Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
d9db3f00ace28fe31cc103ec4b63fa14_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9db3f00ace28fe31cc103ec4b63fa14_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9db3f00ace28fe31cc103ec4b63fa14_JaffaCakes118.html
-
Size
762B
-
MD5
d9db3f00ace28fe31cc103ec4b63fa14
-
SHA1
45a24276ff7266b91066654b1ebc3d17f0d9b968
-
SHA256
e53ef5620fcee260940f012e5112a01689a3d632a46591abb5ed675a28c3c846
-
SHA512
c9d8659a6f6e9fd7b2be2436d23d4c24494231a8dbe4f58bb6cd6f34f5f40b4f285b49891b55ea4298a0d085507dba7aeb9a8ff817c358f98c30cc3effb2373f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a068cab21907d61d4d13c6ff154edd886d3d2e42294535ae6261abbae2739a17000000000e8000000002000020000000e9aa48f55bda81f9b45060b2423c554231b7e92d69c246ab4983d4661f0fe35a20000000cf1c66eb5ce96fc4d9e7278b346131d39dc2fba593490b44d3f5ad2ad57c8357400000004c59c8dfca3e078131525a0cb8f47103dbdb08ab3b5caf8f91096a7f6850aa97939c02a2ee134e213e3383a4c85ec00be5ca41daeedf931525639d3ac412bbd6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2048e1921a04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432200870" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB7EEED1-700D-11EF-9D58-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2148 1728 iexplore.exe 30 PID 1728 wrote to memory of 2148 1728 iexplore.exe 30 PID 1728 wrote to memory of 2148 1728 iexplore.exe 30 PID 1728 wrote to memory of 2148 1728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9db3f00ace28fe31cc103ec4b63fa14_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859ca3855553f0d7848be319cc83d013
SHA194f6628ac1aa3ed5fda330a525f967ea0c735391
SHA256a0f8db654dc21669fb70ef755f56a0fdf44c2e6972088886ae51058b0fd3def7
SHA512603c32de7897b808f7bcfb117f69a7450669c0346fa20452620ff3ec5ddd0fcf48ef297538dc6d85f1f2a240fe4f7a8422462904ffbb161630b7d5dd51160ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573aebd9dde0a4ba7a6d846891c92146e
SHA1adec37e3a7a37ee78b6b4f63027be74fc0511aeb
SHA256611c615fcfee72697c2485236ffe44cbd53d822ef956725b722c4eb7bcf57c9b
SHA5127656633b084a333f08b12ef6bead995e6dd7dd44c44d6e5619d5e88dcc3ba1d5a71611be18b4d41600394f7bc7c73fd7232757f3ecb496819852acc37e932567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef9a8126539f664aa429951fde4ee25
SHA1a5bf749c45e651e3a0dab2b7eeeadf2f2840abf1
SHA25675a7c9195d1ebe52b0805c2eb264fb287237f73cb25ad94ff4e3c63e6a707cf2
SHA51236669e04150259f7a85ffccbe8b30625d31fd6baaf1438073edabd60e0aa18baa5f8f30814a130516edf5f3f31529691bcb8c435f94e9cc57cf28da7d3b2abb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512fef72ec5fe6e16aee61860eeb87cf2
SHA12a7f7b2b7944799eef89915b0c99b6969f508911
SHA256bb6b1e98bdb1706c4ee6e0811911a2600c6e454a5b0f43f2a8d4eec15b97b35a
SHA5120bf0f674ae67357744b72ee66b5ebb34e1ae982d1c107b444be1af0c13c5413e40c27f1f52d33fcebc88833ecedce8bcf22dc442dd0895d630c0adaeee0ff29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e387ad4488089e1bd992c570e0b26c
SHA14805497ae98f43e4403ffbab5ea17962cf796de1
SHA2566423f89d839a81721e68e51597998654d1ab6f496b587d3c56ae9b187acfa9f9
SHA5121a4bdf69218b254da0fdcdae9bdf1779ad5c6feaddf9f6df80fe06463afe321a73d5501090686b5a7ca8eb0247ccb34b766c66c4bc073ed3ccad6b8aeeb08533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9df3745c0527f4bfd8e2d418ebc4fb9
SHA1a74874fe56b3b8cbe311cb468d2ffd10e69b905e
SHA256ab624bdd74356c7309b90c8ea595ed5dda00fe75276954eab064e449a1af8447
SHA5123453792c32234f6baa97ba3e22936028fe1ade9d2249128297589d85ca06b30d2e989fb589799dce885d2d223a9da8b6faacb6171dd0d9389f535df91b4ea5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783f66ab91d7524c15316b21727b4410
SHA1cdd382d052f3315c9a1f250e792f13c01a53b227
SHA256351cde827861016d7aa01cd8d54a90625102f0407648181203a9fd7433adc61a
SHA512fde8aeb9076a315ff5dcc8eb9c0d20cc8f96884722530212fc1845563ab83d138579cbee8b72d8792fab2e914b9bfd6c4921760b83aea50ef6c9502f6966aa21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb46d3c20db64cea2b07918727a2356a
