Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 08:39
Static task
static1
Behavioral task
behavioral1
Sample
d9f9c645a3241324a2db9f0a5e9542e9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9f9c645a3241324a2db9f0a5e9542e9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9f9c645a3241324a2db9f0a5e9542e9_JaffaCakes118.html
-
Size
2KB
-
MD5
d9f9c645a3241324a2db9f0a5e9542e9
-
SHA1
9dba8f32b26eb47ab3591a5290b5d97871d861ca
-
SHA256
109f3f06a6892777b13fe4740638796d68a58b567599ef04ca480cf4ae905558
-
SHA512
2cf427864b7c60d94c339d7dc59de9f72a88fbf30a01b0f80d60e05e1158f2c70f8440f56f177b1795d2657d0bc771ba1c3807c3b7c6e4bc9bde049e7c516db1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d1a8302604db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000092642f6deb9b974e4c03f2c0dcfcb30f1d4a16a965c4cb5b906ee071572bdb37000000000e8000000002000020000000bca67fabfad65add2214e23bea6b595072aef79f2bfa2035000d79c30839623e20000000146022d209c97192eb862015fa5c4ea42d10ca5a53c3cb05c1fecca210047c0540000000a22c5ed5b50ec095146384bb4ca8afbdceefaeb06a6d64a1f2507595c3c52e2b85c8e731e8f1e440967f463d5ea67051f502d15f0a903dee32508c93307b4bdf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C189941-7019-11EF-83AF-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432205836" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2820 2432 iexplore.exe 31 PID 2432 wrote to memory of 2820 2432 iexplore.exe 31 PID 2432 wrote to memory of 2820 2432 iexplore.exe 31 PID 2432 wrote to memory of 2820 2432 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9f9c645a3241324a2db9f0a5e9542e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b7509f5e25499dd2130715aab19fef
SHA19c52ff3ec34d1661cc7f1065648f7fbee6be6113
SHA2561a49cb9551796ff5796fd01b30c618e326e6e27e338bc242995e7db617303120
SHA51201e02b6cbd4092a6163781c20373152b08e0879eeb5cbcdb85985d14e921a014e71ff2256d79b398ebdb667bba9c4996102c496ace612d37d4f54662f8ef092a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6e7be433b7a982322ba959e3de8361
SHA188f194dea7297e2fe8f66e7f387b61e0382c134a
SHA256c734fc56532224689a00b13cf18dc9e3af72cb94b96da1389df9ad5e95f41fbc
SHA51251ec828093695df92cf08b662ee8ca5f056cf6967f95bf4a9f86ac5e6cc7c8d433bad9c066bb264e350be5e61f3d7e0283d9d5474046e6660db2f5986e2ba76b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f958b2c273b859d7b7764e285d5349f
SHA1caab9435c662abbc5a30d387189b052f826f6e86
SHA2560eb102a83ba65b2e8493720b61670fa5c0fe66b79c0716edd3a06c0c0dfc8e6b
SHA512baebcc8c5989f5021a26b6d50a9736ffaa671d5c9927411acede493dff0fc0e815d1a6d21268079135e187a2723a2687dc588fa05820188735a9d3ecc7de98fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f414d7ecf1b1ad452f445182846fc03c
SHA101198605e53b7bb9c8b73a71afcd01b18cc1eda2
SHA256790e0f28bd42dd72853fbcd786627ed2acdfefbad906b04e65711535227bccbb
SHA512bd4f73c49a117482551ae0c04ccf913a4685419ce4ed18ad6c8e3aa0185ccc58a6f4d5e1f8faad158a96c9ddc02b22098e58c7bc0d8ed0939d5241126e726a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51857b9691398a14f03e2d962369d1882
SHA10246bab866dc75f56663fba3c073daec81f26625
SHA256b97f90a1079d9494383a863c5b1eee100743525bab86bfddef3dcc154c137812
SHA5124d59fcc1040ece5aaaa3dd4c3613a5421df3802c340e7779c2d2829905958fc88fc0f223c15e5d7bf51b26d0e25c4e7f4fc067f7717510871d283a43713375bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb811d13401e661671cce9f2407401a
SHA1cd8922751e570e5d139db6bd39fe7111f43c8b89
SHA2567338285e9331ad5ee05317aa479bbfc8f1f37c2449460cc9545fae78d8100e27
SHA51225547f620f5067633171c4dffe5c19dce09c0aca9a134ad2f42190cc01139e7fe9ca7e96daf4f083c74dba9fa95d3054d8f5bca08ee39a67eb539aa14c56d649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5abfdfbb8ed40e2153d739c48275c7
SHA162407297681e41f86f31274b9a5ac36dd326a04f
SHA256e83715b4708459132ab2a25cfb80ba8befdd8ad187afa648f07107f28a27ae9a
SHA512a6f664211d23de6d997c84a60e5b8880c249cdd09103a8271d1184978214124b81487ff6dbcea6f9d9f6a8833ccad07c6b09f33b78723d8e9a6dfa8b532d7aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54487254f1b6478e059dd5ba0bd49b6a7
