Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
c27d47e9c1b1f3ca136e45b22b5870d7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c27d47e9c1b1f3ca136e45b22b5870d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c27d47e9c1b1f3ca136e45b22b5870d7_JaffaCakes118.html
-
Size
232B
-
MD5
c27d47e9c1b1f3ca136e45b22b5870d7
-
SHA1
a82c543ca5f5e88eba4d0556f6ece7c777fb0c16
-
SHA256
66e84cf96e999e0d14a2fbd844311ba8663820e77f99727f958cd103a11aff95
-
SHA512
36c9399f3d3cebe1fbd6db32e6345795728b8843fa37f62af2cae43d8ee6746a0263bb48eda75adbef01ba34306b507418dc831ab59cc133711526ab0d6491f8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000000e1d64edf3315598bb6797b9d3e11efb365301b69d30f6196510aa9b3ffd6053000000000e8000000002000020000000c0dd5526ea60546d4cd41d517d9e049449315f94d25464e87a0806e62423bc63200000007361e6ac47ffd0b79e91d4cd7d28e6e1dc0ec718e88f2407d4496e476f25e6c5400000000eb1e2aa25b55650a888f0a87acafa2ff567ba223774001dcde1b0f781ad8e05902b59f69e0eeff4e1d953e15b081773bd73b40f88a6f079e1a7aa45b09ddda0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD116711-6377-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a9d8b584f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430817061" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 800 iexplore.exe 800 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 800 wrote to memory of 2180 800 iexplore.exe 31 PID 800 wrote to memory of 2180 800 iexplore.exe 31 PID 800 wrote to memory of 2180 800 iexplore.exe 31 PID 800 wrote to memory of 2180 800 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c27d47e9c1b1f3ca136e45b22b5870d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40917d92cc2b1e7324607f74f2cf7cf
SHA1fcd819a01efd904528d1f00e842fe380766a3d59
SHA256ae9657f5f85c833475b864dd1e1a3fe0559a60b69ff555d3d46c83f8c85027be
SHA5122014196318876c177fff392e70c0178605bc1ea14e510fde1f7716c7d4e6b1d0150893a8226cc81b96ed9a7cc248f280e19ed82e6edf9f06d32eb1e28fa86264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b578702835a24d576dfc1b6b7016879
SHA1eae00f40def5bd6b4607db5d0072045d87062577
SHA25670680a37487451d3496288b8d8baeebdf1e8d69cb9ed48d78fb8f77b76d3e010
SHA51253873693241d088fa2bfdaff95f589229ae6fc7be65bb6c1a2ab46e23819711fe844eb1a48e87a981665f2f6b41e4e1210b0405c41d5ecef1fb14f2b99e31651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51702e16497d8178f90c91994408e308c
SHA1bb7686f3d3ca0687a610b68b1a9e9f7516d6930d
SHA256077d4f9e870df40549b05125dfc70ad478d8833d90fdea3b41a033abe8bbd41d
SHA512de97060333692fe38e2d57c64eeff73aed4d26d0901cadbf782096d3b668c150192e310b5a4ef8fc0dc92c94983e127a1836ceba9af8a5efd1c77f75f5a49b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa9e53b3ffb9bdedcb6164a8eccaa29
SHA1e02366156c89ee1fde4c28361d664d313cd99fb7
SHA25683cb93dfd607a3509da17cb7b3a9782e6e3cc7e412228fabee4eb49bd94e1504
SHA5128a0a3fd0fde68c782e2830e3c63528140bc9fc49527d55c7851c82112d361c5023622234d8a4d0d932125883b4bbc6b0310574ca83ba0cdb742c2b20e0e9cd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54700e3b21a6a6c83df20fdb7519718a8
SHA1a1fafebd186d5916160f990a8c5c964d58049a68
SHA2564fe517dfc7f6534c5270df676558caace0801ba7bf401cab4bf5b7ee529fd792
SHA512e0ad3552604ac68b175a47e69154218dcef1315082d8766f792de1bb25b8225549b0f6ac2d1d31b34b4020c8cf857dc77153fe85efb9ba7bef1bad18cece90f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f689a7867b8e433d1b922dc877caaf15
SHA11dd906df15eb5dff88e47fe64df6355b9576ae04
SHA2568287124df9426f84628724475a3edb003107d4d7771ce0bb9b6033ef04ad5982
SHA5124cc3cd94a643509eaa51e51a901df68d830c54045ca89385e2e50b4b5eac1409de219d239ce2df16f2127aef16054a00abf94e698dc0a0646aa29ad57ca49631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574878c8cd2e9f6fd825476bf60efbd87
SHA157e8901a942572f50ac59179042f6cae21aad8bf
SHA256197b5888ba0bb5416ff833f30f592630860613580317be4ab1599efa091f2dc2
SHA512f110e7619f2ce08e969f3653706eb154782f653d2e4edf593c0e8d43290da6d99f7421913324e2fc1fc4c3fdf78ef016286fb56199eb1387ef2c0f4c9b7dc5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58280a43b497b6caafb8a639535b77129
