Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
f54a4528459061426923dcf784a6bbb5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f54a4528459061426923dcf784a6bbb5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f54a4528459061426923dcf784a6bbb5_JaffaCakes118.html
-
Size
2KB
-
MD5
f54a4528459061426923dcf784a6bbb5
-
SHA1
79ac5cd6c5ed0b2b0e5bbc93d308e415dceacf14
-
SHA256
ee14007b36f9a4ae96be437d0db0301a02adc0474384b98089c465dff0570914
-
SHA512
f62bb21befba6c264f9a0b805b84e4e604bc3f9df55cd680f235e4a647ef8cc2840d618b6fce433893808a46736ce322cd7ec06ff10c4e8ca216aadbf750950a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05348d70b0fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433403982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000469ad0e0c94426a8551d3dbfb015ae9a3d9c1134947c02af6a1f2eb9c9f97b71000000000e8000000002000020000000ad47bd7fdfde835e28fba4f51812bb1498ce57ec769479a2e565783882aab07d20000000ed1ed1a7f8fffa15a1eee42c9a7d01e2a6a840c84203e8800605f4cc0e71478b4000000082e320d78c3060038e62472f49ce46ad5c7302161a91975a23ced0f024dde0e435de2567eefa1397d1ea34b9d0f2c414584acce28a34f44909972c723680dd87 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02BECA91-7AFF-11EF-A7E8-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1712 2344 iexplore.exe 30 PID 2344 wrote to memory of 1712 2344 iexplore.exe 30 PID 2344 wrote to memory of 1712 2344 iexplore.exe 30 PID 2344 wrote to memory of 1712 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f54a4528459061426923dcf784a6bbb5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e055f298d4f39b49479c6644343d06bc
SHA1ebdc6a150ef437098e788e6b766062a038485b90
SHA2565b24ff45cb139a56b8416c68cf255a021c7652610b3b141c9e5f2cf0472d4f25
SHA5124a9b647033770ed853c826b85385987b1d5c6438bcf9a9832b91e0a8b17c8630e7aad19f169c60753dfbbc23c4fa093e762242d74b1972d6b2d801faab767739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb0d0e2f93f2c5a357e22c5cfd170a4
SHA11faa1305bb14bcdb8eec16b7f9bfd2360c6ca516
SHA256f99c07176d85e7e4aa5702caeda8b5dfc8e919724546eeb1565635666518b68b
SHA512cb4de635247e1582bc1be4bd8c7279ffcf6c0be241e210580dbc6e1d19d2e54ca7d580e81d75662f567ac8016c9409f31de35cf366583d918d367facace0f5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58509d49eebcb0618c7562d7b223cd461
SHA1158dc640bf018bbae132ee93a599070b99c91576
SHA256c80355e1bbc384a11cd70f524488116d61b3b6a32b85e0b93eae386faab15049
SHA51289f920fc13bb3d142087f8ab4dc3ed592c78e82ca2308a9acecfbda865378f651470e959ea36b35ce74ef4020dc9fa0591351409f4c7e920f143805fac6f9eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c1713eb5b08bb8bc62dbb70f12b757
SHA198a38a498f70ae88e6b034dbf5c00ab768cafda6
SHA256e1b59fe75bc0a80b5a2a54ec71c4dde2be92d2fcb8c3e154646fb261dc4d1185
SHA51249238be53b5ebe7b04143c45c6979e3a38ca4813441fbe65b4a6c37464e01bc88d3b7d532bf95028c6c6036a5e4f29cce291c7131f95e0ef5bc4880d9581e870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bbe83cd36c35633004a19b54427890e
SHA107eb147ac5b4db5ce3937f9f14c4ab01727ed209
SHA256c5826bfbd37d7dcd4eaa19db75546edd3f854482064d1ab2e752d2b70f928d14
SHA51294fdef0e5dd1f63b2b9133b3a0762cd8be789209a31539ed331103678625fe2afa042fc54635cd45687aea93eeda550af41519737ff0f3de66db571a046df6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa62e5135268ba1beb62a542ca04a88a
SHA1f24633d49a98a9660a686b00a8607db527b513c2
SHA256e35dbd4de0bcaffe2f1b1bcdbdb64954323bad43158d74e4eb175f8f093de50f
SHA512a0d411fe83feda1f4052a21c9b455d1b6430c5fdef2b80f3aad50e63d814e3ef4be9362ab6a171595868dcdcac5cd39109fda3eb3b8affa54153c92bf0495e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf8ff8d03aac3d91bec38da831f3489
SHA176ed36b8d3f822ae59ceb44a8bf5e3452bfef752
SHA256a19f3d4856ed1fe3f9e275d13f1e19e4c5dba64780bb9e11e634f8cd165bfacb
