Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
f584ee5c6c61d503b2a198503a026352_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f584ee5c6c61d503b2a198503a026352_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f584ee5c6c61d503b2a198503a026352_JaffaCakes118.html
-
Size
3KB
-
MD5
f584ee5c6c61d503b2a198503a026352
-
SHA1
61a19cf3f9fb9a80b190996bda0b966f6263cd43
-
SHA256
7037769d6e3a6e85541eac51c9c8795d33209964755e7ed0fd2011aff8e100c4
-
SHA512
a98355687159e64989e16790c133e6450943280cfdfb78bdc38a39b4e8ef67b48926ef45368fdc58b80fa49aa6880c8a76ef616f36ca05d7c9644622baf20eff
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433411951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90146961-7B11-11EF-9E0F-4E18907FF899} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a678661e0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000004c979cf6d61314032704e493ee0c449c503152f41e51eb516c7c07a7cef76422000000000e8000000002000020000000e5732d4830770b5659e5a9006378e749b32549a0df0eec755a6817cd2f155616200000005a850975b5580fba79599e34bdc729da37f7b15d58bc62d5577ac5cf53fa81a9400000008d1a7879916eb30b945316090f629db950af349dd700bb2197aff3243f56b2d866d9b5773a3ec87c9aba228489212c08e33a8397b002c46a19ab39ef91e5e4f6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3068 2520 iexplore.exe 30 PID 2520 wrote to memory of 3068 2520 iexplore.exe 30 PID 2520 wrote to memory of 3068 2520 iexplore.exe 30 PID 2520 wrote to memory of 3068 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f584ee5c6c61d503b2a198503a026352_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecd8823217deb4866e85032fb831ed6
SHA1d4329172f428b83727ca4ecfc3d3ef7757515547
SHA25697c990dd3185d481fc74f3a191bebcdd64cbc8159e662006e441265ab5d969ce
SHA512ed17b39778f7d7220ed2e1c2e5a43fef87412e09cd869b0e73beed49e14623af7d1546f0e1acd338f2811f3e067a660f8306b5cf70b9532c32bf6e95979e7461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7167ae9853d6358a449478b65cfe2d5
SHA116bec176fa404a3888c29d06485e7be5928c87aa
SHA2569139b8323431039e8f2726abf702542b754d3241d94362f7cbcc8a840b49195b
SHA512b6679aad4b88820b915bfadbed6692df577d3c6afbcfaa476866868a25c7e79ca62004b6ff97cd17716c2da4137440887e7a6c5ecc709a81270d9420e9a5fa90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b237ea862a0ad3ecf27f90583d2bdfda
SHA1f62763fc5969fa91f789dfd4b71515cb46504e46
SHA2566d4a6ab09ed1f94067b03d941ab68056b6100bde3b8cc0855185a9ae563976ab
SHA5120920447a5636f8a3a1e4fb259bc06b45eb9e93362cb2f203c552e5cbbf4c6b21f5c0a366596a9a816721088106e5673540b261ced3803f329340da4ad7928df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbeb65d183a83fdcf841c44ac4835633
SHA14334813ac325766ca6ca6f5b7c229fa209bc5641
SHA256fad7c5bab476c3702792868fc91460d8c2cae1c5fd9bc1e64979123935e3c825
SHA512f77ed6ccd04639874a108d1646c7cfd9d8727624ad9cacfa859d82e337c8b2bcc11101268c4ccd2569f5408fd6b829dbbe0fb07a82c7ee20a6d770cca2a05737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a697929b968a035aae7a355c5bc61b0f
SHA1e8dd1251b918a1df4b7fe9ba86f20d57f6e5da5d
SHA2565a098491960c080ce91c811620484330cdf2e8c45bef4f3b265c36ab6e94a844
SHA5124a0ef6eca5200605c617d0969146afed22ae5f64f9641ec9ec0ddd03c778c0781f8d644bf612cfc927f38b89183ba120351f35aa113283440c7f96f085d86616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f054b2aa4b3077bfbe003bdd5f2ca4ab
SHA176d3481ed871762699abee3248cecd98a356acaf
SHA256213b83818b20d5faf73dc4ab2119fe78276e9b5adfbb0181c67ccd2599bcdb7c
SHA512235c591c6ba56b360e1fb9c0dea19c383014131010d19dcf6b826c98fd99ca127380fc83bcd2e0f4a3be2383d74a961711def1f0d24d874d233845a845403c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db02c3595232e886bffc0dbdf18b9b7b
SHA16640b383c85009498157f3629234ba3c52651a35
SHA25698028bce0efd8fe0f023b6be1dad087c208f1f0e6ddd8c970efa60ef18bcac7a
SHA5123ac70c678e1a0335e13db1069f0e20a8db3d0a829b663ad2017f2eaae5443babcfa1deeace0b8e07a1ec9ad1d6b0e9e43dc5b0bf31cff57ecac748ceaad0e69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a59ab88c6d52b1276f5710c0368e066
