Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 23:56
Static task
static1
Behavioral task
behavioral1
Sample
db7357790461b7515125a89d4da48034_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db7357790461b7515125a89d4da48034_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db7357790461b7515125a89d4da48034_JaffaCakes118.html
-
Size
3KB
-
MD5
db7357790461b7515125a89d4da48034
-
SHA1
e5e8a41e563448f9a794bfec261dbf9db6666da4
-
SHA256
3b9a6c118d2936e1abbb171982a364a56932612c425cf8c98dd6c3040c2e29c2
-
SHA512
bfdb034fe0920ca38a87d867fe836a64e21aad6e312da9a81ec9a44b4952f766f06078de029861e5cf605d2d7b100730dd65ad3087caa7e8cb301267669f938c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432260856" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000001757b0ce855c96a1f688223e4910b1f13c1072cc3a98b18d948b4560311a563c000000000e80000000020000200000005ff7812761cb11d88ee9a87dd7540ef0bb5b059021b9f5451537cdd9207e8c7890000000b753e2947a1d798a961bdcc1f7183bf16fff78d4285e85bebce6b5ab0335af27ea22e7c2543ff61d60b58a5004c8ca80402586352e9af8942d79f93cdd0f584c79ee69ba179e0827fad650c9ebc4924b1a5ee905081b770d7ffb888e4b7c687e26ac7f14f0f2595e5c3595d0b4c67c31fb48147e2a4ac4be89e6779a8ef4500cc97c8588a39c960b58607a4c994b9f5d40000000262cfee9edf600f8a9c1942dd3362632d9007998f70b92711795621e28a93ae7cd181cffacbaaabebae02379eee040d4cc82cec2df60200445b3afcd0999a812 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74287B61-7099-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000050e10d7cdd78c70232b8366a41dd834b67471e9ee64a5593ded3682f243e3d04000000000e80000000020000200000008131e90bfc1518c62cc3d06f52af6b4477eaed9742a09a2c0b1d2bb46c437bca2000000058367cd5473f925acb8e8de40a15041500cb6f992096fd94b2e47ee3c8ba3066400000003082cf4fc4fe6874859d03dec0bc880cea2d31e64f5f4155f1e514595405929760847867427e8a0cddb77488b66b6ede4de52bd1e7682e343b25e3b13063547e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70feeb4fa604db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2776 1976 iexplore.exe 30 PID 1976 wrote to memory of 2776 1976 iexplore.exe 30 PID 1976 wrote to memory of 2776 1976 iexplore.exe 30 PID 1976 wrote to memory of 2776 1976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db7357790461b7515125a89d4da48034_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b03060f6960f389fce8493d01f51632
SHA192a52f13dd5f3450058cdae4e4497cd5f923c65e
SHA25631f694104683bb9dbd42f1e6fce8c28f9d640259cf024a11dc9c3cc5054c447e
SHA51263f2936c89bc22a66c9d17ecd86806c7256cf3b1889beb68169474e578213bdaf3239bd2e6894d7f139e20528c2024687f6ddab0c06d48ba3d3300ff8d51f100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf051e9451f8016a6500def6f91986f9
SHA1a03040859e044e71fa57e59f1e0aba9797d9d151
SHA2568db3b5579382d0b0104a64e4d5faa179f7839f63536a73b3680554571a539e30
SHA5127bbfcadd60c6752491587195aea4574c0d76e5484b62bfc7853788de6b585ab9e1918d0e4f22e32b1a808e4f20995e3aef7a7b89ee7d7fc2f52d7a95a7e9960b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e0d67125110b179c14a32864ac71e56
SHA179cb677cf126beb8ddacab1f3a73f79182dcde31
SHA2565771fd89faf1c90e826d1ec0c7146df195687d7f6cb364204b928cbd2a2f5dd0
SHA5127abcb5257e690cab99f6ffe76af94816a22b02d2a94f1f511cc9bfcd3a0099d26d64df4d76277826b56dc14ee36724f789a5193f38629786cd5af2b31c0a77f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da11df05deea6d98a3765033414abd46
