Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
bdf93e26a2da0983ac743c3aa7240da3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdf93e26a2da0983ac743c3aa7240da3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdf93e26a2da0983ac743c3aa7240da3_JaffaCakes118.html
-
Size
3KB
-
MD5
bdf93e26a2da0983ac743c3aa7240da3
-
SHA1
dfd5e0c26032ac5ccb9b8147da5c09ea0b27153a
-
SHA256
f0d41ae52099070d9e962947c199bd07d6dc044cecfb601df2c0daa2c31ffcec
-
SHA512
78acc4f32ecf23a2294df99fcdd7c1d470bbabbb9e9763a2fda8961699c7d142eb44068de307261b628bdfc9223d4edb6c68b0d8977edbac0dfe703b9c2ea929
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430639154" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e1a57ce6f5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a323971f31377684eeea7df46955b9af109561947360f20a4cbbfbd7549b4ac5000000000e800000000200002000000068db079991fef82b5bf4f02cc49f509927358e10fb019de415c4f7cbeaffab4c200000009da383efcde63d860375fe148db635ec51a5b8691ae079de6abce4913368b4e0400000003d00cd0b225d3ed738f83de744022acb2bb1df1bed0eadfa9f68a863a4af406fd6d5a6959a233feade680ce9b880ba2b46a8626ace819177b72914392d84eab3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A43DD581-61D9-11EF-80BD-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2952 2280 iexplore.exe 30 PID 2280 wrote to memory of 2952 2280 iexplore.exe 30 PID 2280 wrote to memory of 2952 2280 iexplore.exe 30 PID 2280 wrote to memory of 2952 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdf93e26a2da0983ac743c3aa7240da3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54644c3aeb00cc2c3fb953de9a419e8bd
SHA14a3467685bbfa0d1e557bafb314bee201679caa4
SHA256c62361b87e1b4a08cd4735a25ecffabb55829de5b2d1ee3e41512236e6a812e4
SHA51217ac615e9d11379245e61cc8f40b2a92ae9515a8203f8f58194036564132c3248c3a502b48dafad28d971eb7709e214a090df91bfb98238cf4e80e5df8a5fd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e83b2344dd1af3abfdb960ec1d44a5d
SHA192f72ac9c25d9554344fab0b4f09bd5c9b3d70d7
SHA256fc1d7403778a88bdad36cdaef47c183f44048df33a0ae59d9e1ef5069e446206
SHA51232511357ac20755f28878d9098437170af87c707651285caec6ccc4c8090ccf5b05e267e166d3304fc9f0d1ffcf4752257e084e68058b28e343193311aea6e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035df71fe6cd8e10250302c39ac3460a
SHA1657858f24ff0254a31ebc8313f350471d742bf0a
SHA256d3fa058c38a3989ed3ae5588c40d5b24272e9ba4db2c41550f83068d8c96d7cd
SHA5127f1b325a23418f7ac75fcd2634aefe1848625340b1de3085ae32786236a308da6e5debd799bb2d9ac5162f61689bc8ddaf0addf4dd141cc181be49a094d3b02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ffd605872c2bf9d83f9d225c7ea919
SHA1fbcfaf9c4763868dc9b720ee486eca8d6279cb73
SHA256ff3f5eaba027130fd3917f9f9e6c53904fcd65ee808ca8cdc6965690a289a2aa
SHA51269b997e513cb4378ed8f2e1f6adf37f7fc277eefe6c6d743d1148801a3ad5e8c5d531b7b79cbf27893349d7d9e65645069f55181d7aec7c2c8a9a4122ae5b9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529aa3d36b6f4ab2bd7c1e849b28a44c9
SHA1b28d1e4196bd9f62bbad2a81eccd7edf5c7e27fb
SHA256d2b01233ca1b56dc3cedef2d26f1c1f82dfbf6fed784d87140f8157387b44617
SHA5128915bad719051dff448bd2127ff129f748a528203e49218fcb811d5561321d5f4c81ad6f16b1424100103236f72831e92c9e129d6692ee7570e1f168648bbd58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a46a4da044df6abfff41c61f83fd281
SHA1dda87ee8e8cd8c413cfb77cf1a1beb2daef97b2e
SHA256652b679855154958392241bcdd7c678c5ac9fc173079fabf6b5ea4f07967de1f
SHA512c59022ee96548fb46732f12e058dbfc9a73ffd5656ee3befba55e4c61587a7e33bb51fbf9ffc4bc68b6a2786aaa54e48af86ec89342e1694735a231339c50be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f3b838e80f25b1f7db7a01f49db3af
SHA13960a0d87be6312af9d7ed558eebb0b9c6fc891e
SHA2567bb88cb571ed519db229a02afa2ac0b2c8f2252b4eea7bf90aa5e0fa779e5dee
SHA51220ac6377a7afeb413428b82a8a7f30a75ffae11cadeb00b0eca742b4684df3fda022326cbc7e7142153836751423778a88d0b4406494efe601a038d85543c855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9537c50b0d0abee06dcdc14d808cdaa
