Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
dadd2fdb1d05bddc241daf873978ace4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dadd2fdb1d05bddc241daf873978ace4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dadd2fdb1d05bddc241daf873978ace4_JaffaCakes118.html
-
Size
3KB
-
MD5
dadd2fdb1d05bddc241daf873978ace4
-
SHA1
338653c7ed3a67d47c843e1092f23896f48558a8
-
SHA256
1979bcf7d0c14901c01fb958733bfc1a47d873eb1ce6393efeca2ee6c359fbc1
-
SHA512
70cea35b08813cef6078d7ec0b899c49acc2418c76d47c604884390e32cc320e129ecb09e0ecae4edea4a4f8eab6c06e2490c5d58b196381f7ed7ef7dee32960
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432237613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50abe82e7004db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58A302B1-7063-11EF-9AA4-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000179260b7f8759282cd5f84c25dd3f03e4fcc8e3169e65b0921ca6eedf0f02710000000000e80000000020000200000009d9dd06a9ecd0158cd7c4c5d79fcbfef419d9f85cd62cd579a15374e4916111a200000002f7dd996c39016dd88f6621857246108c98ff84c7ce201aa1248911781438dcf4000000066264f13995d692b69de013c8bab5614ae6189da96d70e22b1cb4fea588423b1c27c4b963ae7fc7d01def7fcc3f7b4715cd4d0e0438b896f51ae66b11a41d73f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2456 1984 iexplore.exe 31 PID 1984 wrote to memory of 2456 1984 iexplore.exe 31 PID 1984 wrote to memory of 2456 1984 iexplore.exe 31 PID 1984 wrote to memory of 2456 1984 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dadd2fdb1d05bddc241daf873978ace4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcfd418c0efd1ce6cab3469f580bb45e
SHA1ae24227caa7363223590418c2532ed0a0c56aeeb
SHA2569f915ef6d4febb3848120b388dc0c308a37796757d35db975b6066283335d4a0
SHA5126e42869eef61db4489542a692444e751aaee27162cd318d832898f5a835717fe619593c4f90b4d859344f13783d6455b4b84f9b5d62e1f4a87f7d075e5b68883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce86f891a548cc21544f17e2db28397
SHA1c609634e7e67f10f2d114a804eedd1b1b8c3975d
SHA25696b634ee2dde59d040f18ef2d9eb0d7ab3f3a3eb6eb641a9015bd1cd92d17f79
SHA51273af7d12c4c228ee5efcd0df6409dbb41dd9718b3c4d87febbc98dcccbc0c81836734fa4f86552f16da6ad95ad17184c152e838eecdc43279ab0e07cd40b93b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea69951459dee06d37073d76c0a44a0
SHA1bc9114612cd3583823426a46c669fd11162ad915
SHA25696f93bef6e6d3cda79676d1260ae3176e97ea791d3b9a999698edc28eb832f58
SHA512fb1f25dc2e8e1a46da772e03d9f083f852815d81fdc3dcc177aaf039f95fb68a5733e06a4e2a484d2678e98dc20f0febf1a089c031aea2345fa55be16ca7968d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef11d7fbd7e4ed9af675ec286c3f9c48
SHA119d90630d15905e618b8e21193972f8a7eda7c38
SHA256256f418c0609c12abb88b29d12385783e35abffc65f088f0d4987e41051e163a
SHA5129058d261f97e3c139cd81f5c7d2ed824289bd2491c696353aa2be089e51be6f0d3beb17aef1a181307889fee119ae1da09e8bad1c7f42d49377963e54b729395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518cc43fbe26586b3fe29f351156583e5
SHA16a70c74dd8cdc162aefac5a0f36abbdb13e43321
SHA2563bc236a3635b935180f1335cedc1625984fc794d4a95d7fd3048901111de568c
SHA512fdfe2e49ac438f00691350c94ae78d3ecd6eab3948c911e225db24f7954f5d4e8e89fc337f82a6ac471d9546df1f43915377d3769269d3384db280be9a6f7ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692d5dbdbf3304e873bf224af6d5a872
SHA163d7d41d17fe5ff96c37fa4768ad2a0c35e90a10
SHA256e0d1822a9949896410f8a00fc2e9cbf5cd9acb575fb2dd43f2fd3549abbc153b
SHA5129c4a743a8b8280bdba39f974df69b0c2aa139381bb1789d450863855c55baf2c40d672789e3ed4b104beef0385ab0620bbe293219d32eedf399fb587ae645f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d93393787cbe6321b54706d976b969
SHA154124a5f357b619fcae79b9a1bd21c3b5ee5d803
SHA256b89a642306278e8f69cff95c981826c9065f3a966f15d6d90672872a9cc7f0b5
