Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
d43fed5c2e88982e359a14ea693d8ef8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d43fed5c2e88982e359a14ea693d8ef8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d43fed5c2e88982e359a14ea693d8ef8_JaffaCakes118.html
-
Size
2KB
-
MD5
d43fed5c2e88982e359a14ea693d8ef8
-
SHA1
b5e34b93302ae533415d524a2d14a0c9e3797b0e
-
SHA256
3969a6a8b263402703d8dc8bf294f71a750ead296268453e1b7f7754f0a72bde
-
SHA512
638f1b284893a83167a2a94c1b58df5397e4e5061af313bb9d31005832dbff16251d2f7ca9f475b9f5e8b269bf6f8021ba6dd66a90e19d37a5c71c8519a4d2f3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00e72e8e101db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431956611" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14003BE1-6DD5-11EF-8F1B-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c9fad6b6fc996d17669652d886e8828923113a63a935f643df51781759a005ff000000000e8000000002000020000000ce42473ea054cda47d0d28eddfb21309f59bbd386131562ef820664ff368444e20000000ee57e6d68fcf6a5eeeb21ddeb2ef19fd398a09ee08d6b74b8fd00cf2e13908e3400000004335f0842b4f230f71d09ca3fff822a1928a0cb46762b36617b584717c3d1a89a1758c5f18cbf1643484026f015b258d7e1e6c106c29199f073458f6351b63e0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 iexplore.exe 1600 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2792 1600 iexplore.exe 30 PID 1600 wrote to memory of 2792 1600 iexplore.exe 30 PID 1600 wrote to memory of 2792 1600 iexplore.exe 30 PID 1600 wrote to memory of 2792 1600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d43fed5c2e88982e359a14ea693d8ef8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ef45e1f6915cb004b5c1e9ee67fa86
SHA1f2c9c2909251f4e90db23810ab9fbbdbc7f39212
SHA256fef20aba0740f8fb62c62f22c8383a82d119d9332d3f91107fa49e8605acbf0f
SHA51207ace1e7c3a872130a91bbee0d4d74a01beb64e3875192fd73bf50ffff41863161f9bd2f26e56258ddc0de83b268ee72a4184649c9be4135d85edd40fb6f32cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555481050191d19a173a643e8cac323b3
SHA19411659dad6aca94503dd6716402f967ae627146
SHA2566ff8de8fed2bf31c42d03f9afd79d3b95513ee88c79a11f38fcdfa87815dc9b4
SHA5126e6f7eeed4389d2bc1e6f985d53aa8a5b227d60888f762d9945a0709a28c634b728d2d5319995a78c3dd26ac29c13baeea5ee1a467757db848c97d75a2d4ac07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544bcfa0114232a18249f73520da742b0
SHA102157fd5aa760a33f0b73ad94ed9dce82f63303f
SHA25651915db463f338ba92e7db16b10fb6b6ae0ef8091a853207ffd840bf996e345e
SHA5121bbdb2a9d43aa9b3310ac65cbe3a294bc92df37b5db34da23fc8328dd9dd5dd68aaab4fd6235703789dec37b76e3a32c0a8effb3991c039e743d45731265f69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859e0d291789c01ecf81f2d062108378
SHA1b4693c30029e046d9008d2c4dfe22fc7a5601f0d
SHA256ae2d6e24b692edea88282d301d238b5dd156d817cb5c3c32dc767bbed77a1cec
SHA512e9c646a158aa3485413f3cc88f6496198218adab4b976f41688806077f0734853b19f2bee6e9b6dcdd52570ceaf2ce582b387233cfd8cd8f95c01ef1a0a5e7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f366e9f008afe51cb3418664a861e733
SHA157b7586da0e3beef51b15f1ba6e68bcf8c8302a8
SHA2564a9bcbc4d0db677661f159ea13f8f7d30015ada0ab957ab462b29500b715a833
SHA5122fd5de954fb6db398f798735c8b9e1e79b796145770689b7e74dfee05b90cbbbd769d40892c069fd3759771f0aa07e7468d11cb6db509099033c60b9361c946e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf80c45c13cac1806eb38cfd06fa2d3
SHA1c2804a2ccbb7feb5102add07d7f37eb30338dc47
SHA25621a737cf7570b634235694e89b4bdc49c04aa7baef8f70321e3b45cd4346ca0a
SHA512ee2f344d52671fa426f52c802a69f7e811664fbeef2be386674c9ce09de34afb69e6c847ddc28ebabc719dea5f41570c2c224bdeb1da5feb26ea088874444d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566652dd02b82d47062fb0485dcd0b64a
SHA13195116af8b26981e8646061947a5c6551b3e708
SHA2560a446f56f47691d80f70fce819695b80677534d02c910df515ad73c125227008
SHA512a7fd17df05fbf9257880553e3ad1d10d75c0d04e9d44b8109fafa0449e965a5ab1ec8ae43f42ae0cc9fa81f2f00aefbc428964b4612ae5026735ea30c1220d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59086fedcb37eb99ac75b17a81a61f308
