Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 23:28
Static task
static1
Behavioral task
behavioral1
Sample
df1771b3f254443fc6d2ee281fd62f9d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df1771b3f254443fc6d2ee281fd62f9d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df1771b3f254443fc6d2ee281fd62f9d_JaffaCakes118.html
-
Size
204B
-
MD5
df1771b3f254443fc6d2ee281fd62f9d
-
SHA1
d1ca7c67e11d49ad659e2b2a7722eea2da15d00d
-
SHA256
1251b060032f93668230f8d9fd666288e8de6339a7106eacca8765c54a6c5227
-
SHA512
f447c0f0204c01100e0598410ce19cc9105e4ff9f7d8527571ebb9a370c7eef0279c67190d945bc3bbf552a0c47854b768adb7842046de1d5692e2ae31f5cc2a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000054cba18355b5b7ef4509ac58fea6bfd8cf091f4cec3639ba1b30e7261bb2f50d000000000e80000000020000200000005680af5593c20a9572b58e74113c4711dd3da1430a57b94b8f61847e789e851c20000000c6684213d12ad36a76a04a82cbfd6353130d9cd7581f3db02c06d9b8aa6b178a40000000ca36883b4dfe382f6990aa2105b1eb54c422c85629c0afce4bf3ad4ed2af7803349465f400c4985cf72a52dce7efda2d1017e2d4694650a7f8599fe293731838 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432432008" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5089fac83406db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F47DF851-7227-11EF-9982-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2712 2028 iexplore.exe 30 PID 2028 wrote to memory of 2712 2028 iexplore.exe 30 PID 2028 wrote to memory of 2712 2028 iexplore.exe 30 PID 2028 wrote to memory of 2712 2028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df1771b3f254443fc6d2ee281fd62f9d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50452e1100cbb90ba9fb84ca2c8f557fc
SHA11e65ef9ff2200bb98ef4e017020b298f4388bf20
SHA25693d19d2f6cb7c68a6f218492b1b21081acd0b72a0c01c16a3ffe3379e32d5ede
SHA512682e198be6f6fc6b0afefc8f2546aba04786ab47403b34ea8aee0220365965c230c332a23d3e122bb6dfa39dc3f21e35dfc238b439b0f25ffe074d69a91885bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df33c8d09f649d6b8be965dbe530fb9b
SHA188102dd97cffaa30198a290145520cc03d04d653
SHA2562f27980a1705c34b68027de5d21b7ff9fefcb4589aa5b92668d3dafb6d5e8d87
SHA5121f75c764116e01e88504b083d01b409ba7bdbd1386b601013880248bcf86f2adccb8e64b1cf1755c71a3fa7ea0d44dfcf3c5cb7a229b6b9ce1ded21338d22a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203e8242027426a0f9048741b3bec223
SHA138fa7692ee40b889a79372974c98bdc2b10c7eac
SHA25649745fb8858faa0d88110476dcbd87c4fb4419ce93fb2212e4dd2d9473526ae0
SHA5128d35f3bc587c7f2885328531964776ae2fef7bc432127c87617107aa51e390681ce4f90af4f75ebbc6ba2b569960f5506952c0d6fa79b538918bed91922e4d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d2b2a7640c1980b65d2677fd7a89d0
SHA150b55d9f3ae994c5d2f057f9cc8e1e81aeaf9579
SHA2564a9d76cd6c07406881a739ca67464c189b72c07effcd27acb99e4b9eb2e20e0f
SHA5120db52a6b9b25f283f0a1ccaeb4311368e503ccbd9ff9d86ee620fcbdec6bfafb121015224d704218df11f39fa2df98c85b737bcae4bafaae39129816ced569d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc29f1f32d3c2e002d3cde99b6602eb
SHA1663bb2ecde09b450923f3565c7801e2a552b0b3f
SHA256d0f759dc83764a08819196edddbcee26bfc9975b2a989bdd9b8bad9294c153e3
SHA512b9bbc1be80d342ee42d4bd33c7951e1bbd7856c42974700207abbb9626343d3c66300918ab21b16754f490e7fa86166ba16942816fbb61c162fe2fd77c99a2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006d2a26502f84ee04dc81df6b41272d
SHA173270e8d6fd935e2e3d1848a6a80eeee3ca12203
SHA2569138dfbab9d897057c16364bef63e3a9e0d605bf3ef84986b9e9ad47e461fe5c
SHA512b836a914f5a19ac4fd4797255c149725be2491bba035f3a731586e3259446f27276e21140cbe97fde110b7a91d36570437f341484c2a379be655867ea65f9714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf6b4e69f0273f40864c0d4e5ad6c79
SHA10434b5b59f08c0db82356735906114d99298b121
SHA2562f929b86e1e29142f2ad652ac14ca09388e48073ee2798b6147e172ae9f145e8
SHA512108080b6e0d10522bb23217e236d7206bb021e55c804950b46693b40feb5f3d0225547b9b7f244d7845864819cc489c25ad3456376ea51671152befaf6b45022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f803d0767941fc6bbfc78d1f196cdb47