SHA1229e2745d4d2437fa61c59abe5867188bc89e70b
SHA2564f7ebe9c920975a72e532832ba26cd5ced4733082d6385c2b06a77768f752808
SHA51215d2e9dd9319ae57387a1df2606f4c849a8dd6a4b458679a1f16a6944eb44e7a5d1699f96623c833b99dd5e1931d4e696c96c1a1a0b513fd79690fd3701ffbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e2e0a48f12d72fcf8ba28574dba38f
SHA1f9ca3ff46366603dfc7aac04ccdf040a36e50211
SHA256a4599826dfbea4a54bdaac44eb0288f14b4135a9e413763c03f6efe8ded0a6b0
SHA512b089a4c179e42574d712e327f1714b4c9d3996b7a3daac44308b01a37d096cb5912c9bd10b507a4406d17468daa16b10a99e7bf77e55b5cf0fbc5008dec65b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0a2c7faa8c0b35c3556ab33a9adb084
SHA198959a60a539290c4c4c8ab78722f956d7a22933
SHA256885bf94c7aa6cf0803c9ab253ea0db8d4b49f1e9f09cca425aad6a4d9fa9c7ea
SHA512ca23cf24ba7b300ceb3aab98cbb991c70269be02f10d688e830dc2406a6f4b3c3721412e432bb2fe30ff234d693c717a17f66b3ea94f1e3c4ca66597117b284b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e5571cfe5af5eabf5291aa32435e53
SHA1ffb090b3a1859c311ab570e7407e9d2956386b0a
SHA2563c527ffea29943d4a00e646719bc62729b353c68d3725bfeb9d67c85aba5488a
SHA5127bcc6fc816f32fcb8776e14f4b71aaebecc77a4e180672f6a75222e41839c803bd4579996dd19d0832056fffbcafb24ba56d43d5ff78cda466602ab91c2c345c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e70ac544ba017d550c9f09ea29cc8b
SHA1c03f7a225d26cd82c47b120572184ca2ec696390
SHA2560ecc7742a6563c3a34fd67c0aaf9581820f4031fd73176e63502aaa7105e1aa5
SHA5126edbf0cd1453cc4c7a2dadb8f32a9e0517adc171dd21c039030711a2f860fa5eed068a4cb717dd20d23acc213329b60baa21ec73a765c763d515fe796884c2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546baa8e52def39fae910e17abcbc623
SHA1851cbc500d0dedd5a5ed3f3b4388ed42ab1583a0
SHA256e83ba934297d96ba1439e07c78c54d5b6f08424e1d6117c40f3946a035470193
SHA5124c4d5e8dd306415d9e14651f0e17870a477580e338d06869803ed171e8e6300a837f1e525e22e08fc5b259957a20ca72b6bcad98734ff576fc81c7e85e638a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9680aebbbf151517987e8f971cde9e
SHA16041ac0742147d2ee3727f34f39555430f7322e5
SHA25684654dd0e3f0ceb1dbda389cf88c3ba526daa93bcb0582b9fd6fd6be35e071d8
SHA51224a72985e391f118dfc5a1757f818cc4ea1a478e94ee125242a0cf077039ce02cb6def4de26fd92fdc5f7acb40ebde6f987358b900619a9f7f022707562d48d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54490a154eb65772e0b926c52d6c95547
SHA1224f00add790010c53e0b7b45144e1c2a21a56ae
SHA256f4d248add9915d18c6ea3725552a9ba8146ce9969f5134b8d9ab1f46368569c4
SHA5122c4ba0d3a5e1aa7265e90d9f352d209141b1859c6155043756117fbfe5ca5880ded23cac1284a212b6df507feec02e65b1a273b47ab99e85baa4f8519f7f6e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc0a4cf9b6d5093b797e6887a39f172
SHA17466ce3154b6af9cbe0d637d9b419aa776b7dbbd
SHA256a673c9828d3f9940fd75366e149b0aa23fd166d25c1945685021e367aaa0be9f
SHA5122c8b566980ed3dcd1a96963b903b404e942026824f623d5a95340379ec19f3250bed4affd402380314f6e8420ae89482e73a1a58334d92e945b69a8ce01b6ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910bb47564136ac8d5fcbd64f76a58e9
SHA1b645d95a3874054c4acbf5391d666f41ba14864c
SHA256fd200da4c0bb2cba9ddd9d9b34072d2e88e5950ddf7736abfcdff21927d888c4
SHA51282e503737b7d8ea6d4761c0911ae33c12a4c599809b6bd42492b0d1b46f794a038b431caef2f6f89d411b286aa210e61f8bb301dc7de8a9af055366ac8691904
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b