Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 00:01
Static task
static1
Behavioral task
behavioral1
Sample
d5549270452ccfce8d54b06e7546c058_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5549270452ccfce8d54b06e7546c058_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5549270452ccfce8d54b06e7546c058_JaffaCakes118.html
-
Size
903B
-
MD5
d5549270452ccfce8d54b06e7546c058
-
SHA1
50ebd5d25170dec4aa3e0a8905f30a8fea31fb2e
-
SHA256
56dd32031fbd3aecacca39941a817e01dee33548cb9be495ba1d8e6aa413500e
-
SHA512
2d82fc0d750a6126677df8dc03b782d74695013929a2fa5e69952d50ca57dceda37acb5b7dcffec2c7d854dc89437f96a794b8e89953395c109140e74105ac2d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003252fa72a8587985f24f2929a63b3e6d64418d1d6fe93546b7283be7a540ea51000000000e8000000002000020000000050f50958a1d16d4cb231a059fec04268000b2ebff2b93f6c232ff8aa4cd3a0790000000337ee74cce721b237b3c7e4d5d4f8f0a7a800990213ce30cae4177886dc06236eb91aa630a262b30ca905ed7f26424336f5e8ba289f53c13720860551112960af35904a28bae19e226355344dd85155871b495fa03af20e276cdbabee757392ebdf4e7c84e1d3191fa635db295c7fcf1b3c05ad28cb3752079cdd6f913399042432ba79c1ed827b37ce57941f5c942a74000000033f3f4d48628b2fddf48ba67f00ad5e2b49bf969ca1f760f3d5c30b894091178c127030848a1332b68db1a8019b07f4afc2a1bf46ae5fd87db5b1eddf61a87b4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432001957" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c038876e4b02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A98C61C1-6E3E-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003d4a07ba502d7f3d12a78f233e593d9386259638ce5fc82563f1209cf816105d000000000e80000000020000200000003d0a83955f5c5ccf28a431999537f1cf72a21dbd8baf7dbccac4ae221a4c20d520000000381aa0431af5553fe477f8f31d9c84b4ad2a4368bbf5b6553b6be3c6763ef4b840000000619878c39a6b332afaab6b7d25b2649846547bb44a132b0c29afeda094483f05e5bc25cb549738ca25504e3a4537361f50b12114fc6d8ac02fbbf151955d0e27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2536 1972 iexplore.exe 30 PID 1972 wrote to memory of 2536 1972 iexplore.exe 30 PID 1972 wrote to memory of 2536 1972 iexplore.exe 30 PID 1972 wrote to memory of 2536 1972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5549270452ccfce8d54b06e7546c058_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a483d792c48fbade59f8da119894f57a
SHA12258cb9b3e8e85f95e391a0b4c62bd57a415dabb
SHA25654e034005c11cd51c8375fc2586723de16cd31a7f14f956a9f135ef74fd07096
SHA51223307ffd08504bebe102f153f288fec71beb3e6b8afdf33177a97cebf874a41f2c92360555346c388d9e70151952f4ba23405d1660dbeeca61015709f9e0370f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c8065e09f5109d3853e3fffd4a2c87
SHA1720a7a70012f1e480b5efa83ac2ce3d622920725
SHA256e8d53968af2becfb77531adf105e60d0f11055808757c397c12cdee337073590
SHA512cec7e6651e59d5236aaf40128042d6c1cb3ca33d8d41c279321d580d654bb358f6b5219c31d373c4e595134ddf803da27f08da7e5b5eb3ce0011f2e216707d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf06c746503f7c39042fd6a4cf93239
SHA140573ecacbb950b29663bc559955bb3f574726f7
SHA2566ad60fe01454a20242eaa4661b092ad807ce70ea6e7875b678eb4d61bac20768
SHA512f39c37fbe37968ee22c43ca2d053afb4c5cbcb9d0be9166d87fa7730828df43adc1e1cff3d0b69f9741e627a36b87f49041d85e8a4a179d41040d361fc86ef77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574c394cba1e01e03fb78f9be25cb804e
SHA19ab3d13e0a56d17db1d83ee2f983d7e58baa6f6b
SHA2562e99f5d0a88b54d4e94d3fc9683936f1f317ae4a6688098012f2a6ba63c0eec9
SHA512ce804198046d8c6722a54b795ada5103a7c911283fbc89d426875f83c27e88d51b138a309a227fbf674c0d7f97963f0a0cb884e42f89c2537d28362030f1c828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ad7710358f45eafb0ee7ba26ad12f2
SHA18086c263f18a7efc57d044f1852a6403454abc17
SHA25610d64e761bde40d562e6f8fec207243b2fb50b873f8103a82ce17375734bc9d3
SHA512ffdf375c2a7c2212407af16102dd61cfbcad9721f535b884b4fb6804fec821a761fd377f01aaf760648ba7b868416b1637f592ff62e3034549da70015f53d52a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6a0341ea7677fa194b080140a5b681
SHA1f992d5393635055c3c6693c6b69753281f128cc9
SHA256de2c5aa648842df2bcfe4e4f642baada8619ca6bf9e091aa20c0caa7c4b42a2d
