Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
ef4bd416934f9cbe58ee8eb6fca6880c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef4bd416934f9cbe58ee8eb6fca6880c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ef4bd416934f9cbe58ee8eb6fca6880c_JaffaCakes118.html
-
Size
763B
-
MD5
ef4bd416934f9cbe58ee8eb6fca6880c
-
SHA1
fdceef2f06f7124be666e57e3ef90d0a9309c613
-
SHA256
2a50564269b4790dac5b6a844f44e92652415999e48760fcfe7d9cda5323e5e4
-
SHA512
28606697433080f35356cd749adb2b86ae755268454adbfaa52db1484f8d4cc8061e0ce4da6ab72d82ece93d1dd4ea50ca7a5901d207a37972847ee21560a003
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433064506" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70572e5ef50bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9AA9A5B1-77E8-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000003e921168eb8f3b6dc61d9d83a27e4dbc94b28490bd42de0ad55302a9a937132f000000000e80000000020000200000004d5b4fb961d5b21c0810cea68b220c5b48c7926837aadf1bf46cd2143f2b4bef20000000f187914a7303d674157b5f9bbf72db3d78d65d2bfe9b45d4cfe5c745fde5a83740000000de99125605472dcdb3ccd21331b84d52907cb6607a76880e8a3e480c5f3e1e099c3fa3c68877943d54714d36743433f3217408938f102349cd0ab2594db7ada1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2756 1900 iexplore.exe 30 PID 1900 wrote to memory of 2756 1900 iexplore.exe 30 PID 1900 wrote to memory of 2756 1900 iexplore.exe 30 PID 1900 wrote to memory of 2756 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef4bd416934f9cbe58ee8eb6fca6880c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f5e2710cdd1cda39b7f400deebec8c
SHA160803f9ed40239223d4031b4658eb291a6886d88
SHA256941b22e747e6118c30b31cec59e2fcc49c22ceaa2ce884a572ab6684157caa8e
SHA5129bdbac6f8ef71a2c1dd7c5bd6932136229a1c7092d9a92cb22a63d86a8bb2d6c94b26200e3aed8a937369dc315204f78c1003a126e7a4d6c080238a6f825e1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536358c12b66994a447281708603e692b
SHA131e3412247e2d13b6c5e20a8e3f50dfde7d1b3bb
SHA256c1c3997835ac857ed14f8782efe2e11ff3dbb636a0564b2ecc3550141351359c
SHA51293003f89094b935005d77a571af1d0b407eed14fec25d0be1132fd40b262853ff687b644ad5789262655a6e0ad10e4784a829cbed8037fc17cc9b45dfd0b280f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531de7ada16f5d38566e539b06e8c48e8
SHA196604771bbf5fa4c6ef4326639e4ba38eeb9e94d
SHA2564d53c8a2502e23a5e813f32fe5e4758b1f64d62c250fc4fbd16d864b7ce6125e
SHA5128315427c7a3dbc6c2e70fc101252ea7d10d6a543b56f582102ff57bd87d2948fca38000c197715c5a04afaf392a27469821c4c2525b5ebdc2722094538232533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80fc2f9584537b9518175aeaa54e283
SHA1d5dde08b2e45718ad7929ca85a1c181c0d6ab8c1
SHA256b5b7ff98e7bc6b8da97ecf5839eddd60cc32f8a3b63de294ce850cf1af595cb3
SHA5129fbb5dffa7b9903f97cdadc8cc6c2ddbc35ff67c51e127463bbe08bc232ae6363c8211e7087328f8f4da0d7495ba3100f2f459e5e974423ffda3e7c1814b58c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaedd9ab1069c6b23261c123d524bd4f
SHA1b4ffa9f159f1a272433182f567243e7909924aba
SHA256cbbb0684efb2756a3a5e6123c85c92603c04b22d408a72f874a300630ac9a3fb
SHA512bbf78140d01223042961529c582111c0a101691de5bdce8804ae97f88ea7c61c4db47f63e4f277681c2cf15dbbbcf2487d35da702588c26781bb31180ca6e7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc89503105680c22e7c7f8f07419337
SHA1cccfa0c8b4aca903744ba57d653dd88dff789a86
SHA2565b861f0968c1efa81821f6c7eaa305e3d06b6e689d5c19f6394d9c5c9f7d11ca
SHA512864e4b7a03d651eeb36d0830d63cb59ccc3dc1048d3d7c79f478303ad101a57a28bd824a4bfbaf3c7f42b6eb678cc37014c0fbbd6b8103224725d6c1fd074996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee41442a07ca6a3f0ecc016178a1b5e6
SHA10549d7f4ed9c91642c516bff7eeb429157bc0208
SHA25632cfcfd96054c4837033d901b89b6ef81666574589932fbd2a39cecded1ba42c
SHA512599fa1c7c5299eca98b0278f9f156a22941b896d16afe2cc9e091cf33f212c50a16b882007f0ea46a78191a11dcc31881de758b7cf44d2bf4cdad917bbe0f51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4eba584092eff23e32702e02e157d5a
SHA1b5e448ffcf4afa8844b3228fc143bce8ab55dfcc
