Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
df8e6858764d476b2df1c0669460f816_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df8e6858764d476b2df1c0669460f816_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df8e6858764d476b2df1c0669460f816_JaffaCakes118.html
-
Size
2KB
-
MD5
df8e6858764d476b2df1c0669460f816
-
SHA1
90c7773d499e289b6f34d88dc58555c945b3c071
-
SHA256
e34e9872f06d41b42045d256ac5d4f96c6bea7bd128710a9a774b78ffce6b091
-
SHA512
d505c15d2623733d80677a637612f24c2e13dbbfc3edcfe42e551035d62ec01b9337645ed444d13fd13dc24b0d542c40eae71653a358f4e4c284231aafaec13b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b51f496506db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59E72DD1-7258-11EF-9AA4-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432452793" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000046d0c7d8a498ff218d5604e80e1d926dbb2f08ba23b7264962d8dc76853369e2000000000e80000000020000200000007f1b74a0c716d5e798775ac61fe20ae58ad5fa78c25a144d0408c100766f4cf4200000004a99429a96fb6d10e48132d1b1353748eeba5bb4cc2596336cf60001fe489f8b40000000ae103d87d0b067ab3443f1639493739a5860c1f14cd9566945872846b93eb0676cb7f3f8f860fa5b73b9f68ca03c2fae30d39e010524a6694e4e4dd0eaae6cae iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2456 1984 iexplore.exe 31 PID 1984 wrote to memory of 2456 1984 iexplore.exe 31 PID 1984 wrote to memory of 2456 1984 iexplore.exe 31 PID 1984 wrote to memory of 2456 1984 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df8e6858764d476b2df1c0669460f816_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926389c91ba57eeb50566d862f742e5f
SHA13e67e94bba24f2743e7655f80c06184c2dcc1b1a
SHA256098dcd795ff79ec9b11fa4964288aaa11767900793151d23c26c3f3ec47c6717
SHA512bbdf8a34315dcc6213b5c237e6ac3d1616caedfab123166a67ca68c4fd114d41a320beae35af910a10b5be44856997004224c7bf745686a4c17c422c6760abbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504034590032a5ab93c20a58660ac42be
SHA142b82dbe7b67fc14dcf49ac62de9b64a22c94e10
SHA25631cb597a306951793239c6a365c04f087dde5deff53e9a4dbb57ff0bca99f4ed
SHA5127e6683bf1632af81bacabf9ad5998e9a1852a54bdbfa0b853183937d80f6ad216ea753b56e31ebbb1cea0d3b77a2ddab9e65bdab5a160542896249168fd9bd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e5c7bec54caeccb65e98df5013aab6
SHA1c5c51d0de9f0317298284e3fd7dc1729e14a7a84
SHA2562716fdfa93156de8b5550b8f2ae8a7d253adbccfd2fe88d5d7affb2d3c7dd2e9
SHA51206ce4b86e83ea62b762463ff06f5326a079838c0dbdd021c1b92be37edda20de8adc815721567cef1ca8bfd1e57ecabdd9b736b00ff6e727adeefa136d2b2913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a638c6cd374c947b5a73a809c16779a
SHA19c14dedc307ce112bc157b9b8c127fa64f5ed303
SHA256f120917b3cceee5f752c27b8989d86a4b70bd7fcb689d0e190f5a6819fe8e788
SHA512387e4947bacb344bb42c15f1fd390da505d2f9babebf700b9d02ccfca3bac18bbffc374d2508afca658d2da63057a43f8603d663b845abb37aaad4dba6c22d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18fdc795f4eec4c457bc473d67acdd9
SHA1584f30789a0b6db324e23bdcf10bf7029bfa623b
SHA256d84360ebf673be1003eb1de6abfede96d31aedc5683853c475e7a6d0dbcaa81c
SHA512016c2f7764dcdb482c9fcbb19844a0685225d3928009398d808d37ab61998e35edc44bcb75a2e7fbd87333a5e54db075dd35a7bde893149eb0c0beb75f00b1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c77ab75a04e4521e0364e629def2c4
SHA14bae0a4a436b2839ecc422beaaf6e3cae42d1389
SHA2564dca1494af92a6ac3991d8f618ca9689683d36fb7cb93cba87de1531626fdf1c
SHA5123cb8f3350cad959ad9a9975e64bf2f9bc5260da3372714dafbe63d3f9a043a2535a86c074d38d75a43b974dc262047696b5d9dd85d99d656f89c8576b4375643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d81106fe50997a2a5fd0a734fbcee1
SHA1a807209a6679eb193a9f46cae5fe16e9a1feaee5
SHA2568da8af609870f6e40a1a73b19a8b7511fdf9eeb713c77d6b6770e25ed29956df
SHA512e34e029c7b1f297ec31abfe1d42850513afbc5f5e0ab0a13a1512a5e36a2664ff49ccd54b3219cefb11933d9baccb34498086070a140d43d86ef8b515b575039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575fc914662c61a9915a26b4519a5386
