Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
d0ffe90792710f7515781c9e514cf87d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0ffe90792710f7515781c9e514cf87d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0ffe90792710f7515781c9e514cf87d_JaffaCakes118.html
-
Size
2KB
-
MD5
d0ffe90792710f7515781c9e514cf87d
-
SHA1
d877db4b7b3381c62bbbd22b021a3f7263d0e0c8
-
SHA256
5412462629a3c6fe7ac55775e9cd2c137e7f9069154c35389bc454396c0f106f
-
SHA512
dfa7cb3cc9bfee9c7ef12e9a3467081449e6dec2c4643906752de118d427ab9c8fd55f78474cc15908f159776c4ea0ceadcd305047fa4f99227b1b5ab2063b5e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fe4acbd700db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5166D41-6CCA-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000628a407f5c6646b7580a8a1f26cc28244867e553261ae1eca8342615ccbe0b88000000000e8000000002000020000000f9d0e6ef942ad3a64a56dc8aecaaf16d5add22142b35b92a30891d93ad30d1a6200000001076f8aac55c1e7cc9f1999fb21051279c4d5e5305fee09086d09853f7f04a6d4000000048439d28b80485eb1cea0c470a4ddbbffff73206035ac732ecb5937606c971046f8eae9b6e73de6be63c03b46b02ea3f9d39303cfcbe1ccb6f358347d2e788af iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431842311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2480 2364 iexplore.exe 31 PID 2364 wrote to memory of 2480 2364 iexplore.exe 31 PID 2364 wrote to memory of 2480 2364 iexplore.exe 31 PID 2364 wrote to memory of 2480 2364 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0ffe90792710f7515781c9e514cf87d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534256b224132c62380bbebe7b0616a8c
SHA1d41b86f49039d09d01664f91e102f0cc8815e518
SHA25608abe11c4fd0bf2129046c4ac1add74c3a33fba216fafaddd84f02a61efb16f5
SHA51249b4f1842c84387f771a7043d5542ff7d9140c6eee87a432423db6ff1ecc179df7e8f8a13a8b61a59bd3da68ce22a64a92233d463de31f80930ec01f5d207d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de7122f6f25407c264da426a1efa744
SHA102b3eb2a2f261803f41bc0b3bf1c4ef4e2c20e9e
SHA2566ad969ccfabe7061123a9c1e4270f61ad298699495f011915b8c03b931b430b6
SHA5125aecddb7595bd9bf744d8697ba5967e887af0dda80a65902c4db536f226838ca845528468fcd57b6ced8ed6b4459da48aff90dc2f9ca9b1c6e36ea03f633030f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f334111955ce381c45225ace35f3b5
SHA1572b7def05b59763ad28c008944f1540ab5c1f6a
SHA2566ef7c57d98dca4fa47fb440e14a6518cfee3885f70d6550c7691217171d4a22d
SHA512e96b912e998bb575f2ae72866cac4b766cb16440b288ac2f2df6707fed04c4aadc15a94d89e74d015c09363aa119b619109e2f001911b434e58e5c09c0d75dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee75d0ee786a792b5f6db46ff4dc7ecf
SHA138f7bcf07d5dbe864497af70d04d3c6ec456b341
SHA256b8d98480a2b762e35ababf5026c3f95326987e24b1a32beae4dd23bc3b9020af
SHA5120b61d7a90a4c367bbd838b4c74015edb85de53f95f694b3bd47a3427df0c013182c306dfc3284e17d555add7283d066e08887b200501127608518b4fa5639acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da48521edb3a94a0265f24458149a2e5
SHA1c9ef121dd2d2998f12fa6e2f420e0fadcb5650d7
SHA256f5c4f077c88657f992e42f1761c1b717eea11f1cbb874833ee46a6fd9be42461
SHA512d8bed3105f2d678817595eb08b45c0a817f2c4052ef5af141ab92a1821e6b12e6799e8eb9b4adc804d2e8e5b220ba5b9bb16112886eeeb1cca01872afc652d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c532b50ee74ff7ca1ed6daf38b3176
SHA105ba73f61937aba216455c164d5a88fd5c449b4c
SHA2568cfa9ba26ab9ebfa7fc6c78ca0e8eeb6632b91b6cfcde7ed7da30652738221f6
SHA512d9ed80b6227e77fa3098f7ff40d98e094506c4ba6d79eb0f2401406b544925c3049e1e613e5acba3569e2c3553c8e8487bd5ecd57249a16114c2e64bca5c691f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712722f470773e5f98cc3f3fe0c04eb3
SHA1dca1e65c375b37af2e7096ffdbc408950b080214
SHA256e59dc818885a5b008f53a2ba352d099e538125dca6ebdf6a58d0bb68558a6287
SHA5129b104ee306df06f4b32f2af5957e8a3df034e41b43f559ffb3b5acc7089c2e896b2120854561f5ceaca340b295999ccf8ff5f9f277bdf4eab803d30f0f74c93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50259cd4ac2d204262fed57e1ca31f332
SHA1aa32a55f0591b0971c10c5b81b9f1c7654ed67a1