SHA1ea6ee09d935e46ab4e0664d9b5906c448347c812
SHA256d7281a97413b2a930d1e0850a2c722f9a8fff4b437d64077299075317dfa608a
SHA512cb0f6abcf7929be6875f3c582e62af35209d5bdf0478ee60250797a71f070efdf69778c48f261abeb7ab877ad828e009a64f2e6408d0b4b027a3a678f4ed5a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef9d436b90951950c876faf320f93f8
SHA14ff25004b53f2a3edccdd5050c8f54c3d0cd7937
SHA25692035c04c9eb6c36231f3147d42ead6ffe067c4eb02a04a09cd1fb3c18939c9b
SHA512fddda968af42cde65a43350e1b8c4a26a957019e7307d4cbcdc2199b473b1892eda51d5e38c6e1c2de34846926a314d3aaf9ee9c23e98fd2f1e49d189b38551a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a264142442390deb868e217e5a3b2f3
SHA152ac37b4be093c3fd53733809e4000c5cc924238
SHA25688e726134a9e9e0fae6d23132ade834c249b3c37cfcd596807219fefefa8177a
SHA5128f591709147f971229d0c10e0054564873d6795e29d0c8001700dd792605c3662289295d1baa4786c9ec28a1f445a781c3258b16379c4f1970453111f59e5846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573df0883e0f4849c1c8348e5e6e44223
SHA1e501a2013c953f82f76b7b1a954bc5ad5069ffc6
SHA256845ae15c964ad88c24b2b5c001d1646fb838a46b88078c94ea9987b648c8f932
SHA512a3b315d9f515125fbac1c1308a49b37cc2964e2275db2d548a721c7cbd4182899b2b5e90bf181d3e429c72f079f48df32cbc13e41872c35814f5a648c8733b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555962a71f0736f2d2c9b37453cf8870c
SHA1b69c41b90b5909189b85fc6ebaefae74fc9f4a9f
SHA2569738368d4a843a28ca3c173dae42739e2936bf770bd50f522a14236be8ac4098
SHA5122f3b0a4350e917b9254c198552497d1c1e2c980354bfddd4ba21d76ef5018243c47051b892a7733df3f01c9b5cb196c4dca7715061a14ddc387162ee3232734d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b58fb85ec6b99b3ca06611d5a39874b
SHA1b28c33aac0bdce424d120279fa6770ca16a32a99
SHA256e070f28efeddaf4ef8294d05a1d087a146c4a5c53c2b408cdfd60180fb70503a
SHA512bead78bbf796850a91de50134c0cad780691cabe6ce600bd3d17d1bde367ef6cfb268dabada0feb7c3d9c020717ba44277b24debe40b31f2b5ce752dd2842613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef0fae2950039c796a9382f4fc8cc47
SHA11bd08c957c7286f095fddb0355cf97c274c2daf4
SHA256ea3eaaa1f05d4da677491b2c3989fb72e70d2c7b5a4665d035f614b494e6e42f
SHA51276cf42d97f134a26be05a1b823fc73a1844820d47585c97426fa7bede3437cb853db64e39a5cdf0d6c2fd557170c157b63e9609a6103a66c01be9e1e78932ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572aa339714b6346994e62631e780a9b6
SHA13da143117270516c6a6decfbb974eeea5d8ef6f1
SHA256f82a1f03fac2f469caa602322cdf9e09224d0eee8422560a5e8824ba964a1040
SHA5121adc85fa632d38a5a98adcd71ac283b879ce502cf32327dacf9d027e82dbdef90c5a698fb182aca3c3ffa77664a57a595a4fe05f172d3c578113a010beb7e788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af15d4368d22147f2a2cc7e8bfd6c93
SHA157805ef1bcaff6dcfcfb51009207e3693c925d7f
SHA2561c399f7dcb2696c4dbc66f52e1e173cdfb8d7c42a42b5a12ce1f92cb59e572a7
SHA5127dfb617c9be1eafef51b59183306ca65b0b00cc57caf8c5b399878b3b9ef956ab8572ddf86ab31d0b5b118d7a10921e4b2bb582941e612f9f5204dfefb6bd86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d14eceb888c56b7a5fd49204a45c035
SHA1c9cee1810be809b5ba66fce46a4ff8eec1360836
SHA2561d59ad997cf20a84ba97226fd7af5d412cb37f57ab908118f95a23d7a55c5cea
SHA51272719bbec118d3619612bf8be57dae33851fda12d09ea5a5b75aab8a5fec31134b489030b55332f6980ed9cff190258d42cc966a6c8b132a53ba52b6cedd5949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f203ddfd17424d3582fcd162aa877cf0
SHA1a0c3e3210bdb0e1ab028fb29b5318c5ab7ccabe7
SHA256f5ab156fa1ce6b325b87d89c2c108f2dc308c2a936fd09694166004f1cfc9f0f
SHA51257513de3f554fe3454ea34b214c71b4fd74c3146ce8f1b9fe22aa674f20d91e793e84487665506b0a92d9bb1dc8f50cc739f97ce356e60247afa6e18e4a82d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5b566deb64d93fb88bcad72df4ab62
SHA1b282b85e56896e68e262527f5eb0808cb3b33207
SHA256fb19ea0c4e9b8efcd51b2efadb671b923cde905e7c1ffbdc625952a664e5c6c6
SHA512898ee5cd6f404d5dfe758e744cef3a752e11574cfbbc42029e10ea9f7b1a53517f06bbc4e38f49ace3718acebc72c7b5275421fa66eed28521e6189af107f3ce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b