Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
f97b69d686aeda307af338d968fd522a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f97b69d686aeda307af338d968fd522a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f97b69d686aeda307af338d968fd522a_JaffaCakes118.html
-
Size
3KB
-
MD5
f97b69d686aeda307af338d968fd522a
-
SHA1
86cb3e88b2d132496518d022b6e0f46e9ee7a8c9
-
SHA256
d7072b186bcf84ae5570c972a97c522af682246cb60cb75fea258232223d2fc5
-
SHA512
89d2b0a21789a3332f30320ea42b6614d1f768ee4c03a48926f07a588066e7d64fdf117b8ab32a76bf1125d4849b5022b317cdd1d82f2703c524eac3aa80f814
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BF23E01-7C71-11EF-9A8E-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433563127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005058b03e2b7ef75bfeb31af40ae09f84f2e3f8691f41f615638d609df5bcd78d000000000e8000000002000020000000a697bdc4b583e37e8c974d0a85a37656ea9ba9dd7dd19eaf0a887c4fe1d8ab20200000008c97958fdee8a57d36e52c4a6d7c9fe6eaffc2e53aaac728cede1aa5b45fd96a400000005d7b13983563e70570e84006206d002dccb6839145bf2b66934477257ba09fd1aa5856de2b7b0eef06675f707a501f7c1f4c9f2c35ba5915ff0ed8ec1490d5a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b049b7607e10db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2732 2932 iexplore.exe 30 PID 2932 wrote to memory of 2732 2932 iexplore.exe 30 PID 2932 wrote to memory of 2732 2932 iexplore.exe 30 PID 2932 wrote to memory of 2732 2932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f97b69d686aeda307af338d968fd522a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f4924a4bf9d3eebd5c2409089667ee
SHA117529d978ae35562cad81e8af17d0224064a1275
SHA256da991780a05f00d89eb31c6b07e6881c7e9c8d7eee73a07fc48501f76085bbed
SHA5125f034598575fce278059c3b45cbcef8165c71030b0bbaae11333bb406794c4d612b9f12ee455583cfaa5251e9361aa32739067e276f03fd206544f7fa7f5d6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b0137039f1c9ee6ddc335d8f35ce29
SHA14352ec71fdfac86b5cd85b43cd59d92113d2b355
SHA2568e052e2bee82db7596f8aa299931f74f0e756d4dc1054aa885e66f2844e9f854
SHA512390d6d45c35598cf3bca475c7174c0ab7a2d6bff38a8ceba52db39851d9b49065e604797df13a7b40a3de2f27568bc6cbde66f9e7dc4a0d81cb8159594ce4c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75c83eb3cf022abca012bd83776c635
SHA181aaec499ec612c34b1628c48a45a435c936eb89
SHA256adf7c39491ad08a462c0498efa076eccb44c152f46d8383c4c59f87c8598819a
SHA512f8f352e7bde15028e4ccf287e095215fab5870134ef9ed198f256e326fe3bda5efe872acf92263039243eea548b22bcbe3e10c9ec57690aba264d84a9c7fcf98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bdcbcb9777dcd615870185cdc242dfb
SHA1f5977b954d8f4038ee078af29c72f4c69b14ded3
SHA256fe90c7979da383cdad39a3513ff302f470c89f9906416c1751048987bd098fa0
SHA51295107bec377d40028eade72fe962fa8d8ae364c5f50e2afc10540daeefed7904e435765ed52d37cec78d25da440e31370733eb122a7ad7deb56bb2568d1a4df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf6e8da3d654d204b3bd8043603c3ce
SHA11b56194eee63bba0caa3ed64fd2107cffd221330
SHA2561dde458fffed761454bfaaf2ea8ce87fc9a87ad5d5f12194a798e6005b6075be
SHA512e7f7e9a9a4378389729e95d8b004ad23f8410b71a823467646d7ef4e4c5be81a887eb06e3bfe4e5691458ff61575b13449280d7a59e600ad59c2d3bbada5c1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51566e3fb7de373e8c28b40f75b39b71e
SHA10a75639f4d49c20720c985c837399411893fdaf2
SHA256b91c1415def1f456139ff938e885526ec531e7c537127b47dd0b2f39774410f8
SHA512a8fd65932b39e9c718b1c830e68e27d5fd3ad11af3dea0adfc9a4b230da686a745f2f6a18cb39bd23ee490795539e96359945ffb90b9d9aafca2866b9df71543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a33261567e3038e92771829b8974595
SHA17aaf05661589ab672a1df1b955bdb6a663cc385e
SHA2562e1680a9326974740c986b9b130ace49d6d1a7564588a4e73bf62b6dd63b3653
SHA512a5fc989d3356e473aa29d0fd59fb60d8e718703b5a68622023605b1918ba7655bf7d2c32f3fea856841653a5b8ee85dc4bf99a728f8c1e7c34da22f690a8b310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559fd6c61794011dee946201c685d4a12
