Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
d1e6abe8a86c1c9b9ff805eb3d909f09_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d1e6abe8a86c1c9b9ff805eb3d909f09_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1e6abe8a86c1c9b9ff805eb3d909f09_JaffaCakes118.html
-
Size
883B
-
MD5
d1e6abe8a86c1c9b9ff805eb3d909f09
-
SHA1
e9d4d6a5831db8a0d736a073ebebc5c2fdd034c1
-
SHA256
25d93dc9c306f76358b235fdd168752ce62e1ef56d85b97964fe3a504c85acd8
-
SHA512
13107361487c0f125d93aa40a1dcf714cfd67356541372132b8c9147c75d9f5fc849618da2594635a32078ffb90fad30bb0fa4c15ddd4136008397321bd9e08f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e70fcbe115e9e6ac2d44e58c61c468f291b44a3d4f3f62c59f15d66cd746294d000000000e80000000020000200000000abb1a3423c636525149de4d0642c4dd753bd3a513b3e4727819534ec85be4bc2000000097c4ec84390bc42273e530bbcf9462b920623ccb6a89f67cdc396dc461b2f51440000000af110423554621a7413aa5ae698fb50d5c8f134f063eba0e05a1b01ba752658601fb81e165c61b76a57c811911b7d832b929df05fdf2aadec806c2762e5ee9de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAEC9131-6D11-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431872814" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908195cf1e01db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2724 2520 iexplore.exe 30 PID 2520 wrote to memory of 2724 2520 iexplore.exe 30 PID 2520 wrote to memory of 2724 2520 iexplore.exe 30 PID 2520 wrote to memory of 2724 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1e6abe8a86c1c9b9ff805eb3d909f09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6a5f70c7607deb557b948ebd8a646c
SHA1d0a5b728e3bf20e971d8f4bd5024e28b4800ed1d
SHA25640716c0ddbb9deaf19504b6f9bbcf46ee3f15dd1d5501d3e70eedeadaba8091f
SHA512d3445f0f6de4d241ce201a96fa81e0c253aae60bc85329e26379de956d88a03bedd099abd14348204f31be81311e7b0dafe4cbec0dec29417960277437b3b99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57091f16938d93e32171cdc39a29d36a9
SHA19d7b03187d50b7779e2ec9c4ab22f05c8cbee4f5
SHA2568b61c972fc1749bec666fe99c94a549f7eecf5fc194b3b2295e0dbfe340b9abf
SHA512093742f29ba2cd5937415e0b2b982139648cc4c741993ab57e9d42bfc08773ad9fa0714992f0ce44263e258c250602b43a2f050950193c06138a5cd9fad9b74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55358845bb5022b92dc8e327cfa1770dc
SHA166070024f07482eef136e1fa6ed6fb8428168ec4
SHA256abf12f110bb56e956e59097e5458e6a932c0e241126d3a901af2e3663d9a1bc8
SHA512d020627085d03278c8f734debf7e23fb1a233f79ad55ed358eb5b97392110d804520111b1c5a84866a61e480ba532dc43ddc465cfd4a0de2c535b3111e80822b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cee12e94139595992d20ceebc3a67c0
SHA1515e6f282129e1ba3de9c400a3da6fec17f22023
SHA25699958b87c089738035ec1655045cf61c1c2820f3618bd7a6a6470060c853ba91
SHA512af4b75fd5431eb7a22db8a464672b8345ca51a0837ead6d8fed64a53e2335c00215bc31d3e755b752caffc730ea47d9059224b0d12ca567ab14e995928787660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b60331e6b86d50d8ed26f62e757fd1
SHA1ae6ba8532e8146f4901e1fe9d360b160673b86eb
SHA256aa2b5de631a627602f3fa9f6550ecc6a86435b4398e6c6d41a055aebf7572347
SHA5124028af3d0c6182ca4f5a5aa12e12e5ccdf8ef8ce9637b6988b1746581ddfc618556274f8a8440c0f964778104065413869731c0ff0dd06c71afd4ad4cd4d34b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af9990351ada31c386e3636ac42b298
SHA16037f1c48d170a3e929331ffde5542bf1587b575
SHA2560b416129fd391933d2dce3a080e18ee4ecce691e7213fa81ddff1db757745573
SHA51238d53dda26b9fffec11a2f7f8bc629670a16170a2f3f44b6b70d1f6e2425ec65533f1f42f01b7be6d3f6ce11387ed77d4cf6690d04a7900a5548eb3dfab31e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f1acd46f80740f40f559398ae9cca8
SHA1f43b81415dcef21f0a66b7d65a3c3dddcc43bf16
SHA256e6058d38d8759201dac04bf5fbe19d491073af92387dd1421654fac1aedadb85
SHA5124f3aa0955ecd3aa2eb0e5648276b73f422e0d0c5ce06fcfee4295959160ba382561074703af052ad76561a8aaac2bab9854002cd5cdd58c1b7a23a412654f9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8fac24452ceddb889550816aac157ea
SHA10e9f5d34fa017453a9fcd9f6f7329d0bb711025d
