Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
d2fe94962c5d551927db1e84aee78f39_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d2fe94962c5d551927db1e84aee78f39_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2fe94962c5d551927db1e84aee78f39_JaffaCakes118.html
-
Size
3KB
-
MD5
d2fe94962c5d551927db1e84aee78f39
-
SHA1
fd563c822de15b8ea1bb4e21677417646045c7c5
-
SHA256
3df104613289c1ede06750b9caf1d961ddbe8c6c5d2187922c005b0c73fa3c65
-
SHA512
d830018e3598137e3297987ea007f75b31f1f10284e86dafc832a2b30e26f32e3cc59c81923e4bfa286f90d7e424824a31403ea166bd085cfd4e2bcc76ca8883
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000002e2be20fc635d5de028828cbdbb17fa8d88f9150cc38bd9cb5f2efe748c18f6d000000000e800000000200002000000033dee29ad0921ef78b536f50cc7ed4758733c3f22c6402d386fd5ab47b6ef34f20000000dc86649655da23dc799710c261adf3ff7ee80d10c07a4a8ccb0d7c1b1251ca5140000000edc2ca7476898f9296ded1e485229a4ad3407c7f0caa86da5a29651b67c7ee98b564855940e84b137e0bbd320b20310d7f60c74e8b83ba6dcdd7c7aac38564e6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B747041-6D6B-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d436407801db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431911230" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2fe94962c5d551927db1e84aee78f39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa193740b9cbd93860df9d580f4b7eac
SHA168dff6a0aa722ec911dc88c986a19f640499f0d6
SHA256afc9368fe586110e38f28857827fcbe3b2a24b5c84ae8c294df21db96114534a
SHA512966a762a4393006933cbc38f8726de7113438c9c7491f66bcc73e06a3be834c5c1982a07636d030b72190061c0145de8a4769e6fcc5e2a63a4f72e4717b83e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfed56daa09a9c3df35a261761543a72
SHA16d6cc6e40583fddfffe973e916f9fc50fe8fbc12
SHA2562215913ca0b0055af2f6e4d4bcc656f8256840a08cbdfa0f460f3d8548a97b3c
SHA512edadf5abbacfcc1e050793502d8ae1e4e00d646c12bac4a4a78d4ee734892d8c6dab758b75eed5f8037af375e2671ab44393746499e1ee4ecd3059d4a3700266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520c25f02b815ee70c7d8ff78774a63d
SHA1e9a435bc7f469a98f0034c18f9e75cc4c0a8cc25
SHA256e8d2eb147306381e9391883e33b543bff57d29932ff0691cced36345d578ee91
SHA51289571dfd3d0c98ee8cab3dee36ce0d4f4396071c5325b86251f98bc0c36a1e9257244ccb0c0662e82e836eaa3c42876bd3e82ba830031e63e0634b41625f128b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d616adecc02ad5e480bb3be18e6c1a45
SHA18fdae8ecbce028bfeb7fdd3334a2b0eb2d6a0737
SHA2569e757b6302266abf27e9f81f9ffe009c54006eb4e3ca7d9f6f4fc549aadc9123
SHA512969208596c9732a899fd18318593e6c2f4c7e5bbfddca0c086e4612c5ffab5e4284592bb1c031dcdcf1c72709c76df98a00155d22175e76b61192e43b612aa71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2324b857c9cf7cc73537f42823aa2a2
SHA167d14dff241787048cee97c13ace641966ab9905
SHA256af0aff3d82e05ebd3fc7fd2d541da7ab652e53621ab5d7a72f1d57078491d5e6
SHA51258a5c61b4ebae8f1016222370fa8c830876f21d887f32bec9fe3b77a13eee9c3e397b3a08ca0a8aa616e68fd2b71904b9e9c5fe5ee497d571b07c2164b92f510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34db680cfee97a090febf717f26da83
SHA1bd372b18ff35eea0b970b3f15515c87210127764
SHA256bbf4b28a4bd00d19f8c490772e2d53e05e0f86282f413b5ba44424f3325571c3
SHA512be433e4d24ddc1a44bef7c61e3ca32727b05dbbeeac91f722bb1212a67a46ca2d2a626ac055a0771657911abb09681874f165cd340fb4483ed8b40d53391f9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a148658da9f62c8f2f9d96e1f59ee5e9
SHA120c98a07e22edc32f93af027a329f4c1bce30bc9
SHA25669c3c72a384bd6476342a8660de59f812d1cdc11ed74c58a34ad438e6f9044b3
SHA51243d666f351bbda5515155c7e4562e936047b75427d8b050f0e242cc64d89855e9d69f80ab1451788f88fd6c42461df05f425f861768d914c23debf23852cdad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280a738a90e1828d0e62e092c0762d47
SHA17e80fbb37f83579584055068732981f55f84d4b4
SHA25646aba3287dc372137066c859697f4ee3b679c9301c8fbea4b8c572341640c1f1
