c163b6431847c9a774cf5041e53324
SHA199523f8d4f93fe9c1dcf92e63911b51d1aef0826
SHA25698ff824f256bed4337d7df05e26b374c796eb38577dc04583cc64d1635b4c46b
SHA5129a0df008cfe3c65572510dcf48dc286bed7b5b502268d785ce461cf5805590f7f11091422387a2468daf70fca6711861e3892c309aefdaa55350230bd3368538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD556602f1f9dc63690d30e482059cf668d
SHA184832aa0f22100d7ba8b20f96038c99fc3e9335c
SHA256013418991ef2dacf6ac8aa4b4b1ccea821f02fa66d1fca17eb320234b291f675
SHA5123f25f28f9c5506884e0e2ecb86bcdc8b11888ff6b6331bbfa47ba88a05ec5ae57b5f0470ee079d45685d79153135008a107f61c93e433f7762c884b7b414e0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595297af2ca04cf460db6ac705a6366ff
SHA19039abad0efe25286c2537bc637cdc5a78652143
SHA256729ceb7b52399b29f51197426ea4c33dd514b61a18f30bc9404a5964cde01c2f
SHA512cf419ed94deffbcbe62dd2ccac3f1d5bc3eb2044696de59d8d7ffaf12d9d48c896d068034dd195d70741e8ab507d7d584d72009abb4dc1ac513e04a88eb4fed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f63ba94ab647a69609739e8ce81ba6b9
SHA1505333db1f6780b6d38bd42eea0a098f9e5931ff
SHA25673af1d880a8b20ec3a4a0e105b047763b293d77481ae523c0a153c2c730e7082
SHA51287cd51da25bcad18c99ebbb5e69fd40226b887763cd3852aa635a3290d470169848e9cb62926cf6f5c67dd01c6de922658a56b35761bc82111aac55e82518c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD550f8f830b02599214675536b0cd27e99
SHA18006e84c6024de71a09a98e8c39236db80489102
SHA25637846c9bd995fd2763bf98d5961c0fbb7d0d7dcd314ff8c3060eadf01a5741f0
SHA512f1387c5a50d94b14418a9f64f1cfd601f8fdd250e499a5f3d8c6df1c4038b74a31a8788a943449d122cd0e5a0d72903673cd9c228fe29233caa90b6c0c3483c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD502205294e088234c0826be5a9ac7cf09
SHA128918aa6fbb29dd69f5deaf9340ba12c0be4a65b
SHA256d8bd8a3b6ae57f53e019c2c42d4e76f56149e616b22dbc41ef415e4c35a5959d
SHA512bf5c3fe3f9788a0ef5610925eb9f22f505b4b3145cf0f05535210f509607d7c29f5cf8947800be7940cbd57018009cbb32e673a776d227f89fef3e36b4717800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50587bcf7de2dbad0b9c2c714175f637a
SHA1afebc96fa93eaf92c69614cf12fa48d5055b0855
SHA25644130e45876b15748192c265c11899dd110ba2d276535c5ee59fec413024df5c
SHA51247984208bdca43405f35d0c0749158a1ee54ae40e0da3151534563b462c0632da110ff7e259b792e2a4085077e29e132f9b32c1f058f9de2b8f58422c22828ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bfbfbbe7e4015dd93feda72c12d5010
SHA12add9f2ed8e90e099d58471374f3d8571f4609fa
SHA256a86bafc3d776474b1f1945d1f9cfe9d4962025f3ce0978f6769140aa107b1f3d
SHA512376e0634ba34d860feddcdcfa11c9d6c50d353ed58779ef3164bfcd17b2089959394587afba7c4f7009d3384c4b899b7feb75b8e7ca1911ba3cf29ce8eabbb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD546659671cfc5230bd92726a94623cbfd
SHA1b85ebfd851a0319a458c0690fcf8d8b528bb7f98
SHA25697dee5c5cf23aa22fb5d934397d7b00f464b72786d6c328cb234030085f9ac96
