Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
d1e9b17c0e246795a5db4edf627c5633_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1e9b17c0e246795a5db4edf627c5633_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1e9b17c0e246795a5db4edf627c5633_JaffaCakes118.html
-
Size
1KB
-
MD5
d1e9b17c0e246795a5db4edf627c5633
-
SHA1
621305bc89a1f14eff5da2cf740068600860fc67
-
SHA256
a319e178d8194d911d139ebd1dfcef8bb6504d1c4b6055477dfad27e32e51d58
-
SHA512
f7ccb7912eded9e0613c9db46a7378414cb02bb4dafd0aa129998d240c07b238faede18031894d1f72f3df48efa914db02d86abd41c3d95b073739a5244cd5cd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203c51a51f01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431873169" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDE904B1-6D12-11EF-8CD4-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000af8e16e23848b8a46fd431520582caf062d354c01e2e1c5dcc34d6df23168600000000000e8000000002000020000000ab5576b02f287d5927dc533ae410f178c9f27733b53d75d215c97db0ca72578220000000943c8e015573c210dc82d07f93d7c9e936335842ca2861c88d729fb34b8b2258400000007f2e634d8f096a83abb3473416153128e8ffd33a2794fea40463491410c090f770bf55e7b7b85bc64fb6d27988c45584fa15f5a4895ad41a83316ab3622e9a69 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2692 2696 iexplore.exe 30 PID 2696 wrote to memory of 2692 2696 iexplore.exe 30 PID 2696 wrote to memory of 2692 2696 iexplore.exe 30 PID 2696 wrote to memory of 2692 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1e9b17c0e246795a5db4edf627c5633_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb158865754f00d17887b4a0b2e6728
SHA111471afa515bfdc9f0cd8c9522c8511b00e19187
SHA256c849d6b10aaed89443b876aa959b34dfc18b0c479fcdb3bcbf8243411503b9e3
SHA512cd88ff37c5a26fa063d7c118379076d1a37ba86e0a4497e3499ca29592577f1d7cb4e28c460384f65e66348d94034c6001b5e221a8ed7c12d9ece751f0a36e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9311dbdd609e928b46240a220a4d8de
SHA1391c15a0f6b0425fec8332a5447bf22d2ff0dc4e
SHA256171b921bd4779075213752de52a2e0f18e62df06fd6d88eb89c84967f63a691e
SHA51294b49e9f911ed44ad535d5b4bcafac970ab890283cdaae4865abe24473db7af8d902216a6cf605ee02b6c0ef0139bb483fe66fb2a7987211a0172baa97fc3166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87e747b7861b7e92c24cf2300e0854f
SHA1abd48f27fc65d5f5facae3b3be0c4e15d607de89
SHA2561c16e48ddcddcc518630db4f0fd548edae1a60f9b6ba6f7efaef5c0aefeba767
SHA51238bc5c3c8bfb0bb3853620f0a9bf855c842be136f064036693446b408414d8f232b1d4dd3ce345089bd59cf0948c5aa24b35e80dd2392003821ec4b98157d028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59387ed86c628bcb3e0877c3ca09b1e87
SHA19577b9a45b68b139073ffc0bf4aeca49ac714cb5
SHA256300be3a70728100d2f34ca75eb8132d971195beb497950727fcee560356b7cff
SHA512db7b324bf325f232c69f68db5f408f54bb339cd5d9072b7dd29e81e423be359c74e93e67cb7ccd54eee0ee7a9d9cefc548192cdefd8e8ac4b1ee3c6e46a3c238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a414a4aaa965c023b18337f51dedb55a
SHA1904dbdf0deb501eb18125f1fddf940228cc70902
SHA256a0d5f3da650c181e8c713e5b388158b095402e483c6c12d04e95d22e191659fe
SHA512cd0b224bf8e1e40cca300e29f2ab61b6119345d95fb7892a49722ef28d1061148b5efe13873a17b4c8cf3b90e925badff6a4bd13d2e3e4e3a11a80b71b45b50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd409685062cb301ff57c1e93ddefbc3
SHA10542a39fcda25643155d07b6973f13dd0826fbfd
SHA25620f680c3aab6eabe67108d519d8c2a4f095fe7046cbe215fd51d4c51855e866b
SHA51226f5102357e6ad63dbca0ce06fde9869f0db78b0d7aedc9d8332c98689d9d4398ce7253f62d9f86d38166a6c212d0ae1e20bcbdcd8316cd4d2b950ab73e1f5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f01329b0f5340f55936b8c2efff63c2
SHA13bd2495eed682a1f17ad45530a256a45ad54ba28
SHA256e0dc7696f46be7f64317f0d7c59ae67e99f4576bb952493e9bbe28087c9e01bd
SHA5129c8277c5c3b1f360b41ad646f5568db8f79bdea2cdf4fa84a8c51a04e1c87a075d0577e47a2ff21400f34c92f6a42770f8565b9ce9ffd96b48fb54a84ec61cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55814ee30f6b33d7a4ee3b70f37f1bb4d
