Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
f0464dfa4dae4274fd5969e514c55898_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f0464dfa4dae4274fd5969e514c55898_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0464dfa4dae4274fd5969e514c55898_JaffaCakes118.html
-
Size
1KB
-
MD5
f0464dfa4dae4274fd5969e514c55898
-
SHA1
bc33e32b4b7956da8aea0e0e0a791d92ce839f49
-
SHA256
13be7eb1320271f933eef1b5345f1698338f68cc306c0f499e298c51d17d7dae
-
SHA512
37a3f6012b06521d721a75337aa3172fe3b8604f7208ff721318f89368ce9865bb609cf418b5f85f333febc4b5b01f06b735e424244d7db2eaadca426fb89ac8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d0416baeed7ecbdcfa676eb74f503873f9811b7784246890e088f2efcc1d9d08000000000e8000000002000020000000e1417d135e8eb95ebfbec17faa8116f56324df39ea5f96fc97691090bba0bc9390000000efe1cd1485bc7324abf883ec189badc1418c207c8457ccfd4090f5f0e5db3e62be39a236d25e57bfaadd78cf160236929cf39d8bbbac4d89478460e2fcd85e76551ebf50a54422df8dc0f2dad8e67300a171a62bac24e6725142df14ac4d770c75914779672946b5cd8d5ce5480dacf30e2c8e1b998c5ef6df7dfde19a35718cb6d522517bfad9b06965040385acfe81400000002a9ccddef135bd5faba463d1457d6697a4705b05c49b7e80feaedb84fb0108465a27f8c47cd5967a4311ccc0829bcaf6c70a9a73437312b511c2f9b596044e3b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000c420c45c5e13bab6b2d8af12144fb9f068826bfa5262ca842c5eeb9b849f1e0a000000000e80000000020000200000001cd1aa685c15217bce4cc7dac1eb56288ee624779c43e496d537ca50d73a29f320000000999efeaf5b05c2f803bb2acabb7d866cc07350ff6f49a0cfa3298b8c9f548bb04000000026ab4f303ecd3860e34a930a3b6cfd88d27ab1f24d11e15511b3edba1cc878156312e391db4639e76c73a5bda8636d294ddd4c071c58e691c35b44ff92184b03 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d9f9fc490cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25B732E1-783D-11EF-9816-E6BB832D1259} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433100816" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1968 2684 iexplore.exe 30 PID 2684 wrote to memory of 1968 2684 iexplore.exe 30 PID 2684 wrote to memory of 1968 2684 iexplore.exe 30 PID 2684 wrote to memory of 1968 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0464dfa4dae4274fd5969e514c55898_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058a8e0f33166ce95719192f1a818ba1
SHA115dd7482588192af58d3f9ad5d19130eb0e68bfd
SHA256cc62db62d0eeaf083bda1bedb668a44eacc2d49af58c7fd21cb331f1d812e9ff
SHA512a83466eda11ab4ec8abc394ff66fecfadb4c37a8a8a1f5e8e2a1e1d7f25df0d0b1d9164724a7deaeea11f63549f153174198a65a0c8d182e409b3d73a973a1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a70b75ef97ef8dfa9e8de730bbe91d
SHA1af5236cfc43aa46799749f8219cfc9020d215746
SHA256ed358596004ce007d6e052d84024f81885ec65232eee468038575c4f6e8fcb7a
SHA5123af74e3ce70090708a057b0ae698a37704482c102ec02460259304f53941cce0e76c85ebc9e5f69e9ae04dd4a85f9bf92f0e9c826d0cb2514c417a67edf18ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df70251cc83ef16734f2c6ee4e08b30
SHA1a2c8b9a2863fb7936a899783f9b9319a13b378ff
SHA256fcc827d91244e01d1751d796b5adc955c12016e571aa56ac0cb1872c8f0f8dda
SHA512644a54f937b695c73161a9fb600f3b4d6f9d1df11e2d7e280de78027c37df5ad432d87ac8c70cd05347ed411f4b5a50d84e00f7f374819340a90fdeb5dc3484a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f885e77e5f124a299c00224ea66e17ae
SHA1a43a1e69307cb2457cf7afc446559c4a87194cca
SHA2560790daa808acb66af6d13d0534d92b2e7f48ac50db3c6214b43cc0fc017fe35a
SHA51289a64928569002926966c4dc9aa71f6bf48d571b03e2af737833b25c57bfc0e2e33ad05592619307a1d12df291f8689105e80243528b0d1bf8c924d8f6939894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff8bd59651a8a9a648e51a2fa1d22f4
SHA115af348e8ece0321cdca009db52fafeaaeb07893
SHA256f7810d1c86949eb0c2d9929c534142995489ff45a85f56a1b28a14a73c95ffa4
SHA5122bab2fb8491367ffeab138ec8e84ba78c1fef29657cbdab9999e00831b10745afa0bb147c6c4a1316f4c9f51d96327820a427c0b789db944db51353950ef1a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56628f21b89726421bf487b8596c921c9
SHA173f1af2064a2c707ede50f2c8130432a3f578f8f
SHA256c879758263f2690abbd15f3c78f4ee11678e463a777c9da6337c78939d972755