SHA2564379bb082516625ec08499755d458263248a54d87ca2e01a23dcfeac6e63d5e6
SHA512a1324a1250f6187be3e8fe5beeb912896a11dee37fcea5f77d7cba05e87c1079c4b4dbb5ab29c3a21cfb3c7c5796ef8dc73e729d63ed81cd0e5a3020bfc1ba78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9f9c79a00af25e03a31c8f2c713641
SHA1f9e3fe171632fa77104f625df544d6192ccccac6
SHA25617ee5c868e6afcacfbc2f01425f48a81a8c146b223d2929cc84e4967317ad77c
SHA512418d70a32f48af2d69b2b9e4a6881640f8466faf68ef1da66e4c20a31858690204869dd15d0ce638dec06f22e853f19b1f7428bc4fa3e04dc923ea31944c6530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ac59c1c4d0d803794ae179372c03a8
SHA1360988e4d5b66ec5e5ef72e6e958f88c136b37c2
SHA2561ff638c9a567ac55e2210796b56e69f01dfa864f718db2c8ee8bc61bd556c47a
SHA512ef15736c51ec440c7a7bffa237351211a2eb38af415ed7d93a35d6b629e35d94e2fca448460c13eebb41a6d021cf909b209e52a6a1da750a35456340dd0df079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61cde69726953f8b1fd6f14c23757e8
SHA189e8548b700faa636b04ec22ccb12df406856663
SHA2566795b2d1b17fd9a10c2f7c4659d0c240ddc1e09424273277a9652483f8d4d2db
SHA5129a5dd6181ef82eaa454b1f3b803955c15ce9b9f7f065a0f9f9f93e5487fbd69304a3a3a19ea62683bc00d8882598cf5d5360dd932dc3d0fc176428932d58121e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56048fae812d1877e847642e7ca74063a
SHA10852a935e9c371d56072813d5b64401508606b3c
SHA256825910621ccd2a95eac282b8974551596c2fcfa93bf238ecb2223e420baf66c2
SHA512fcca125739db3812887f21052788d4d2fea84a180048fe722e4c6f6c9f30548b7aa83d8acdf64c1072c788265ec5a916de0ea755bdc140563a9901e4eea8e000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510fb3e1941fbd0e4263dbcb7551bdab8
SHA1d2baa536e53e9a18a47e2da2658d18b9c7fa3a8c
SHA2562b4a0b60e6813a8f8bdcf4d6224ec62ed74a98dfe1bedf2fa0db94b338048d4d
SHA5122f8e40bde75108879bb5b5f36eb3aaed64efde49b714eb54a861d44e94acd1c07925d5cbd1c58d15bb6da6740d954338fd9f6ceda58f0c253e9314b410c7e956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726b328d878e8eb08523ff354cffb8cb
SHA1259a3cc7d4ed25a7d45b9f98540bf4d261f7f656
SHA256024bf5f8fa57a7028358ade8ba061552c29ac6e6404e1770ade4a37958eed6a1
SHA512f764fe7261377322b803b77559545292230bc7f14875360c2d3e9909c23f8958eea72b11738e8b2e05263f6f0c4108ff5c4e9e35f6feee17fdf4f51e914e53df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b31faaf72a3a59ed317543db5d00231
SHA11a33adb086cd2dd95f57a5dcce6f36ecef826bc2
SHA256497d332112c8e58f0ee86fcc8802ac3952b890422c625f6616e4ebc437702f21
SHA5128903e07f7c703a278893cbe62320ff40e1cb86b31985e14d41c01cadd96044f472aee2a58a7087713f92fd5b8df198f0bc59cd09dab76c6ff8a9a941c4c0f6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54418028cd369e05be8dc6b291d997041
SHA17aeea001407fd07431802c2d36d85b4201921b6a
SHA25605f50fa373ad12901fc9aa00feec7d41816e0ea79a3189e3cea3e73e4316e562
SHA512876815482b3950e313e2b66c82b452622257d011bfa24c9202548bfa870f8fac9420f994403655efd3bcad521fed8132487b756108f28516696dd50bd6c7cd55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da5e38399cefd9310fd1bfd440caa22
SHA10d5ffc886888a42dccddd742f9fb8166986cf276
SHA256d0cbe6a46087b33f5f4f66c0bee7426bbdd5822cdcd6be025739aa2022f4eb49
SHA5126beb00f64c886ba816809a42217696eb364cb0ee92d7583d2873e66f8790a358ec6a7fdc476073c54604e38a6b4ddac4dbda9cd28cfbfc8ea143646f45d48e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa29d2a7aacf3a2243ae02357509106
SHA1dad37ccc29dbb8261ea2a0b473548850f518db34
SHA256e39abbd541027c9c129a48703eeb4525fbc107cc7d21ee8e20e79a3b8b5abbaf
SHA512902a1c89fb220255e76a4b6be11135f5ebe63010bf8751fda712d738910be6e0c9d3baae6a3bc4b0cc0e6b7479bcc0e6a229c3a68bafd1159061ac073be9fa7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8a836044b3a787ee9c1d45f7ebaeb9
SHA1f690edcad59bb8a713e9c9098a0549ba432a7509
SHA256cb500cacebdf290b0db2976aafa8792ce18cf094207bdc47a20da03a545830e3
SHA5124fb5a7a89a59419f403b6d2a5c950af6b4980cd1b5bdb749c83c53db57cb2331a3da8799b3a5e164f30b7055619e373026b1127d6e81ea0985d91c84ea4b95fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b