Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
d46730235fb88606e5a73d04a5278012_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d46730235fb88606e5a73d04a5278012_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d46730235fb88606e5a73d04a5278012_JaffaCakes118.html
-
Size
6KB
-
MD5
d46730235fb88606e5a73d04a5278012
-
SHA1
b7da03d41e9102942eb96322068f5ee217935842
-
SHA256
6325202926cefead485311a41f05c8d9477108eb3246fca307df38831b7a99ff
-
SHA512
48ce7d622944b4ac46307e36d265d259dc3587ba0afb25c80502843e748e9aff9e32c0d11fdefdcaa28baddd8d97eeded445ee7cac387bc3daa29b5919aaefd5
-
SSDEEP
192:Is9PQbNPa2QNUhjYhJALVWlF2jIGW2T/W3K:B9Pd2Q8YrKU+HWqO3K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30466615ee01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000032f48fe21ce03466e60208417e445fc53fd3193c86b3f94f9cdf99717f167890000000000e8000000002000020000000eeed6cd1feeca8b08f73a2748c84ed198d0b376c072b61e9a48f50f03601083b20000000f608fdff34e8a684413a5bb136428f5741ef579c2afcb0086d8ccb64f3c6611c4000000024a74cbabf90f699ed7b992d22576637558cc613963bef6e246765f01e6ab2655e7aac78971c9e5a75121828ec7fad2a928509e0cb6ca79e3588990c01b7b588 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40545AD1-6DE1-11EF-A0D9-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431961838" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2744 2720 iexplore.exe 29 PID 2720 wrote to memory of 2744 2720 iexplore.exe 29 PID 2720 wrote to memory of 2744 2720 iexplore.exe 29 PID 2720 wrote to memory of 2744 2720 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d46730235fb88606e5a73d04a5278012_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e737472787804a3b5808cf5059918ada
SHA18ec8e40c93db5e8b98d4a149a82c4f9d6d934e27
SHA2564af2188e2ec91ed094a3f438fba895624b0ea731143333691326e0bb97f0c9ef
SHA5122bf309e93c85527bc45b7b980b0fd50c97dbcda329d6d6ebda71b9475a5856daaf5b32e9e6d618dd282a7c47ece712eb05811f7bb5516ef42b9211472af33ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ae7ec700d6a1acc513c2269c879e9a
SHA1081487e67de7bc0fd7d6abb343fcb51cb32370b1
SHA25667684a826dc9d101c638e70d64c9f6e7ff3f399dc2cbfa3165e8b70a4e510498
SHA512133389ffa2afcc698f329c907cfac1d8eee1ae8c7c0baff38c0b0c09dd9a2fddb89fce57c92b1127472ee06bf0fd1095cde92e58ef3c69b6a397a89dd95eaeeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a84a43eb183d3845294864be813cde
SHA13a604a482bd0f314fe634a75d08d15d5282d1cb3
SHA2568c8f1b79226ad76b8979b8ac12ea658bb1fb9f9204bb8ffb9ae05303cab1a79f
SHA51223800856fa902f0257fc8985730cd186df946ae61d1c4ce0119dc7ddc08d1c8d3886a735c5156e36c19e3d0eb0ccfe244a4a519cd99afa7598edcbe51b854ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c67be2d31ac5aa17a2c9ed6706db6f9c
SHA1b36d4c8a07f3efcd163835e09d28473ac8bc8d28
SHA256dfac7ea4ed5cff094ff551b62c2fe74d2da2421e9ef1065fba00e0f093b3870e
SHA512ceb18f40e862b9d331dd2304e08c4953fa610e1a7ba0e0c25c7f1a224dd50d1bbc8de0692bfbdffb7d568c0314ee71e6a7cd1331d1aebce9b0954afbfcf07519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecefe426e0be1b73e4300b063db916b8
SHA1d9beab776f29d81e83e93ccebe2bdbcfdb7b0d53
SHA256f31cf6f9d240007a9574c2f3df49df67c942feb942cd0e7092e2a32733a37e8b
SHA512eff62193e4ef8dde1b85dc8612e5f583515c6ed2e76130f9fe8b71922c4f31b91e7e2e1ed368499ef9f1353d9f1e22e3b6232434e1fc8f76591e41f6d66cbf86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6479003823c9d7945c3eaea58c620ff
SHA12441c1edf8b84f2540e303d2be734c08ac7ab1dc
SHA256b0d0cbe27bc4ea485133b3c782e88e7364fa31a92d54bda3dacdd103548ac0b3
SHA512a88567a6685d2992259c7e839cb7b7c2295735e87efd453679c6e387f0d2bf22bf6da2efcd1023a0e992c512edcff12ac625af77499179508736a9ed15bdcb83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7bde1e40ab21e8222d1a7abf05fc4db