SHA148e0ceffd55b7b641594c9b2e65e3a95727bad51
SHA25632795204a3a48090e3740cdc29f1db4679faf4a40c022363c6a12b742b4a82a1
SHA512d1c4149612c396ca44cef65a6fd269d684733b65fae395117e809c4a0161790b9f8d02e73ab5cd48b3e2b092cbecb7edffd249f41b72ae6f8c45564156596b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428b24ed51c7c439d4dcfa9bb4dba2f6
SHA14f78da2ff9e26828cae06523727b7899546398be
SHA256e1e142fc658ee4b504d2b6534f7affea5ea840c06f3ab024daae94da55c895d7
SHA512fc2c267b2dc0109539f5b51e16b093879223bda02bf30f17acaa4385f4df05b3740c4b7a3e9b2d733d758dd066e3775b9dd1d2cf6ad66b640f1969f17cb13e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a688d4d73daab6c19a6b6d96e4c27d5
SHA13f88e6708b9d69cf33cc772b9f2e215723e45b4c
SHA256feb761d9a85a07439bc1c2d38459c29f93187722bd443b029e567da90f3caa63
SHA512cf4a83a5dc0adb65741b7398dde4f12ec931754d11ddfbc3f9e1d3e20182e0213f7c8e878bff3a0a3764e99aa0ce5a44b10966502703bf25153057b63ee2c601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587270489c447d933e47d8bbe333d17d9
SHA1f3a75f3bd6c36f3b06eb93ccaee509543bdc3696
SHA256f49c950c1cd47c74cddb347c0aaf97e791010d22b5e7d1611045c7dee5e136e4
SHA5129f7bbcd2872e4ff489f676e1774c0a6ddb1d59220dbc940dca5df9871d83bae1a78e36aa235face9d4c7625789a09a8fd6e1f0a93fdcced0c05deef7fd5cd16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc457f9144e3b5d24c22e25316849186
SHA1ca70b2e6c5fbee7ff0e568603761e57828457ed3
SHA2561a7a99500c4ce573d7928d7d59dceec9c6e3da3372fc9f24a7d89224e41ad6f3
SHA51218aac749b2b7f1c56a1422c478946bbd5282ef58daabe8f3c20442ccd8b0f94039e117912fea3565a0f01ed7024dc9f1f9d221ba3eb6196eeac03c194880203e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55662c659f50cc0b27b3d7df27a0867ad
SHA1e92eca6b22272ca7f304eefebfe205ae11d76f78
SHA256b03b634792393c27aca6310033d0c1ec719064b90825fb5814fb5ba1beadc7bc
SHA5122481c14c413c6a0c697bc9e1527428cabc8727dea5826384f3744f17d98ef398c015a6b4aaec328a09a7de38d0497706059f9d532d8f0601f9bd3a7997ee662b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f227d920ddd5324077edadd8cc04c915
SHA162614853a9f26d68af7b31f4182c5fe33d672114
SHA25627a8d04cc0ac20ea8ba130dfbd0a59da655618ac5fbe2fd595c347242dd1b613
SHA512d8623e3f91395f4df914debd0e8b6777491f50241e44662ca2bbf3afd437039cc8026fe107b43a5567c6c459cca2608c3510d8db6b28402749a6a25f5037c1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315d6c97bf14e5e8a953cb5b3480ee21
SHA1044cdd94e47a4cb869000a8a3a28d68cc562e13c
SHA25666700efd3fb587157dcd80a270e0dc44058549715d73d07a7a83e256d94381b8
SHA512030d0397030d5d4fdf7eac8ce4b4fe374ee0e9bbf0335da3afb2faec5af4c37500d2139c3ebfe72941657ee10cf6f62e11044455993464aa259d71988d6219a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520cb8298924649a9596ef01e09c5d5f9
SHA1ffb1520b6abc4a2185d168bd731d6f96f947b731
SHA2569a4850ab4e9ba84ee051568880c61b7d1619a173e1b38ecddb6c86f64429f96e
SHA51297402c1afead1b5232278d6a92416549c5c2150d5d74ae3b91e4d22b6c087c0ff70d53462d73fbd696bf42ea20e621b5ca27d0f0c735e5539bbe3b50bce2ef0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f285fdd8f789f71afe4e0a0b036a6d8b
SHA1695da2c5f8a150df835be630b95ccac80b4ba45a
SHA25652d4c08f3ff5ad91529a08c7bfda7337926d106d0463c0662ea8589a59faac27
SHA51227262e161dee7e49f69b6554e0bb0b7e8bb066024d49c32b80d871627ed4a07988c479982eb8daa194ae060befeb317984472efdcb4bc5b8609aa0633959b50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589166fb5c37ebd9ca2c76005fe9f3627
SHA18b80e97a984d7b3ed568f53ae4d387530acb966c
SHA25696c5a80318b90341e8c28e506abdc4c7418d8dd4386663edb8015c89af626fbf
SHA5127c24e9e0aa6790e04e9b8670aafde233b8b9e4fdf01545a8fc0b4163debbbdfcc40ea666607340f44baf6fd277cef38132763fd85906cf968ed7188404116ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4b055ea7d5a179c1adbb6f65520191
SHA1cc8ba493c0943a1ed98a3181876c596d5bc2652f
SHA256f8af9b3414fba0c6f5c1d9b16c01a5b0847c4d8e507034f568b58012dcd01a36
SHA5121b1ba08bb5ecc531e23f47dee679cb218b48f71b27f103987f7af62fac88266849074a97f6d03f81d7b971796cafa7d37613caabb4f86aa6ce9c6904ef759cb0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b