SHA512da3ffaa6d8db4c2de3dbdd0e80516f5345b9ff264f9e7e30f380cc983dffe697201a858f7d04622795e7adf14db26e322eba3ca7323e3fab7b2b3c8abd807ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a24fb114f1a24bf5615500498ba9b9f
SHA1ca3d61fe1349d29852887c9a2ab47f1c913d8619
SHA256e0f49467734b436b1bfbe51c3102b20e8a48b3b4f04d4557d2bb194383c01431
SHA51296b42ec685be4309d2e4ee2f0e4c21796a3ea1aeaea3de3a2e470012736bb890037f4425bca6222cf13e9d1ce2a79d56314f23e8306c378936537b6331cee867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57395fa548759e51bce6d1301b45775d0
SHA1a210d41d791d391a9c5518e2c77f0e0ab8349220
SHA2564becb238f7837c74b67b10ece06f1e3ec6e3de319b6ce96b89a255464cb77940
SHA512a0047c38e1547fbac7685eb8b4d64f3b18863c1e3d7b910faa40bad2484ce81569c08d348ee4c1ac486b0391432dba680c7251835ef7ca8db946aeacd9a6947c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2cae55af164b2244401dfa2932b6a67
SHA138a88372c758d70bbddc3b3b682862977ac27b19
SHA25676d7cb821798621870dc26ee969c1ce7849d504c7cadff9128f1130ff4c41f32
SHA512bbbe23cb7b4ad0d38cbe12f2f4b85b2c359d5ba3f1d1071bda517e4f1bb62db6303fed7108a352fdea510cff5838314c38bc3c10d740ec69a95c9aab7c72976d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b6e23ec91c2f3b9d7cd935ab8544db
SHA1814387ad0b2086853b65effd36fcf37f6a1edc5f
SHA256407b04891db7647afd47f5b71efd5aeda8bd1dea944405c5bb64096afe2e2689
SHA5123ee0744497f0e4468654c93bfa68b95d608ad552084195cb42642bb68ca609a562e73dac0e21f7b4c967bec0c3a84cb801a66104b40b03e9bb446db4cbfa87e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511cd83eaae793d967c14efdc0731898a
SHA1a2b06d15f30cbe669bc51895670e9d3a14bbae81
SHA25616c3c39584f7cb66642e18b7d706b5b91f74d99608174ce561174fac3783e619
SHA512e2349f3cae8d80fb13dfd00b1fa4d2a495677a433b9eccbda0cd49ee1889f9ed14a4b98cf7be644fa27d6ae3a043f138ef003d56d1c0aeeb3b6158f3485fb80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c7555275198fb863fa24a9f8eab0e1
SHA1a50aa91823d617a00310f83962164637a8f9fa15
SHA256ffe3635c7373c2bee3696d29498340339ca3347ddb2f2323d84d3199c6f85e68
SHA512e49b3e0ca81bb58f60a1d70b70955ef8f4476588a1ee61e4ae1b9d321feddd577969786b562782923dbc5e1457e1b83a8b39ed20bd74b844edcfb6b45ab31729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab8a3f81de167fed314a062eb14deac
SHA1b1b8c5f650497f1b2ebc068106ddfa4fe9493214
SHA2569bba44433520e70b5380fa69b4b9fa85a01a65cf90e295a00735f3b9d778de1b
SHA5125f789117265c822aaad14c017b69d39df8d5130e182ff04453a5ba98ab401859afe3285d1310a0c6c82e52efc1cc4c9f6a94b1a7ed67d909eca016cfa31e6239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7b20ca44ba9c569dc0fc6e41a77370
SHA1316f5a1971e522e25b3b401e2f35b8c16cca1358
SHA25621e11dd84fe80dee09afb47b70215183e4adb28c371980469bd427435660d32f
SHA5121fb8e709a5a70c79c6bc58533a379626dfba41c87e1d06547eb14cd2098a7422af713b5cf12977915e635507aa3f475f09a2d83eacd1e39488cc45e15f6192fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38f6f34b86e0add63eca20e6c4caa90
SHA1e50a30cd4e3b45f70ae5a42f5c9da9d4e3f31694
SHA256fe91ed96ecbf1a0018aa33b05e8dd2399557e56faca11386dfcf8455303c4661
SHA512b9c9aafef2a1e7ccb5941412b5c855f4b3d23693bd31114338cc30370244f9971c8b1cd92e926956cf5d3f71c20538260cc1bf3e80b9b2684409f3897c0f8ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554041e95bdff195df2d7272486b9fc27
SHA102e8b153f4e21b5b9719f26336a492dff4cf560f
SHA256488f5a27b9ce6f6fb8a6633888523b23bceeafdaa5cc3006535370bd99542736
SHA5123d56c0cf52ca75dfeffcac6fb8a7b4cb6e02817d84b12fdc7b1c0433a228790f7efc688f216fee5365c8f7ff5f8fb6d33e25b6b55525e5bb855d042cf4113e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51488728f73bf48dfa4b7f2bf3310da83
SHA141f30dd3101e8db5ed12f8784fcf461176a267a2
SHA256cbaffae464c3d06ac4139bd786ddb2bdf87e3c55fc42be9aebf7f65c9d280923
SHA512b294e3878abee4e8d254518f23cd22e1633b14d5d4605142d6983d2d6b49ed12faf729e3409ac5b5d9adae9a86b649e0ced1258b17cb03ef5d58cc2c145b4dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598eb71e286cf4c862943ebef7b830d29
SHA10ae5b0e59694d98921be2bc3da8852a45934afb4
SHA2568ff3cf3d815dc420fdde79d670bd692c86988fdca80a8c70a18c25a87e7d864e
SHA51218f4d4cfeb1c0c8d848e6a585d7f55282a9fe23bf20d4598a136312e5617c23bac31e906a1eb33067097df546c8a4943c2c49aac4b197c502af82ee55389412c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b