Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
f044392e8fb437a8f1eeab403e0d7fb4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f044392e8fb437a8f1eeab403e0d7fb4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f044392e8fb437a8f1eeab403e0d7fb4_JaffaCakes118.html
-
Size
3KB
-
MD5
f044392e8fb437a8f1eeab403e0d7fb4
-
SHA1
634fd4e49531e7ae6f1c9e7683257c0a062804fb
-
SHA256
6223fbfc70fd5e401eb3f0d9f41192bdace1782bac877a139eff5cdd0f22d9dc
-
SHA512
77aecbafca81b15d8654187cdbec9ddcb323f35dd39a670a977930810a06dfab4207e52ab1b4c7833320b5b6a499b89cf32b2d7764640940dc1d5f5ed686ec7f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b2b870490cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433100586" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002693a013939e7ba66e6cbeea1373c6faa60243600d8118d5d06341297be06c3b000000000e8000000002000020000000b137ad2a1c5d718addffef5609edbee4db37be42b8fd54dc412d2fb69e0a92d020000000af12c75979b620aff46d30f9dbbea910fed663219819dbfa6eebab9fd6e4586240000000e6c3f67973eb8bbd492f9ab724fe5cfd44f2d6ed6b8db767aa0aead66e3f191974df3e5d4b5515b347ae129527c5b688e0d4e5ea8efac6a55f4a30fc2d5d2f57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C076561-783C-11EF-A1E2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2860 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2860 2644 iexplore.exe 30 PID 2644 wrote to memory of 2860 2644 iexplore.exe 30 PID 2644 wrote to memory of 2860 2644 iexplore.exe 30 PID 2644 wrote to memory of 2860 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f044392e8fb437a8f1eeab403e0d7fb4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f4a0455c1049f4a0bdea12ee72bf5c
SHA1b89e84f220b6faee463efb632d151751907fee63
SHA256709f8766f0ddcef9a569db2725eb310c490e47253444262948c0d79328d7250b
SHA512c025873fb8f65c487a15ab4edc12377ad76acbf3ef5bddded1e3be6fac4e36dc17ae6edc41704f1a559a0b1f58a13f3c95932d6d5b1a703051c9c7fc22d8def1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588dac3e687857746a1afc28050862fee
SHA103e8ca3a7fada0dd817eee92e382b812ec5378be
SHA2569a926dd13f413574e79f7d5e84557ca19cfcbe7a7443794e020bc781d49cb602
SHA5122b230a4125b6980d77f8472291f5a03afeabd088b32b0a487cb7ed1c3009bcbace3001361112b5068e9291c32806126fbc5b058fadc89bfe318faed76f7ee4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59473ac1f40798fbdfaa57a6b4f43c78e
SHA18564f454b7d09c88b9f2043a2d548ef2ae813e55
SHA25668a569754bf51e04b5c8e1bae0ad8d179f3e3d027e6be5331ac98b1178be630f
SHA512f44c80aed12a0dd3c08239ddb61738526c1456d1857cd0075a622acbc588805e2b23963b54081cd842f4448d4242f3ce592d2261426fb4690bf48841d0f0dc4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac7933b1009574b447fdb1b324d4078d
SHA11d1e1522b6194cba73887719a5b31394a5f07947
SHA256fc8f678f4ff951abf3d7bc769892f0f28212c1d0a2f450d1cabe8f2df6d4de25
SHA512777223f54500603c79d832b683fba05b18ff8352e4122ff30bcda3f717e4828a9b071c488bb43355c2e94ac2e40d0fd3e2db680e2e5047c32a633856e936dd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac6788981149781edfbc8f6b740a6807
SHA14ed971e903e431d5f993a42c229145b4a9f6e3af
SHA25635d457211f4d990bc6a446ba0b8133a5804b00749a4f67ea7e16c47750842111
SHA51241ea12cb75d74fd60b2cbb0166511b43b22e78f1ad94ef238f1a0027b5cb915d516316796413157d63b2390fe8b20ba0f136499c0a1f7f5011aa2b882a3aa222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1b5faa59300ad2af6cf97cb31dc13a
SHA1559594bdd4dc5fd17564b6b9bdd73cae49bd6f9a
SHA256f4f77fb911ff80a104951dfe03b66052f5de9b7cdd23bfcb7a9576338e4e6988
SHA5124d3a4594f611ed13961b00024809c6b3652cde9637470e2176e98e1ee6e4e587c773bfcb1c7565ca6eb8f46f324095de18108af77c13b405a8c6e6365230c014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b46ba4852b5252939d6b4ae32ffd92
