Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
d4a7fedb7bae974d66d29857a96d7f2a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4a7fedb7bae974d66d29857a96d7f2a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4a7fedb7bae974d66d29857a96d7f2a_JaffaCakes118.html
-
Size
7KB
-
MD5
d4a7fedb7bae974d66d29857a96d7f2a
-
SHA1
c608d2c8859c5bb150dcc786eb7fcf9170be0a97
-
SHA256
9711d19d4b7037b2cd1f3c8651885ace440fdeaff50af1ed227faf2866a5833a
-
SHA512
14216ecb370ac0cffdd314af72719037b02acc6dde8f4c8195344c4d5d35eb6cb79cd367a6154885d60cb4cc81bd2b8064eec6a7434e1db63351c050087d4fe0
-
SSDEEP
96:uzVs+ux7UfLLY1k9o84d12ef7CSTUIzMcEZ7ru7f:csz7UfAYS/Ob76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 209e42960202db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431970657" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFC18A91-6DF5-11EF-8320-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000007a4a12046be9de4d8f7d4f1ef63974466a4a7c32a914decb7eec5be919fc9bbe000000000e8000000002000020000000f625ddb2360ea028c9e428b841c643457478812b45c741476dede5958854e1cc20000000b785536e31a2ef25f7c580dcd9f40cf45405deb2295bb8aacf3f1cac905f2b2640000000a9dbe7193479b40b258c1c795c456b444f5fe45eb9e52b8bda318bdc58f240329f0d09252750760d30049fa6d1cc88ad966e11f4a431090045e96195b8e5469d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2080 2400 iexplore.exe 30 PID 2400 wrote to memory of 2080 2400 iexplore.exe 30 PID 2400 wrote to memory of 2080 2400 iexplore.exe 30 PID 2400 wrote to memory of 2080 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4a7fedb7bae974d66d29857a96d7f2a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e47623617e10475a058e8a7a2a5f0d9
SHA13a68653b73eede065ec0d78d4a5cb232fd866440
SHA256c47e14eac131689a793e0d53b6d86b966fde50483930802d39489891eb42ab68
SHA5126d01cafba6c568e07cd2407ab21a6d3591d730baaa389cc7a8df8e184285886e54985ef5d42a33b341a4edc1229e98acb4eb7988580d9c89841d999d6b4e297f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f23a577e4328f39827f1d460d95328b
SHA18998214d6c7bd9757030e0a6b8bdb082cc5d4426
SHA2561ce297cadf914c935d6f68856bc91a4fba59fa4c5ccb0f92e3755cfc264edcc5
SHA512a74a23d8e80e0479fec865eb960429b83519feef9dd22620c67e4a0bf166fd78eaf5feb95c86f4258507513f05d997e49909f21060c510bc1726001515a3be7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f894b36e4ad62a1ffe238d5a629d8dee
SHA1a56ee0a337fc72ccb1298b8a1b9daf81d1d00c63
SHA256512332f8e0960ae19b840820f22a0770775752c777c328ff117493a9078b4b1b
SHA51212897678d3817eee2037f4815f678db7ffe6b4c32d837b08102a1132b203abb0956e0696ca58598c8dc587186bd3de8770b1f95efa27f1907f5d218b04de8c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f286a8e1488cfbc04aaa0fb62fba07f9
SHA10c4ac77ea1ff562b8b70a3db6694125e602885fb
SHA2568936a88e35b8d096c8730fda43cd345ce36ac74183bb436bbd077e3fe9caf214
SHA512ae3439980ed5d085ab8e188789798496c104ffc84120f452ff424412f2d619c214eea564dc018f36c49510d99ccdbf21ea97be76adb5397759ce0d824b8be767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ab168066fbc2780fa742d9df4183fb
SHA15756611a74abd7fed155399faa993cf5726d9fbb
SHA25671b546f930ebd2434f3dcf4d29a75a915d31b625b44abc08265197d5df49e28e
SHA512aa140bed1569f77e0d7e78e275817349cc885755e3d8a89d658cfa34ca40684e231ebb38b0bd6e45cb1381192c149eda653b52334d6c36b08297be685f485c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63d0e789f004128f225156b3beff7b5
SHA1b5e768c28ae5a322f551115b34213ce807443b34
SHA256e84f91cdb4b0e1a13ee0cea7fceae8c5d47861527104e55ecf810fd12272e312
SHA51287989d06e35c74c57f7f827c7491aab3276890c1a9eacfba295f64e2ca7fa121847036b0df0d5f23a5193b7486690d358e0435de30516b1efe4a2d90c51ef20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c824ecd540f061713db4cd78307a3e
SHA1aaa7cf39522528fbd66d768d46a4d702662037db
SHA25686458c3948197ff9ffbcac464277b62cac6074cfbbedd8956e3ad301016aef48
