Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
d9ac6738339936ba1c6742861b5a5026_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9ac6738339936ba1c6742861b5a5026_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9ac6738339936ba1c6742861b5a5026_JaffaCakes118.html
-
Size
1KB
-
MD5
d9ac6738339936ba1c6742861b5a5026
-
SHA1
1e6d25c2861c673ed7686e25e85b0a59855237c5
-
SHA256
42bd84c2f919b34adc8d86bdd76f37a93a5bf97a590b2ce4206f46a9690fb595
-
SHA512
f5fcb256dd2f3fe522dc77e8ea9d15ef6664c10c1c114a122bd0f59abd594c323436872159620655a7bf1875a3c1be4a0cb66f9e372eafe989728ddfa2d3ce4f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000003b28db0727f4c73306895dd26ce670748ec39ce9aa99f477fc81b87836f3b2a0000000000e80000000020000200000007b31806695bc7caf9c44f08274e0857d08ea9c2c04de1a492b3f63475909692d2000000087582e0870b1ffa255d4b175ee3b245cbbb45ec90199a2f6e0f35a928cfd459340000000b751833719fd8daf309d327a65240dd819d9e47a77332fac7bc54790ae5bea0dbc08f97db7763c5a9274acae9f5cd45cb1c457521b28b1d4c06c27d05bfdc3c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432193345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46494F51-6FFC-11EF-9107-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d041c91c0904db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2852 2956 iexplore.exe 30 PID 2956 wrote to memory of 2852 2956 iexplore.exe 30 PID 2956 wrote to memory of 2852 2956 iexplore.exe 30 PID 2956 wrote to memory of 2852 2956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9ac6738339936ba1c6742861b5a5026_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b79277ab83f73952b0e83d867644b51
SHA1f4b502a1f429866d63eea7d330336e200a736c4f
SHA2565c5738e2905c26f833d3197879d66437ff5e4df311dd56e276006c3902e2305a
SHA5125beb69bf8b4364397df534be9590536a7e0d91205e7ef32fad3549f28cf454dcaa143016a62052f3a5b8e00f845a42273d34ffc700d6cc66bf8e9ae78c5f8813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14778b7d0693b554b760d4f665389f2
SHA143ba9a016b489a2947e6f8bb322d485a7d3d7505
SHA25630a6e72eee096e8b7197455f09835722ec0efb44eaff20fb1d765d4be004301c
SHA512d8691f44028cdb1e93b1b218dd90b24e3eb0f7716d91a6b02ab8b3d4583424e839631e6c1195ac58390388e1b4b4f1d3b2557e7c1790c2436d3b9c8fd84c4276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a9d829937e4484f82a0a3aef035079
SHA1a151dc80a3737d0a15b575ae42027633b4c5aa18
SHA2569eb7cde8b93768b4fa87a0dcc770d72146532957001ed19a9487e5f093f60a6d
SHA512f28cdbaadfe2b91453ffe406eaad09eb9f551bca4604725b7e278029fca2afccf76d9320fd39d5bd1170a624a72c68067c2d9c2d03e88e9d5fbace76387fcd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed450fbb6fb7d623ebb11a4feb1244eb
SHA1531ef1fe8ed70fd334ef46c0020f7678778357bc
SHA256a071ff9332804f4c07cc461255ffded19731aed196f3fa31b756027ad66f84fb
SHA51273f77be9dd10eed8d67ac378027f07702ecdeb7af91dc58aba39197e34c64c0016df666a906167295df7a176ac952af57ef961530fbcf0e62db6d91196125803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41be9b5735f6467325e8e3c42461771
SHA184e112b1d5d9dbc8c5956f4a3982147557d4cd29
SHA256db67586d625260c2281d52f827e48fa5a27bb155ba3bbee5cfc4455bf09c3e74
SHA512f3906498e415b9a9950d0d7c804d7daabbaf1462890e2f892cfd4a2e8bb93014656fee7c95e2d369792d22f666e74f3ee829cb5796784099439b0fe810c37293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4809053684896d6665a8740e42b0adf
SHA13892327dcc4596fc2e9a638f7ad67f54f591ae87
SHA25623e43050dcc31f5e5745e747b2a5c1569018f6b98618f101f0e6f263b6f1c0df
SHA51261cb6aab919768e11ee89b6848216fada910f17abc273f1469aa9f27cd8dfc0ecab73e1575319bf7a093a22ca6603d2c47486203a2249aab4557dae039f612ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5009079cd92dce33fe65d55316b39b
SHA1d7d763ef8ff7f7a5515a96771f671e9b6083f26c
SHA2565e62d7061f856a004a4bbca78c2f73eb62d4cc7cd4bc32474255b2e3c51b6fd5
SHA512ac717b35dd4318689684b1844ec6b932c246a125cfe8f2c19d825a82a05aa25c23bcb86292d838f20dffef74299fabed11e5e01f5a50aa0f235c77c53f106a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef012454d9b0e9deae1c4cb68b668eb8
SHA1576aba56dbd5f48186dc542b78296c954f8f2c41
SHA256e5a9b8a756cf80b8dd0998b1f5b1838410a9dcd52c8ff962ba8260348487d35f