SHA512915f4175effc17ae3a625a218eb6cfe69bd18a3cee2c86645211a7dd9c230c5a0f9407876036b99ef227a95cf83bfc101ffeb3cb3c68cf6a1d1428b62720b9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e40d9895b011e651fa0dd8c40d2e4cd
SHA1bbd3849a0db8ffc1837f1fedff46cb56a3df8566
SHA25629b9229c735ed487ddf4b4e8ae4fb97c4a7f777b45e525a53fae91ce6232bdf4
SHA512cedba1c7aa68b54fb9873e64279ee74f6f393bfa0d8bf55934d87e48a2bf0912f0fa839de0e17cec529c01fefcd2bfad4101d5592bc3441f166fe2bb2f7cb3e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e1a3bad909cba024a0a71a8bd970329
SHA17e525cf5adc917f875fe664c104fd18ff58d35e8
SHA25664e48f77b3ffeef53867cad8e9cc70632b28d9d0826d9ebcee8b6a00c07b0c72
SHA51249231fccce6d7702dbfc25fa50a7399324489804d676a9eb96a56c89ac1a50ee588c90a360dd890707e63c3d27dbbd517a71efe2a4c312e0b2baec44e77b95c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c195a2de6409c0847816f8049be8bbf4
SHA18df8822b064385bbe675de8191345aa1f5412c3a
SHA256447e892be55710e7096fa2168df85ba7ffb2e3af4a62edfe6562511d9b7d5477
SHA512cf793e4aae7becf60427ccca5f9ddd13f9c1e7a0e9014658d2c2ab74a016e4185011b36e17e9cff70d04b4ccdf2287c9d80b2bf3cda47521da508ca564d9802c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362aaaa8edbbb42ab88eaccf84e9417c
SHA1818948863d2a0775095cda4150693cc492af0c69
SHA256c40b298d8c12c289cf8e846ac96974579606f830ec720caaf8f63559ff70df02
SHA5121cd63244eccbb7f3919428fc3c29418f625f8fe41a153852e31363de0d2eaed1ebf2657307909782a8b9eee32276f0708e6496e739778eb9605f7928cf1d8586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef87bf8d27915010e290c192faa70c7a
SHA16629ceb344d79542d70446a4c0a8ee8c92466f86
SHA25698526452c790671138ca5154d9ae53ea15a4ded63adb432b121b9bb6e2dcfd01
SHA512ec4163d7ea4aefcee70bf9266a1e3c124ab552008dba01fe4923d07436fdf2104364ff8de952ae8c26d5afe2b915d789bcd0b5199c72f2b4734f5a5e60f436a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55217f63a6c63415b2e295b8eccb75396
SHA197ca569a332bfd8f350822a0ccee0db838bcf957
SHA2566afb996a46d1edb6aa87c21aa616dd19378f426713b247968e368a582438a95f
SHA512513c899a01c22487a08cf74b12bad2c4af4658a72d1d26f5e6d45d14e8cec7174442355d56bd44dd7370dab3dc4ad6391f516b3ad7e192e5c8591c9c3f61a24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc32befb5b842301c3224588f5c41d6
SHA16991be6848a1eb9d968061ee35cef31b554d47e6
SHA256762cf264b80ca7279a7e6e754c4a13df84f4051509e9fed0311dde1f52b4cfb3
SHA51290554bc23818f949e5568d4b86b16456eaebba2d4e7cd452868ce529d58b98b43e122241e30f0a69a3ba2675cf9b614b5e733cd3947ffad3e2b2f03dd05a7b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824c1100ba090bcd53608c5006073b4d
SHA1487ab443db88b6c12801878a7f1b996290bf67d3
SHA2565d8178feecd836536d5fb24b8b90fe1589f19ce7ef79aa0f98de52f7a74e9538
SHA512e0a57a98d5f0bd611d18f1f51ddb675526195205a99ec163b798960f98958769f827cc0f2459fb2a1ab5401c48c2a9eda38d18e0600cc0a490efd7bc6b84c61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581aba245efb3d0c4225e68112ee8ed37
SHA1754376a9945d08926c5bc19a1a547a549269be11
SHA256b6dc3bfa7bb242019225ce187c3cd543edd00dd7f926112b8ab2a0327beca93c
SHA51215d358b9cbcd76275dd8ece66e63184c7e7ded0545890baa47059101d756d1430827ae282b990bef86c6868a776b1efbba8ff87a20a9ec0519ed0483c485fa9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e37a29573951dfd1aa4a2b0d19032b
SHA1bb932e84bef3c38b6c7dc94300566ccc75df4420
SHA256d62cf3572a8ddddb157054a2a7f8056aabd6607416367b4d3916f02876b9e634
SHA5122e68b440dbc8a33d99fc66bed57f1c78867a1ef5d6db5dffc2261096cb5510e078316ed1d1cc2a1b764302722b3529552fc2ea7524d5792505d71177c0c50d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa04f0456050fea8e971e0b14462e7be
SHA13f145414f4fe785f7fd1f9b969af63b892c9b56e
SHA256a6ee367ff882c8ec04046409f2ec0b84c298ffe9c71df01fed22387dec06a439
SHA5129d5ba68caffeb831dec0ede15fd9b0f40654fdf764a6f19d35b3f40da89462709018adf4692419756b3524c8078834bda56263cad4cd6df627905b2291d7fd60
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b