Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:04
Static task
static1
Behavioral task
behavioral1
Sample
ead02353797d11ff257210ed5c5bc834_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ead02353797d11ff257210ed5c5bc834_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead02353797d11ff257210ed5c5bc834_JaffaCakes118.html
-
Size
2KB
-
MD5
ead02353797d11ff257210ed5c5bc834
-
SHA1
dae5084e37ff5d401fa3f86980180b75a70d75fc
-
SHA256
97a7c995867fb682c85c5db46c3ea5cfb661f579157fb94ed2a842ed601a6889
-
SHA512
712c79afe9eec4a43d579e441c2d2c901b77fb301aa2f10a14dce8d629bff738c9041a250cf158b6bd3ead92b4b96a06d427d0d2914a5cdd2bca9c1f42ccb7f6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60bf4731620adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891314" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CCB6CE1-7655-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ff4f555115eafaaadf7ecb6eb95667f91281b963ec32c36fc6045ff8f9a15fec000000000e80000000020000200000005fb1418ee03a43e3d9d186421f4002813cf0eaa25e24dc2853c501b7dc3ca53120000000ba00d1e621015550aa41a310511232b59f395126b565689ef39aebe7e0ae810040000000b96419ae1bce0eb9fb94fe5a51f4fb3a64a369b074ca9804475b7e2c80a777e94edfb1452927ed077f1c205eb9aee0f9e31e9d26e9cf0f4e18d41f296f7b32af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2764 1900 iexplore.exe 31 PID 1900 wrote to memory of 2764 1900 iexplore.exe 31 PID 1900 wrote to memory of 2764 1900 iexplore.exe 31 PID 1900 wrote to memory of 2764 1900 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead02353797d11ff257210ed5c5bc834_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58141a08c6da3291431bea83d16f1f35a
SHA19852aed282053425d58cc4c7ecc976ee4d84bcea
SHA256897c008260e50193cce9041d0f6197ae46038e7a1bee7b7776ec5955d3b054ca
SHA5121d7a634e3ad7d79f7c7f72d5b5c77073c01f8f61659a38761b74171d83ae56b76487cb90fed0264d62d7470b569f3ce914e4f44cf1630e1a4d1535d86f6d4d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd751718eabe0d5ef9c6d9934a91d00
SHA13625cb1555f5a210086f7d98980974698f4a2403
SHA256ed799fb86c22c8b4b96ef5156a3b39eef6f65d6d45f4d4252769f0f0972b6864
SHA512432126ab9969dfa5313bb6b1dba1694761fdfe56cf8f476f1d9ea36d368f14cd5d8c704ed8ee388f62454b18b82918fbf4c45e1ce4047a6aca968fd71292634a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5477c3bdfd8b695eeb69d453051be7e71
SHA14dd1f9973daa6a90e7497c4c759f9718da424b76
SHA25628a1c53f0b7efb936238d29b2fa0ec22f6602591cfbc71bb0004965b35fd56e4
SHA5123f13c98608aa433a1a46ab5641aa02c08bf9b9c2d579d05665abca0e177a034af6d97886fbc8ab72a6daf0ab1ce1e271a4887b5701e7eb1e2be30b5b9ad87926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563adbb1429cfab73852a68bc94e521ba
SHA13889d5a6484c14d5a4a6af367aaf04362bd2be96
SHA25652c44617cf4b232d810a501b68dfa82a187e78a07606e5fb24a8893017af84ae
SHA51238691cb3932fe55efa29d7bd5ee0b92b0f672c6ac3d92bedbdcec639ab094529cbdb4e38c08f613bf81018266de62f8d176af68cffad7fdb400aab756e19f006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f510b4163e8342c45d29ef1f31924885
SHA10ddabce3053b550379296257ea354ca207e4dce7
SHA256bacf365fe71058131c5a0a86c342a43aeeec41d242aee12b4a04fa0baa07fb7a
SHA5123c03f9d5d6bcebf1bbd9b13e17dc728ccd82af3d175aed978e3e2a6aded134bf61c7b2f3c1b4c7b87551b9c9f3670b1a08b7bcc22197d7661d576ff89fc4a358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d95a44d5caba68640f84ccf7a6da36ac
SHA1dc069cc7adecf2bbf672faf60359314fb627bbb3
SHA2565a5fcdddec1bd0f21e264c39d1b2fb8ab10842fa58df6ee305b1f9adb7e0cb89
SHA512b297c68705696912ba81bfa15eea482b4f3620603e57dcbf32304680a091ae73992b126fee5f53a9944c6a8c7be8a9c5c168c611f9e2eaee9e7d43b858da8cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab2ee1a9d3950c2146b253411fc8e18
SHA1e57ccffeb2d6e32f7e1523389c6d61fd474d566a
SHA256bd0a626eb02049627ca95a9acaa3fdbb324919cd32f4df52ed5b2e3465e9404d
SHA512a32605209964c2fc05dfeff5ddbfe40bfd7044ba3d3acec5f1b863d4ff5dc8e37d8c770c05a1d03eeb3fd2a48bd4b9f003f9b28af96c2f14c7d409903cd589e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb482b90091b6a6b29227a43c5019e86
