Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
d1d4840c672da2b52b0a65f04b7f36de_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d1d4840c672da2b52b0a65f04b7f36de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1d4840c672da2b52b0a65f04b7f36de_JaffaCakes118.html
-
Size
2KB
-
MD5
d1d4840c672da2b52b0a65f04b7f36de
-
SHA1
3acf193348e9e1f2a4c5e4351a7865fe6f98a73e
-
SHA256
a71f54bed4329dc2c078a62bd5d71c9f69469849c3c70162a92440ee95814e5e
-
SHA512
8e167eaf1a6db74c54eaabb8f8507504986cb482f087d2ca1087df76bd1e4f103f639d41af368e25272dd2fc16a41832b75b63b8feebc3116e193626a3da3c86
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8003b18d1901db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431870558" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000002a8261fab0fa0ac4c845da955ea89f5664a08c8f2b4d25a5edbf233767507da4000000000e800000000200002000000029941f690e3eb5667102264615d626d47a7110dbde37a827ee1f70f72ed60fda200000007f8c57dd5ecfe50f670f2f82341001d2a83efbb7cae4c13fe234630314b666bc40000000eef2650304e0a46853884b1e7bf72c8b974eaba774cf0e31bd50657353fb6a1707988247eaffb5b0ebdcb392f038c10924fabef9d6589c3b09599245a6f52d24 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9229061-6D0C-11EF-BB30-566676D6F1CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2276 2956 iexplore.exe 28 PID 2956 wrote to memory of 2276 2956 iexplore.exe 28 PID 2956 wrote to memory of 2276 2956 iexplore.exe 28 PID 2956 wrote to memory of 2276 2956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1d4840c672da2b52b0a65f04b7f36de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53455472d1367205408af92f22f744add
SHA12cb50da5cab1f4794a7b1f9e5a390261b0276c2f
SHA256303e8476ca31cf1fdf67e3c88f998c4657f0120f9f2304b355f4df21aa12fd1e
SHA5122e43962177c489ae4c120d87789962ec0576a56d46902d3e24a7d19ead266f89eab7ca5bc315dbf1481641673dcf81f8a1393d37a8834ea4907e71c8810fda6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56822eef6984d4c2a0b49b05c54b91b84
SHA1a07b28cfe0217682b6e1d14509619edbdf1448e8
SHA256e46064b263e32f6077ca5c0e36b30d7f99458e4eb70efc798a189d791321caa6
SHA5125257b90438406a0b9e8492b6e8d4c50ea59834cbc17a0c18cb4dba971dc2a3c611d625bc338dae44ec0cf4456eb68895aac062153f10a9782f33c27ae1f651c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59577430e4f533221233f1df0d93bd218
SHA1f6e38baaecec447cb34ce7abb2706f848a3a3afa
SHA25604edbee11b15a56a0ad3d81ca95896b799bad73bc596b264931c43ab71b49cc4
SHA512593d776398209a1fed8d8a5d2b9962568dd5e1e58ea8655ebb3d0c90f988009991f40adb6b37c9b0d4d846be403338d71b27781a1bb889903a2f98cacb1972d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aac4437797ea35e88ed31302de86bd4
SHA1394af057fc90a0735cfdf458b3ee7ba41431771c
SHA25617b3d53fe25e3ec58d11b65bcd9d612ea12d295f872f7596bda3c661a335b764
SHA5124ccc7935bf1cc460925ba84d78c14572acce30ae7470c00bd225b7fe89f06705b12e770c19166bb8c77591b4df96cf800d4d66712bf9f2ec531933e141122996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb0f2b83b02a6d258616a57586a49f8c