SHA5127ca58353542e8c966c91f6ac7068a709d6f3905d1fa9850dabcf231f63c602e4c8c2a4377b81d1f3e7fa9e3a343ba46744c7809eca02f536fc4d186d8d5cbb0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7824a534bb95df9457fd3b09cdca805
SHA1bf5e79d85d852ab0a9a6a534d8e2a80dbac5a461
SHA25668a9219483f14caa0f6aec8042710e59711ce8c944e029c7d8998e778c2c65bd
SHA5120d14c9535974d48af5081b7d93cc8752ff89070c81398f4ff4f8e14a8cd12eeb9440d9084cd994da41a0cc1ab9124425b481288ccc5994a34692a617f511ae97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582925d8a369eb05ed74590a83e5139ac
SHA17ceecab2c6a955fe1877054de65452d1adc0e871
SHA25641c547e207c9726d4d5e7078c11cc8b0a3b52a8cd7dc43b2462a4909ddca0513
SHA5128959140dc96ed756c8baa67ff35c0e0e2f5f5f351607b66c00e7f67a82a31064f160f608cce5eeddda8e8aee5b8082c3a81bc61784d1d9f88961ef694591f659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579bfc198a2dcb0f112536c4c6c0aed7b
SHA121dca68f94f5aeed5871d7a892cd67c030f273ca
SHA2569717f6f840b04973797edaf59f7889818097149120c89c46182bb8acbcaab8ba
SHA51208bb9d04e877a5b60cf012ac85e58fce6e09a4d14517cbdaa09cf350bbc4ebc4f0cd74a9e3689698839978d9321e668d3eeb4f770736aff59017873f3d9d78ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d319cae53fa3ef8748d291da18df1d0a
SHA1830e05f3cd6589d38b2f6a089ead312acec8dbf3
SHA256c107bfd132e56ce0fa33fd2ed523305e87039c860621a5dd166a9a9d7c90e600
SHA51252406fd9c7be09d1f70d81d68338eef9495554a436e18efc7293b6520ef796bcd9b841747386a6bf76eca9621d0e3cf87798694a50a023a3fe13bab332260499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e7cf6a966aaac8b632f1977851264d
SHA17f8926cb520ceeeaeddd0cdf95b8db91223e8e15
SHA2562e8055970c81274731fb0c99aca9070bc636015814907b8f56d8f9b3b3f2596b
SHA512a02bef15eb75f0f977ec6c9e5060d86f04b4eb2a96004ab03d54f4127036db0e9940068f92ffa97a30b898a7b81e1f3a2dee21159bda50fca72500bcf1733197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556cb4533d0118ee12dd4a3e292253f1c
SHA145919c7ea96d51b3d769f17d1ec1e2efae3145d3
SHA256ec516660f4c2c3eb3d9adc67ff0632564d481dec423a047db470b3749d6dfc41
SHA51229e1f2f02874a52507c816a757da0c6774ecf0f73efec877bc72ff12d7688ad0d07bdc26504e9d48d6b35abad30b1aff8cbdcb752171f0b30359dd65c30a529a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59909d63f0b10c0bc4a9e187e949d4f1f
SHA14412df9f8d65f059778a64df32818619b6764864
SHA256438aa4578811e24bef01802b6b38acc3dd9d63baa8f7a7467b161fe8e69f5a9a
SHA512195bd9cdacb7229ba448a1bb91840fe6385148506a7e89a41b9fe295618e16ae10c86be24352843668af0d4f7827b481582d37c6c93a57a7ba01b8dfde54d4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f64421143dced6029f5aefd9d1c7a13
SHA1b451bcb67424d0c6c4edcb0e23dbe9b4caa13b20
SHA256a5dd0e38d1c21242d3448c1384fce902df94ff46258f6ac5bec325459e41f586
SHA512196f5a3dd02c019b4813fa53074b94ea42341e47a240871e9ef6cbb117ca2d21ad48206b9cd7a76d800e2e5920e4ead0edf735def2a2fb20b79cd9471248acda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f6c281388fa4d21e90261cf35ab0a4
SHA194d12efad5da1431e03ab1fb9cefd92aeb4d5be8
SHA2561207a3a9b6de46d5c324a4a1fccab6a71e7cb67448b69934631b81b03dc15053
SHA5123271659cd6c199bf333ec29c4475b58ad7291d45d77ba6027baaef5aa191f6be789eab3f08e2009626f64b1df371aa819c63be9006dd5de0eb4ae6b3c936b59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5360555830e813f603cb1bb712c1b63a7
SHA14960af1188d4ea1295b33f06922bbd4aa7914c0e
SHA25638432991fade759b41f70e1913e5bfad1901a59a771d101f615f12a8a87ed397
SHA5124fed41d716b64d654a84cb2c22bd950ea57248e678aebbc8f37c15804aebd6c25e5d519ad1ccec0e6fe1f011082a597966b87552c2e266f01c8c7c523fbf9ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553736d656b4ab6ebe04d02b944c81eba
SHA12b755ef85dd9ba96c464d6f1ad1483e8fa30b34d
SHA25680b7fbf300efac5baea39ebbf7d37f16599925a778bf352ccb2c17dc9e6b480f
SHA512fd0e740bcd4de46119f1928d865beec0f3b3ce534ec78eb8922e70edfeeab59746a456a3519df104daf8af6ddd4fb78cc030db322a2eddb119ebd5ca1ad935b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df5153cb26c2ce12bd78595dc4f3c1a1
SHA1c7c3d0b1988a8f676e524a5bb8d1650d036e4694
SHA25644e32532f7feef40df7b99e1220d368344c4c665b1a65f6110b2020509dede7d
SHA512f5aa1e9170fd1b1c511d3ea009a1fabd77496025b0c38132663df1c2c4798611ca8357e8a9cb2fb1318f85ffb382717e14f1e24ddfe011e9671757b09580285e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b