SHA1055f965d172578c7a813ebcea6f9c655e1311b88
SHA2563ea9a0b11ba594cd6e92418582b4008aebd7907f12b12bf5038d53671bc1764d
SHA5120085fea3a067293650eb2b3e1fa99722cba0bbd922a66197d8d0884d110b18f2355cd4f09a9bc492e9873a3c97145f5aa6dc4d02a82f86fb8ab3ecf10724a800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f0014f85a207bed21d8a96f136a5ca
SHA12d5834c41557c61f2137bdadfc61309ebf585979
SHA256d4692cb9b9df5d923242e0704254e853f21d8ba5d3b7be0358966be3af1ef233
SHA512e1694320c5a8fe066c1ecc13f71ef73a2d275fb4fa5ea9226387fecda9c8a3ad051c404405c83941bf6889b6a728b44dda6acae7d335c9d0be3579310c7cba7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0481399c27003974e4037cea011c006
SHA115db6ea4a4582a75c6e742b76b087ea8f7e591b3
SHA25607e0cdb0dfde7ded86e8909e4c51227ff8c52b957fbb29b88f6545196ea8db46
SHA512c3f3f98a93ca97b64cda0dd7845fe9defae9f46e2e03c614d6df0fd749b4174c3b3bef81347bf46868223dd213088e15fdabdbf39be2500978c84ed3e6d4aaee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded25accd2fca0899549eea7739620de
SHA14478f34f94b25b0c8df85266f23ac8340e775b83
SHA256232c41316e1b0f3953c4e4796839df00c95986edc755a174236913f88a906cbc
SHA512656b54475bb2f8c9436eed1b0270c15799faa90e544c5595849a15cc19889c9bc75d95c0c6f8b60a179cd9bc233a29c76845c031d4047c90dedea41119cef338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507904539a928bd688c72618379fde24e
SHA10411d8be361f149206a10fb7bbefaaed0499d2a3
SHA256d5231008e8fce7b6bfa2361fdd05ed6d650d044e62db0bb45a42421aa4388ee0
SHA5122d2db39efdb3d8e1c7ab28a5659ee0cec4a0dbd58a6acfad01066b69273715a6040a53a451656425ab2fe1024b0cde8b545a9b966aeee730ff1d145f9b8670f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58353e02b59581590056a7764d442146d
SHA1e846bf5232142f5390b36af4b431a24f7b36bb93
SHA25617f1422becfd89d7e3dab0d151c25b1da02462eb8ea21c27962aeeccad83fd1e
SHA5128ae63cdb73256d8e9aa678b1f32a703163c980bde99e8d0e3e978595ee36f5fddb0872f8852362cf7db385f40a3022eef80f967eab84faa552dc22f3776f149b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b5c02fc0419d8e8d76f869c0f9872b
SHA14c2bd3361cce821b6b0f3b6ac8dd1b66891d28fa
SHA25604c1c2b9df41607bd0d538ee4dc2825b89a39af1af1f3c8e3dafc0d6e59da053
SHA512ae937f1554216d3bf2796ce5898792812ac21c65d791830c71f94a6a6d88085a9d50a6a4acd9f2970c753fab0fd16d68ff12208a42cf8177ec647cbb1da00cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537efc1916dc0e00d2ae98b9e094f78cb
SHA1dc4187bd50e8730c1405ea69a5becedf7c610323
SHA2566881af135decf39db3d40a96e5b7dab9b559c90446e0a2c14471646eceaf5b8f
SHA512082f8e2315ea1397a512146f2425a71354def6033c71de5a8efd3a117e8f7eb7215cf073e76d2c832717de310426c700f9cd5a25606b3bfc21cf792680625877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50691ab108f46d07ef7edff04e721a7c3
SHA13b63c82bcb9f699d6eeb6a580191f63f7642d594
SHA256d66a0a03f8de2260c21ba7b7408924ee2644016b744721ed229e3d134a520553
SHA512a59066dadcf87b3d049b2182c4c913f058819ed8e4b5dcd9e20b4ae66d79650edffd1cedf5024b90ab4b22fc31700f959df333f4f53456eec2f842c1bba03aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2399122703be1f3d16941e4259a9299
SHA133c6d1196241cfa5a3bed44653d2f1ff42366f50
SHA2564bc46fc262b5342efaa23072b60cb8f2a5bc6296eda28927629b16288c5e0df2
SHA512688159d37bbade878d4c6677fa2b7739f434e7659244b872f915c3b62325d4e3d4fe66ee33e5d0b9a4b3c1438905cfb788528237fca36a4c97448518ed427476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a85dc0658bb0ca18aaacecb7e777d8ce
SHA1f273abd3821f90c9a748a9962f8bd484b547435f
SHA25605520877a8e27a73bc2959e21b03752257f79c0b7b1797646b1ba1e38e51d436
SHA512445d69723f8c3e6d030c0f82ea250cbe475cdc71807aa65d2788b281028edb151ada59597df07bdc5e1258b00b100c764da88047c4c6450c92e692e4365d0cb3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b