Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
b9016ffc73bda2bff31d11bf1d8b6a8e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9016ffc73bda2bff31d11bf1d8b6a8e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b9016ffc73bda2bff31d11bf1d8b6a8e_JaffaCakes118.html
-
Size
1KB
-
MD5
b9016ffc73bda2bff31d11bf1d8b6a8e
-
SHA1
96f2da0ac5f426117fc6288aa2149898e03f1e1c
-
SHA256
1977558829364a8d536c226802e3bea99590936887c0ca69c3af0a1cf78f5550
-
SHA512
211e67a5ac91d4cd3cc86d790ca0fb4665585b7e7c9b440ab947043ffc492470f00258e9494dcdb50b0ac701e20b52ce20019a1bfc50fa0d0e700662cf1489ab
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8419F6B1-60C3-11EF-97BF-72D30ED4C808} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430519701" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60fadf5fd0f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a2d22c0189f5c6ecdcc46b240c58b517478ef96993f6c76703c992dc12d4cb0c000000000e800000000200002000000021f5d9be8ab29450c40ca96edfe1a3ce6be00d419e9de8b533c275648af63d2d20000000c386b3eddb39d86115971e195be2837a06627a66925fbaec97d8b3810ec93bef400000008d683bca4601104e7a2ff21f10b704effefa8c895442ee59335232ab8cb4b6f1aaff74cbed7f0d94bb15e0106c7d1377ee70db0d41f298ac66d5b3768c4c6783 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2900 iexplore.exe 2900 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2892 2900 iexplore.exe 30 PID 2900 wrote to memory of 2892 2900 iexplore.exe 30 PID 2900 wrote to memory of 2892 2900 iexplore.exe 30 PID 2900 wrote to memory of 2892 2900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b9016ffc73bda2bff31d11bf1d8b6a8e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f76956a1f7f6f7ab92f2697147149553
SHA1fea7b1731c9ddd11775849fa2bea5d0be53c610d
SHA256b401eba5d28d53514ce674fdc457b6550c81e85540437796df6c679adcd19c09
SHA51244b96bb2c234ba5c75db800659d7f70b3654d8a456fa272f7917dab74af070e42c198b6c8b508cee3bc4f685a412127b878b9ccc2e9d27d31ebdf3c1e2b0c9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5986386939bc0b26b2ae104fa54814
SHA1b7a6f8fa7f991db682ed2bea77c202862493a7df
SHA2562b5b41ccc468edb5b0712d627acd357650f7f2c0ec41bc44512b48650a7ff9ec
SHA512e1c99b1c5468219a4ef14bc62481c2c2ca13bade959340f99d3d2210bfd183e176b3a2ae44a14a8f8f8637478dd1c2ff7d508b27fd08dab7953767dd2e97c6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4645124bc7be55f9082caf89748cea
SHA1131c774b165815c1dc3592b106698cc81b156348
SHA25627e0bb6c955a776f37e7ec21b126d27e4cdc548f78357bee7940acd7620e83fd
SHA51206ea231b090b9407ca90b9c477d15a1b455099f0f61dd58540dccc46c41a9379e959ea01b394a512c3d55ecc5c90680b698be22b002397aa162f203361c47900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50795e5df0375b57995cac97f5944c43c
SHA11b12bff0326b4d087e12ebabbad27fa239b6445e
SHA2563e39264472bb054fc297cfc9ec17090c5803909479350739cabc1dfd500e237f
SHA512bfadfa7a2fb6a3f427bd9d4ec30f7887687b82fdf6dc4820c79637c1b103fa1a8c6f28cbc985847660325c525c41ba1d3edd42f76f580edbcbabb2bc8a0b73cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d411327f34aa3e9d7cbed846c74f0e70
SHA17af7f753c78dd946d022d91b66ae0587906174bb
SHA256adeba507be8d3d89f0007a8bf1fd9ed6f2ed709e6d3fed3e7dbd14a8f07c7b19
SHA512dd8d6945878fdd9442d98c7773713cb303aa0242558eb27cecc370089f08f10e2580b6670d8b88e8c650cc3e566ff863a540f8b492b640f0cbdc43d365fe1457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61e73cf5c10d44fc57387084facb3fb
SHA13074e2af5574eaed06918e7c006de8ac77c079db
SHA256ea3dae4c04064cedb2af5b4f4b4f139b34aca13308913f7ddd1dedd14586d78e
SHA512987d7bdf5df24f5783326d5fca400a359c8f49f8700ea0593be24aa0a48e730012959671384fbb322c00822285881cf91c4df6dd981c81c0c8ae291fd2136b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54afe4acb41d205c850adea28cba54ebd
SHA198c256052cbae351f8c13906470d95d2682e7239
SHA2568c4480a28c0ea698bfb8d1417806c1db3dc3423ce4315ffbf3fe9a134de41c39
SHA512fad630eb5569a1d142522e11b8b016ea5a41475b0ee77181c048d75c847b207ffa22c9ad7235cde463d0b7cfd929bcb845c0de994b8804419925847875cc8908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575722d1c28102be2c0108f26e848ebc5
