Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
f697ff9149286cdbefc81b26327a2abe_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f697ff9149286cdbefc81b26327a2abe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f697ff9149286cdbefc81b26327a2abe_JaffaCakes118.html
-
Size
3KB
-
MD5
f697ff9149286cdbefc81b26327a2abe
-
SHA1
94bf7953f26efc9aabb94dc8560427645babd572
-
SHA256
831aca781f61fe508285068b85bf6fd56476643146fac0ccefa45b3bfe5fe9b3
-
SHA512
5fc72bdc4b2aec6c28476b43e252f8c1a9b1577d6aacf489673c8bc98032be1af2124afc1eeaa22c3397ba38a2a37d6004d83b22dcdfb23a6e4bed8fb87e80ba
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006cdef3ca2acc6e381f7ce65fe50ffa50acc5b423f23b2bb7543ba98b143a93e6000000000e80000000020000200000005749d67ce0d7b1a87b4b9286b0bd6acbe3499d65063c8f475729859f05b738fb20000000e953c2595ee56d683ec45937afa5b477784774dd8f87bdae451c6e24fdab48cb400000007d92714fb5d1e378d5210a54e45afafc13415f8fdba66dd60ddb77f9ecb8e8c4e2adae1bdf6d53e7d032e4092c0c1df8b078afbf3885d8611697428ee42caca7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0674ca3770fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDDBCA51-7B6A-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433450282" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2796 iexplore.exe 2796 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2692 2796 iexplore.exe 30 PID 2796 wrote to memory of 2692 2796 iexplore.exe 30 PID 2796 wrote to memory of 2692 2796 iexplore.exe 30 PID 2796 wrote to memory of 2692 2796 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f697ff9149286cdbefc81b26327a2abe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcdce4f3b1cdc98e797b2e6d96283ffd
SHA1983d99781c1f20214854eb7d396f4d54b24ca3cf
SHA2564d26d193f9955d258d2680f46b1e0ba974535c395b0d162de3c1872cbfa18387
SHA5125256af2270208175e096f669b71fb18aef39ad166caf9ed8f67c25803cde49419db3e0ee43aa476312f0d2ae8b17188ab36f76fbbc95dd56e0639a7eb05d919f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583abb56d2b6512a3297c69e6fe58552c
SHA1337ddf8be45d6af4b00ce1395e890ac9d552fa5d
SHA256d9e393af08c6ef0187e1b8c98f281969ba0129288978646c5905dd7a946c5da5
SHA512e87e3c48bc9f3a7693aa7b136ffc6e863e6cd02959606c821684d5a598a9bcf145544c20bdb5ebbc41383d0ca647cc2662629d7e155fa45f80da111eed9c90ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589632cc2458d09b6081f50127bb0154
SHA1d3a290568251a3d897c352dbfe4ad2b24a79fc53
SHA2569e204537e9df227a9021cda09cf6f5cfd91beb8646b1be94615131f0df951427
SHA5122b6c6b0e52d755eb4b4916d5d02bce9125e02198e59aaed2cb58046713002ffc9978e522c6abc13cec2d93aa5b9ed9102e312ab7ec65913cccc292be81fff29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25816d4a045ff375c779a84c306ad87
SHA14e64f851ae4f778cae5d5dbe640b1e8f84a72276
SHA256175f333804505bc720377900de06fb703a11457b13a6f13c8fa897ba1d73fd09
SHA51213fae565d71c7276029185ec63cba78bc4e8a23032c4984dfbb1c17383e5ba666d0b7427b976bc3d583d5dde7041cf2f736867557d8062dd8ae13cbec4aa699a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af77943c71f6aacc7bc58772ea12f95
SHA1487a20b0bbfef4248ed1b196ad9698757f536bde
SHA2566ae0db16df589763fdbfda324a89d678afffc7c33f967ae60b2d8a098734d7a7
SHA512316ef15488e810f0a19f0eb44c51dba9348a90d677923951ddd68c594c2ce8ee90d2d162354cb545292f5bd4463745b928567e7cea9b9adcb3886fbc4ba067d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348e4a306b008cad656c90b1c9a4b69f
SHA1aea7506baff8958d95212b33de3afd9798c56ed2
SHA256f971f965a4741bfa8921a84af9761816d66fb159c3539e66e30c4bdc36f52c59
SHA5128794854d8c0a31703be7f664d346187539d3af5fa01ed34d282b27341be8872649c622ad1af6b97aa02821bef7c4332962a2716b7397b809d2fd0850d2259137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a44216d5b9b8c47fd8670eed89d3842
SHA17c185bada4388ce1a4d3e0b7f7cb9befdf7bb2b5
SHA256701aec145132799c2c16cddae22f51c3b1add068fb49669297327d615adc183e
SHA5123de07e30826b62e423111c3c294e5f43dd97955ce9de96d0831a16083b22b65f092023e1de179b8c5e3eb67468489d54377eedeffb22eaa3065acc848476d840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a141208556aee9e0baf9757e8dbe8d1