SHA1bc6b5c84effff75129cac0d566e083f12882250b
SHA25673bece9b5d4842472d6d684da5542b6e196a711aef1081dabd56db133e4218ed
SHA512350396e85fbe6db2087c7e23934913d649239d84983faa2da93cbfcd4bb06e3da586fd791765eecb542fc29fb0de4b0ca0327c96a731f2963ecebd88b382f3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe9cb11f853cbfa9268c2b06895ffef
SHA14cc06f694d2ef3bf57c6f343114b746a09283412
SHA25647cddac5e43f969b1760601c876b6340a7a693bfe0f158f427bfce1335747587
SHA5121b622958571fa4c5e1ebdc7ebf6e15f95b4d5902f0edc3dc30933aac333516c14ee595eb4915bf89c92be0a01cf9a62c39659c59066d1fc5cdf7a0d9276f0f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452bf163f6396fe9603075906bfa0805
SHA153517d55d987f47bc61cac4e03e659ee157f6b56
SHA25688ebee8059f7a00b7d934c1ce840e03bfe933a8dbbd8fc95edcdf8a9822d610c
SHA512bc044ed6db7c366e6aee5b4c0db21d05c3022e008f964d7c8dcf8782af97e2562317b080754a329e89796c1360e7e6ccc7aa8bc4eacd316aa492ed253d6a1d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b076ece50a88c9e8466d1002791eca
SHA11b0921775f60a3b1fbb6a96e54dc2a58a1c49563
SHA2568b472aa8f507c7840fc8cf2a270e1e944fa879251c8da4d36bf1301ea8ec42cd
SHA512552c7c067e4d8ff795d16d1a4cf7e0b382cc5c9f9a6798adee40cf93a9d886ec02c9e06f3a053c71f2abf689ad89413139d732883955aa7f072963862c50b5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530de48d1dc4712606fa9fb02b3a63758
SHA1ba6ae89bb27e8bef2efe7a8ad596da9d614257bc
SHA25656f1ff5bbd1cac56ef0ee8df3cfb788b103af5fbdac8397de205983c4ae71b7e
SHA5123614938e13ffec0f2af30dd5b89915ebbbb0147c712a58c29da230faf05d7ec976d7a8b4bef6c1251271d9ad655d2eca829b7676aa39b0eb5228061ea0b92d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377171de7c8557bd12b3d0be7e936254
SHA16ffaeac74e58182d09eb693d88df4563b382cc84
SHA25600ce187526ccd4393510407696933f37c2da7788e3c5e94e9ded838259b5ad26
SHA51222d15405e765dda1dd9f4c63996f44e9a798e41e44f99df5a47081f0610da81f91cabc73a010799b7061381814663fdde6ad6e8f6bbffc60c800b22cd66f7209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51423c09f6bccdc4a4fcee85b3cdd6b9e
SHA1f67928afc37f757fe28f8348a56dc82db5d4a102
SHA25634502e669683450183158984cfa76dab2b49c09a157ea2c23084e93effb3f18f
SHA512994dca22fb5151536c20c31df7c476b6b0dcd6f73440e4800764c5b213f076d55cf04a110a8fc963aa4dc3187192d285fa981afe367abfd3c2ed903f0e495791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22e6232e6f3d2cce4e7737af7393fc6
SHA1a292217a61969b5beffc9fa7c21df3696354c054
SHA256231234375ea62fe26d450838ae62dea5ce0eaa4f9f967815d75c4366407b0730
SHA512bfb6229be1500e6b08b03525233f4690e800efbcce9f97f2dee66658896dd631cdaa9054d37470b9473fec1dc694ea85d1a181ccde34f0cbcab45ec7e6c0769f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431cd61905c70e27f8188bb11a69fd8a
SHA1f6f10363b96dcdb1931f3a140cc3589cb71f769f
SHA256929c5875548870bd95fd97a67757de83fe46d0f49dd4320b5312870780d96e7b
SHA512a84bd5b6a2a13222dc2cfc898c94e68467e5c0d4a3925b952ce0b73729f6f3f6c66b46ee3390679243f550d1c511499423722ee7820c70bf84f6b9ac731c99c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b225c9276c4d2c4aced9b0b5244b63
SHA1007efcbb46e803aa8fdfc5cad2d4e2e23aaa9384
SHA256dc0b1f9749b3c3df0f8e681401ed48a7003c04653745a843c2ba1ebb72f5c13b
SHA5121dbde7de8db7a674594ee4132b1cdf4241c97d2290c947e515e58a7b8600bd77cf461b867b0f31731e61332ce9889f57612dc80762b9b4fb35f1d82d0723191c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3b3eb62c3185893013cb4a055cea4c
SHA1edd093c38947e80251c9eeec2246455d64b4ff53
SHA2561e91d99353cf42bf55b0460fdb77f995f9a6dae488a549e0501a1a67c515b159
SHA5128e6c6debe040545be8ee6b74f02a8428a119a6b2ff6bb1fd70ed87792bacd9b2aa1e10d8d2128e968c4768b4477eab659d0efdf3b6adbf0650f221f7b3f0fec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d64b7edd8acd9d8eb9724c7633f77c5
SHA16efbcbca4ace68e6cc78c9201693447b08b53277
SHA2566941d217d87dc7f963525256a1dc1325e119651854f7ef4c30d977d37a061aaf
SHA51285d95f304f1a54e6cd7d1c2cd1a7e56e51bdbc445bac85e1826611c500444bdf7093cdf6db4d8d8fe2df329c7c85d628a3a47c93463ec498233b0f5fbfe06fac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b