SHA176662e75ca9728a61e4010b73134dc69bb3993af
SHA25611627b2e2b2c747e49c75c6c0df9ee7ede12ec6567cfdf2613dddef6041f9c8f
SHA512214744e6e073a2099506b41389175ef6c74d9fbd9f05bfd632465b764dd579016a815d81d417360ccfd4683fc9e4168b4f44f4353e7e3b7c896ba854628218da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54197cc164bd4158bbf7dc6a8958cd4bb
SHA1ce01b5b9da36a6a86e5d5a397f29e5e5707d2882
SHA2567045b282ffeea12ad7544b8ec54d5b96893dbc25ef85b41582dc6c777616cd9d
SHA512c11061d4d54504a2d45ef958945815d204094cd4df080f1305b68a4991217d27149a4ff18b023df34576fd3a1592eafb2a66739acb234ec8798b414d12a112b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e875c2d1236e4a44abf631aaaaddbd2
SHA17e4f64e756eab8869d25817a985cb7276619e5ba
SHA256b4cff3125ba2d4a39174a33d416c461d36282928335e81c19819f89868542972
SHA51286fd96b055fdda70226da7c74ca1641cc8112230234c972647f263bf1605f1c034e404c6de2a54f0fa113505fa50cd73ad99eaae8726bc4b061e2dcdd82250da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bb9f556e70152a4ed6b477f95b0369
SHA19b02de0a8a8cd6c806d8ff6c47c0bf7e6fb06785
SHA25621831844f22501c364464b96993279c7e1a00e4a2869b5926bd2dd20ad639a3b
SHA512e24a484ab19a8532a02fab0725ce31dff857459cf93e68689c8d7f6bad52040b34b83a30094333cc79e862a53a3488e068b333fed436f0fe710cabba50a2458c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb206be1f25567c5e4d18004a99134c9
SHA1816ef37be739131bc1113dbe761342d44fde454b
SHA2561868e8bb14caaa98eb917469a5e98b2007785a19726c80a9e991b2c226aaa69f
SHA5126dc468133cf4408335e8538ac29cac1933f152fe04c64c828f393ac2f190cf8640802b33048336e21eb42b980c8346220b60dfb757238efe404cf00dbc2b189a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d295788215453c7370dc03f2f312860e
SHA19a0952cb02a45cdc48e34d7700778a26f4a0b0a2
SHA2568202cd6d5e6f14e98163f81501981d8b1b8f10f400de5d0356dbab45af79f744
SHA512eadc339525faa3acf108b0d09ec78894983d92a0ee359436efb82b99ffdede75fb19820307d8c9adb0dd18bf653e0369698375a3cc7ea92af6ba3f30c117d99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a8b04b73d4e8cf22d224dcbc02a8114
SHA1a181abf4f7220caa1cab51c42189c964cd31a1bf
SHA25693beef9b6f805fe3a8ef38a093dc32ec7ca7d805892f3f478cb0c55820305394
SHA5122c0f9389d01b127ea84c99ef7be69650f988c65ae34f07dd2887a9a92721f0bd4622ff3d74d962d1a5af666cfe632f23c3a232ac451a8992f21435ee32f12f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a54dbeb41dcfcb8d9b7246bc17ae429
SHA1cacc461953a4572f66b95f360665d70bc2df965e
SHA2568bdf1c3d6cd0f02ca7e5291f393092ea186f0761f27e08a4e58e34f20438ea48
SHA512d2e2e23c47d785169a3b68bcb6811323104e34fbada7089ab840e32daf8f7ca22bc500d51ad1bcd0019361a2e1a0680d20d0d4c66747b3661cd64b886557cb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824dce48db10974af4287a1d1c91204a
SHA170ee1af711c21f7894f7e9e3b2426062e574a099
SHA256cece5c1602b36f340389267c7307bcaaa77f14f0c09b36b44297d705c6bae44b
SHA512fd66ade5c26473092dd3e09e21eb9a3c0be34db1ee8deb822a19be79832cfa45b903049871f028f9dfb61c89221bb8ec1f795492dd4371ec58d7649a36299b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599078e81597d062094d5bcffaf2679d1
SHA19011a6f174c979f1fb65e22f414dfc4e28cf39a1
SHA256376280fb78c5d290f0c4ddde1b4c3f6ed218df4cfa78a50e664f86772af89835
SHA51289baac748e7ededf2eb3de9651a09a46e672297dcda810e82a8ce90bfc4fce0d99cbb7f508983edc329ffb36ef0300dcc44a5d1430d1b8c8ada7396fd89d877d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbcd57263d7e8937cc6bd17e4a676a6d
SHA120c2cbcb7b0133b8b7e8bbc3c160c056e30573bc
SHA2560d2911a08dede1c7db7114319b4b67a73d472f1eceefe7e07863a435109c8d65
SHA51283d5249e41dab3fe3e1533005d5d40431e72ebe4a9f8a14f4587e7b12a81d046e2d96d9cf2c9ba578d7b6c9d7c19f681b7870f8f3e3f413d960e399faf028238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8d34b8b911706dbf65a205cb7faae6
SHA13ff7cf71a1c3e3e12fa97a635e61b97895bf8db0
SHA2561027b83fd403b0950007d3ff7b30f4bbad1faefceaa75117a8bb877f4625fc2b
SHA5129acf91873f8250303058e4dd39859335b6cafc6289917ab97a6363e6f5529123091819a7996ee827480f64434a5b3da8e4dcbb3612e30c4d35fefb1825909ebf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b