Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
da86e19b54634f0222d363f7ab4f1fea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da86e19b54634f0222d363f7ab4f1fea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da86e19b54634f0222d363f7ab4f1fea_JaffaCakes118.html
-
Size
3KB
-
MD5
da86e19b54634f0222d363f7ab4f1fea
-
SHA1
2222f157f6e6fdc11d7ad8c5a0bdbba424de5c64
-
SHA256
759a4dc2cd4c2d322ddad51618b29043a1c41cd8d0551450329e4973bab37884
-
SHA512
06eb3c6b312bf02fdd5ad6f085276374880cca60e0c9f3f08fd219487ad554aa845583142fe4a91fcc8961e410e676a7d45c40279ad37f2ccbb779b9e4fae02e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c3e7c15031398310892ac8705aab36c75d8d0c85504b8afd9eaca9bc4d1e42c6000000000e80000000020000200000006b22dec8c121bdc2b33866371fa28b0fbb0aecb8ed2c5b2e7ef687a00f311a1a20000000808058855dadc77f41394677dd0d761df667430b26430876c25837282ef1860b400000001fa308f341014030a8e19f8993b705faf8cf8bcc6fd8f563229c19ac882b2ca30ee3d44d4794ac62c9bd35e08e4766f49ff895f6d36005190fa53cacff82f4f3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0477e4b5504db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432226067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74E779D1-7048-11EF-809B-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2264 2148 iexplore.exe 30 PID 2148 wrote to memory of 2264 2148 iexplore.exe 30 PID 2148 wrote to memory of 2264 2148 iexplore.exe 30 PID 2148 wrote to memory of 2264 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da86e19b54634f0222d363f7ab4f1fea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18a5e4a46254c23668394598da16ed8
SHA14e429d343ea71ee569485250c67d526e124b6f37
SHA2563fd454b24f015da90cccb09f65c82d19693824cb979b4727ee3bd6ea4f02869b
SHA512bd50b4c93d19c2b47fada25ce9277bfe32384e9fb9b2e0cf495ee22af977036730f065b82a275ca1f930fdc6ca9b2f46e8b3e45e8a615631a61ae1b3bfe54a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ef3a38f5af0cc8e99cde11e2c06240
SHA1835ca547ea360983d29c54bb8b5d80204af7ff95
SHA25699b1f19528c4f132d51eb43843ac6f0b04467e6466fd6d2d69f5fbf00d6d7139
SHA512d15d33e0f2fec6f8cf8cd324d1e3e892af265434365574a0e6c484e4f1e89b891d0c06f0b610f563a7f22c1c1a5cd5480d41aa2497fe57373f7996f73e310516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a569650464ef1da1c07feb4f8290f7
SHA16ec66caed8fb1a4b7dd5aa6b30d30fa3a9c2207e
SHA256d71167cc36e48352ba99bc9ff23a64b8edc88aa2e861781be51fa94e353cf9cf
SHA512ce92c90429e5d7cb1e1437ccd50e79cdd569c8be7514914df76aeb3d6049ef74ee9946d3c6aa837b313d78849d4615bb38bf3554adcc8f30c114b9f7aef9f5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573eb31f2f291f1ce79aff17199a671f7
SHA1eee08ab5e1ad6265c8b912baf06602403dd096ff
SHA2560f20d73512f0471022248b55ae11214b2a7844e0c287c2f080eab3cf3dc89ed0
SHA5129b71c3fdbcaf45d2da275a75f4f01dc18d7a7d53f550df239d2742ad7f2241315b4f3cbaac48de5aa09e59e240f2016755fed53f4528331184d0a00302b3e1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464daa14e87f86e3306f9c1754fc7ec4
SHA13d4e344bfc20ba3cbce64795ae458e1ead0d804a
SHA25644174646d9130282bfc0b58143cf7af1a5bf020688a14bfd4b58136d1256f1dd
SHA5126c8a19ef2b8863e1d318bdca6e836343a034478869413a062ea91733d08d00d8d52c31ee6b6159829d928dc9e7e95732267c6096d9b10c4d1ea0bc6c0d484adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657a582bf9c550fa93a038457ec0e02e
SHA153a86b4a4bbf5fd9749265006206d4072393e4da
SHA256eb4ab1881e2429e5d0152487e546cd3f61327562383c1763ad3834fe5f020a06
SHA512222e2ae5c321fa0e61026920e4b9fdeb8c9a92d1eb620a596d8aee274f485eeeff343db0988ca032f4caeca540b4afc87cc54566869d08fc5aa832a2486e7885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ec848c4f4763e6713b136ec4c3f16a
SHA15179fa8a7c00d60f3f74a3afcb5703eb92bd6b28
SHA256f095f11209caa1aaf59eec9836a142ce6d380e6c7a88e6841827aee03b5d9339