SHA512dcc3972fb6339ec3e17e26df5a55f350e5459fc55f45ea85612efce1783ae9d2015d4204600655008e9b1d291ebb07f72027e5a57f58dbd241680b707cf46467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa200a12abc5e6b7715112d00493f996
SHA1304efa9f18745978b92bef24aca69fee6a7390b4
SHA25692330c7f57019c903b52891c7d9c18de4072f45d8f467be3977b60e57a0a2b92
SHA51222ea3df9412575cb3ea3a2d3119badde5a90538657bf8a149745210392dcdbff0289b54f70299b8180bc28125ec4a83edfff6459a1da80e5926709f2569a565c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc787daf47e9d6de8f56c9460553626
SHA1a8c3ad87b572cfaa19bf5386f468aa6e1c549cc7
SHA256fa37e848caa31094e69ef21ceaceded5a83b399453f60606cb0603bc14a5b711
SHA5127301207fb2816c3d035d38f1c2b0f9c23c5a711ebf9736dc21bccb1dff482d66dd50e3dcee86b8156e37e59769eb04e982b237a50d76e45075cb07008e5f64f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e757d92b0267cef0bb88aa9824b35451
SHA19c3dc0fd65f17ca359eb6678ef7c2cc67c3305da
SHA2567bcad70c4857f2dcb4797fd6af3cb338ae29767a6f4a0f827639ae33e82079cc
SHA512159d785dab4b6d171a3ec4aa5ddba4f61813602feb5de1868ed8a0859eb8b568212ff59282dfe830c7134c276baf321dd967b963ac22e95e4da625fbbc206a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab5c291f612529bd915e7c3125416b2
SHA1225a28ce1d4e0b52c771bb20d3bcbc94f91329a8
SHA25602a3cfcfb2eac88dbdb969053491d09bb8f7fa7c59fedb611049af884640af65
SHA5129e119f06629d2473fbac0fd13a14b2c0eebcd8bb98c8c7be3fe1e074665cb7dbf781630a976d45890975e9db9fd7b9efe8aed932d90bb547cf91c3a215878c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c47d903eb6ae397207d7c051958aa0
SHA1ae7fb72a2d026c94c7b7ea0ebec2abdf67ddaf92
SHA256960781dc2d7f0d1151f9bf9a522b4c33575693976d2dfa555a6e3b9ee1ac9d6a
SHA512877a5bccc5e9ebef95e7f5a98288e2c34eb307e296ab2c1c69c9441d3b6723e7eeaea0b4367934f36c7c1e30e3094c3a4ad75247c7e3dfb0711f4cb16e9c1b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc332d330410c2204cbff82172b825c3
SHA1dde585339ef230fdab80e41ec1841ebd0216ce54
SHA2569685039b5c1f86c33448ef80eb7e1b99379e2c33a9f46985ac948ec9322d5dc9
SHA512fea7d87f958353d651373b8fa9c896c387ae0ab41100c0617ee6ea89f6881746e3f673ec275c67dc2da2e4620b00c1298ff2e1e4581e652ec77f1592f6981cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c77cea04acdd494d5a67fbce4075608
SHA15c732725d598ad4cb5156aae0b99615a2d601a82
SHA2561a62d47a0eeda5c76b74dfa19a29a10b154b1edb88ad7f7bb971efea026bd4e4
SHA512e9fc76a9e7c14bf2f79d9712cdef64ca8b8914289174a2e041bcf7942f9e3fb2cd8f08e7ea11d21a220a605476e2b7174f5a6535ed1b4794ac8d3f47daf1da87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268db76464bfade350f21b46f3c3476a
SHA1905d9ccb800ec1823fa2afe10fd4f12db8b6c677
SHA256a2b11aa0c771caacdbd0c993e18cb29b5041ba06b64ade381682db2c872d0a56
SHA51288875e94ddcaa776edfaf8034432c66423c6bb874d012e7a92128cfeb3bb74782d399360c91a69bad5e16bfb8cc0cbc32f06fae344e037ab4470d06605f826f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d442dff1497580803f4ddb14261b7a72
SHA1c1b275cb1f6712ff58752eb8aae161b9a84295c7
SHA256f05363ab5243537044025a52a013484afbe10d07fcf615dc4cc6481bd5de4cd9
SHA5125158186ecf80693906cb9634517351ccb8d1c2589e42d2745c85069269cbf9b85cf54f8ae3e97b6cc604e78c7d309a315f61a9abd01a37828f78fd17b13d2ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a66bd5647df96936de35b98caaba0b
SHA168ceaa6dee5d4b77beeb12467fd49c0cb01c6af0
SHA256931046a8f0ca65d6c83722e6408556b314da78739c635e2e819ac2d95b348cdb
SHA512f104412c88273c036c8cbbe898e6cfeee132f44ee6354080136b4e9a30e73f9968248d8e7940283e5518a2e37ba144e93555869cf2f0266a00344674c37a320d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafea5f5eca8cc8412cd83c9535b2471
SHA19e0ecf44829efdc3f8989b1d661db3e66896ca5e
SHA2565b87a7a1c026f04a3d5e3c40e12cd53f77e1a508f7215fb593ba23446df2e5fe
SHA512cd72175244c996fe5bf2a31445fe871b6d7b36d05999fb2ae0120c11ae308c40c370f45ff4aea7bfa0794d432bb2f8994d01e9fd8c087585d0a12bb0667e1dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502545a9f9a109559f776aabc4a05ccda
SHA18df7cf1dea320b3fbf3b0592f02915b2e1b2f39b
SHA25650dcae84df0a6bbf5be264a03e1695b1c5813d3f3bd71c00a197211b4034ea39
SHA512f2b2b545d8960ae7ef6527355152bcbe91ae30e1b8eb200a59980c81acf3dfe18126742ddc4162cd8462e3001876059e5f3364904872e3c19a3daaeec35573b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b