SHA19e6204318765f210e102be0201fccef4e8240d1e
SHA2568c743df1666399a7f70d32f33df1d97cc939a20bf5a8dcb238952bd55bdb8e48
SHA51227c620609a52eadfd0c380600067829cf878d079307ef8af8c26de632019b48616a9e9e65cd6ca4902b6706c84885692e217403f9e3817cb1f04f89dcb08bddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ca8d107af9c85cbae5c7572da4bca5b
SHA1cc1baa2d0934d09d14cfddc0016dd83c9011205d
SHA2563f97038f06535703c48c9696e62eb539406a9244323d5fb17ff50ee76d9823aa
SHA51204c9c14a100ef41de6b4e880d095f453b1da36a42dcb71053130ad7b517c7977e3d9d159bea7d9acfceb263006738c5eb18b57d242a5d1f341359bc5299958b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535f84635feb472bee0a36f2afd50aa79
SHA10d1d6a2ded0b6b5cf1adaab2c778bd739fe4b873
SHA256a9a05b74374b1937e73f982aaf5dbe8e4714ed13acaf8015c1f41cb6fdbcb587
SHA5121357ad95cb85651650d0f6bb422e04d2a0ebfbbb4e97f3efd4f73418a5bc8b9427702a6d020208c4de385c314ed484067a19a1624ad0b440849abc6ea44ac478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a567890d097c8dea3a188ebb3dbfbf72
SHA1f2551de65d366ff0530a423008d7c9d11ac5bf37
SHA2561fa4c55aa28e72e1b36113bac66a55bcad1f46789ce4366312d073f4e0b11abf
SHA5124a3411e14408b93299fab117bf2f6f5cee078f62a2858140b8eb0300dce924f92753ed32f78c0382b722c9038edc9263cd66d510c44b79169afe4f02c38af6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a1ae91a2195468841cc8839e45c0d2
SHA12910f96f00c76867c24827fc425aa2cabb6126f6
SHA2565b901d1dfae462bc792bd344a84549f30d2f84a4c0ccd1ab24e2fa3b4f0ec2e3
SHA512094bd6ed4b6f65bdba653de5227fceb5a20f1f8cc14d66f37d7fa4744ab5aa7a6911f5ff170741ad27dccc6d88844107cdabeb779ae1f90e2d87eb8b570599b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e448fd093cb3cd7583ae8cf5c29b7a
SHA142d3d6015f4af6c3c5f40950158ec8d3f46ac6a9
SHA2568b1a38721d50685ae57d47404b732d9082c071a188d3fb290d5bd090755d9e1f
SHA512987a316ccdb1e0c31863f7d3a031f2aaea4879bae39b6386ced4f6b3807b2daed2478417aa93df72e4ec8d171760f37031c8adbb322e2d5059905f8cd3a835a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740b11d0666d4465290e1c601d78fb91
SHA1c5b51bb47584af4e81dda4aeb710a0193ec01136
SHA256733ead34aafbd177a330e5fe2b851ec804e0fc352e6ee7401f77f8c90876d934
SHA512c7db2b894d761e4f93f6ea22fab99651c9e2eb341f3bc519f1544a52602da07bf42c81baf75f4310bb3ca3bd11b71783db1101445b70bd8ce521d335feafa05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece98b8782d800eca94babb601a16656
SHA14083e607118eca8091f352495b644806f36e2e2a
SHA256edbf49196fbd205cdfc181d742cf3dc012eb31cdca17b3d355848a84992eebbf
SHA5120014c0f339407e7198493b4b225de43955a6f3f720ddf74fca6d5664c70cac8001b0fc4c8cff7b54cdf9ac7f309fb8f042b78bf3fe779ca3b392081ac3940396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a7b0e6d4b5524f852dff66b8d0e0a1
SHA1cce2ab20fb8cce44cfdc990bf6a720779736195e
SHA256ab8ba19e49ce8fa443048fdcfcf632b8a1f6c089e2e0a866394b2f5db1937301
SHA5126b017e6710abfcd7b319e3687226bd9f3db2996d9b6e596b1442fa62277dd05bfd2f3da7a354aa538faaee83ded5ad3e396ac46c246cc39ebbc43dca1748821b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efba1db415a5dde6c414f76f8ae51ee5
SHA1a288e9671969ed8ca6abe14470d104248139308c
SHA256fffd8c00ed7dfed13b10f33872114e74a3019a3efa973a2e9f82bd1dbf14c562
SHA5128f4da5556ff36366d4e515f3be1dbdd7baee2c705b2f1e081c9f490a87d27b220fc8a8ed01e7fa3083c0e79c46e79b9970f6614b991c064370a2a4e87b32bce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca82902b2e823549fdf8e1490c5b6a54
SHA1482a67134f697ee2a43d4829194af0e536429a08
SHA2561094680e70379ef3cb27ef1791616f5d45764a6e138a36310414cc7a820727fc
SHA5122708881fc53d2d833528f476dfb57b22c3e73684354b8de646b64227f513aa83a78f3ed5c655a9812eb7b6d24134b1e3cb4c2dcb7356e049a934d5efa852442b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d32e2bf6c34de984565a04ed35e21d6
SHA1482c3a96a2040be0e1444db7168c4c7d081f3125
SHA256066487021d531a1f8ac0c7eaa2e365c49202d061022bad37c629f4666633d759
SHA512b9ba2abd0aca78b6bbad7555ec4954d62c480db937f0a713d32f00ef23e709fdb2c86262f66057b7c4cff5e0ccf243d32e4d3d5e638c77c7abb6f01886006a70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b