Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
da2f42f02902e82b20b440072dedacdd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da2f42f02902e82b20b440072dedacdd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da2f42f02902e82b20b440072dedacdd_JaffaCakes118.html
-
Size
3KB
-
MD5
da2f42f02902e82b20b440072dedacdd
-
SHA1
aa78d28bfa32ac659f209628f6d2f2d0e642dff0
-
SHA256
70be015392a4bbd2890e6ffb715006839e1f932754d8575f4d571283bcaff37d
-
SHA512
a74a148f0a17152ba8a80fc70790609395f4f3a6fd8919180bac9cdb11c80c87e944de83d0e3c876b03bdadaef30e7002ecd595d019addc88e886b5e8f58a632
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000481cebd61a7c87dc16ee15d79fa6f614ac5f444e44cd5a6aa957926706e4f5ba000000000e800000000200002000000023d2b1afa5d8bcd356dd8494ed86b4b0c70591859625d5cfbbfd99404a4fa4b820000000e881747c5040dedf19dccdcf5a127809affa0d508649c3655987102bb5eb945140000000ad69cbfcbc096856e77b234c0064f3bd9ad877f938cbbe292f40fa723ab93401fb8aa87a1801c1b444610ab0007706ca530a25a25b45058e07ea2b9c3949afe1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432213905" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24FF5D51-702C-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906ed4f93804db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2748 2552 iexplore.exe 28 PID 2552 wrote to memory of 2748 2552 iexplore.exe 28 PID 2552 wrote to memory of 2748 2552 iexplore.exe 28 PID 2552 wrote to memory of 2748 2552 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da2f42f02902e82b20b440072dedacdd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff194e30dc7ad11e56f03a6f98b20430
SHA132cee04304fbc154b991e34a3c24914dc544b292
SHA256e7d247d245c34460481e0f2cc0193d9e1bc614f73f80a45b651102c1c75487ff
SHA5125254a143fc6eff770fdd6a3011818dd7d61f5417a2554732a5a32bfcdd66e4279cc6e574545b05af2dee3e7ee640432fc045b313f4ddbede2d39db8ddd9c6258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adaa2e0b1524178aac41a63e818500db
SHA100c31ea4d087c96ec2a29189146d0c0935e0bb97
SHA25662a64de0fc04d5bf69c99e58dd1ec2a48515662f9cd4736b60fff5d27ac534f1
SHA51292826fc53b2edaa5a357391808ce4b9cf56436b7ec5d2f8e917547f4475e18978a3cdb2f769ffbfcd30d2e39a952aec9cc9864c97f70054b6431a141fccece00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d2d7f22aa00a77f65952ba268588d1
SHA162fcf01c6d946bd952964960453ebcd45257806d
SHA256eb7a833b86cc0138dc5886e863bf13022ae0d2baf6f95f15b7958dc957194f91
SHA5128f6ddf395075f85badb28b2d4427f4c6803bc7cdeac597510a3b02ad70c676b4f48369aca3a59f177196605c827b45717eee8d901e6380abc7f5dcceb74c8611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332ed68f9252e0449c0760f21f388c1b
SHA1bd2de56732e42ae718dc4f5a3aa6d836ed99f531
SHA2567183337384e30bd4a46a0d4150771b0ea0a764c3737218d3a725ec97b2c8d757
SHA5128ea419cf5a54148a62763c6c52a5da959441f3bcfe8cdc49aac57e28a8b7f04d5a2352c410099ff7dff6411a96a855040352ae038cc9f99db710ba5378a76fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a427e255e8969d0fae49eb7d1ac7ec4d
SHA178a04b3dcadb3e38d4faf1588532703efafd51f5
SHA256542157d925d96f189953366554105c680307de05cd79e73365524186f33a1b0f
SHA5122a3be3c8f3f33eca2d76c8fd21b14797bb307a88201f399b7bbf544c984cb3dc849dec24fe919c06fc41ffab25e3d5a627a515d83ce51c5947bb9b113fe08807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d6a2ccf2fd71cc0e03e135afd4b27b
SHA1a4a2f0a34f00100bbb19ef69f9f634fafaa2c483
SHA256e85cb4f522b3da9b9928b485c41918c148a4ced19663bfb211fc1a55adbd989a
SHA512bb37acd7b296cda92143298f0a0a102519f2321fb406e0eac254dc2a9346eaaee53a7ef7348eca6ba41aef0894be355a390d83cedb4de5aabd137c77d43454ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcaab48433d014b038fa9d96bb9ce0fb
SHA18ed11a63806f610393540c7a94d9788588c06d5c
SHA256eb8fc556db93210991643714ebd360ac28175f2138331a096812677ca1c4eee6
SHA512d5120aabf7cc61f4f71e018753fb770353479c1f22397cfe23ad830c2711b3731c24fd01184e122fb6fe2c5a6af41fddd3f94d39ffb5e7a3f70b155cea62930a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d76199ef95431ed6340f0e8b9724c76