SHA15692d043ceef4459cfcf7506b6b808e21777bab4
SHA256d053b4f686d66202794e6a62f10148cca01f1de970ccaa9c2bf1c5123f24757d
SHA512232f75115bd389faf81828987ae0f30e3241ec6404c28d9d14f9eca119700886dcb4d21b262a8cc0031c70648c7d2898678348d0a29e1d016fa24fcd31a019c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736e4694063fefc8b8f45c50b199b27d
SHA1f3d405281c9612deb43f25558b18ae034a23dcbf
SHA25617dc70629a09dce455f3dd3b50350bf61845262a203d1daaded2654f51db5cce
SHA5121ca02a5bc323afbda932a0319d2b2b1fb80d7aeeca5c0386abb4ee6fa4c24dcc4f779f78aaee610e4a223acb88fe7a0cb1f2373cfab211c50341d85bfc4944e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543cbef9a06ed244af04e65ee971fe278
SHA1e2af8bdcf2ea827ff411ce01a7d4bcde957ef262
SHA25601c042382a0a1c7b01c8011f18de89db737cfe29c3850cdf0d51711ecad745c0
SHA512d749994a42887662968c73f91652c811c6b572338033b66b8e065d8e98ba0e365e333f7295f7fee08135bee21fdae956dcfa1dd480d21529550b69c8a95b7961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8255830a64f152fc6b264266d5f30f
SHA152ce3722e308f1a9dcf067c59544f458e8a48a72
SHA256ab0152976abdcc66596f6d2b19130db468f9994a1d91b812698f46d627b0d957
SHA512461bd8a5e7ea9708c64ad37fd61b6e9f9389e3a5363e91777bc6b06e5a303a2ddd4e76ee3c42e203317e58b9e29d30cd6a70ef7cbc3d9f481850ad7375d30041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a526f6cf2f66b79be1946093424cf909
SHA106d68326aa6e6771741f101063c25a650ac02ec8
SHA2566301924a4ab6969e89f4c0af53915f7b52f157b97affd99226edff053600ce56
SHA512ef99ca74b10c83bbe2c3b1f621e802f074be9d0a13363fb463d7444efde073cc7e1d4ae81670fedb7cd0ce70a1fc53e403d73d28f7e618515e5000c9ecf2f7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef02f12a18971614d8af43ea793607ef
SHA1e1330cde4dc7dd02081288e34d860e2dc9a84d39
SHA256b6a662c6247ee51be0f319a168b1be38b1868aebcc1918b45a5de829f80934b6
SHA512c451ff216523480faaf81186ff7f3ceb2189d4bc743b4a5e1bd9a65a087b714e3000d9b82a89eb74a00c75fd4563d09d41205c281787630ea9b7b18c19ed89c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505977865edc5859fd94dfe962a30a9fe
SHA1c0e68d896666da8cfe6cd1926e1e9d6376f3905c
SHA256074c9b1c2c1d9d66c334c419ba03a01f394041fda1978135a2c0bbdf6132e26f
SHA5129b88cafbc17b8b2f9eb544f373ecc348f1545414a6c667d0e72deea4c86d66ace1e9a0df45b5fafd632073b737d565f0f061613133037fde763083e639ed7d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd2216c9d64a4ea890769f7d177558e
SHA1067313d754e43e698a3f24a9b04ad60e3ff23c17
SHA256af7c185c7acc8cdc8ef6b5f55c365867be77bb990f9fae5c4c3dee709582a6d8
SHA51299367bd510aed701780b2e8803f1158d895b2efeedaaf732c8014adbbf8f43c2d0df84b32f97e82e0167bd1400927d6a1634fb8cb97ef6ef99e8c3ed45c06829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8e0914bc6f48870a04fd39eb8b7741
SHA1a08eb51c38281f13a436bdbfdda8a9dea1bc2e5c
SHA256899044ce56964599aad5dcffb1cad2419346bac1bb642800a4e84c85dc44948d
SHA5124a7961a1275d211e317a5a625727842a56595eca85065920f1d36fffda47be2356c6ffdf24b764a76de88effc46dbaba7c21e7f12d6243c4b2166d57db24c9be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b