SHA15e701eafa4461c4a62b988a77933f0533d73da1c
SHA2562969d8b7f3e42c9954afc704d299f03a6768c208140a0db2b1e928145989cbf6
SHA5126906c92391b43a69840fff63d558850f7a86da4bb4058d6cc8ef4b8c672eaf5f440f5d54bef97e94a467b97b28b554cd931c9705bd7a0a95ab974071ee256a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead14834fb71bbf79149e487a42101ac
SHA158bbfd96bbeea8d5553dacc42bb051743493a726
SHA25690bea882cc44b71e2e29592f64a5330b933381a3e183a873456f1212fa9c6be5
SHA512316b71ee28e009b0025570718c1821ce4ce737487ee97f6bb18d806c4f844f7b300ecf66ba0dec7d680ce4e7e0dfc9d00f573c5faef359af89bd31ff3f878fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5499ad398ff0570d24e3e9c3455ee90f4
SHA1ddb2e7b2da73778306c22891b7fcf2327d7b0c66
SHA256fb0f5060dce442a903ba9b5d7a0064a5a27b62e5943ee1ee1b3c6f51681f5113
SHA51299f11fb50eaf25001ddb7b9f59ddbb5e311c35fb2b186c2d86b2fd3a0dde73cc9cb7918782ee2497c626696d88ad19551e2ed87f5362bb7ae31347155210b15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560cdb520e4b0850e5d3c5b10e21988f4
SHA14b334261a8c2814cd9669fc448e176db2c67a686
SHA2561645b8320e2158592759f923e32964908e74264bcf9fbab6246ab296aa3327b1
SHA512e0c2572aaa0013f62f28afd26b536dacc578e0ae6a3a9361eb9f092d15d94829315a8510bc3c1f91360d29eacfa4b6c6b68b8abe0032c905b150ade12218e9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730b5e902ba107f289cdf025d0653e80
SHA1eaf01203655fae41436ed4c038ec11eee99e47e5
SHA2566c54719b9ff1f755e9d2eadd5f281a6d6ba6e9006fa438baee690620e37ff9ba
SHA5127e4bdbca2dd2f9d50d664c994ec3f847f01931031509db7b1a599361dd78a4cc142eb9e96bfe04ad07bc347b256facff6d85cbf81c7a1c078798d42f66ae2632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622332d5b5eee73ea8f691010fc17a9a
SHA19ebdaaaebb911bc8333ccf67bb00e3af00b5ca5c
SHA2568dd048aa7aff4a248c2936974e54587e49b74a3ac9f15716f6830aa86066ed3b
SHA5120d4977fe6c374f8008845240ad47c1a37921b166f9a13cc8e6ddc3949c48c4ef245246a21f33ba01c96f610fd8726343018058e5935d9c49d12edaef63ec366f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f1caa1e355f9afd5561d7c706e590e
SHA1b4b54412a121e4ecc76dd2c0c85353dd76a0303a
SHA25600a54e5437f74e9505eb1c669b5588699906f24c0c51ee595a072dafd65b0daa
SHA512bfddd060c4327e26a0134db1c0f98b0a96c4171b24042dbd49c64209412bf2177857b35f6e6bb242f792ffe89d58f82e0049a667560770e7ec17803c21e8116b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90068d6855f043f73f0822221399005
SHA1dc16ba013116a9be9c211301d2b83f4e8c9813a4
SHA256da0bb00cbbceb214a2e68097c2d419a76c20f119dfb17ec2b66d9c5f58e6ed57
SHA51210951fb22d84251d8981e722061459b2b9f4019ac5f487493151522947c91a5e5550a5946bfe983ba46dbd931d087fa3074bb250357d070d6a3eb5bcb1757d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0cbf36bae693281ac144f24e63143a
SHA11d7d29895e658f5cc04c50e15de3362091bd586b
SHA256a34e30738503a0f65aafabf22de7071cfffa0f2544ed8d5666fe2cbdeef99b0c
SHA51250809ca850d0f24d17d2b50bdbc5654855a87ab27abd5a66d79d39ee6e39380fa14576a61ffc4da391cef766002918bc5b277088e0780ba27b62b3ba075befa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc73a0db1168c21e19b8a99cc859a7e8
SHA1ecbbb5c6691b407bdf6e2f1aec842ec0bf565e66
SHA256365f97d90203246c3ae8dd1fbe4c3ffc85ec498356188cdad6e22831ae54e466
SHA51256e3a50c118d23923536fadc165fa23adc54857f7c9e472395f85cbe2632a8e8acc6f6633c5bb735f9f6d5e8955851c9bae1b806c1b7cb3ada28245bd88c3bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2080364b364f9ff8c106f0ee0054bd
SHA18f41816168168315145f2d66a313d78f181231b0
SHA25662a3640eee0525c51093f03bff91d3dcb46087ab0b2d6413b41a1fe3f10be53f
SHA512797cc85519cb3919f3b8f00cc20b4e044d884d3fe26c0f45f3d74c5c8c3ec6f7064b2fbf43416b7c1675ab2c8923c719291b43775879010027b8637ee899f819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ab5600e6ba0e125f487ae35d6903b1
SHA1a78cf25a7e0198207ef14c14ae4b0d95c6b85fce
SHA256f7f5d397617cb90a2c51ab5c36b4f622e3d27f42cb7e2bcfc5738bf8b0a6dd7e
SHA512a09a1a54a80159bf9b9e40ba66a821e17724a0bcdd098f7f813a277a2b73abf8cec2e49884f62280c237cb0bee50d4d803a48c980d06cf672ddfdb2c5d9af5f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b