Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
d3733de520f1082facd589fcad388d4a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d3733de520f1082facd589fcad388d4a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3733de520f1082facd589fcad388d4a_JaffaCakes118.html
-
Size
1KB
-
MD5
d3733de520f1082facd589fcad388d4a
-
SHA1
10f57c7535e88aff52bb53e8e36bbb192115bbee
-
SHA256
8f679cc347ac9acab9ce83b4604e90b966e2e565178f90afd45c70f11a90a7f0
-
SHA512
77db5e0817120a029b41515d12b7783012314bd8dc794efce817d1425a902511bf2f85b5f790c27ce7291b44774a709989c1d1fdf64266de6919f8078df9abc0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431928561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C58F5DB1-6D93-11EF-B233-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cbb19aa001db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001b1fb9d2b13f1a1149981e04cf5f8f4034856500c094918724309b13c032649c000000000e80000000020000200000006fe30aac95a3f845af21b1b45c8902802d0319f6efef959d8519d6c250a052c82000000085fe095c98066c92509623591d058b5c991ab48d7f2dd32a1c2ebdc50fa27061400000000d063829cee75e7d25ee7f6b58a9405da2161bd585fdca44defe1a98ead4ace12dba48d268fcdda56432dd0b484a9d1c37edc8d4e2cea129d9758555832dbf17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2560 2192 iexplore.exe 30 PID 2192 wrote to memory of 2560 2192 iexplore.exe 30 PID 2192 wrote to memory of 2560 2192 iexplore.exe 30 PID 2192 wrote to memory of 2560 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3733de520f1082facd589fcad388d4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4db472ad65900a8c64f25de84f2990
SHA1b94d0aa8e60ca35b27cfac8aff6e223c6c47712c
SHA256c50416ab6b127d6f7c2211d07705b43f8d6871d8a81a310a67c050a02b5938e8
SHA5127c12dc530087e3120f0c2c02be18312e239833995b4f48ed5689af22f96acc6509bae2a9da7ac451091c6bc302532ceccb387eab687ffde753f4158703863163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53613064694a46305ef21496f6d756437
SHA1b3ebb8b2da56c744e4c503098fde2b3eb6b5cbb3
SHA2568970c4fa631d792711347628737333ba15b12ff5de48c469b6d8f85eff99c286
SHA512d603de8511504992657375ee60ca84bdce617f70ccb65231d56b3390fb30766c951a329c57bad2a011af1eea857c0eed10a76f838f9493944fc531d2bc50fd0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a031dc25620b682cd74ba403a446b8fb
SHA1a13859374d44176760e1bf28d3634adbc1db36b7
SHA256951636363bdfd91639cdba6121b94c7e9569fda5e0e6ee0bbb074460abebd1ee
SHA512027bf5bf614a662959a1a79ef918f8e5686b72ed748d7cdadf2781c4a542383374927962d151c5273407962a5ecd84a931e3885560517ed6b0c6486af4a67952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa4160de6b9fae8b22fd18c059ac4f6
SHA17003df6cf7d3cfdfb9aa45576f24d61038216a34
SHA256ace00a8e02b979130034d8a1e4d8de26b135e96a5be72264f9c5a32b594a5539
SHA5121fe29a88c6343f2066d9b72d277388d32ec13fed5776ad62211cb78e706617b7a67dea9937487c49be95cc37dc94a7eeee4e81d56110ed29203d4aa423e6ac84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8a36d0601b92622078103aad54f996
SHA174b0e0a7f966d375e6859ee954edb38d4bedc8f7
SHA2569258415dffda648c2564649b805c9a27565b61edc2d2b8c0f497597294f10d72
SHA512b065f246d3934e126ee56a764992b4ad0c06783d44bbbe25eaade69496317a27bd1635b066d94c8f753bdc742623a7906f9904cedb925dff4b4b2f41587f37a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566ed06c8f3817a3b0d102090bd8552ea
SHA13d4df00727e295c45803d036b744f0c31c30ee21
SHA2567f195dabf7d8f3271b1d3d015df25061e83bd757bae9c0bbc05d3a49c6906cc9
SHA51292403a9c524e2f814a337a1dd8b5f4a847197d7749348fcc2a2d1a343d732d5c229c9663941f3970d94b7ef37c813d2180c31311a819be824f83c36ef519a102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e78e5898c22a3e928f403c70f63e99
SHA1290400d7238e6eb134f2e254e4cb2018cf62da05
SHA2564bb97bd3679ce4f7a8875ac13e2cb5586e9a4e07dd1221d1da12970b822faa9a
SHA512b2e71ddba232b5d25d121d8747a044dfdf1720b7a71fa1fc2ea67947d2fac07c86505cf686d52ea65be7cbf1c698f4502bda681a581e239a8784c2a284b3a8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de50180295d7539b789ed5ac6bf262f
SHA1689092234993c9fbe25377c9ddbee1b021f5ec3f