SHA25616a44b320b0ad6a5b8bb9afc246391bfe77b479daed86e812f8c5abcedd49ff3
SHA51253c3c0643a8cff00f555edbd8e6b783674325e990eed1804506fb49df07e1606e7b33646717b30b77f0c77eb554371c3b26d0b03d73b3bdb470441183aceeb58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec56763739fa6a5a576373e538f32267
SHA1460039964bb67e4d2692872337bc089a6907829c
SHA256bbf773d8962e26d647e8ce27be69453a509cc7540b10934d0408118eacaafbb8
SHA5127d42a2733648bcf2d7a62a287dc933e1580a5a4c1268255a848b0311bea6990a5732da7cf22f448981a48dc7e81dcd6b976c00e848c14f128392df2931c2f90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f64f4397b68d16f7f3ae4e40ae69f70
SHA111c943961bd309cbd10157beb172a6fd3b024652
SHA2565660bb78921bcebd6a4ebf64bacdb36fd532aa569db921cab65119b91ace7618
SHA5123bf6358886790d5041aa878c1fc6126eb3616a0c3a0165be6f3f4a5b39e9d23479f8098b11b167947f95c2b656eca55ab7c285ebc3a3be8f3c2be147ce40dfc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f390e4d3f263b46d65cdedd2c382a026
SHA188954a333373510c2a8132c1743e4e1027e83d85
SHA256623f11db6e86806cbf0ae4e2b049668088b167268b4ef38fb4b5ef10e4466a0e
SHA512d936bebd75d8bd6306d8a098dc91b3fcf3d7b7e34b2820ff4fe905261a56f29142598d52ac9e61cf3e87995a46ef104d421bee96dffa016319bbeb29039008a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57209330ecb7dc92998830f46742aa9d7
SHA1ac0401830d17f7e43503290e3136334989d876d6
SHA256f5beea4a03ccfbd4bf9378ce1bde0f9abe5f978c0975f92bec664914aa6c48fc
SHA512fa75603392f8109f6a29f451f87a7e00cfd7b95f2b9baba06a84c3ba05fc97da14f855610be58e6055effb72cc8bd66e854a8139a883c616edf173f7ce3b1122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51620a1805ec0bf08bb6ee8cf131192ed
SHA14aef41165ca05cf4f4a44b4e96a498cf90a2d306
SHA256555f0de0ab59c8dafa51160d2bc75279eebcf4c44ee8096ca382a63fd43ccbf8
SHA5125e234f399520bc94831da8fb1ae375ef3bb53dc117c19df47b8f1d52c5bcff2ea677a008db35cd836a3eeaa9a833a9b04479a4d639331297e5d3f0e1f216637b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57686b385196a753eee72da3a8c8cb708
SHA1eb874c6818ccf6f0d5e5db08e440bcbebbb4a139
SHA256011fbf77bd47b05ee30c83c95330f87487f3a50310acc8e9d2cd8cbb0f310d30
SHA512313b374318563040ae391c01d0dc0ccc6fa9c569dd0804586bb15a13aba9489850e741d8f2080bd29ef8261129bea83d1aa72a8f8da0d43b573e55bd301e9620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5509fdc3debcd740b145daf9d57681256
SHA11c62668a106bffe12dccbed7253135798f538598
SHA25619719cdfd972952cc8a800fe4d15cfbf8dbea2a40b5654eb38007953d10ff2fe
SHA512edc4b30ba7d622bd19e9a08c79dddb48593fa13c42528d7b18b343e057ee35fa4ce09caa2dc540480a6fd7a3cc28b54b1eda3c186a4ce1e1e88304755e2e2f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52166cd8419acade1367fbef5846f614d
SHA18af171d4a77208cb05a1e40d2d54038f408e05a2
SHA25670663a05971456530e991d75aa8fbb09521bb332c43079a472046afa11b3b743
SHA51262c2c4fa2d0dba4ec255a20d3c02a410e7d76845912dc522c05df4855c516dac458f79eb7af6516c590ab00b585171001fa17b8bb89505dc3b35fdbcf97a7fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f567686b991d256688f1f40db871894
SHA1e6534de362e33826e08a17b4ce9f16723587342a
SHA2566d12acf49bba9125458e61d3e534b1690be83aeb3a613ba7a55549310c5d1bee
SHA512ae0dfc14a83905c7f21e183cddec163eb81990ff8954d540d1ccb1bec463d72c70c0955fcd6900b4be241ffa31e6d49acf3d8810b673cd6e9685a666f5e38b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc8c53f298b49cee1fbbd023d37342a5
SHA103d833d49304b50c42b3abac9f59882092c46ac6
SHA256d5fa136bdbca019fdd4374a140897d2fc06e8ebbd6046b67794ae3e1ca9346b0
SHA51290c2c486272ad3ad4176eb4fa11ec2300437f1402876a26c4472d110a9b31898e2bc9a56ba937ceab6b9b2ed8f681eeb61ef48426a472f3f1a4cd5801b1ef9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51594c9785a8f646b7ce4f8667c8c92bd
SHA1831e3ccbd24303340d253e528dd664b7e07fc5d6
SHA256e0ea0df346d8e3a23d6002e79de2ba8b060f99b4e9d17367bf748a9933129f6c
SHA5127775bf3e29ef28041062bc3a5e01042c990e8f8eb3b60c3ba0b69cb42c76f605a9599a13200bf09728de5883a7576419b25bf1d0a530d6f23e0cee492577718f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b