SHA162d4de10869eaf205968a06815cfdb3e5eb0cb10
SHA25660aa1490a84ee77244094cacda4d994dab4408e23a4791bc2b4e5e3e37dfad8b
SHA5120d33cea96c83bcb8fadde7b825103c442834b780764780eb3477d22269fbbb14414f4d5d5cde67f9bf16e487026bd9a5811e57110782cf74218f56549bc68d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559449a6c5961afd4befb0e041a7c9a2e
SHA199d648eba558caff78a2b4a6e53289ecb698fdac
SHA256547d19ce0c55e93c0bd5a8a7e764ba7b06a2fe2ae34000b3810c4e2cd262b2a6
SHA512f918462d1d1ff2f37a7caf980aca19c11fad6860d3270e34fdc96d43a0e4f4fd803e2bbce9fdffb963ba135e720400cefc7489640e950f6c3f877792790cde0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf683e12c96d56185875610838f80133
SHA10387abe1ed816d424a510a7b8e9900c3fdbcc2f9
SHA2568171fd3187da0d8241a8b777657f413638333777011833563b688aca65d1aee8
SHA51285ea85e3e01fb0493b4c9eba927f4bc064747476cb80fca9084f3af796169d01964b486d2f0d2f47533d45eb4e9f3d3e83c980954bb8f8449bd66e8612d66e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f88b6d6cedcdc3c4dd5ac494917f1c4
SHA1e91565db49cd6a665fc299b79a9cd9efb8d5e2ad
SHA2564d894bad758a0ed8dc386a12b1e1b7501fa9007b612a260ccd6ab1228c0901f4
SHA51201d8a5ec19e1465e202c187ea2638081f2220e2893e7ce72c82cbe93d9d22a12658c9957fc19b6ff32de7f1e115daaee2905c013b3964fdbaded41b2830a9588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a5edd26e478e48f7097f2b32c7e23b
SHA16c314005b0f8d95a672ca4a1acea3eb03092166c
SHA2565a7301d6333f8c32e7dbb3627d87c3c003df84271d27baf028ae712648888379
SHA51248c5edca675d8d9672dcd4d66a444e3f03382092ece916e1743c517cac38c671f73a31932982c0e7d0709e31fb2e46c2d4ed98d90d5d10fba07f83fc5ff42671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888a6ece8a6767eb75086eb8ea498e7f
SHA12bc10bc20b7c083fd14f7b1d3a85a0c6279498a8
SHA25676bea468365bab187cdc9fb7b57363cdcd2baaede08fdd68650c192ff84c49ec
SHA51235d8d6c802a0b00c28919acc45b28476a2ba19c7c1dfbdf8b36be4166f22aea8e232233132ab3adbaa735fe8ed76e8c19074a5d6f36836b583e64261150bcb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352b7dbedbb5b33a04ef3a9807d4dd01
SHA19ae4da8fe2c83ddec52c92aac0b05ce8faf5dde9
SHA2568f76fb767591e46ecfa16d977e37feb2858cd41981731507d900e728f1189fa6
SHA512b9e2330007b87359fc40a4d6a11ebdd32cfb26340ea6a62cbd640e181f8e3bf0c093b39797ce359e80f1ee04c8c4d8e9cb1932c95bd9461f7781e895b97d0d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f99ff34b5b19feb1494c33c1f679ac5
SHA14b24d90e2312462240ca37de5d192bc69eac0cf9
SHA256d876ecd542b7f4ff9e62fcbf2cfbe770bf4420dedf68ce0ad9c7477754be4330
SHA51254b882f75a4e26c7ade8cbc81832a4b45dedc1e9456343f7eef0f55e3fd95408e25bbada26ca0e831e717958c56e1222ffc3b0b8404b9fff15840ca1dd111a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad77b51756a96be380e786e43f4bd3af
SHA15b7ea321fcffc144ca77a5d97af82eea5816a615
SHA2566cd35b0d8e85e64ddd2a4163850909ac6a1b184962120a20d0f0ef71cacc8ee8
SHA5129ff53fad5490de27f5b58c80e6b9a5706db20534a8db17d464e5b56f55a8d49740cc300de35c6c49e41398b83434161aa04f15e56abb3d2a398d4f36db7a620f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d76192f55219a857a5fc550c0084758
SHA11c8b6f101aba966807dfdfa43a9595a098cc19aa
SHA2567032a65e4bd2cf3791215e2605c8a5eed049966c8aa14f43b4846235e7add5b0
SHA512883cbbf762036a064d2f721a3adb67421b88b03a3e80cb82b957d0e678170a719f7f846a79a99d44a722bde0a1661e4589f09c0cce97b44dbacced5e61d9b27c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1d21066935152f9616303118503704
SHA133f066f9a5999c3101834d0cd878cff8ceef06b2
SHA256ece8ede1107b490f7007483e6141ad4169773134e83bf165074f3321c4222e1f
SHA512d96a2f774285978de503442175f06b9c6de0d185b15e91d5e26086d4bc899200c3695bdabe3c4febc56f7dccba527ebd0cc54b9b35ebb362e0bb364d58e7b478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568dd18ad65146350a28b954b0c97e1bd
SHA1374280d5bb45ced67d833f9bd15c77056fe9e913
SHA25679eb7f46ec29e37df1c08cdacb2a2ade39453b98c10265b0e49612f525c2efca
SHA512452dd00fc501fe138343c39a3d02cdcb2fe6c20882d7e592f4e1f05d4a3e9fefbdb18c3445c2a251fcb57278c6fb0bf5f2663e48d609a5e5d4956c45d1eff02e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b