Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
d36528a0ee853fa72a21998fbde4b829_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d36528a0ee853fa72a21998fbde4b829_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d36528a0ee853fa72a21998fbde4b829_JaffaCakes118.html
-
Size
3KB
-
MD5
d36528a0ee853fa72a21998fbde4b829
-
SHA1
f82d1cb265414b6b2ace3cb7f8e0fb90a0b6a0b3
-
SHA256
6607f1fbe142d486993bb548de46adfde345d2a2e917df099838e69a941eacac
-
SHA512
0175c44b414b9d2498c4aafcc4a05dabf8b89d68623c39ed4200f592f301ee411f8127b6384a267c0fcd6af63b8d6f7b0e3427209248508c6e3f10e117965c40
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431926807" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B13C80D1-6D8F-11EF-AAC7-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000002f14acb8f1f1560d8a1070ae9eeb26880b0535202282e7afb0c129a173e6a10a000000000e80000000020000200000005401c51ee0b32753b98101e80541243dc1877ff7ffc1884588c39324dbe2892c2000000046d843fb665b44b519cb79cbd4def8322d1c3a51c07bce77a6aa684ff88996044000000003e190252f40df3f54a991845587109f44cd8923656a58343e598ec616dd4c663c9ac4c225ed7485a2b37a7670e1bed0931ffdb814301f56c439c54b8a577889 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06d67879c01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1980 1908 iexplore.exe 30 PID 1908 wrote to memory of 1980 1908 iexplore.exe 30 PID 1908 wrote to memory of 1980 1908 iexplore.exe 30 PID 1908 wrote to memory of 1980 1908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d36528a0ee853fa72a21998fbde4b829_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52735f837ec1599de2550c7698e729349
SHA1343940794f89d2b56f7d968b617438e51e80c24e
SHA25648c1c4b685d1d22a8593c04bb3690d36aa5a97c41192ead20f20d4be94c9f6d4
SHA512c3ec113afb684c27468d7f448b26113a1b97a06f25b1e32b452eaa4df5a2788724defb383a37d6307f46cbc8b5f8b7fea54dab4372133c352f78d6c252027767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532fef05708cf6873b0de3eae0649ee5
SHA19d8cc92d04793e21a3812cba7db96940c18c6128
SHA256dc6e077ebe1b3339e100fe6494a7b4c5d221b5f46ffe71d75d1f0e05e10d2810
SHA512d20f423969b9e0276294437d8811abce8da9d17dd7884d645fa80242353bfde84f5f46fed264f061b11f3a5c266f3a387d98e88bb738ad5c35b2fe206d530ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95e69ad904f8595cbb17573b95dfb3b
SHA1457d2c9e9a79efc26e2fd784dd53b95b544634e1
SHA256a17627cba5c47dca09ac41478115d46e1e7c5d7efcf547a481f6ef04e59d0910
SHA5123976590e0c2c456f65327c7a5d3ed1feabbb8ca20fe84d28f7d7504e7184a9afbbfbdc4ebeb6a4c6c956e5ecbd65b77482ab77e77d5fec5279acba5d8817b502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d32a29aea027f82cf9fed684b0d0ca
SHA171ef8e4289c39055cc2c5b74f2dcc5b9d0352c84
SHA256eb458987e1f521653bb04af006dd4a4689c04547c7abd9e50abf3b919021b29a
SHA512bc5ae7472b6eb25791630c856e232bf4677b6f5ac035370ed2c8a2c69e588e14665a12ca0675d1adb168ea6df406457be5f741c43a97f58c4960f7162b44db41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b317121348a413cea68164949a8e62
SHA1a78ae5df743f5ca1c44ee446ca8beb99b846e561
SHA25679851f770414a3d80d1a44a6a9a34cebec1556262b35196495066c626af74950
SHA512e5e28f5e2d974149f1dde504007b86b497dead1d71d631c454274a79bc89683b654c281f9baf377c1292eec171d546777285ec6d80310a5df1d9136222663b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f1cf1707dcf26872344294c7821a7e
SHA11383148d28e862b671937cba19b60dcb3b995620
SHA2567e26bb467825e29ceebaeaff168bb94856bbb68be6aaf010c7dc1e894ac46366
SHA512a1b061d8d1c15a65eebc6fbcc2ecd6ceef4cb9c4c6d9aafc4a5ec455728fce420195dad45ddfeef0141102bb299ceba7742bbdf446bd10ccf34eb27292c84180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3d03572a283d4f7ac4c58d81ae333b
SHA1be33177385e07cfdc2512bbc5eef659ee91815dc
SHA256be016610ce54fa63dc0213a5185d45fba1901ffbb07880c3707f5b061092609e
SHA5128f485d59be65ca73e2028d5b72915987a7e58d6cdfa10e12b8f506a0a951cfe612d2d019d79b30006d8acb024ca966d0a99532f9d98b135c84e19bfba1f0305c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f259a720a49be5a9ef813d27a7cb46c
