Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
faf44e1de2cc5145f0a4942df367ff4e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faf44e1de2cc5145f0a4942df367ff4e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faf44e1de2cc5145f0a4942df367ff4e_JaffaCakes118.html
-
Size
329B
-
MD5
faf44e1de2cc5145f0a4942df367ff4e
-
SHA1
8ddac4e643c419ffe37992e257c9898ce90af17d
-
SHA256
eb93a4dde7d77a2bb76b2b2554fb1ed1b67f773f036b80992c10d0b4577113a0
-
SHA512
9f36e4cc5ef13f0cec6e3d00b032b162d4a37015d037130fa40af8d77995256e71ee658305aea2c534041c1c35bd52b24fefec320df33f6a119ffdcbf25b1f24
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5538FFE1-7D19-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000a28259eadda27b1f08cb639c21bac8c96fee7cf1f6a75893d222f2114ac6d206000000000e8000000002000020000000459dee9765b25305a4e03718e9d227237aeaa5711031df6c29cccb134c9949e6200000002f621ba5cd797a8edcd04f7da8a83a68cf5e01c83dd1b2830e4b45674d4e887a4000000020664193910c8cc763e30259d43532f5ee8eebc21c59da7009700559533c48695b71796b0a070fc136e140ea64171f2fbcf643d7f2e08642a41b7e700b2a58df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433635195" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e042b02c2611db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 564 IEXPLORE.EXE 564 IEXPLORE.EXE 564 IEXPLORE.EXE 564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 564 2056 iexplore.exe 29 PID 2056 wrote to memory of 564 2056 iexplore.exe 29 PID 2056 wrote to memory of 564 2056 iexplore.exe 29 PID 2056 wrote to memory of 564 2056 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\faf44e1de2cc5145f0a4942df367ff4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8aa73226b717622fa005553333437a
SHA1ce0e53bad6d747fa0b7f592120866ea0dc121f3b
SHA256f0526b5ff593e26ed18231e5cb123bc4b2f9e8df0c757026c1840b59f35b5dc3
SHA512d6f2597a8cb6964d4eeb5e5ce097caa8a4e367ce648c2262ddfe271459bce28e62c422c6da4ef7c3aeefc00265895e8dc42db65595f24343c8aa17f7709bab3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67b945c56c5afc62009db14b52f104e
SHA10ac51987ebbf317547acca129180fda424e8a33a
SHA25600e86ef345fb240ebdd3d5d77862ff86744acecf9a5239c54c92cb11e9470778
SHA512a9efb81a426c57cbb1dc13117ae4cd051d3b3548340df0d20eb12ea5431f822978e5690a76bbc76eecb0601bf22c08dd59e00b6f84f2d81d9db5787985b6910b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56066c074ec090aeb83749c14ff52e39f
SHA153422dffcc3a204560404b1d379a2b60b848d1d5
SHA256edeb191645efd8b9c9929ee0096c7b3e30f3510770f6fd89fb2182d32cc13432
SHA512a2e7a6d3382af16614d6e73f5c3a9ac88a1d78a80ae1566c8e196b01098da71f288607cfe15edf340e390e7e773f3742e1f1119a6d63292d9f671799ce36d757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572abf8a4bc57c2e921a21c46bc2c7622
SHA13d59b99f675201c9f9a285188eb27a9c9ea0fb96
SHA256884570f9b2eecf7c2c686f14f48f0fda68619551cd51986202b40cee78db2fb2
SHA512190d2535b1ef76b4de32350b2b47f9af5f3acc2e56726d01d5004bfbe2a7927f3e7eaf614cc356f6fafcc8a72d4fb5ea6334021ced7a796991fae6ddefb27dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8f1ea99e2c5cf551a6f13191af59dd
SHA1ed7bd9e2a3f6abee466e6ffd85f570c07496e388
SHA2563a4447a9d55107be039c3d4ec8f0c53a45d2240e4c3a2a5ba13f8ff2ab48c57b
SHA5123aec947096a30cbaec58eb8d3f699018e9b7aeeacaf25b51db3f35e6471460df8d9237aa84d94aabc76b6a8b2d4929f48901c0fa53b7d3f1480fedc4fe778e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d367730a6bf02f4a2700ef7b03ac0b
SHA1b4fa5b7b8d1f1af5e6067e231f193fa32a733742
SHA25676ab6c84ab84902242d5ca0a0d471916956c56b8c03390b7e505bd87d4b49964
SHA512c68bb23ab659adc9688fc74c537263e35abf05bc11920a5d9648b59d8b6048a279d10b2f67beec0aecfe19989fba1aa318c936eec340fbe79ca13b7eaf9dfd39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542edd11cfa62ba6af101f5b35d2bc72a
SHA1eada10a5a8ffc23ad1ccb718eded99c546f818b4
SHA256d08b4f7bae000c5209062a3826b9e2a7d7b8cf412f64141ec547961bd52421be
