Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
ef11d9273bad33e697a239a5f130bfef_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef11d9273bad33e697a239a5f130bfef_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef11d9273bad33e697a239a5f130bfef_JaffaCakes118.html
-
Size
3KB
-
MD5
ef11d9273bad33e697a239a5f130bfef
-
SHA1
61bd50edc6723ce7d92eec259f55b5c8cb8aacad
-
SHA256
d2f7d50e96862658896c614196637c4e5f20573f7925f34f629878ee34392e60
-
SHA512
f4425a6dd47ab55c113987515e5ecaf8a58ad729fe593832d68d778f9049f8734a6bb0d6358ac6e9213c566afccfb2d769a3400faeef5515df7853fd744570bc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c5970bdf0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000018abda989949a3288f091ab16675602c8bd79e4e96f2e780fc10800d2f0bb301000000000e8000000002000020000000278c060cfd2323c03b1fac7903ad407bb61661b51253124b9bcf7c32d5dedf1720000000c05e4a01ba06c1d3fead67eb6c0a37b9d029e2955a79dda4a78b91db4fadab9c40000000c1c4f0ff435ab572985977d1b2a7e7d44794e0fb6752a0cf1748109f0e243885d9a92ca80293a282c496ba229bf2ebc944283a7b29e3a21933a7fd1f7f92ec26 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433054889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37138B81-77D2-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3056 1696 iexplore.exe 30 PID 1696 wrote to memory of 3056 1696 iexplore.exe 30 PID 1696 wrote to memory of 3056 1696 iexplore.exe 30 PID 1696 wrote to memory of 3056 1696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef11d9273bad33e697a239a5f130bfef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632cbc696e130bc7ecf193dc67d26f09
SHA199d0d6abdaa4c980c238e0d7d3c3488b628dfee3
SHA25645833984695a14e454d8db0254ad44eba10d4079550c7ad18eb2f777ac899438
SHA512dd74ce6f6f68c46fe27ed03fd76887108685772e1eb3618c8eaff88729d1aa1a488aecec7fab006201c6bf6225cb8e548858a8393f512ba78faafc8803e0903f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ef9a2dd726d76ad83e7c8d3f0ec727
SHA1c812403692432a5b7a9289baa8f67deaa429a422
SHA2565b679ef9be53fff398f5a6d03e3f7fc0ee0802251f759e9a65ced9b2c0fe8445
SHA5125e6e1aa7c66138dab62b7791b1877ac09b269a88023dff0a4a48ecfc0aaac9a1aace5a418166da5139fcfc0df6c39900204ca4d86ee0874c04399caf8b0fb709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511108a6cc2081d7fc5608a1725d33385
SHA1aec4ab49d489cb6e649f7c36f04662b9422af4eb
SHA256c83e034cecc44d7d2c862f38f5d3f7d58f2582779ca6e51729b446a346a98c14
SHA512ee9ba5733253e8f4799d61bff3ca65d84c95ff7655f0cc3b801e6528083b3c90ea1758cbbe527add52c79eb026f87fa69ef24e633dc717b5194c478cb6c8eb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d123d4f74faab160557e527620478177
SHA1136a6c1a807f907f58d63d7c31bc712499bbae37
SHA25682b91307ed411afbf135153e60ed994afcab90f24431a49e4fda3819a02ceda6
SHA5124525dd5e7d99e7def439947fcee4da08ec403cbad39e14178a4816b3dc1cd4dfb806f25bea30594f465db628e83fd44e2e69f98c8d3559c36ac8dd407ea31123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098195e16b94c5be2ce5ca34b57b0d7f
SHA1e6fb54d729813ed3b0611298753e3ae42ea7e478
SHA256772aa762b419081a4ae169fc5b756aa28d7d6dbd76ca087c49008285078d44be
SHA51273fb0a0e9b9dfbc32dad16319d29b891bb913aa1125567cfc16764057332d533b60cbcb4282bacd2c676822264c25c6a846defdd7d377d0fde34e64eee9074c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8596dcd27eb47fcdc01830f0fe0726
SHA12a67f0a26b696b28b8fcd1215cf8aadc3a573760
SHA25604be6a8dd53beaf73d7557b00886175a873d5b6d6688ff8ec9da582ddb18df03
SHA512e30961372cd1fa8e5921dbf9ec5c2f5e64341dd4b89adf984f5c945b35a649bf083755c91d3765884ff82f69fada570477d58ce315bc221879bedf3038b15c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d7046cfcdc50b9be3e090ee5f93a0b
SHA156a075473c325d08c860c123656a08af2f67716d
SHA2567826ef041fcaf4a90cef32bbf45127da57b2a7d9781bf465f45bd2b6e6844f5d