SHA512c9b2d39425a8e638999c3be275be9904481843a7618c02fae742025d4e32991000f3e3c5e2e7f18389cb3f2004900f15ce48331443ecd8f1a739d8762ff305e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf7ad605457c42178dc3da3f42dab43
SHA189879dca4bd6be139059fa062be602b98778ad85
SHA2561395d7c2f62b0e7e88d3bf6faa630bae0170760cb72e698aec0e8075644ba692
SHA5129dd75c7e1856825b01b17d609c384c665e424715443b3d5bbf0b69db5138825f4e146b61cf9c6d220603f101f32a30d6e7a4930bce1ef9ab1de66c2be846f2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a370e51a918f2739575de50e7fe1d24
SHA12cf5ea6d62bda4423a77f17b328a6403114d0640
SHA256ab4ac5a418816b55a5435772403dffea3dadbfe21e1069d539d1546417239251
SHA512beb18a08c45bab8ea5f74732e171fa32dcae6d5099e8e074b2bf77b770314e7ada83a94e96bf412db36fc39251c692f404f5df5f9114d6136eaa060198f69197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f154725f12eb290a3a0d38a4e6c3b37
SHA1835ae30c789ece21f21f58525a2007cfbdbd3adc
SHA256b0de309b9b8c6496d80421ec4f2405e00e7ae9c387ee740cb13aa897966cdb12
SHA512797ab75fd287029679b4e331cf1d94e7cb59aff74c1d3f19209f4450a1759a26402573d6201091d030f850e0086a60e53d77df436fe68844d3e85d7e4bdd73a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56f32b8054db81ddb334cdfaf9b4e6b
SHA1bb3272f871aa9d167ba8a4a44b1e328e72ed6147
SHA256e6e0bcd8807714bb3da8b4b4cd4e0b6b7297aa2dc02f2c0e21dac33004a29c4f
SHA512d0240742b46ca55002e3fbb2dba85ae7699b89a15abaf1dc075fc747c020da83245da9782b91fe6576cba50fc380f1f1749e4105bfa911f9b3146060ba800240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ae30b8cef6d72e7b407a1c6ff193a7
SHA14f155ee5eabe9594dbc9d1fb0192d56c2f5d5192
SHA25634fa4b19c4b00a20926d7ec38480d6601d32e086925faefe7ed79d123a3673d4
SHA5128ec45f3802dea6778f291ae7eb8431149d1bfa040d8d27120bdcb523ab0887a05b16dcd8a95b838775233d9ab839346374a4522385f350c656d5d2fe5965a5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9157e88894e7df0eae9d2fca76e2c5
SHA19d8bd5355cb7d047c5165c63e0fc58be1e379fc4
SHA2564a3d4a8149dc9f9d7ede85d9571d56664d2ea8a2a847ec79cd29425fdfb58e24
SHA51210bf9756dc24f63fbc70a01d54d7f2e6f54144e54b5bb6d631e1b150bff94bec64bb830be73593cee9c1cb71ae6b8698a4594c78cb797cd8dc94b85bbc7ec6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9e79a8ac6b0efba00dc9b43a21cbf7
SHA11373081df7763c24da026ad505fd8de1ea7741d1
SHA256d355dbae27193c73cb81f9817583575bfa10a346f429f124f40fd091226caa37
SHA5123ab2d8b72adc3c51473dbf94c664f784aded8fca9a86f7a3fc06930fd36a349579effe5b530090f43cfa2263194eb1fdd7163e163fad2d35c5f6829018aa0fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb00dc3703ca68db795e82732cb138c9
SHA1908ead9788be83ec9a3c7eb146e71f4d24729ffc
SHA256327e1765ce94e60df7833ca4179739604df7c40d71f9111bcdcd44b55722da2a
SHA5125bc18e8400797d6605eba60b34e6a2860cc72a2f822c68e8a27817169948d0aef5e3401e2175b8f5dbddaf2ec9f6d71a40ccce75568c29fa45de2ce082d2dcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a965e8e869f6787c63908eedc8165ff
SHA1c112459e3f8525d4e4146c04552e99512c34258c
SHA25628fbe9b98743bd8abf1c55a50a8eeece75154a2b2d3e5ef662e0b0d48af44424
SHA512964e9e40fd3cf3c96d1da5b852e2f9672ada83efc36b6fcbd23cda20c0fd331ccc1f31e13fab8871b52bd3b62d01b34316f05edf7e46ca88e5bc7d0fde885899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ac02c1649969d55425b252b76f3f19
SHA1156808dbd374c9e0ca8015239df2261fa94adddd
SHA2564e19b1d5674b87523a262c8b635a633e8b02f484b978b27346c1fb29c9cc815e
SHA51273a4160580a70e52fdc29cab3a1049ec3796e446c14d87372875d23c96e3ba0dcc6f3fda0af4c4a00dfd9718caab753afc417de3245b5648b7a255e41c7dc870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e13962c8188dd2049c153e01348f14c5
SHA1b8e07aa9905a6fee1197d9f56f84762dd75139bb
SHA256a4f57c3f453bf9e6ddc10c1b34f8e24989bc6a4268d310111e61ee9743a16b7c
SHA5128b111f20532787ad05100d85495f7b0ea8c8311655b6d9f4991259f0a878072b7bfeca5c104f78d7e516323431519b2667fbfde49335118e86b389012aa10a4d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b