Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
f048fa006f9590a6392455f3665f7e55_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f048fa006f9590a6392455f3665f7e55_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f048fa006f9590a6392455f3665f7e55_JaffaCakes118.html
-
Size
3KB
-
MD5
f048fa006f9590a6392455f3665f7e55
-
SHA1
a8cdf89c884ca30e0069654c21eb51c5c5d6ee9d
-
SHA256
a91b5d14862b49178dab5d5c101816dfc55778017a5a9fc517dd2436404a5dce
-
SHA512
30333d164b6656ed617c13a15eb9b1bb019e2264ddb7fbf40a8051a3a1768b319d4cfabe97f30c28b723c231d0357532553b20608c704fdc290db2b3f5f74c3c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d447ca4a0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07A0F061-783E-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433101195" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004994e3373d7de917f4f884b4d33b71c38f24132c1b40f6ac7ee377fd6bfd5916000000000e8000000002000020000000f67792b0e1934315b510de3d6991c1ff8bf2358808a66262199ffa62a2bc6d6a2000000018a0191281dc3c432b431ce55d8cd7ebfe5c571cb467a6ca1d86cfd5f150ae8040000000adbadee33439236bb4f371d346e05d52d49da3fc173bd97ffe2f17dc65fbbf5b4c6d48b214670f56516ded0ff2ffb3ca148945f5689ebdf39799d0e1c8387832 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2800 2240 iexplore.exe 31 PID 2240 wrote to memory of 2800 2240 iexplore.exe 31 PID 2240 wrote to memory of 2800 2240 iexplore.exe 31 PID 2240 wrote to memory of 2800 2240 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f048fa006f9590a6392455f3665f7e55_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3cff3060323c03f0c63b9cdfa356e85
SHA14bc955d630b93a6d5644aa7b252dbef168dc6e13
SHA2566acbb1324f9055ec2c822baf744b851ab8be75c17a766a0027e3b7ef99110a3c
SHA512568a8018417149d03184ed58f7a666af0d490dc6a43f1518d7d8e88d43ea50b86e4c00a42a5ac62449924cc49e69c0c73334969a51490bdfbe548cd2b66bbc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f59a03111bcd90c1e890ca2ceadaddd9
SHA18c5c548d36e304bc7db75a8659418173123ac04b
SHA25667ad26746c5734e4b0ad66a0fc23defae5def2bd49586ed1dc5065f03393c153
SHA512298e9cf4640577cac46cea40c875870bf76617e8082875a775d2a7b00a038eed642eae37661e9f37f2bc4712a76750d1a7f2fceece2ca003428aabd0f6682db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504020ef81ebc1d0942bab1fefbe3be92
SHA158664920a04a17faa2d527681f9513c4f77c3922
SHA2561b196b3997ab2be8b654e0f72258b5c47dd0a02ba6e58db6b85b5a9206a2231d
SHA5128388e7f19181a4085b005ea3b27de431daae952c1140af744cffb5a6618c74aa66b484fb5c0a7ed75e8e834eb1a0bc5ef8bc9f7c01baabab8f115c68e7c1edba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53046a976da5e3b78a6f21021e11e9ea4
SHA1b7557aecae00a242a3a42c357de36fb1619782cd
SHA2565db30590ee777f8261f32f97699e932ea9d45488b08303698912eec5ca6d4387
SHA5124f5cd244aaf6a37c72144e78110743b42e1a59bdc49a57ac7c6c75844e60bca99e4b0c806d1907d057d7eed98c7ac609a3ff0515451aa4b4bf4152f1712baacf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c556c80ce62449252699ea17df69d636
SHA190d082a38ce5ec1014dff4c9599458083c0409bd
SHA2566b470e1ce62426e844397dbb388a4ae03d5e2e7d057bc6631cd9cb4e23ab1b35
SHA5123feb41f068fc20ea2236179016dabbf86e212ce50fce394e939cb142ce673fc81e97abc524e4f5ef63b89c27a18d235921f5cd0188e63a5a08f0cb9e0534473d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508996b64f321e5571ca6ad3312b4e734
SHA13b39067f146b9d16eb12a334d42bda6eea5ae9d9
SHA256250cd248df90b31d248ee6bfd4808e8a3763bbdcdb9827435d007880a252d5f7
SHA512345f4fa81c8dfd9b18ff28ced4d8caa0876947e01f8fce82068beabd3a118d1ef91425d2427c82efd3fa6beb5b1536ed9696d245b5c8707f5cde14c37773698b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6811f3b190a19ac4624f60d8371364
SHA1bf017b95248b0155ff35be9f466fcf205dfa4c42
SHA256488800b8c0b70a0212082fe88f55aa40aa459f4fc7af0b2e807d717f12da309d
SHA512b9aff85a79a08a85d9f510d276b7a76c46aa917bfbbfa67f772c3130eb58043747bda9236146dd48d20a3392ef4f2238fa3b6fdb41db1836d8a0ac1e97174282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ee99ff8c9e94a77402c320aa6d8f49