SHA111a794959e8dda8cb34199d752a899f83e02ce3d
SHA256157121a81334b863a139293e97e813e5fe5aa501a657aa76fd46695025132489
SHA512645ca480df309d2b4abba34adec18bc6b96de835d07a92abced167b1d99dcef4aacceb3bcdcff2a04e53a4d6c78ad3e7d3f010c9c7bf15490cdddc4d5b4b6919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503fab38cc41de413599e4bc2c94c9020
SHA12a45bac0c28d6f14dfdc562d4f526f283e066d21
SHA256a2252da63d9dde9c934c5f4dd5a9466978b26401ccdc46b447f83bcfc334221a
SHA5129d31004f9301fcaabc127e28ff6638a80ef73a4802857b70894cad9289fb5b06fdf232a992e3bd150660d3c9f5bbd5103de3c7009b35e6d86c9f0e20cce7e3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e81abcf92b89e5a77ba6af98e6586d
SHA15d6be57e61c282c4bb32395b6e91e431873e5a01
SHA2569ebb5220d155022d54e0fa4bb7da1229326cf93eb7a042f53d7e1051a908b81c
SHA5125de59972413f94b1e4ca84041d502cba94bd03c5248bb0a41e09b39c480cb00bc671681c22f3ecde095440c8cf251bfe5930216cc67d51a2aabffcd8de63df4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf95f5fed3eb805ec8b421f0365568d1
SHA1eb7e8d0a1d2d185f36ed177fbbb2f293e35083f8
SHA2565fa3c5d4e61c2870362be1729ec287ef999365ec060cbd0e56769dc86b8e2ee3
SHA512df64c50b60aa6a1e2c4140d4ec4cc1db8d87899abfa9b7829c4c9362ceb03dc76997c175ca41552570a191eba05a785a59fb321d13b01fee3e3f7aeee956181b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5551bd8728692d46621744b95cc6e6757
SHA169386c2c4d20b611e43136af8346fe413ecd154d
SHA2564aceae497590a4da022dae99229c02cf0e068ba553f5ebfa49c5aefe0932b3e4
SHA51227cc3b8992d40f8b39bd5be82de677f892de4a54b042ea34b090818703744bfbf82c42e561ae6382379820fcd9a2df9e2fe2ce474cd599f35244069a0d9e47f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd91097c5e2fb9f6b4df2fe2ba0add8b
SHA11eccba96cf93b667443420e54102769e9fd13d2a
SHA256c38499de6c8d0565347768f0fe1731b780c7402d8d105969186b9d3aac842768
SHA5125ba7339cef2ae209eb48a734c31cd2b48dbfd2374b0b2512975e16d70dad50dc0c0e422e80c5b585bbfc8562f831092e43c99918b4e0d5084c8733d3e28c4a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460b8aa90602a5210abbb760aeb35612
SHA1a0a4b35f1037e22ebfad5b5ed99aaa8707bda08d
SHA2566ad419e378748a9d4695e3c76e7802d221a4722294ca140eec8085ad42eb3e06
SHA512f4af11da897eaadaa31032188900d459c03a95186c22acb3643103920efd9ef4ea86aa7b9cb93dfb3cf5e87ec4f1a7bf349c69a9f73bfa68769e051cb7369d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e595f4a12c778400464028589310df0d
SHA1a704a3c21624c9ff7687930057e4a780a94035c2
SHA256d8d41004c1df27a13f3ef6aee54679473592eb2cc99766881fb310891843994d
SHA512bff150f50cd8a198304a12e42dc212b21cdd0807ae324cb442c5f351a2dcd4a5d47e3555df437b0981e3dcf2884d8f5de5c6c8628c051328c2930e4c82ab5fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a513c8ff68b75c38d7e1735edaf2988e
SHA19c94626bae60ebb62ae5d875a0e5d1d4c0215fa1
SHA2569dbdc02dc6948110b0612b6ca2ad1d177cf8f8e0b8f780a03390a46e72a469af
SHA512627fc66b09821f2727bac1a3769063e0c45500dfe7cc6a802805fd4971926e7082feee0de74b1085ab7434cf269869eb4232a89877be9f9bf0e9f4259e1a33a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52936fca500c29cac0a7bb895af44f362
SHA184eef7846ea216b401fb2b3dbc3c05d68b6c1864
SHA256ca5c34c56ab8666b7af331d47e3ba7fa8eeb243b916af69ab1404a905a3602fa
SHA51265996b4ace461dcb00052d91babc5e67e1fbda07910e508a72362dd63639bb536cb5fc03ea691ac081702a022f23f68efbcf40658067e07f21efff4f9873c046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f074b3325b72d26c377101c22296eb82
SHA138700997ab91499cb558864b8908a06f7acedb7d
SHA2560de1a174b5736a3a09977d847bdb2a9f7d4b208982320f2fb4ca40d6c2dc6573
SHA512a54566a3b71045dbde5fe79ca36b879c6a98e121452e34d081429238dd84ced46325807540952a78efca83874ded44b3f99f968a8b66c5d6484d5534481ed3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9482e77cc9ba1e847eeb10dd3c2d71d
SHA1c44f0bf4e89bfc7cc9badf591524b31d2ffc7276
SHA256a43f6264158c93acd23239af8d34edf417ac518d0a233ae5dc391b5c3321432c
SHA512827eb5d790fd33e7fc35f854664872a30cd75bad8c56c6cc514dc5759de7b85877ae83a24dbba7759d7a6dcfc46d24380dc6c5b099601230e919820ba3638414
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b