SHA51268cb041375975a0af100b95967c4360741dc28a2b990668ea75f643f5135274f1dbfbeac1845af0255d0634e7b8a71f2612153b00cd54229812734940b4b21f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6abc6913eb97f240e0b45ee3a626f37
SHA1292a13d8146e3b62a82a853db176d737b21c45a8
SHA256a8ea3f2dd33dde2ce342acd75af6dd2b4b2ef4afcc46fd4a63b0b9657da3f1f1
SHA5128b5996dae0c6124436891fd42e357fef7357cbdc48dbfe8c92d800864c14e51a8bc632e6eb144ea20b7f05f6975a47b22946b6685773bf471d552cc8b6682196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7506980aa8e96d2b3121268daf064b
SHA19b9bdd4a66616bce2d8b7731f6a8b4428e0e35ba
SHA2564eb85c3566b5ac8f06a76237c7d81619c70eafe3a674e93cbf384466e52c1e55
SHA512f8a43db0c7fcff577d4de4373f3c2188f631429a23824d6d46df6238518838acc81378bfbe79ef54425951e4c10c9cb44a01838f5a6ee4ef3728e89db7ae2f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e5c039e9a7a5d5870d53549c3957b9a
SHA15408d404aa437ffb20e0a67cc1053d9b401917ed
SHA256f5d69c9cec4dd59b1d2da6960b36d8506ca2784364217b41b680c780e9224bf0
SHA512e60baf0574a165d3497f3b9ccab297215c49804a4add857c74d943ef0274ab913fc2a3de9ce46f78bc3ccc1543dee472a95435463cad5314c7ad0b961670dc37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c728b74204c4d14ed247f7ecaf11f0
SHA1036bc8ead8ab8792a5332fd598adec1b6477d91b
SHA256490248535554fe3be96c99e3edbec79f622142db06391ed5ae812e414e18dda2
SHA51219ad57fcf3513512b5e09990b65c1981dd27160ba848eff72c4fbf7bb123ee6a778a13b1b0b8f7c184bbc338a7757949b2a12a406783507234574b15f1057b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f033e10ef700b6f7516cf87864e4c22
SHA17a3bde3c1c0ba0b00b6b6078a9f98dd1621860c5
SHA2568ddeba7410f5807484245dccea04cec3eb8e77b1835facfdaf5d07e8698b4292
SHA512ae0eb1e34b401d48510301e25bba6ed580da3373906a43fb90518cd0eadb6f85c82d92dda336b47e0211a66bf336f9c50bc7ff2ed94d50e9d86a22509fb9b819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa8bf1e5ce86779aca752616994ba1a
SHA13af4e97c84fa6e6fb94601289240e39ec038885f
SHA2568f535e148d06a6504114f593fba578563e4579b0cd0fe3eb0bb2b2699d9f891a
SHA512e71616210974543e7599f327b3028acfd3b49df702c71639c2bc38d3de3ddfffa178b8b9182df51abd9d5334282835a2992bc94e790dd84591ee4700072791d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55413a5b27481cca15ea45593aa62c2e6
SHA172b9fffd20dbcab5f112409ba4c24bd6fc524490
SHA25601ab990c8fd283c8bccdac1e66221fabed2de5e3283a8f591f228453bf990a3b
SHA5123dba6629c53a9f7307b3e669241390abfd4f771474a5a734c21c3d2011dc1df9d0fc62d194c5c0c0d0ed87caeed9ea838b474a963ec3f8a96b699eac92c6cf5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa59355fa7791a745a19c4a030d435a
SHA13f2d83dfbbe0bcbcb67e554c70b51b04b9c5b6f1
SHA2563a83b2c08467b4b206cb3c2a0441c345d3ef06435f12201ac8ed846487ad8d45
SHA512d6073a6a21977140c4cebc5a334d793e6591f47356c1fb342352feb24ce00cdcb036faa84005e5fff12f13dd02ea9ecdc1c1fcaf7615aaa619ec6795f20a1f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f9a73eafa0ddf24b5d468b5efa87df
SHA1f4de36e10d6be1fcc1b2996110f57dc49ed9f071
SHA2563dd83cf924489b4d5f0f63a0417785059b19b97c6aa4ec7030903b55bc472486
SHA5127c17fccc93a298914a649e2480a924e9a98a3d40b94f14b32cc553e80bd34776cb3a29795573af92c2a49c8d55f19bd388536efde17bb1f32365d52a279bb55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464b9a5b7ed5a5aa720801b5f09d7b23
SHA1127e12def6f0993b1006a7f9edf9ee363e0cbfb3
SHA2561ba85bca056ba931617ac3798abef0aa0d8920859a5c35061f5fac8e557088ba
SHA5127e8ba94e273d58ff68fd38e464467f1dba55e92f20846c66a3e27d028903f5a23ea753df165dfe511341e3e64a820a04b98ca160417905291933e9d406990f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b3f554ec465791c21dfacb867824d9
SHA134291e46c7b5338810d911fb59984c5f9742bed4
SHA2567fc7431e87e97ad0e3dde1fab1e76d32fdf9cb17ca6532c92e1c613e04d69bca
SHA5123690db5aff8635f6d3c640095531acc2f34c62ad73833ad7f10bb3273aa8c374385b65fd6690f74df775ba71886dc403b2cc55f3bdb7d5b1c4cffddfbcacb994
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b