SHA51213ad23ade58fe3b29108f443cfe4b33383aa340e24d9c17f385b8fa7c4d30050fa3b3c6dfcec4750e29d411c65e6a7b8f305443a7df84df7d18c6903246b7494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ce865523c7f6c42726e91622fed3fd
SHA177c8d07a9c14f2be434cbf9d97d9be05ed1e9a5e
SHA25608f215c9d79762489c7478ca4561d7b962250329e69146565666f9b3ce3648f8
SHA512c24ebefc7ece868c327bed29790738eac01651740da359893b0a4db9eaff1635ae2f000a94842fd5896292d950a300a07afdfa6c509aa8fbc6fbd968f73a34e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc75f134c7102a48e1d1b03d5c25fd8
SHA13b263da5f730135b8d9f91c57ca7124e0a5568dc
SHA256ab34a5aac9e255de11d35b75a21c9255d7ac46cadc76d5114f8f22419af28ddb
SHA512797ef5e760564d456bbcc190dc104255d0c3a278c74356279acd5336ae7638e30926d9d2a8bd8dcece6b6bebd7cb82ad8447019f5a27fb93cdc47c61fed5542e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d36ecb6acf7d41310d228e592d2cee
SHA1c8251687228671558a1efa1a8ee2fc9874fb7f55
SHA2560fdad0f3910505c440e071533fcecc2319497db68a5d263a49372bd523af49ed
SHA512a64b42d6a1332facd4e867ca9324609da44763b1abe65c750941f5e400be877ae801a961038b43f9fc58a42628ec254a768e90ca55d36fbfe89884f7e1b7a28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0cb76decd625d756c8b9539f8f773d
SHA1e04ebbb4cc54698d8b50ac365a1542b0ee960f7b
SHA25680bedaa74816e495120630015086327942063b339419f426b3241dbea513b76a
SHA5126875b94b406fb63624bd18fe4c81338aa61ab741d31b86d56266f71815285a4d7d952657c4b0159ba26b9fd5e7d7975d7fd741fc1a5a7aa037f3b4d419883d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d453e4fbe9dbdbe23f23a7771c0de14
SHA168bb8abc29c952d2ef3a1408dd157128ac75e82d
SHA25606fa2f707e0ea9f2d264abd0f3882daf77ffee31aa5d0d42815a8e81bfe6b4e2
SHA5129ac5e474f0067b147b68e21e62caa928e09b17b95197a199eb9bdfd09c222d7b66131fd0be28fc1526d5288b016d4b18a749d26a8a8f4007e080772517aaa90e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c401ce39bfe4ba10cb60a2623798ec19
SHA19a10dc80e36c25a7bdc3771b05a053e2a2982dae
SHA256cb57c85921c0e27e80616b6ad9a973e021a490564bae8ba4a5178963d98e4509
SHA51246dea89d38d587f01285f33267f7fc0d2b81a9ca29d7ce5317327b39e679a83b4d36d378e3ca81fec847966ae73ce87773666b1afc38de1f881e9c480e594254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c65c824bd5d556fbd1634d5c975c53a
SHA14c643210a32eb9a8f1d0f8a1a13a88518aab7fb9
SHA256c5ba50dd01f8dc76af366152729c7589061e995621ad2d3c4a8f73bd5732e21d
SHA512b2672275b05b84ed686c3bbbc24196b8b5a869e4a62fce84b0598d0744826992e7a735d9309326c2be65d03c40a197f0f063019eb0485de5ce275aa4bd7ce632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d8bbae885d3b3ee30c55608a1a38e9
SHA1b3e2646093c691b9a6d59ed8179a2633f46101ad
SHA2563e8fb90be40cd99561bbf0386cd5331d547d7279736dd0e8300b1c6eb4aeb1ad
SHA5127ead3b74506f46df4b20f8aac4ff1620ed89b269b458e8dba3e7cf9ff04307ced610f0bf3f5e4382b3221250d55101039123e89a5e9cf0b03df7e7e5bf2c1149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c43a4007f84561bc1b66eac0e959c6
SHA1c41f52cfc5367664ff304544d5fa3556c12d2369
SHA256a4167ef768e558c97b87cb9797af478e78781655573e1e972f569b823fe6a691
SHA512420a672f8cdcbc44ba2b52e44164cdf52602ef3987f7956413d820986e765b773f628e5b1076575aa70f9b7ce0b13c73be1a9c6a3b50783ab1c54fb5cef0b4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574c4d1d2a9ffa292f34760f6dfaf2db0
SHA196e965c3d9a637a1623ca75bbf828c01c4cf9cc5
SHA256f63b679cb6e9cc7a047da64e1b682fa957b6163e81ef1c2234232e7e3804ad2a
SHA512a53a7ccf1f9fd2373b024f390fd5175367b728bfeeb0e3d592941faf9aba10f6083a0f3885d7a0126405b38e8ce3fa9137e924998c0e9e722f277fb047d58053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504606fab2abbde8bf5abb930446f7b32
SHA1e0ca3b30c86d9ccb821d4adef222de11a859e3ad
SHA25620988ecd67280412d41119ce36de78cc458481b5caa86289d0d0132785f6969b
SHA51267f95b246aeda301079d9a06338be1db43706d3f23b5c1c332aa8813b5fc6d3e9a28a10e2692f9e0350d35203542d86ee8a6234549298dc67c382df126a5124b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b