Analysis
-
max time kernel
71s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
f54535b6335e6b268e446765b2dab41b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f54535b6335e6b268e446765b2dab41b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f54535b6335e6b268e446765b2dab41b_JaffaCakes118.html
-
Size
1KB
-
MD5
f54535b6335e6b268e446765b2dab41b
-
SHA1
08365655d24618859a721f094a22902db5f585c5
-
SHA256
f6c5b533e7744cacbcc889499713945d313e4211720861edd5255b2535c62d68
-
SHA512
c75dbe387de5d82dc42daa118ae9c07de79504d7b36425e6a2f48fd3232664f20054592726a07b4f074bb9f935feaf5ebe0d5533a786ef662985524a4c793034
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e9c0660a0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91A03931-7AFD-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000001dea151f0c463fb53856f4f421546fd278c5b5c89070ae780e39f1b0fcf045c7000000000e80000000020000200000007e6b8941af046ac4002c3068dbbc79c73f8481522ed17aae9683876fde1c4aa620000000f78ca986376dcb60c3df960ef1964b7df70c1e5d1e49c82bf521e5100ec8109740000000500671b7e6b3025fe889dd61d7ad832b4d2e52b9add3a5216ea7ef7cc18e8c97545b693ffc06ce03f7028538ced6ea3b97545a11f967b88433052b26e4b22319 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433403366" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2836 2136 iexplore.exe 30 PID 2136 wrote to memory of 2836 2136 iexplore.exe 30 PID 2136 wrote to memory of 2836 2136 iexplore.exe 30 PID 2136 wrote to memory of 2836 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f54535b6335e6b268e446765b2dab41b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfdff36b50e38a098c3bad8496fa7020
SHA19c8a2e344d84d20c884eb0f827e88f8f8c5d79d0
SHA2569cad40f2fa424fa1b7fcaf0e3dfcc405007fd4809aa53d29a923647155577b48
SHA51295987817f027a48325111992be91894e23d48b1a3b79b3de185d7f8972c3210abc841158614f3424537b6b207a644eb49d1c564c5a86d4704bbfc43473f716e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ef596d22563e10be33215cf628511b
SHA10c140670e9422159e9f4d2cfd8f5b8c85b2f8d46
SHA2562f19b2734ef437576b1c6ac32f23ff2e7d76f71ba3445349204c4c95abaa5394
SHA5121ab0ae4922a29f2069bd1bdad52a1b679a44692e8791c5b996c6f322d46afa1030e9b446aa1347778791cd54882840a44ad379b95df99806563970234b0bf620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b5eb0b038fcb131fe6b9e25a902684d
SHA13165cc21c8413b8f9bef4a777bbf3abcb98bfa42
SHA256896bc611737c0f70d2ffd534167dcfead2bb430c5564d2b5d885675eb7ae3134
SHA5126f79888328c8efb3731c70d868248f0959db7d00099248e15bb15453c0af91229951886efcb957be74bbf75cddfdcb012968d30073d826f158450667304159a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54550b0e0cad6740d43e58b575c9b62f0
SHA1c319dcebcc80c45d36859fad7874be2f99fda0ca
SHA2565cc853a641cb3cf98eb76d6406e94ca5ccd46e0270f2fd0a96b73327a9b7ef47
SHA5126546469c70ed22180b750f2d3112433b3dbd199b163ae8581d8415620e9300a7fe904dd7132c45d00e9aa91c83132c8a395750f1e2f9b9c72a4a36a0e0b53501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd51026811ad1cf7b1a37dabea10daa
SHA17ca652436582326317fc51edf3565ff8a6e17e7c
SHA256e53406e687ce78e8d076c259bcd0d7267390a96b5fb19e8b8c01bd438856119d
SHA512f3318832dcec10835e4bec8e87d6506c6116400487c2f43c883a8c538d0fffc86af0c4a66531066016b4daeb11791b867773ba9868754c63facc7b4190cb5c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59653c1cbb320326f87b55204b266991b
SHA17b379095b314f68867817f2bc2f780b848fbe596
SHA256816cad44e0aaececce5fca78420404608d951ab0a3772333f562bec8b46784b1
SHA512be73bc33b1b04ec15a542b340b2e1f0a1e993af0a0b3e6c840cf595cb44ed58b4b65cc7499f6b8e49dc3560f6bc11bf3d50d93645c2540c390fd5f62796f2f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2ec8f8e54e50d1a4f81c63a99dcac6
SHA197041e0f6e8d74a0da4ba0d71ba8fa6036780055
SHA256bcbd17eef421f8a2afc25bbcddb2a55ebcb9813b7032d82df2a6b99b6d17a840