SHA1b6bfce30558248bae5a960ece19506b022ad0be0
SHA2566cf8e74d148cdbbda3d9c0845175581d70d31eec9170f86cfd37e724b75f5be3
SHA512ed4409174b40ebab9181bdaaf80a4ba9f3d9beba6185f1b84c775f4350b85312a901ced4d4d70ea17961e26aecb1731c8e57e39031b661b5cf04b0e6da2911ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad349c0d919ae8c548f91281de2c99a
SHA10307f7ec0b29f449344769e0a7fafbe542910e3c
SHA2569067ec5ea4eb2dfd5a9505f6a55f128635a04e6933f629101cf5561902ed8c14
SHA512b4552f1fb4391a1c74bfa3ff7b520dca636ad229fbbe9f391a17645303d91c368ec2e222db101a2df569b35e0b1d72c9cdc6c0897f46ecad462f135d478a5240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589db837777e79ea26adadbc6a8f920d4
SHA148125b5f48af00114ff32695c96fe5104d2706db
SHA25628d834a50b13c8b62647fb8795597d96ef9f723e0a03dccfe066722dfef34755
SHA51257b2e6b660dbf15a319b5d7083addad472f99a336300fa2bd3fe2b8d03f3e97dcf1ec9a5f5e1e3b7c5ca4c3d6e97b375dcf6882c22c6345be030d938b5d8afa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59224b648071239bab571be53a637cad5
SHA1c0193bb52805c6d04e259a35fb5ce3b98a38b4d6
SHA2567459907f8b81f634dc7b03b4bd172ded5f0b1dcb5747372d92ffe5f5a1fbc767
SHA51228f2fa527f0cead02f0ffaf65674429e67751c14af0d2665a55693f5402f189a24041cc9db62637240de5efbf8f272b7faadf31dc35164e4a394cebbb1ed16c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3545e582aa63391eef0c1f9cbec5fd
SHA126dd397782c7cdee1e9796d28b2e1a2953e9071d
SHA25644b51da96e1cbbdb1df17e5cb10a31d16d1f9dcbaf79f1cf4bf6df545df67089
SHA51226b063ae4e833d725886257cf5585e507b2bdac0aa5a4f0cafda832ec00d553d95491e155ceb02b9b6c764def71f2776197c9b39fe8dbe474f87096dedbab83d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6325f390166a0835755a0f61ca5b0c0
SHA1b1127855806e5b8b599c0afd188b434920cdf007
SHA256aeccc54f5468c4506a4d333978cb95a2c97b4b815fef482dfcbd34c056701931
SHA51220bbc4bc0b62a62b0da27873b4b4ba7d87b61b087da281c1e8cc6b1d7d4086a2d36f8f73d524fee3fcd059c260ba7eac460c607c0300626be09730b63faf6d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d1b51620b784187a4e527f59d46006
SHA1a11dbff7218ee779eed9b2d0c380f6e3e684f57a
SHA256dbc5cf5563865f9d04eb4126d506dae126a349ddf1da477c693329f8ea4eff93
SHA5122efa8084f6373aa02ca1b023c8a68cf49e19dfc677b41667a00bc9836eebb6337c3ab776eeb6b3b64685b2acb7d2adcbe759928ccc1dd222ffc131e3ed36d16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb17c2c90790ddc3fd2793c8accbefa
SHA177c4b5008f2002f98c6e9ba7425b52f3a9f8ff31
SHA2567d06c1604af7c070e66736e0e68b5bc219bfce420fef66712f561e91d576cbb8
SHA512786fb7312ad8be4b6a347d500582453eb0e0f787eba6627e95f8319551e885ac691041a8b0bcd8e0b897330d28a258fa6e5735551b93a316097c89be1339f946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be8bc6e25a5c8e97d5d3b3cd027fb95
SHA14a28ba3b5682f282fb40c4c4c15c22e3f7dd10a5
SHA2569e5adc885c990c6c8b63478d509c6f90aea4d1a8bfff52a0d9eed45460954991
SHA5128ceb353891896b3c288ecca0597e4162e2deb705ea918bb4cb10dfe3165699d7264b5f0b203cb57b06857ba29476d2a1340abf24e9ded12c3e25b1af167713e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504dcebdf2aaf1f30c337c48d65b7fbf9
SHA1962b9d0b7d29b69ae048970fe20ce1608da56fca
SHA256a9e0ed2192841d513b26e668a11deb1d08d992d9da05a5b58ba3e39f7996c6cc
SHA512dd281f6a7ea64db35c301e53357fbd5bc465ea78c3fab6279a0ac003cb20eb1efb224baccc158714346aa69dcf51d1621741a94cae38a81980d31cc46429df22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0b4f847565fa6f5408f3caadd95d96
SHA1e3efffabe26b7c966f6868ff035843b0bf37545f
SHA256b942b44d5d18423913944b6bcbc02ae53cc14de729b681fc119f17a557b86519
SHA5124c766ab5df1a67e6433a32eba3a784773581b94d31ef75844bdda67e67a88d86e00daff91ee293c4b2d8dfbba902fedda9026a7abea8b95622f0eba66af8df9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e659a0b8e105076989e565d592c7cb0f
SHA135224f2e58365a320257cd126ff672fac44dbd26
SHA256f00e432f145fd568226d8eb0a59d88ff9a21c114296617d1791fae4ecce033f2
SHA5123aa6fcd9bba2972376f5e3be5063c894c5b51475776d6f5c5fbd1815191bdf536e4357b66453403462f737cfa2e7ec1df2ac0342be1f49dde24090b8c1265216
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b