SHA1e94db42851cd5123174263e30fc322df63a5a1ff
SHA256477cb51795dc532c5eef7209385e102e48cfe0faa12f2e22c5eb57f4af7e41fd
SHA512eacba6a7db7a4ce5b9745cf007abb16ed4fa76fd663a785d7fb13c4f41c80c93b6d86c10958355c2114dd39a78edf97f1d5a1dde5578fb846262686040bd694a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1510f5ce077096c2bb6ae2efe759d95
SHA16fd0519d4f15b084878baedbe7c42ce94edf56a4
SHA256f2fcb55919d56e338049e46efd3ad1c98c3b5ee9b64ef14d52e454895c270a20
SHA51239c4e3764466d0d2ef0f51ec95bd4d8bb5683c99a3610083e0d47cb2363f8cc19991f623c3a74c606f4d1c77e59c70e61f3aa53eeed17a22a224fbf7775043cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c1e3fa087fbf2e25f262f0bd313467
SHA1b3f17e41c419926e2d8df9c69fd9974699b05a70
SHA25627a0067fd55f2284d83f08f6d844dabe79e40c2187c7da937a2f8c129716d74d
SHA51288110c6ef776b5f6bee521f18f66e9302795c0258a7a2d497336db2ba361039214386ad18e461c7f9ef9ce1536adad3098fb12817b13c58625d4762e617944ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cfd24eee3772925e5b47f3e75fd281e
SHA1932de5dc6a0989797a89fbecfa1099293e3a6f4b
SHA256fca886ac79683b2f8853c2c965818dcae41fedf33221232904a80c6218500475
SHA5124975d6e31560e5ebcf13f1eb747b1a7140b693c25013d32184d4e68dac64d5de901482a665ad9c2d44e8e8b8c85eee204b19d2048f243168d2980456c2ef85e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543059bbd6df6d13af4aff8ab73daa9b2
SHA1bc795e9e15c68a4495376f659b81372118b004dc
SHA2569f2379ec04e158828ac73e53e6a4e234b4291f35dd866e7111c6342949ac1104
SHA51262cef21e395a2538eebc28125829ece603a59dd1f5cdebdb17acce34f263ed18fb0f1f1369f49e0b662842ab86938779011b83293187f23dfdb769f9ebaad5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50593a80742fa6a3c84f10f39d8240dac
SHA1693c3cff8efff785cf917daf8390ba033a342fb9
SHA2561daadc009f742119858ae607dde9fba5c91387aefe9098a9dfe1470be40f7944
SHA5122b28c0496cc22a0bc9e27a0094bce6214f95518133058d55589960750c519b5edbc95525fd7c96749edd46133107b1c712b5f51697e5fe0d9b87bd69e9c108db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2279fbe99c88c9b46c9d2b69fb8e69
SHA10fdbb0bea34cf332670bf76242d5b4a7b8d2790b
SHA2567b40814fc5ba46ee247a99e2ecb4d51a99b5cd406a16911e14a086914dea706f
SHA512daec2e3124a2a19acbfdeb0d258352f6c3dd194cb71eac0af66e2297cff2f7f5f8d48feb74dba0b014dc22da23cf584fa4a45b6802d56c4d717b8987b0d9d6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385b21a68fcac92e5d5f5065df490b2a
SHA19cc7244c6db1798f2587194554fbbeb3c9b00d04
SHA2565d0516f9e560ef291a7ade004305a1f27fde5a2d9c6438d0589fc1e82e284934
SHA51209c9c292cae9ed9b091e294e074a791d554b28a2192bfc32f94870f6ad1b9fa3d4e066c1a21be39815ba3e823e97fd5f45613530eff4ab5091876860eff9946f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a0056b7f080667750e1315e65624d2
SHA159127cbeb82e6e8d8f103a95a0a3815a1d5d30e1
SHA2568e29b7734ca531201ab05c2eeb7280d160786432c17f7fbe39a58a03909d6b0e
SHA512a775e8e862815a8a4ac5c9025560755377a2ebcc33ce80ba7d00b45e588cf1c0cb44765573fcb61fd9b740608f7291b474b458228cf1a720f96d83227e44db48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ebef605f6fffe6e538835fc6638cc4
SHA1787aef84f82f1c292692bafa708ea66972bc742c
SHA256fed6cb85acd5cdf425a38e3307d54d4390d1a11d1b43bf6c37ba07f232c748d5
SHA512a4a1e994c6a25a0e5a289f79589f9ad67b912e13757e714a187b7e2d2a0f4d9026ee975ac32480421cf9791a66e9ea1141f8b88fa4b39ba44002cbaa4551e2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7403cfc5648d7b53ea6d890d94100e
SHA1bf70f6cbe5158e5fcd33b045dc35805530d9d74a
SHA25626c8e6351bbee84c6e74be2d33d2c4122a343ea0d2e88cd6dda306454dc41d4f
SHA51214f700682cdad86151f9c0aaf09092a9c6d52794dcff02cb5b9e379c59f653c1e11be6bf21b94f6dac62e329fcecb777646f5604bdb74d43e4e61e40a49f0a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122804e7c4a99bbbd1c57c9d8fb47660
SHA1660147e4fe1c699dbcf827563250a7485d97510a
SHA256c68c387db4fc61081eb86aa2644bf30b1288589ed9b9d48183c85783365e3f2d
SHA5125f53e7334b4d772bbc3d4b46fa6942e16c9fba66441d6e565be6bf928f5b19380c27cb05c173c182fbd713dac5beba6152a92b240aa006698d171c0c756c14ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b