Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 07:58
Static task
static1
Behavioral task
behavioral1
Sample
de012a789bcd9d9f51406ac8437d5f10_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de012a789bcd9d9f51406ac8437d5f10_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de012a789bcd9d9f51406ac8437d5f10_JaffaCakes118.html
-
Size
3KB
-
MD5
de012a789bcd9d9f51406ac8437d5f10
-
SHA1
b3c9f7416346f974e18461c18c21fa041fdd9aef
-
SHA256
5f9a839b6e949e5b68a49f0b4a67d0289ec206f022362cb5f7f5f07b37055a10
-
SHA512
e483a1c244ccb19f121d1307e2e853d0a761e79b618c635203d32ba3604bebd1ac24f95168961527784c4b3de5e34f5a5495cc8935682da9f066ee86a0dc0053
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007da4d0b205db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432376187" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB35CBA1-71A5-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000901172a6147bf4bd6045fd70e339e221538c643e5e2d110181a7396cfdca2d35000000000e8000000002000020000000778c86c338bf69daea20f98f58b4891e9b3ae64e7877a485ab391537b38a6de220000000a70eb11b2bb99aa56072043ce1271a20b5e1afb024aebdfd9b5180ab068070f840000000f6c5be899cd358c73a3940725f144270f46d8f466c5b016d135492332801316bff7434622e49c12a70c7582a6f17f39a17065f293ada7b5b1d10925b1e0f3f68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2764 2068 iexplore.exe 29 PID 2068 wrote to memory of 2764 2068 iexplore.exe 29 PID 2068 wrote to memory of 2764 2068 iexplore.exe 29 PID 2068 wrote to memory of 2764 2068 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de012a789bcd9d9f51406ac8437d5f10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504676865251655613dc9094de4515534
SHA1d37871c7963ec92f6b7287f876b54f84abc8a3a2
SHA2569cf651425f1d7633141c651be51652acd1449ef0d59531aa1e7e58985ac01e9c
SHA512b5cc78b90da415de01c3b94e98a5697da01a96a8e94621b08f9b75f5066a77b532320de2c5262c9b80bf3fca5420781deb8104eb62e394adf19684035d30af2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33403ae187f7517b0c50551465e22e9
SHA1e711fe538f48252be46379852bd2ef08b85cee5c
SHA25677fb71071367133700ca6278edfb914436f675504a1bbf822bd319571b91ae17
SHA512937f7307667b896b26de5beefc3d74ae34cb2be67d13449ceb9f39928e4111647e1b55112d0dce2f5f28ab68d8b08b3919acde0c375f1070cdddbcd804d71331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53967bd7a2358cbdd88a7eb787658b69b
SHA165725b96a0596a3e994c7cecd16168ec3997534a
SHA2566c90965866c0087a8d3a54379fcb7b360d49fca505cbc48b2dfe3e3d2306d537
SHA512aaaf6e88f4ce87e6890422fb68cbf1580074b68f1fe4fe58830de332acce0f2db674fa99e15755593086b6d379cf2ed1c39d35401f9708fee7af5b9878b4ed7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b16201fb7f074bf7f47862b71d147e
SHA115f102df4505670936eb5218195e829e6c8a2409
SHA2569dd2ce7efbdcf51fb58e661411f072d10fa8a15febc9a08ddaa7177a4aa84b94
SHA51206a6a2e20f7d54ae3bf1a55f3e9222ada1bab6acb57209ca820122d8cd9b4d2294ded6b4117b4d47ebb8572ef722b93cabcc75d0076b65c2443bca12d8e9b45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f53e67a3207f5ad39c02aa22b37987
SHA174511913aabf44f54f75634e0971db0e249d1488
SHA25660d163871d19379d2e114aae8264062ad41e0066778dad6c881785ed4058a9e9
SHA5123f3f2cc13bb24088b9c149cb7276d5bef9751aa87ad97beae30850dcb03d55e740db2bb4702c7f9d3d1715020e17704ca5b7c3e1ca99f162632b5041a4eebdf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c8f0c73972803f5810113bf42643e9
SHA16c30fd39d90f4d6e236f48dbc9d0108910fb0b5e
SHA256be1853fe4a469b33480657de95f42111e62ac440fcd63a78a18e1199b9b54578
SHA512702465e255373336fb8f1f7fae8b01b52f1ba8964ad5fb06a204f0c717c12528672ab8812660fd13a063ccb1ea8bda428dd83dc4106802b8cce266c5fad8c06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593986a87a54aae0234c5cab64de3152
SHA1c0f30792dac083fe1226854486f07691cb0a2632
SHA2565ddf0d50f98928db64e961d13d361333fd99ffb7b7ab8c58021364374e87142d
SHA5124bc7411cae406a5d1652c30e744c4325f82ecc6693a3164b7fb52ef3438ef8b0dc33d66ce2ffb3a021210be96e79331f52ffc581eda0e2711933979b9988d303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8bcd3db316308b7c7bfc47f57ad52b
SHA1e3bf64053719ce7218e6abae5874d5aba8305e05
SHA256bd07bccef8b783786a54d099692de42f6ac910b6defec48484f7ab7a3216ceaa
SHA512afed4d1e4a825c50f103c038b015b037269d4b34192c4f1de1b43f48a9b6be19ad1e7bb9445119e950f1c7f38e347af6cc1ed8b60445eb3415cf818c54ef92a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772a4b6b15e75aadc3ec52e370d8cf6b
SHA1db03f67807071d37bac4e694533fa513c5d3a819
SHA256069d080f2cb1732ed6669f46fd1ef9781eb7111b9328536b754c9b89617e5a60
SHA5128332d17fe5305f7f9e187139ff32085045154c4d32cd82b5b01d531fa20c47c00d7f1d4699f25445ba36d066f95647986fa6c81d5faffba3550e41b792587e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d419d2c8db41d47944db3d4fd876ae33
SHA12b673824f5d9df87a91cc365510b4c3603113097
SHA256a31edbefa13d1809f82a3c9e89054710489a559a1407f662b7148b6d5e2bc285
SHA512a3246965fec00097d11984e6eb204b0acfec31475afde37e6ee75a6ad46f208d874f748fcaa92d69e29d3f0c5a71eac5b06c83197c3cb1d818bfbe3520150e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f5b4196321b2d734e8ee67e932d4c2
SHA16129a107a60ceff2db2537d75d6e46e74e22ee5f
SHA25683a8b54f94a20d45ff38503c6af8e1e9681da45e4576805396fc852674c0eb5c
SHA512ed963908f56067282067472c789d93c4bb2f403f564ad8183c6b6cefb6599dd27cd85fe5d4c636f8db59e1247b39b22cc7313442a0cb7eaf9d6d6f75c08826d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b