SHA13cfa9e1c4874d5f1e59b5240674059267e8a1ec9
SHA2566894a426ebc1c976c2ceee8e54a300af55dd5f761849188e607732ad13d3475e
SHA512f7b376f5b75f7f4a8abd376a05dfa36a3ca1e1a8d424bcee102ee76624fa0b0e16c34d42de960b2456fd609c741c7d87298431e87e502764c1624b4ed564c962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ccda664ef3b9039cb2290160ee7f93
SHA1f464e85b51ad8e85a930e338d99ac82d3d848aa5
SHA2561553adc36b67eab896df749399adfe276db7a3bad8caaa37bf55bc84213bd9d1
SHA5124095d2f52f062ecf8837f52683cdc3947b5937262576a247af772178cab7f90263936228a1cb68eb77c96731cf3e8e7a8ec4aa0d2d3d905626aba1169eaa17f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7d25f6a8e3ca69c123b3a458989ea8
SHA11b15156901bbeebc75d119e2162d5b49bc6cc2b2
SHA25636815ac9628233cc73ca600e4f77358ab1b30ed63db57571906074e0dc0d8cd6
SHA512ab6d6ddfacbe5c2c88b5cc5af0db13af2aa8482e6c49c2a35497318beb414ae46668b71d5bb490669400183bc71450d97badcc8890b4b4e29e8c8e783eb0a274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e136a9f588db20f5879e07bc6947ba
SHA13184e5a776b389bce1b13823b872c3080ff74b19
SHA256cc1743ababf59fe07f386cc7eb9c3246af217d9e412fbbc395c6c7d953f6b495
SHA512120232391c8c32a2914ee975e9cea6b0d4649bbe3af3758d06719c273cb460617d933790359660b59a08f87ce1c98c32e4ae21e6516ecb32268e2bad74fe2be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994c1a2d871031b7dce850ddd2482ab1
SHA1e4ba8e3724091dec3c0092774649eccb2c592048
SHA256b67ad372ac68739bddab2dfedd342e95fc01b83027076ca31061edbaf417f7d8
SHA5123e938abeb9dda0f2ebce397cb422f2c2391e43d17b3b6cf54ff7a4e2f7fb8c3c73ce1bd7356020083167e767c7957ebe56d088e27ffbe189950e149138ee3d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e4bddc152bac55ca4a2c4993cb0605
SHA151cc6f13646fee867617879f630ffad1b1991a35
SHA25674cc2eef8f3d173a73934a12bc72c5a31dcd99fc097bc51a9588f887e32392ff
SHA512f2a6eb11d9220942c8104339a8791f9da3a7694b201e0160a1d8510cbecf0057aa504b9b66984fd728606f2fd468c95f9313e6cbe3fb414dbdc3fc961e9fd212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77750701ab7a9fa174de29d40b54bd5
SHA1e03fd8bbc6ae80352f2b1cb9b82668f27f1fb03c
SHA256e209bb4532e86de15a5c8c0a0b5de9b34a35911f1484d0139e6534d39789e795
SHA5120a6d7f5ecaa9e788a2d998ea90ae050d0d1a6f1afd72e3edda2580cfd404d7b77f60e02b51360ca89536bc95a43ddb80105b1c7272c79a65e468d008a9fd8f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f4e5048ce6086bb47b8c07e316ff2e
SHA164d5a2d200d32233b7349c43f02015091d14130b
SHA2563c577ea9f12acc922a8769b7bda9ae76c5192361317d0beceecc37ef8c8f55bf
SHA51293be52b5bf338f404de93fbe1f0c10ee266fa74a34eff0c409420fa6bf1a60819c9449f0f7cc4d27dcb9349b7e3390dbe4910a86915550933328039a21e80a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d8a8541b94488d055ddfde4a2523a4
SHA10446482e47fa6ffca767ca5de1ef358a7fec0616
SHA2564812f0f76ecb733dd66105264b7495ed5b9a11d974873774d6b9cc1cb89c73e4
SHA512e0b93c3ddcc05a0902b595254546411da537e5615a1b0158e95206b6bd74058e2020204f17ab19f51514691c641c1a62b2b9bfa3c53ef017af319319dc1efe36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6b3d197ea796bf4b7bf242d7bebeb5
SHA12c2c47295f499c6f94c803abb8ce83fc04926ee9
SHA256680f09c3409e9595b55ee281a4847137bbe169c11da9893a753bd4cf8ceed4a6
SHA51244dc4e7f7eb585d61d0a878c60ce600624a97b67c4ad39e5ac0b0c2469669559c63362238a7f11673e6c9a0cfbfa7443d44cace6d28a300bae1264d547e301e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999745837677dc7d436fd022459e7614
SHA1c680b6ff212e8fa59938211ef2aa30d5d6053b75
SHA2560b0a562a41351321f36c5eac9fc09a4f02cc256c25f1fdcfdb54c0cc79002028
SHA512bf3adc369979566cc4ebe3f9dd63b249eb42dc177230840b94f7732ddd31d1a18e875d0df4db92e5c72b4264e297d8188c5ebf016d8c1f3c8a0a49980dabf875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e9be49f22aaf5de47ee62fb52045d3
SHA14805d6b5fc6b878a81459d24f07613cc450ba22c
SHA256d4397e18f8f8c1a25e5fdf3c1eb5b6d3e86733c5b098f0ec4eebc465e8147c38
SHA512bc2a0e949ee0ce127caf487711a82e91b3d35ab7f8aa810cb79ddae12c89230c82f90da505bc256bc79015dfe39ac2bc6b7cafaa044c585a8998d5ddf1c6bb2a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b