SHA136f1c4393ce2411418853b4f1503b0927465e585
SHA25633ba1a6ca0da51e1c041069af835afd1e0e2d1c76b9410157783f17d51e7e534
SHA5125b81f7695292f271a5a710e03fd865cc331106971826d74d39d9ab7f67df3ba4b31b041a09e55e3551c4bf51217ad4c62c24ae3813951c4c3c6e9a460dabbf71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b8ddeef9a7240b6ae044ece94c309f
SHA101d8006c9282dee44290ee4a364f8be675b315c7
SHA256989e64bc9e96377072d31353c84ebc56e98458050f95b687a511594e927a8e32
SHA512a4e5a7717163e259b09258ed98522666041cd9ccf154de0fa5a27b514601c3d63f6812ca9356be035d73f96a312b9f49c177ebcf7fa66dd3ef450d4a806784e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c20a0a259c8b6292725becf800d9e47b
SHA1fbed7cb68327ce777bfdeeda9af97f08267b8d96
SHA25670282a41630e106111c8b8912a60d162e761a748ad6710d761651adeb53c8a4d
SHA512fe9f5c5c3d066a3bfc46f52939a65a54cf442e5af3176e10cfd3841f3a0b3d93e508a76914b28fa350d27fb42d07848f972c9bd65036790cd7d75219cb2b9693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b47cea1e0f0bc937ebd7d2b3e9bed4
SHA1cd641bcd1c77fdd738f9dcc736c953cba058bd19
SHA256a9968b15367485413720e4af75bbc75a8f10372e066429b86cd4d8dece2fa8fc
SHA5126dd6ae286dec7d3dfc971177d8534151c70d63ad4c04667a36d5b5a4431b7db259bbede86b394f666dcf98db6947817ed92bde5921285369d8c3ea84fbd2cdee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c630453b71dec583db60b447bf3db0
SHA1b8f6dabe753b6e12e23dbf6828315dde9c28b287
SHA2565f18748585c6dde30cd1d281cb00cbe91b0e4a4369713b3179b24a7c46f40c27
SHA512deabb8ee35c929514dc7611a86e21b80a7039d26065d24d058d5def4fa10d4a58a4262bd90120e6c3372b31992f2a0e46a0a00ea7e685282aaced99e4aa165cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a31b031c460cd3c926fe91be7f57d7
SHA120f8ad251caa601034e14b242b1bbfcbc2856f74
SHA25627c7f0b466ebdaa7023b3807354b6f91ab042efd9e4300863f8f59344dba7ead
SHA512733e740d17a6391028fefb7eca81fde2e35e545505065b8846b657b30ffb14b0be5c88a8fd5372ad29a7e1d990eec7f768e34628c3536096f5d35aa3b60ece5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4aaf8fcc9458348c34f9ff33d506020
SHA10f92ef2726979e94e621f705b3efdf72b15a6b96
SHA2563cb87fdab796185236de59a5143af1d203e6c957b9746655d7ecf1fa2c311480
SHA512943f7c536af41331e361bfb24db60531b6f7f0ca87e064f59aed2e496bb16e2502a74f2bf4355dc107eab6e2ee291867e867ef06bcb745adc5bc1e61d77aa144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0fec96cdfdab8841aad22dcf78c59ed
SHA12470d106fc2ce490a4a4a04536293f1714503209
SHA2563b61c5a5eeb39262b2a2c64109edd7db7f0c746dc7b23a3a595dd595ea46d019
SHA512a9f2d6fb02c5bd73967624e37a9377ca22f74fea3c92c2f0bcfd51dc6767a1d978f057dff35aa08671f20c5b52ae4ced95d81f14e706ddf99999ed436b6b6511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9da4b40e8e61cdf9d11dfc3786a53c5
SHA1de7df9b640ce5f73e792188ece7eff8226b13bff
SHA256d5839277cb0328d1256f2b25ab89db51f9bec616c3736fd9ba8fd9c39b88ca56
SHA512f9885f04015c18637076baa0c795dbc45b39780377fd6efeffc3423390a93922ceec65464a04e06c4f5dd0f9859a3116ab0b05b0dc3df06891d9ab2803193a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54525c2945f96d2a0525efb60b961c5ce
SHA17148d854ddb15a8b6016c7c09eac1ec821b42da7
SHA2562acad2a002516194ccb62fb803a1e65b7ea6714fdcf56ad7d7edeced940521f4
SHA512a8dad6ef005c8e2aa7511e6c3fed47bf38893fad28c35ad8378a4b34913d612bd4aafc2c6a220b699cc112e009713fa899dedacf63ae2c3dd9e5a0df8dcd7447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b68ec7f3cce35d51c1937f34d299eba
SHA10085c26fdc9733213b3e9f00d69f7f3a7a9be6bf
SHA2565205f5469f30e2ef290f3d60763344a1b431ee0a3ca42ec664176a59e7333a11
SHA512d8685f1fcc48156ccfe16824cfa58fd1b03ae7c35713ae49b128542e1ceb6869284c93d2a39f5fc3addcf9096b266d03649693b8f9ec67b189bcb9c71dce0348
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b