SHA1a45db94d2987dffcc52f4196da73a1c37de0c205
SHA2565b05eef68730e2ee77121555131d4aa177e0a62bc78c0d84bfe04f0847be479b
SHA51203389c1e46e406fd9430a9cc807444468cd081b73698c26d88166e74d436880bdf91221ff98c08c47a45d8500435622d9cc7db1f11f628612d1f705134970843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59461a7ec24b9fb6c8271c0c2056a40be
SHA1e107077a1c24cdeecb560281904bc488db0034bc
SHA256a12e7a0ae6dd5d48a4c43bff08579820f65ef1162a6b39d83baa732fc405de85
SHA512b0a6eba28bae14891ce5c68e6d8d898ab6e9ca94356dce747adbc2cbc25ecf02b3e32087c86fb2ba39c594120db9df95a49268244e35e3308df003b8b748c29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56148352d6ed65c4ba12c51d911905210
SHA1c3f5f289e93be19b09f7ce1dc9f04648395f0db9
SHA2562baf86e9d498d2b2da124337863e22704b1d9245aac026e5715b3f92bebabed4
SHA512f22eecf095135524ca157280f31fee52e775706c920ea9f492de2f2635cbf1d4bf0bf61e7f7a1d82f359b9267e99bac9b8a7eb00b7afdf472a3eb0f0d7f94c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417f792e1659fc86543d6793f0db33ff
SHA1f792cd73c63fafe3b71d0845414ffe83e9c3da11
SHA256bf261af191797e8ec3b928fdced762dc9a2d3dfce2d7a4c1e2e833670417eb37
SHA51217f2b9c80b8421b4c8937e18afeab9afb6ae4e9d69546c55a4d9cb3d1ef36faf87b29188abd80c96724c1a447cd70396b4288358fe093be2445da964e1605c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21468a9abe9bf29bd4e17a2211586f0
SHA128ddab0e769a55494a529eab7180a20fb838ac7b
SHA256884cf38918354e7b8afe84823fa93492e4f6b1e19fd94c635f6812592260dd82
SHA512c8e9a4a2c4e486e492abf95e212ac0dda97080aa8a09c884b37e04b5e2f60ae15a3934f8086bea23fa5566accd257390ba77768ff280371332e3cc98d62dad9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297b3dc7defc20dcc210431dfbff13df
SHA10f7b4e5fc2aecc24b426ea054e8cf2a2dd804859
SHA2565d6a0b7a71e249e078bff2c78ffac01e8f8af91f2263fd5712d9023dfa3fba24
SHA512d422a5618f4f458ce18bbf83fbab8db6caeb06b528e7f5d9525c10c7a63e424710b9910fdb709772b52370becd7a706c40bfd6d629f143f68e6e6039bca70e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18660f1c6cafad21bb7b90e9515adec
SHA1e152be5c28a14eb8d2a8351b9ac66cbbd499390b
SHA25634b24919dc9e9c6dd636d8d80cf69515a4dfe2153172e154c658fde11c765c03
SHA512c47f0bb35932d5ccb819e12f5b4a7d0c583571a534ed58b8e03791fd944dc1c546a515eeda25e4a8ba1d07ba7d817e2eecffdc7a02f43266f5e4bfb98d1e505d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b605a2fd080db36fe7088a92ef54e826
SHA17d9e963e12a522da043eafbb79870003e431c481
SHA256302afa3dd891e0ae9c90cf9d894bc959eeb2b9af4cef3df90109e61bdf8ac774
SHA512cd2f76770d3195c94fb1c5fc067891831a0e566e7bdbd1d07be1e9e230549e357addec473d00a4de284ae23037767da9925a7fdf04db9d6e893db9c1e37d3f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd513522ee39736aaadf44cf0e2b8af
SHA1bf544510b581a8f485b835cdd0d6c6fbf084ea30
SHA256f44d5f4a64aed090ebd58d51027c9df06341683b1141766a70dc7dbf0ac71c4f
SHA5129b396c13a6224c67a4d8618de6fb3500eb475f9854b3d2893c9d924a3cafe7931cd403c9b6fc45352dea8b544840d355d3dbbc78b154298522ff289e2b3b6320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0e2cfa8f43aee0d2f2d3c19e82aeb5
SHA12895dd4371820cfbfda35c2f3d39754b9aa03117
SHA256f99c712d6345e0ff3dfa2f8dd37daca191b24fcf39eb67ef7bcc079e62eb6c4a
SHA512d81cbdb57a15164dfbb43bcc6e5adbb6867fa3957b9a8de0c967673e3ea732ed0512a554c73ece19c51aee97d3e766c2675c2cefb594c701b049da26d8c17cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b799388d4cdf3eb61bb36cfc345c4e4d
SHA1bb41b156a6f19b6440952bcc3b87ab7be1b7ad82
SHA25618c381863216dce6feb4c5633832acb8b1e986dc678532ccaa23b13411d20f7b
SHA512101b3705b18d926df679d9aedf9d0d144870632795e5e6f893677ba98bcd70145f2e2450e000128c0f4674956dd07cdb97a498212ec5898d4916086289cdf416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af02544cbe4df783ec0ef3c79b892407
SHA1a686fff18dd6e62598b9a69eb89221fec6bef884
SHA2565dce7a423e3afc2cb0ecca0143153bce8262032e230c3b755294429140b37cc5
SHA51243a29f1a74737ae76cf69a41e037432d792496ac829637439f19df5e7b5418539897ececfee0c092dcf03dd681c1c867d47ab98cbb038ef2ad5a9ed571d60392
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b