SHA2564de03554a783ce8e0e73f0bc5489ce365cc4cd19e77f601b016ab7dbbb8c9513
SHA5123632655ed9ca3faee188c1e688a266d37cc69603fd7f2cc0d7e35506e4ffb6ecc6230733e2ab5dc828a1ccf6e0cf659840c1a6660169bd64c78eb2f1dc60c70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf345856a48c80b368d03cf5f7e9e57
SHA1cd44863a188fab21abd9a1ca54df0eac7f49b287
SHA256aca9b204ebd77a5c06150be0cf5bd514f4a1868c330c24f0ef8b865fa2b05b78
SHA512ace7f1ccdcb1ed214e29ebe36547dae8fb46a3ba2d243543095a21b1eca23910408457eed217cf4e870d955e59c4a49b395c11ecdc992e2260ca591f30173655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc037e7ad1da3014ca2e59dfeb50d4f8
SHA198d0b4bde3a35a0c42abbb472157f6576a1e25fb
SHA25628e8221d7b1edace9080345d46c9735c2e97bb61cf5939a3f7268f4e9bc3786a
SHA512e5377be4776397985e6b6327f125d8335711eaacf5db8d9516cf70ecfddaef4815c573e69341daf2cd00563bd30aaf0ae7a654287988c59d6d94bc2cddf8930c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529512367860c6a967ee1876d1b64acb2
SHA1428718bc5576ff2c6706cb924cac30046938ec1a
SHA256f06c5a9bc7efa33169fae1753b01a62ed62c3c7f1626981b20f8cfa9a49866db
SHA512da47db2d7acd92827e5b3d3fdd404726dab2b6c0f0091c20619bd2e18b1a63fe1ad6b794621b7b130fcfdc32d1bf7add9a1d17883e45eac9bc283933e3e5c916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567997ae4d12ad6ddb5a485f1ac2f8768
SHA1ac3fb7ba68546e8ef8049acbfdd61bdf43166d2f
SHA256eaf10dd7566bb67ee6b16acada9d27bb5c5ce81993d52228cc2184451ecfbd2d
SHA512e4a4a184a921973a2059caa4658bd69f3b417e99a075c1a77a89cc15f3fef8c670ff41f4d5b93961af70dcb5e26c58f8d0d147e6e8410ca96f7623198346bf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a240ed79964d066f2f32a90871a3e9b6
SHA15a7cc66e72fe1f05dd688d3e0f5ef776a3877d93
SHA256102656f2d6b11bcb93b53b36678965b76281274db2c23ef5209592b016b4740d
SHA512fbb27d11cfdd25f7b646aa16cfbb1eb5191e501af00876792f16dd4d96ba83e30643bc35dc90b5b614580c0662083527eb337e38966bbacba81f29f6044775dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554d91e762b36d511a5b8b78e496660fe
SHA1f8b11df39b8c7c3ecff46ee6cb9b7faa2a1b8d3f
SHA256dfb52357e446c970a7364e9b550cf535afe596f9f7f84280ac3e5af121e492d9
SHA5127babebe6141e9c5382c42be7fbe4e977476228753f102b86c2fbbe58bfa0371e7fe114b2c1180d5003c1cab625bacb961f503199bea33f7fa7518c612c07e79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e294a8fa5d7466cca071f5e29696f3a0
SHA1f3343a43ae9ef3cf2908728a6717b0b131d78564
SHA25625f5f6c7b90361e3dd855cfb7cc6897cd7be486fd0f5c30201b9cf7d809dcf78
SHA5126cb8b6515fb0e4974a24b1d829e7884dad4bfe2bf3a2741e0d4315d65931e8c1efbfd2075e981ff1179c9e1d090096b65e3a203794a3edd2b692f9e68022a37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53740d5ce8a48e6e3053bad6d2dbcb03e
SHA157fd24541cd4f26f676ed115f0e887c455e76cfe
SHA25642d4e73fbc84fbdef58fcd81c45a04127812f9cf48958c8aa95cbac191f0f179
SHA512c963549e5c90320db0fe498031f1fe37851a38dcc8cab039e64f92a44df82f45fb34c552905692e59a624be5efdaa0f613951922451e421d75bdc91a51b3edd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bc2b6d64ea4f264348743d9bae3435
SHA1af0ae7ef50a3ce7326f18e3f49d11bf4207ec4ac
SHA256736a8048bc2697af8dc75e20e86bf18d4c85eda165edd78fb9dbc1a83cb177dd
SHA51206195b35cd894bf84075c5788414d9484ab82e5101a747ac1f746929611db9a6d8921bbf49b1dce2c02997bd58ccea86af407e77085525fbc719de64f156cbaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5df76a910a51586fd418f805dc92e4
SHA1275a0fd91aea5d908864608ba691de81f6dd816e
SHA256f0d8275297f3b143b8fd610720689cda56fa1056a538a7c1bee31eb56bacb71d
SHA512df5f4102ea3c01c646313839b41e20c138cbdb933b542c52d92e8df25eb12c3fbeb543348403813ec65a0de5cde956d403d0761e80811d17430caad41804a352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e8de0b8679e7465f2696826b6c8b82
SHA1f60d2645ffc09acb475816072b2429f94274aa20
SHA256e288c336abd2c8d62955dde6613ebb3b3d46042163df4904d9d6c455434b9aa1
SHA512c71f219fa17c326236b746bb169819365c42c9bf6cea75c8009a9970771794999e975e2c1c902f6ac5ddd4e71a53ce31e0c9e536c7b678ec9dd1cd0e37bd0f03
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b