SHA512c71f9094ad49e4ac1270ec27b05ad01497123aae5ac203fc2710eafb77a4ab58fec2384c37dc6508c34426796f6078c500411c65c17df9857879531126d449ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4b0308abb681cd59f8435320f2bd746
SHA11cce85a3e5729242ac4f5ba34336ad026c19e37f
SHA25652931713207dc69e5c0e238bddae42650f2c7e0ea0296de269ad25a88563ce15
SHA512c9f783d560b81a86c548882eebc2468a638aad2e4353191aecdd400c3b8f40140c99be556834ebde6a90dc1cd9781f7c22cf1fff3876bde307e420f7a60da589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f2881ac2598f739d9b45112fac6e771
SHA1836c555a83f1b1b08adb805fd82dec231d6ebeab
SHA25608cadcb730886ca4ecb67dbdeeb7a3de5c6c3ee0b75a530d9911f22470a407f5
SHA51232558d085193737fc4f6c1e3526be3ecb0317427c76f4696c35a929129704812b758a25b04f9df413436d3690057f9906feba4cff231bbf05f74aeb2decefd7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5317e01e49224eb67a12b87b2929aa594
SHA121162a79573e8d48b8bcd39b1ec39fc008ccd59f
SHA25651fc50115b2634109f4b0c7428432b79dbad85bf0fc0517e90c79ee7d00fafa8
SHA5129e414ece77fef2ef28be33bab9c616734696ccb5a16065aeab134e0a47a09480196bacb4d5fd0d54d8ff737709e7e53218fb5653a346b138e71e0803b48922db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a96c8811457a364d970a4093f2da05e5
SHA1bce3938eac42355c97e54c7d32d082043168c7ec
SHA256ef72ebc5e3a714d2bb0ad1ddf294398fd4f6c609541b6ddd1d1b5b6225c54c19
SHA51208391d6d5fb56a290810146dcea825905c03b51977d424df34bf554a3b9f3326951afb3d65563395070e605ab944a1a9122ca94e878bec8bfbf7fda8e187efdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5240dd69ac62a874778de3cfbfa89f77e
SHA1aa28c5357618c68a9d2cca514de254a207e985ab
SHA25616ec0fd11990b77d5419cc8941e2ecc044ea4d21989655631f3db462376e1f89
SHA51228335f8520dbcb30ef25180a258608007e1900f11b3100601d40ee890178e1cb5a29c58c78934fcbd59b2196e95d38c457257e59935f808bb9f801b81a4453e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552aaa61db2e4436d29f591ec8ed1e026
SHA16623d0d7eb7781ed6850dc7124dc7927c6e8c008
SHA25619969be9de078dfbcf6c88cde8ab98da492ab2fafedd328988f949a29d0b9c2a
SHA512e7b3a5be5375029a480c4be78ce011aa94b9ecce121e1c3ed053b542eee8ecf3945f44faa1897039cedd3288d37758005a3cd7dc3ca13e596bde83e07e5a6879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD539fc435f8413c5e88954724b76f92e11
SHA12264488bc847f1243d6901a6878425865290163c
SHA2567c7dc2afafbae1e0b4b4a969c55e40941af71de7372805ed226eeab8b9a82a7f
SHA51240da451faa247faa87e5c9fcc96a59f86daf8aff9603408ca4b63a18b436713522ace09b0c584a6ca8b18c4138f64aff3b779bb47336bb7aa7086a201248d786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5338ba857c43924486b93c80e494b6003
SHA1df97ad6844af0995d6bfd7cae665793ebe6bcd77
SHA2567defa378bd8060d40f13c970eab6db6a3f22dd586bfd70b9304ac4a13801d49b
SHA512eb75b4e8338410fe103c5eca5eef3fbf4836f6cbff42925e1135c4f74f49ca7f9582c726f90ed7327bdfcc644ae53ff29e10ec41e05b509827aac79539083bd8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b