SHA11658577aad5a199560910a278959de84d1cf4ba7
SHA25626546859330cfa6cc98f0d4751cc27b36cee2c65203f9e8af9e3e6c326ebf1fb
SHA512feaaab5724b7eebc8de4c0c6669be35e7bfa6580250c457bbcd9c3b8aa072cb76df21a78bb5a16d01ccdb09e129a54ab8d738a68c85baf54a9bfda247db2f85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d33c7c483c10e85d6f283c3a2e0f90
SHA12c32d7fd02aa0319a071e448a69765dfcb5c9ade
SHA25660ae4d3782aa4642877bd643b363f4bcd6ae0a0a228c3c108f361cefb327a157
SHA51222477fd80736dcf848463e9d05d49ed64379a966975469d54092b9b5182f35aa3d9bf93ade75db8ebe8cc8ae93429f039700522f44fc298a3b255da582230fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b36c7a397397d45dd56f213e133670e9
SHA1f4857b50f243e3cd48c1a5c2ba1da1bb0e29bd3f
SHA25675666fcdf0e4a62893f58c915a0f803464c2f89f8f2869a3c1896e2cd10142f9
SHA512241464e35b5fc76b1b1502dfde836e0df896f4f9c9531085860879e5f5162623a97b543ed32777addac0489b3c32499fda2532d2937872266db168fbf87f313d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f9cffd21e47eceb3303c48d24f51c0
SHA1e312f0ca2ba9b2ec016ef2842f0e1874c029d66b
SHA256bb9f68c4f9d8f1eb8f0e27ee43596dc6f87f524b32c0069a19af4cd7a2a11f11
SHA512c28adab7c9aa509c99f9f4230c7edda92188c18fd32e5182be0be68d69d55140f6a0482b0c1f89d88ac117052fbb3f42befb330a60d855e2d4237294ce0688ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6f3654a1c58e6a6fce8fe04288eb4e
SHA1376267f9251a631d14a57f7674cbce1930dfcb68
SHA256c7801188edb998555b946052d5d38e5e8310b0b66bfb5ef5242fdd1d8c6a9696
SHA5123b5a52679f2adfa24c60fa0fc8f66c4d2130d89c78ec1d2ea0f2697f63ca06470b33d5a0361512572eb41694354586a85b2b53e07a4d1041e71a87fd212bea48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29a9e7a3c15277907610507c58a22b8
SHA1350b10f49f7ec9596efa7c2c8c5cc0e0c87cebed
SHA256e65844a72bd273df6768fc4f5e0d36f59d0d22a88e24b15aa8898f6ea98e7a5f
SHA5128b19462494509487b81316716a1a723e36ca0315d821cd818a84db6587939cb185e9f7a68bd814c8b5d080164bbec14403b244b3ca1d5cf9728197ed269ef8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581eaf5fc5e320f8d8882656ae31970d0
SHA18dceba095bb49bbd3b8570784cd4bcb217ebb0fb
SHA2562e96ca398c830c4ce942367d9b42e9ac2788a3aecba5471862a5424b6f47fdf2
SHA512f869a24bd78701bf87e3b20fd56aa6ecbf5273f11fd8e743bbee0a6b397cba23786fd5519331760bdd74b78ba4f02d59a3698ae4dcc2b3df65f1c8e6d2f34ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe4702706fce22c303fa64f2898f20cd
SHA1b0013e8e44c47411217154d24c7689e735e17663
SHA256892b421e3f6a79cd3843754ffbe15fc245006b0ae6a41d12b1cf197ec3781d5c
SHA5124f40af81ffb648ba93768bd4a98de063decbb5ed2455d9e7ec2a376b8a3e0af84c1d7b5199d499f1671c2d8b71691bd1437ce92965f07cdd62c43f28d41b39f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08cc27cb01e0df74801c2c035960135
SHA1be2c2026de23950d605ec365ad07fda00044ab22
SHA2564970d1a2eb02fc4f020ff645fdfd0d7f1cbf97046ae7e78691b123987eabee51
SHA512bfa7eb3d6bfc7a3e6bec6f9303631f2811248ce02a96c14408d82d02d02034d9abc93cd855c5b907ead487044084df25be2d20395e67d6402ab33cec97e2b1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938691a96bf47406b3448bfb999b6fc8
SHA16ed66674ae89e427745789136028c6d4447f0831
SHA2561bf3402c3f0dbed8809f5f262956e01608085ebd5c0e56482fbf49933b5488f2
SHA512612b0f43ab465527966f8616d446601b3607ff9fea7bcc7eefcc2cdf2930ac2a6b457748303b3ba402baa76b35749da6c0136e767ced4730517939f6d6ab4f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f6924385323c48cba6d44241b0acd5
SHA1db4a6505ee62eb32c717a04a3312d46ac58337ec
SHA2569b2b53e8014d164f74b8e80ce468660940866ecbad813e1c720c605ae3bc7d57
SHA512415e46a8f375ab298ec09aac92e41ae810a01a5b607b74b4db6e97443c1a1ba65f0733fe1fbff82b17b78e5f59ebc293d728b2f1187c5b6efdc5c7cfd8b88509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c93dac09d254ebde52293d5515e6e52d
SHA138a0b511c33c84e11abf1164ec28b56ce57d300d
SHA256d0f3c5e2da0ce72561caeda5b45d063ef329af5c6d6bc8956e2633c197614ee5
SHA5120f576048f637bed8e377eaa569bd07de61868e0fc66b877213e6a829ba0136bdb96208e1918181399cbd9c53b1094e136409b13a671fc7cdff0875d2dab5fc0b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b