SHA512ab8ca2a534b04d2f58394662f7e2c67039092ba115c4ff472981092aed04a7489401e951b768acec077beae35038d8b6258120c3b59830556fa09d1e775d22fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d9a4f1c500504eea7a82eba227704e
SHA16e150c1e65e8c8b5df23d747d5bff8c0408d98cc
SHA256c57c2cc3e4b93e6b04853c4e755d59edc8cb4c554e36f3627f00020494da90ae
SHA5128a4bda7b0ea12f4c23e79a9277870f753c075ae93a401409341942cc4a44bf8f16fe0ae98b6d1593cd273ff59793b3f5231acd84f85bca2b5b36e76f70f18bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae5be7c4eef02cabb1ed3820f319fda
SHA150edbce2eedc9efc0f57c6b2d46bd8720e971da2
SHA25614619d08af00eb08746e770edfc59299cf5fb480019fab01e55e286dca35b973
SHA5124a9b62c59a79becf84b4b8de6df9040a59e8458ac7e533a1ea805906a496483286b500e4859f0d585bcb51a20eabb340e4ea05358abaa6284edb432347d91b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f866d5d52f56c63255834bc74bfd01
SHA11bd42d9381f69b62ebd4e8e38f1d1a0dc15312ed
SHA25634f1cb2a91a92a47fbe80597f1a38c264313e3190f3bcb8ad7382158088c747d
SHA5120d18e22d8a39a2a15a91f30386a7abf0d4eadb23608fab113fa6ebf4f79dbb8759278e60c9b4f8bf627376d1614a382d2e79eec02a8f7382a9a5536624ade8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82d4b8a9d988ada5c13bfdfdf81b7ad
SHA1eb1fea578fc00e7ef76f7799f1231e2b092b56ea
SHA256ece13e164dc5731409cc08d6930fc2b45f94c17fe291571d9b9cebf629cecb5c
SHA512d47ba874c0a666799ec366b5bb30d2fe4becfe48709aec6b5cdbddc53eb196716825f9809e1bd1be3d8320d570c872b6c23293ecbfcfb3b2e9591d250a396c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ff2f19503a5f6837e4205a880e33eb
SHA199833a54adf30983c696b79830b9284c486a9b9c
SHA256a1bc22d748568b085c7ebd2a727aa2eeefebf8475563d0c345d079eabc899630
SHA512d743d527a199d24f528c9a133edb0e2f51801400330cadcf02b4665bfac6348b1c0e74cfe227d41f4e32680eec5ea91a20c58f1469e7600344f434262d7cffb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9e4acc712ecd92733150ac8e2bcd9c
SHA10e553d7ddfa1cf37e3b38c78977b8d747a9fbe16
SHA256bb726ac39e69d2978db95952bfbf7ab889518dfd319558b4728132994d20d247
SHA5122f6fc0ad9c8a15cbc66a0529bc31958e917526e6a23d79e014ebf1a58647e3debccefb1451307b207190e55490e83f96fab4b79fe5f04f9efabff2b61ce76911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f126445e1283c4bee926eeedc131bffc
SHA12f02fcbb1ea63af537e879ed93191f9cff33d691
SHA256de67d0fb824b09402bae49b56982bfa02c312ffaeee9e8760a285051f5a4329c
SHA512ba2bb1c289b6c2ab2adbd7c66f69fd3ed7e8929315866b636ec0ecf93af33f0d8ecadf23c77b79eeced9b46b9642ee3b4e5da51261f955cf79b4c70391598c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf96ca0b4c3a19f389064f09e45b47a
SHA1a07b582be039f15671c0e7ecbc7c8d8093bb487b
SHA25678ca69ba3934031d1dd1bcbb37c13d7b76026599b8c8621fc5b5db22decb51ad
SHA512efe9e04f602836e7998245e9c14e56a2030a7643cc4af90ac61bacd615e98c80dc4b2a9dfa7707dabd3889fb16a358559eef1322ce7a1a755fb3f76e29e999d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6244dcc13d1561160836eded433dff
SHA1371d142365709068a0828a07514ad63ab00d413e
SHA2564c8d0e7bed4d128f58e435dcf4ccf1cdc84b6d49a8b4d0597868e2497ddb642a
SHA512167709dc170e5836a5643101b764395cee610c5ded2cf90c859dba9e64844a25fa17fc96c5377678423d94588f82b26bbd1129cd380b126928af6b9002fbc571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aaa33b8377d399b9fd16537cafaa3d7
SHA101bbc955e396aebecc201d7d2e09731e790d5801
SHA25631f549211a775432ef5e9ea1631e0afd8427db03e883f8fb81f2e39b12d62ad7
SHA512c9302bf163cfefcb492a1b4f9174d5e0c81edfa41861d3844f8b642983247925fe8a3101d28e7015e18c10ec17e4c59660d69402639c7789eeefb997c2b2242c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b62706c8b7a892f1122c1fb36c44bc
SHA157259344dc179bdbd2e720de09b44bf5c40ecf69
SHA2565b86a3a39f428c57ed3fe6c1c7b7930b16450114340f321bba2f9a6b1b7f700e
SHA51291168d745da9687e4b0f4cc43248dd988ebc514a0119fe65cc83c8e1bb0dfb08fe3f87f9738d58df4fceda495635a31d417fa29b8ab964b9f2a063fc12142163
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b