SHA2565e51e6e47cad820d9c230ed267016fb45f12eb907217c4be895570881b4b8f63
SHA512553464271bd4b54cf0ef8fe4a791017143d4b36a1a0f278c7b1a39b4bf33022d0e437adc0f65ba8411a96c97b91afa9dabe25e967f364784619839ea90a0fed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d084a9ffa6dfc9239dbb1cd8235e035d
SHA185418609b3d47a94050861ddc05144476596aaa6
SHA256ce1ba591cd0ae14705a7547cee8305751214fa98fcd12509aa5ff8a4cc0e5053
SHA51268455f0b912be4cf5924519a09a22b1b7c5e621efd2c99325a55b5e36a4673ef8189344d88e51df4b503ef43bf387b878a9cb039e0fe77f1ebe76b12a285e736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1556e9261f4d9a8581850dd65ddef7
SHA1d4dbfd99474c8bb249e027de710858f9e40dc212
SHA256798a46f6dc9696702c51509303e6e70019970831e69233a4cc8b519377de64ec
SHA512371f59df342b3b9230a508a7df34405adc1814cce3574759727832d8ca11b8a50c9deff37118c50adef6826a8aa2fb8b34b80f56287ed87c34d5abe463a94820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521df586e0f431646861b0147c05bf38f
SHA1086a4fb919e7b38b3616bf8ef4ba1ee9fa5f4ec0
SHA256de647ba2eb16a95cadd813c0dd0189f3188be4adfa75e2c35cc75d08795a2c92
SHA51249c317c078eea677820227bb490bcea7c3eee34fa924cd444de5d56eb8fa50a481ff371c775c4563b5276756ba6cb96c6523e7d0b1877032e6d6732ca8d5c899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e9eb381e4feda2e7de3d7a2e85dcfc
SHA1be99f39e6213553b3661b34b2085bdb273410775
SHA25673247ad2133483cc230c0009ac96d89d65e4d135d7d9af6eddaf3b4e6711a160
SHA512174fa8417eadcd649281087c4e66dc81034ef3efc72391a19ca4755654d1b8f690563787d387a3c4076915c918e65bda6cdc63e1df178af480136ce25eb105db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462bcdfdfb2a648c271d61a695b7bb39
SHA1354b9220beee56bb649d32be1f042d46826f6833
SHA2564326113260f953bbecc8a5792c937e0edf78172cfc32ed5d93cfbcd01e6a3ad9
SHA51218d3c35358f6081bb2e3654d28d970b4478d6287a3136b51e20598ef2d0ff9852bdc716cc375cd58e996da20b20dc89b32a39366c54f515ab18fca163ad2e03a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54657ca4a5498581b84b34468494d4308
SHA19a29bda19c4dc8f880eefe73f1f1ba367ea43bc5
SHA2561941ca9144270a2e3bf9e72608fe6afd4f6df03b4369006632977848d3577e37
SHA512284636ca5f8b1a0b0079304033021b0f01ce440a22afe9f9118c04f1c2acb21d90742a772b0889ac54d8a1d068f72bc76e949a6c04e93c39d8b60bdfd8eeba19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d26d9e306f84f8bd5dd372fc3c9cee6a
SHA161902e02434cdb5a26fa9cd530719c7f4cb2a565
SHA256bc7266e44a4c9ed29faa7575651a566f113637bd0824c9349bd271e7cca3db94
SHA512219d0dbba55d606bead87b1e69a83c6fd6470cf81fbf8427435d498dab4a7b5a081684c7ad7841cd5b1492bb8fb1fdba98bd1854a5025a26e46c15e60b9c2fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206cfbdae5b9bed4ced370f6cf2c128d
SHA127c63f884ad7a8a7402b704a42908eb5ba127ed0
SHA256dca9b9f54a954430d9ad399550d6b029c0754a6c521ec7afbed8c5dc0ee74dd2
SHA5120efc6f358e41bb995a2b8aac30df3a5a50dc1bd3b19f0e9b1af6c80b484ae87f97cbefa2a7ffb84ced40e17f7d0fd8ed8198a1b4b0a06bec2005bddb55710699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a954fc16084342d2ee01ce7c0271785d
SHA1a00d1201c922c6439c6f6ce801ae31bb863d0656
SHA256d9ee360673bebd18a2f009c46cee90cabdbd56c3c116d90ef3ed9e37ea354077
SHA512a584831446677ee1f719bc645ef172015b1c4bfb6af99b1235a31515f1d1ed10ec8b8747a13f6edd79532b13101dbbb6290372f3fbfd8cfe2de5b930567a78c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5255eaa0c18a80d69a027a8f963dc9208
SHA1abbc8f8cf1e9156dc48a097c06d7dba898d70280
SHA256781d6f947ed047036817bc4202bee6eb62b932d04688a25ca4ee2ed0a8213a00
SHA512194f9c708768a49270e37459207168a0f3c2bd9553304fe9e565e0f0535af4503f41a1976d71869398ccec231e13fa8c35ae1141fb208d61fcb95fdef02f3407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bccbd95b10d20fad7ec3d455e4ce4c9
SHA1d9214428a2188bf3c93a6858eac20d6b266f452c
SHA256e81a8a8b591bd70cf4d4dfc06e26030569126cf0c75abc0ff7fac07889afa3d8
SHA51247e2411eeb0f2d8259a6abc4db8cf4b389094cfe238b291fed4e6aa723afa6505852df22122e72067f5e775d17f9837d907d92e01302642efaa1d656a07f1648
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b