SHA512a811cbd70d7e69dab50418cd69601e95dba8a662859d891113574a6666d0a0ab92bd9ebaf314b5ac8a9b8c3ca9f2fd0ecf207c865a695712d346758862e579f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ecf3e4f5034041cd44480a21531ffa
SHA17a01c245fb068d3a11552568bde598380410b73f
SHA256695a3b00de370040226a3b9492af6e061890e8999cc3e7c788c2347d17dc3c9d
SHA512e82f517338b51f0b99b7b1470a291bfff7ae517922f8b9b9cc9812be063549dbae5ce0ac8310db05d26b853146115fad9c407aaf466f40df72b9bea16d0b76e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5584dfa56b8b943005e559b63a84d3e23
SHA1d50dbebdc2717c88019c1086b4b7b36b6eba399a
SHA256100326dd5e0f598587d12046b4e08c60bbce6b88c1006acbc9b0c5479223f4e4
SHA512c8a2ced714c9d67e6e5f2ab232609ffe652aee88ca327a781731feaed8c0a0d7d17c6166d5f2e230f8c8717ee64b8e09a330dd4dd266fd6903558c2dd5af8435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffe9593ef64c95fd24056c7adff7954
SHA1e1183c3c55c79b705a280ee842c8fcb3b200843d
SHA256b9132b6af19463bfdf4f44432972d6482c0f4f42f472eb0b0409464dfabf30cc
SHA512e2a36b1d0ed201ae9c0be4ad63052db530dd074355de348067f28603bb697975a5cb1367c3b0356f0f5abbc34a1d9b3e334ca05282523b4fa56ecc5e39f86699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545151c8faa2d367df0f972b143dc5e5a
SHA16d37624541a81b44de1fa045b35e7c8df62a0f10
SHA2563cb461d301bdbcd6f21626e1efeed3e4ea14fdafacd414fac9585f4788a06852
SHA512aca49643e99cfad34b3906f50d57592730106dd615bf07b1212b67b4de3087dc39d22780ee5ac579b3e12df943c93a27960ec72c7a06f26bb16f951fcdc92b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46d3eb28186542e8aeede4ff39cb45f
SHA11c2e20e05f35cd170177c55f097ab9e037f3b4e3
SHA256013befbcb5497bef0968c3529ae2d1da8f7a7afc0aeade474665e51743bf6fb5
SHA5125f6ba804376d736bf406ddb75b48cc80c35143ef656af94d26834962cd6838bedb6017bb7706d2b6cb0134bac20f829bc07daf43558d655c496db44b6f53455e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d0058db8462c8f7cc2b213dfe007bc
SHA17043770ab011a01506df2b04c3b45fc89d1f4040
SHA2562c692a15896731621a65222f2da6458f83f6c42340d859f02b4e42740ffc8d83
SHA512a9ecacc6f177f9308c770fcad955bec628ca6a633031454b2db61bb2611c5eb168329fa572a038dd3adb22b2285bfa42a5ada385b2f67a56ebe1117a8ea4136a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58630afb8cf067dd05232641e4e919620
SHA1791b9b6f4f3cca2659ac6d8ccd0db990ba244eac
SHA2565b166342d60fff056f7cc0db4d0ebf6a13042f9767071e807eab2350e1044a07
SHA512cdb0fffa31b92cf7d69f95ed9cdb4a1596b2b344b5b5ed5d20be569a142280f423bd76ef1292efa0471a7a34e0c1f4a97cb339596ed5e276b25d1e8e1fa7086b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56918f3dd516690270a4811c67e4524e2
SHA18117d3f5b29d06b7783d04d277a76fcaf2734035
SHA2564bc559b3e51a9f0a1052ccd842887f58c57c9275a624b9a35bc63a39ce558244
SHA5129ad77dfa05d65104f86249f69475d7cb6b9f38c43db49dbce86bf26c0599fd6535757282c968eb6b46056db82aa1c3f591e87393636e3dc9267a8a122383741d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eaf4b1324e8620c52a53396afad738d
SHA1976733fa6464c9e62b1f5687cf389e8fb8d32255
SHA256d975ec7a9c6f1d89ccd023df34151000de745182115639948890c20f2b76c8a8
SHA5122acd34a837b36bb92f8ec9b6ae39f6d5e4faf1bd681ad32bc694e3d7199ceaf02d6da70d3a6e0e8a36b3326e0aecf7a3ef5a68dca3ce53b3df1e481a8919820d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4a1888ca33a68d7e39ea0316c20627
SHA10c122ac67a2fb340e27771f4f9070a8a0ef4e45e
SHA256d9bfa18eb0a3c0cc322d61fbab803eae901260d6f905fcee317622b418c04842
SHA512d9dc956ba5c94e3f122b6f1523d9aa1dbff33f8a518fd414c1c50569ec264c73d9222cae9681b45e8243ac674d0349d312aca2c60399f6d88dc2ebb9bfd91e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004b532dd5b8b2f397b84bade0a0b7cd
SHA17320c7a9e099ea6b94e66a557f8a5ec6ad19da1b
SHA25645f1f54d33c9430e81f922fd2b809700ccad1da58035af19e4e7991775cf5d6a
SHA51217e90d0df3b145c84fa502d1bd2f203048f9aedd40d15e728af9cfc5b4263d573f7e81df431cd0a2e9de1ef053acecd98608bc89317ef0720bbe10c597c133d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b