SHA1cb1fb1841a171736e315bdea3371f7c76ab5da6a
SHA256a417943b5d14b78767f7e28bcf21dc69d568e409393282ed91d1e430c81ca9af
SHA51224517e15b56d21a9c5291fe8931494b9bb2a7265cc8b8d26030536c249583ce20d6175f00aa66d044e69e1199b6a226130731592e8ac654bc80348138cd5b0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a77887ef6143033508508a7d367c7f
SHA188e7e0496f4b6ed7bdf98e4d8b3474d2cf5aa9f9
SHA256df0661505219373f411df37cb2f5eb4238fd04daa66c532e08cb1d9735b099be
SHA512cfc27adc6d4910bb78fb0fc84f6a05cf87d03d0515bc117028e505a1ef3f93af4c1828eb9de6a381239e0f0d6218de9fd0cf12c6119765dc8ae2e691386e9a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59570706821a0b7bb44c3f080c02559d1
SHA1c0bf06940fc2611cf4b7a8e2ab7bafe5afa8f976
SHA256ad77e7d999da16165bb6b4857c4fecb4f4dfdd2b8974ae8ed75c00970dbcda5a
SHA512327771cf3b64e854bc37643e69f998bbee84462df6e069ee5566f847a434d597c2c57bfdc0ad355e780a828c791ce05f877d26f368c430e784c4f1250ee61e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b5606f0c8d049c9829b026ed025134
SHA10c6e2eb5327659eea8c0db03a644f1c4a2097621
SHA256e4615b23dee81f7b3f0ecedd7ac4aafa5b3da548ac4d086e1555c022ec395834
SHA512c2585972ad124c49582918acbbc2aa9cca5f875dadd80fa61cb574fd9196111a855440b74d7ae5326a8eef392c6aa0b2f2421dfc0fad2fae9639a8f5300d5de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59398334fc58c8cf6791b3f7daaf83281
SHA15919ecbb60aae7e673e186f201820ab191eb85c8
SHA256fe6a33107a77502c4d040fc135ff8c8db3aabd284b03ba1b43e0ded823f05eb9
SHA5124da663adb51bffd5fbebb9e4f3104cb7a52fcaa822fa6f30765b604c2f1b848a3f56ae1cd27e1a7fd92990ea8ff059ae689f05ecd9b1dc4cb9a48bb11334374a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f88332cedb392427772006bcf1f2fb
SHA16d185ddc43e52157eb556e10c35f6342a888ea0f
SHA256e0e58c943f50b545fea1cf20d1a6fcb7d34eed24d0b912b599578440842ae17a
SHA512f3e61eefb8c2037b41bdd2795f1fd49a44d828c94d69ef5e76ed1de39dd6a4cf657785763785ccef883acbd6a19306d2a96e02d0028951041e02698991756bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548cd5f1e904fd4495163b94b504451f
SHA1035573297d0d799d0dc18d79edc53c049fd330d5
SHA256c81135599e49561c260e3a959e1e39bb0709915903c51f952fbc1888c7fea15b
SHA512b20f0cc19bd4c0db74abda14a9ce25cd1e240dbdf1c05c1a7e0c24beaa98433b114b3ece61ac082a539246515d875d5b99903b998d02344e0bedcb901a8c9730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d89625091d9899e84d7e63d66e1c7f4
SHA16eca60a83c77d35cd31086d055262680b4c51c55
SHA25629ab83583479144d6af10d3cde9c6c7f240b72b3346aa76e14b54c43fd315c1d
SHA512449d18a5a80bd526a02698363e670e3f4092c7bd38ea391c06b4dc1a19f65ade9fb6b701e385bc887daed22da226d2d72c49828c27aedef19524102831b0956a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab334b58857d0f9961dfc0f44eafd5a8
SHA1fef959e91a3bd4d35b45d18ccf6606e34a1e6efa
SHA256e278b4463cb2463d05379e5339d81d073e3abc59b7062aa1e62c4ae634e13f06
SHA5126e04a6a266bb3c8ee674cd2af603c1240fa5594f04584f729d1c1f77bd37c14feb94017e6762839a59dabfc896048061db5f4b6b904e48e2fd6c3e4c276494d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597fd1da712a0eb996435f9efbbabc7f3
SHA15eb3b60c7ec5cd43e37c20be6012e7960ee65cde
SHA256b4672a8f73056f74c6859f6926fd06d986ee2873ba70d095cea0ff27285b5186
SHA512b18a6a5dd49ae994a74c90d0e0a94ed772088d676754e027a8fa1722aff31baf22e14d79b11f66ed05d343693f8d11e6c745c2cbbaec987183eeed7668ca1f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce9c1aa14f664a2e50007b68926fc77
SHA1dce4cfd95c8dd7ecefad729a357b23a8b22faa2c
SHA25645d0b7441640a5ccd6713b8771b82841805928643c97949ce970ab0706992d1a
SHA512d5e88be96739b407099e874550c4d01c80c5ff0e8a9b3957ac22f8bd80817efb80de2669cecad44aece03b9198c1655f157c6d9d6bdf10164a50c7b429896e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53422cc7e15552445ca8f594dd0fdff3a
SHA124c9bc30778e44b89095940583cdb4c58394ae4c
SHA25695742fc3d6262cdde840f9d471ec4b40ade1acd7023539e15090258f7949c471
SHA512d3d4112b4f9b03181d8db278a83ee674f315484b55e2d07417d7dd6b6d5c46eceb7cf150e38119388a33ea9545fd8f152be414532a78e265efa9175e81b7b54e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b