SHA168a76f2365f53c9c68df16b67cd022f43db3b8d2
SHA256b7f9ad6906f6a7e0782406dcdb156874952e39108ad72d34f1ea334b0a5fbd06
SHA512bdede7ee495f61ffa543195abf893744721ca9ce1be4d8eee940e02caed14da3ffd73ec95e5133e3a56554baca2986349841efd7d63371f0360829077f094668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50b67c225c36aca2b8ec560b5db1f6a
SHA1cdd72d45ee5fffe0f9a1cb9bd5702d271acb4a59
SHA25614ef7eb2af9682dc6cd41ce4b660a7ed7c3ff77d3abf25497fef7a8bb73f8b19
SHA512bd97c00f2bd6fea5eaf3b6a4462e3c6b0c956a1ff58cead732b6cd5f225bd93aa5d081425b44ba7a7c45bf6127e221a2b27944dd8b4893869ce2ec8e26e82924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f6f159f29ee3cd6c5569fd57b92d639
SHA1b303621dac3b8c062231574ca8279b3253623b69
SHA256d16a50e346302c59b7371b56589d7a86957b0f7c8029dac76de4ae9a36e90e2f
SHA512279d46882f1777504535db5f290b9c5d58cd30c8fb67f23cdb902e336b65ab65d6b7e179c24debaca6f0902bc776754b8bec901a05c30f457c3ea9e182bee4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983a5adf8a3c7d918f4fbaa9a7277ffe
SHA1ad23d7a0ce70efde3ee82a2fb3ac0b1dd630d9c6
SHA256a729855a9f8070d0e21c7ec2de39ca081e43818d62fda0050cd3fd57ab992415
SHA5128370ae250e4da47e3c3cdb0ef1564368d56879c1f19531d6e140dd393791f97f8a4cf942a2540c509517fc594abe3f8e92199b26c31517847abc3894e49da06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be46542d8f5405e7821d8b90f5698d41
SHA1907169c0c4c3c589aa04c07db5430ac252dc0241
SHA256d71853acca08bf8f85e1872f6be51cfc1441706733b340c53e11de56fe9f46d0
SHA512a5f3736f552a4a145c911d70fe8acfcc9a51322b85d3ef2dee0ca2b562c1ec4b6a7aa5a07d010b3d229ab10023dd4b0ec4e538c46230d5ecf38cf78eefb3e1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257e237a3155088f8206ab96661fb13c
SHA11dec07d3c4d94dac78c260339a60393282583d27
SHA256b42b8d88f9572ee4e0f0ab0bdac11bbdc4375af445e82fbf73ad669c5691c5e6
SHA512f6943072c8285d0988ed8543054e8e3a45b32274db888f2e8883d02354d1c89daacceb0f4ee9bbb1490a42a304643159f011cb518f32f17098e388dc93acfd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d853126b0b984ef688c7b48ae47387
SHA1474c4b158d5ab7dac3735c2115a0065bb2895aad
SHA2561d7bbad79590c3fc6a22c89a5cf8bcd811e585c777612d380aad635ed889b2d1
SHA512f3e6dc36b9570fb9efbb0c8e3db3de962679e4b5dddf6a12d4883c293a5fc4e8aa370b534d7612c8fc43648d2fb21b99c9429498537890a070a1f178f87a6fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f34ccbc69ad30b3993401ee1a446bd
SHA177b0f3a9bb4c5a73f5b40d1e4483f95c99daaeb6
SHA25658cb9fdc74d48003682042b660a259a56e4cff62ce568262120d801e705dea24
SHA512ef5d784308c806871965af91e31d981712c70b1caaf881fa1087fe9102b5842b969fffc9442771fd04d3d76b2e11f4e31a7dbd39b0d2d716a6b28c38134bedcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40f93d8d8e9209b97cde1f1d9538951
SHA11efa74ff86fcc061438c2c616174b78cb805d50d
SHA2562de0670679e2c3731e1d83bbff384626a0bf3e3ad6cc3cb5a191afb9b374c270
SHA51200e438ffa94902169b8b22e89e32d0a103c4c5b81e5c8c69de99cb8e322335f0b7a3b99acd91de2d0873d638d42cd69f6a89267124921766f4e9c9e71d9b043c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0f219e02198a8e93bb9cfcd8343dfcb
SHA1750098a9c11798d4d9ae0c0bcbe9f5aea790b5d8
SHA25617843c5f97f57d6f682ae8305fbeda4ba3c5d37ae425b2000efedce8a665b6b7
SHA5126cafcac9569af95fc296ac4146432cc30aa15f3f3cf562c62730fb6f5dc8d41b3568c5277484bea68c60b01c4cf22928b6c4ce4af204b36d3075273ecae5a7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0583d49e268e6959e3ce2669369197
SHA118f758f70b4b543ba6c205d1b49591239c902bae
SHA256ec5ecb1232e40832b24b9eca36fedc4199bdbc1b74f375adc865cc8312a2a879
SHA512e88c82b61f9fdf3bc1f643fec6118cd025ff34799353c952bc8c717df886c32b8b7d068b3c71fe3db4c88c41c2f3f4d82c64f3827c558f5a14fce6bcee1b6439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a7621e17044552e573d9bcb088565d
SHA119426615bc489b93a909818ae3bba801a79957a5
SHA2567086a177f8dd6b9e1b0f1b6d224912dbaa91ccf33a56836933bd6aa465deaa1d
SHA512611cfaad1fb6c9495ec0aa944345a720d7013cbf2eb4da62f81ef79e73387cad5fdc89103aa4c64a0889a18cf833495e7dc5fda39197b62db2afca33731c7dfd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b