SHA51220e89108d3719d58af1d4d87711393242fe94221cade667ab5140b6ac5757867379ac65282008f94f436639d643f47c0b851d9f0bcd828c31d59d0a9e1dbb61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533346fab427094cba1fcaa1f2f31aff5
SHA1bc0d836286290f905f12c8a56652429edf5b7843
SHA2568f4c9f167bea3f8090f82389feee5217184ce08d03116008388916222e43644a
SHA512b8e7853788b01d6fcdf04556e512ca24b9d61ee992ab90255cd45a727265606a25ac8a56e11ff0a4d3df442939a1eb36767eab84fe24d0e1eacc49e28244eb95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7e084f06ab961251cb29f2e75f4ac4
SHA1ec493c27d46fefc29a33d29a2bb4195e31d12915
SHA2562b5e585305ea1a374627573a21813b5b40fd8f04a20bdc6b55e2734be46022b0
SHA51296a6732bda3e983fbf1370cab309c9ad975ed76f72f787f2fce7e6cfcd3696cf8f81a6f33309857f63db44cdca60ea636b7c240c51cb0cd0db2e2263a44fb5b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412f39fad2713586f6542d5e512d1b17
SHA1ec2def237018ae6544c18afe30bfc59d42e02b20
SHA256dd89ceff68bf67bff794f5f6e6ba1a787ea73c90d1a1ebc250ff7ac9cafbb9aa
SHA512e5a8e8b45438a05300b5aa79ecc0b73a505af6992aa956ebbb136d324d3465508cc9f716647faca48714b194f0164478961fad021d3301b24ac7573c10ef145f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e99a58130a4b2dd233b9ef2a27a85816
SHA1230635fc0ed803f5f323126aadccd300d453b9e1
SHA256cb5ef3a66bbac148573b728753c0016a149effaae57924b6e4eabf4efdf0eeca
SHA51248128a2e081b9cecec43cdb392b54aa96549e454f9cd67e1a37b39ef1c09bd1e4df38ce0daa491a41379cd0196d9ff5e7bc761506837e0de0e52406a90b4f77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4b9e4b348a467746b2d0478999ad21
SHA15277cdd2270d20c6329143b685403a98842c39c7
SHA256cf6ac496747229905da18081890fa7720e4be1ba398dad8a755633f07ceb6e8b
SHA512e0343cb04bdfd389a60efab9a25b657ad3a94a4fcd2ac7a07a9c69f776dc9ea13b2334f943202a1e10e4a013928089142fb242c9d6f667eeb534333057fbc8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee30c788076c56a88de83606936c010
SHA11402339f5d5188853a5076a4b31a5fc86f77ffef
SHA2567375e80027bcf6248702ce39a05c15c9dbcf79636c66da4ff5dc0813835c2c18
SHA5127282b53d1733fe057dacb138d20cb4c5e03ef574971599e11b4e245888709177f358f93053ee36ca7ee010879a7b076b71093ecfccbc1ec025bb33f726071e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2510cf548bb087e889577fb47dcf7b
SHA13e35cd4143812acaf5d147743b72f5d3ad9f78a4
SHA2565ad14032b71a72dae6b73998d4916cace4ab5089ca7db4f2a1fd30946bd00978
SHA51268d0daee331363513249d2809b6f853123f8511a2e6fe2c86aee06325662790944082db9efe1ddd2a4c1d1f7d2a463e2320693f7a2f6d49a2d4037d43a386e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9041bd6748a106214846b5af5c5cb8c
SHA1f4bf39af8149847718830ee3a7dee043b5adf60b
SHA256dfff6987b87d6e22fa7aacf53ff59a19ae18b4c8643a8afbeb4f133484d0f9e4
SHA512853c23b9c66cf1f3cd8e5fce31507edfd8f0c85277e03dd5aa1b0671347b1d697a82396a793d8ff0e0b716357e342db9ba2dfaeba7d654a92c514d0147213125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56859743396ebc4c1c3558dcd189cd7ed
SHA11448d770bd9ea9a9da7ef027b183ada72aeae4ae
SHA2566e3e8aaff6e5b32d22bfbeb3e0139eb80c1bd0784dc8de7ef2ef96b327fb12eb
SHA51265ca763429714835d5458bfc2f84a2ba89830d1108e11f9ddd8b68014b88a69a3a3a796ff4c1d3f229428f649f7003b168fceea19e5cbc4b31e9e72a7b119458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635c8df8a7771c3eb5c78f4f78ad09d6
SHA18af9066fd260f05dd0144f779d27155d404f60ee
SHA256a38e690c2ec8da0426dd72b273c178bc47aeea2f4f2c1467fb54205510d38c30
SHA51229567f46bbe67a9e4f8ec07e39dcabd344a123b5638feb0baeaa39a259bf50b4ef0de87ae5b5ce68b8688717d189d21caca58560eba2e21b371cb19d77acef2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58568a2273877e438ee09d4442bbfaf64
SHA1354d56b1d3f3cd1d508c949e4099ef1d6333357a
SHA25655ea378294eb6e6ae775a38452de98ce324cfd7ed55cf0064fb8b288a6f3e47d
SHA51299a21bbe17644186961b2a8307e2d4c5afbf3802273fee1e0edd5be1861f12c7b912c66c07a91216c72f639b73c3f3213853daf81d39b3511ec0458f557850e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b