SHA141ddff697877881d87330dc8e3f2472436bb20ab
SHA256b0812d1bed66ebc50ba3009941ebc88ab89c57d5f66d925e69dc358df13b9b85
SHA5122e8eb0f3c8e321ac12dd08c96b8a72234fb982465ce221aa9faeefaf6baf1b2337e3f5405fb90e3f2d8d83b7a3b08523758e2880cc155e2cc1908f2261a553b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841defb0f5614e16e28d5ac6a39fa687
SHA10591480eceb2cae0bbab484ddd550bf6475069cc
SHA256e70d11c4df2d4cbcaa9c9da5283d89711a2041002bc5aa724883c3aca767a5ae
SHA5120b6d84f0e17ddc2c41a316d06ce521363b2ef02253c025b496c3fe581ffe99d1b5bd967464e3f6237837f4b3c0e9e0dd46e67a97eef4535c28d94920e595af59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883bc462a77e9b2eac3761e016bdd145
SHA1a5dd10468cca61c0f8ffd1b21de0944e156bf300
SHA25684752e8cfdd4a2fbcb5b7b2280f6ea0a24e7086e8632a641bce0e72517fce6b2
SHA51239b55ad85e1e3b383d93e1d56da4f91deaf3134b72d5ade4a6724a414290f9ac65f6b1cd61813e07513c40dd212b8042ed1db9307935f8c4de8e3708bb78f5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce5ef2af5d5d6d4db96ca73aac2e145
SHA1d7322ac87447b78bb95922a1bcdbf5517b343419
SHA256ec58b64845cdf4283b3a35b99c68bce86c4666d898c4e8971239d6d4ed78c76c
SHA5121841aafd4f5e8920d8a20fdaf45ac1e68faa2f44515432d4d7065a23dc04d71153c2e8f55923584ace021dbdaa8a40baf042154dc611df220076aa765dbd758e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027caec3809e8e2897d2f028badf832d
SHA1d93756084bef200ce280861bf160caf26c60d699
SHA256463e6b2f0078288ec00a4ab13c77245990fea0518c8593a3ff09259c041e2b4f
SHA51297490de47ddb2bce3549356439ac8d20ffc82de5b6d4bd80a7de2dcfe3e565d8fd7d2d3bacfaf2f5f0e5063e7f5b2fac3551cb11cb8c7338363795b4cb171477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56869e429f5991e545e18c00ac181ad8d
SHA1a151a7d8874f5dbac95030fbafa611648585b0c3
SHA2564abb17a9c9c0c04044f055bb3ff20402f672b66d858711136ef7770b1d6bfe10
SHA512e9fa3bb9f8a7a9c2212de796f555b604bd1c5e80e700da3346fb4e1e151b1a1164e38b91176c077072a1c32d0a60a2d5f7c4b59baaf203d5ad5613affb4a31ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b2de1d3ed79272ff0bd8c4a888a821
SHA10afaa9f30b55f6c696b93f18fba574c58ccd9fb8
SHA2566a30f9878b17d04e92e7492b8771e634a9a3c1f6d38815d6b1997f36709b4ac0
SHA5126fa97d1601eb258836f6ba6ce6c716de973f7df8d78dd2571fd5685bb5f73fe09842c3b3bdcde9367641e19d1447457e5bbbcbe66cf60e12eb675111eb6707eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c646d00444aa5974a3b05ff08c37032f
SHA12ffa60d57e3591c7c52dc4014128806edb2eb6b3
SHA2569d9ba15ed6513fd96c921f3192b67d626aae47bdb444f8c405d4211b5ae9d02a
SHA512e3e9cc7e07b2de55403a7900033c32c969e3ff0130beaced1430a0eddb19decfb403d5208b36c59482fcc4990043ede48ad0a02d3b25e5950c582e51979f0ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cfffcfd81c3d52fdcee447fb54b96ed
SHA11bf302dc6120c873c432f80b4e39cb85b6985c31
SHA2563f084fa1340e95ae503ee70dcfd13133adf21fed774d5622b1b2ece9e0de8d00
SHA5123f0f724ede5d0f07e3c58cbb3d0f57c864d1993742f1a79277f4d7c70bf7ce43b126f519a2b4147d16730f92b06ef22827b43c263c128d2b1eef2c75ac7b43b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d78317fe2a2e54aaa83d4cd84eddf87
SHA15219a78040b129760a36a317632e6ead3a8256c9
SHA2567e53686bdf45939b9f7bfdeb0da9e23a55b82c91e4f0545681c1e4da809696dc
SHA512d9e0b1af462c6be1c0646f18114c1c5b9359ca600b8c88438ce8da84a3f7ed6456ab35a6d30a9ad19053ab9d4fd76e7bd6aae1d88ece34822b4fcacec75e66ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d579fb64da3e949c2b26de88a841f935
SHA1a977863659dc379678114df75aa2ccd7013ef1c3
SHA256e0ce1a17383500b273192d00c95302c034586b95b8059321fd90d48193ec2b12
SHA51241ef318bc43a15eaef83f3d5f5547d93c11679143a05c8f7da3278ad55d647fd45d71ad9079ddb7fb2c10f2fdbd2a62cf4f210cd9dff9867b1e52035e6daa2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea676aea3fd286de13cfdd4bf974f92
SHA125c8c16c9624f43c2388e9e589c5e0d88e163f76
SHA2564940b5b6166798fdd47525191ba76603956fbc30e9a2122ff7ae2fac41b31b78
SHA512650543c36105cc251baec7d29bf31e2409a267fea0f797a7fd523c23821f394e693c6dbb9f4575d90c21e82192739de1ce63044b4bf3576386c457db7f4aeef5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b