SHA512380a2a9a27690e6bdf25f09e79650aabc33a63b4e3cc7eee6d9a7f1258cc5097588f962c0c1e44bab329ef0c22decaf9814759ee7d4129dff67f84e7ed0782f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c4bc6a2f9d4ab683b3e5ea8456d8bd
SHA16d0f76053ef075ae2a2b6a7cfe9eab1ff94b912c
SHA256a0a0f35a2e2adf8724d00459b8b1c8f80971a385b58c5940d137ae0453e0c242
SHA5120591a09c8cc51b36d6e925de67f99d1002fea5f7bcef3f4f8d9e0ea2bd8be6dbfdc920d11c21edcb0628522e52471ada08489649dc31b9a0f44f578cc3cc5d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9dc4867c9f0165371e8115cc421e8a
SHA156042f34f78cde75a49c4885cbde7f988c97d527
SHA2568be934e29084b90523911d719e85bfd5ee1ef366fa8861395a0151634a644226
SHA5127d210fa9a6180f9c5cae22537a74890a336e6f8ac62ecb3bdb0f24affe5c154e76324dd23f28c38417a1948053b93346b6a4d19a88452514e3f74bf691801e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff6dbc2bbee3ae1a16d199f9bc5bf9d
SHA10f789edfe403e24350f3b05b03378a86f371735d
SHA256c01c06f13aadc4126a394ca0fcec8fcd625ef5c02a4b6afef7e49ce44a3291a3
SHA512d2660672acbd2e8ac55cf13b5104903cf440e16c4934c2062db6c9af01dd152bf9638609daf80cb6cfd6c956a105543d269ba9cd11f182f85b4ec46f3e6f4c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4fda32c1ba61964fc29475d0d67f459
SHA11de382c12bf3099b81463a016d32c4b9861d09c0
SHA256945dce932ace3488c75495fbb15f654bea1d421f03dafb104c3e9deb052ff17e
SHA512e024a76a0fb7bc65397bf488e8a3d83a78bc15b4b3accc8a715720ae7874d2088fed289f5d2eed0db10f5755c20f21eb1e7cd77f3ce0e8a2df3977333c16f50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53602036408d798a2d9e0bb6a4e8dc410
SHA10b018ac40381cae2b87dd40c04304d17c73b30f5
SHA2567e2cf1be8419a6bd499d966a40fbf7ce09a0e082a1df0cb2f1ebd1ecba73907b
SHA512ffd3275df8d7038daed8ae71cc0903fadccd3dc68a8e5b2c2b5a3712ca5b8718080f08104e85878f8cc5fafe75789449d877edbe98892e9b53343ee4429d6a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516eaad023ca1d83249e0e156b26b1795
SHA108a48282a945013c3863f775be857fdf02ad7c6d
SHA25661cc2d19da7f9d65843f89c1b9632963cac0f7d546a76dd03797f34616178374
SHA51275ecd57557a5c589fd012585b2da5136e2c26abcf7c8e077e1435eec2126f8c3f99cc55e702b8b85f6963d1ac6fcad4805388dcb0bfb000a7cacd62e2d4a7a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43bea8458a496fd8b7c2dc535781343
SHA16bc024c3e732d3f670ce71f99902799d7e4047c3
SHA2565a871975f0c7e816ad1d61b379537107f9675dc1472312645ea08427b6578f2c
SHA5121f76a6f48b0865f5c63ad2cea1057f38612b3571c8ae6e5690d91ba70a38c912cb3e413f4647ffe02604b69e62bea27eb54f474b90ccadaa230f944f09488d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24f2cd6e67b52903a8e54fa4d421976
SHA1a4507a032861985f83f154e52e1ef6a19bdb4221
SHA25611662e51a2d7b33e14e6148b5de5b1c5455955c5fd560bfb146797e0402e9a69
SHA512852c59f52497b7f189bf68d93663e57791295b0f73d504f92ddcd4d7487033d08c052e95da3adac9c73c6c9676122ff0c63f8986b58f718e4ab6feeddee1551e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bd07ed3e051e91a6c2599533285b004
SHA1f6e3d42773710ba0a0ff4ed44f535ba5781ebacc
SHA25603258b4d2a322868e0c712e3423629debf0758997d3a7da0f3665e57e7016aa7
SHA51236db6154f5b4f8aeebca8d969a5f66707820a4a2820bc01ba687d38b68dbc912201aa76fc92ca3af9b467cd1b0b38fe1de5038810659a4e42b925c6199a55b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34a24c7dd9dc9986fd8714aac09598a
SHA1172b963337b4f80e0cee7adea2c737f8e3a82c65
SHA2560cc068a9fa7d17ee906d0205062e8be156f2ba46ca534af783071e4854f375c9
SHA51235307d901c4aff17e853bc9a750e4b0f406bee00b79e1be127896906cebcb03c055d4cb4d7e1a9342d6d9762f091deb446733242a226636fb9aec31281e6e8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba08514503d83cbf56ee7734c045785
SHA11c7defd5d58eb9aa1b1bc58df7a678d50d3448c8
SHA25624ba5d49cfbbd9fc1337ec22ae498abb9a407bae53f5e6d550f82e1d77e89e77
SHA51268b07d4fabbcc90a612fdef4bd470d25b1efa96ddd3da521a69da6025b820be8694ede053b23dcfb5e805c238847d5c9f992838de032c70251fa4efe0197be86
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b