Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
02b9cc539417249c44478d06022466d0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02b9cc539417249c44478d06022466d0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
02b9cc539417249c44478d06022466d0_JaffaCakes118.html
-
Size
918B
-
MD5
02b9cc539417249c44478d06022466d0
-
SHA1
9999b06a9937b55c98d6a98b7937e1ba8243a616
-
SHA256
6dbb78fa951ebc7977f95de11bff6cdf502c2295c440bc1ba3bdd76cc90cd64e
-
SHA512
58bccbc3badf9d21b52ebd7eae8b7e7bfe3b42a50b3b233fd683a1ec66752434ac274116f078b14e88b1e0a2035e8d3096b28127ec9168b3094bdd11371bcdda
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433882959" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a013b60c6713db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000008cc7619cd6185df231e8419b76b67710ff24ae305239f4feb7d6d82257e4ea51000000000e80000000020000200000000280ebfd653160fb7a6b4d497d7a74a9afc1c93328ce3aa9f72f7a51c09583c520000000f058e109846722a77cceec02f354df70f720d816e45f06c50e8b23d6684e676840000000a717b488164f4648910a7c8dbb62fcfcce62a6f7abf25a94d250b6b51765864ec8aeaf26c208ebcb0e0722018b130f28f94038ac026d57586d712ce2923afc70 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36AA66C1-7F5A-11EF-A641-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2416 2120 iexplore.exe 30 PID 2120 wrote to memory of 2416 2120 iexplore.exe 30 PID 2120 wrote to memory of 2416 2120 iexplore.exe 30 PID 2120 wrote to memory of 2416 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02b9cc539417249c44478d06022466d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aaef26880fcecdf817e85533329b792
SHA1f765506f31c1d02fce4cd190160bc762a493f393
SHA256d4028fcbc3ac2a718f30d5c005810e3547695e99f27b3346907de88cdf4bf3f7
SHA512025afc474af7ff809d82e0d32abf200162a1dc1cc3d26aae5affb062d6e071e2347e1c65c6cca0b76ea28e26e44a40c51317048b5771306ea02ba52222aeffdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542325614faed39bf3c860dbecd474a76
SHA16bafb24b7601e2cae3f76404157a19b7292eef4f
SHA2568a28706cf6b5ef26b4462823399eeb472d5da3638f78e6ec4caf8feaf0ab8650
SHA51251e0953c49dbbc6b22ea3cc02067c34eb7ebc6fd14cf38e3cffc49e4393c5295ccf84232df5e23c708faa094aa52dc7145d091ad1d3916716c46419bfa834292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d6b516b4330fe11678bbee13c929a2
SHA1ed13114e146d4ceb66e4157de1b00768d44f8df0
SHA2566abde2f9c64dab602453f9cbccecee4f5a4c49d45b0e87f166f042f1f21a319c
SHA512d8e167269ba772911c82133ea12fc1e156cf675f24a356858bb8fd6ce9031523be2804b371679dd034370c5709e5a0f784d1d01154a662e0aebcaeb42a19b87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f349e10c06c768a5de81dd92c962d13
SHA1e29ec4ac43168c56cd8ee162b13f071673adfecc
SHA256ea0c8d22a7bf0252adb1fbfec09483781c67270a8ba81783121fc3b2fb9f084f
SHA51233eec5dae79c26127a3643ad5fff9380e6872399682186a479fbd20d5c6e90f27ac121edd1b9fa09ac2ee635281ab5235f9e07a3d75f11637f86fd2aaa3bd57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330d6802f76d1a63497b69c8daec3213
SHA1abe3083a65cc2403a771cb40a81fc8ddd7387e0f
SHA256673bf4879f6513aceea63d37c5ce66b057ad6d4984e98d3fc3fae2b51575d665
SHA51251cf16d88d36b29569fd0e986346641337f167cb09dbb883cb488b9095a6118178ec12ef257cd450551d4ac4e8f5be4813cdbcd64406ebe7db4ee9cf1bf62592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54727f308d12534bcad5f6d040f1c9829
SHA1b0cac42d0a38887d8b526bac78de99735b0df542
SHA256d359e4899160d51f98a6febc6bf13670d163fb7ee92f13a91535e769ae993cf2
SHA512aa08c6096f59475c079946737dd147605ccb2754a8034adb2e054f31d25e08ca2530895fedafcf5da08771fda9c97565f298befbd07dfba3b3172914ee3e2a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99c3b84a2fda0773aac5ea2e8e351e2
SHA1dd0bd83a38847cebecf01236813651737b321c70
SHA25654dac430dcab6f8b877268c5e336a853382bfdc41c01d04094040895695d449f
SHA512f85a335b3eb7fdfdb3772b50e5dd9e40ac88b0562b6a0527e937503310c5e49e2c43bac0d0915707af30a2e19876a86f226ab2a90dbf480cd2388ee50e26ae22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c645fad8a0fe4bef67a377720814fa1
SHA1e2dd7633e9a08f1950fdef57b0e3e9f3e1fcac5f
SHA2564dd714d01ad3e7628517fc201129653215e7e84b082df7f4c63ee87291850b9b
SHA51282749db7efd4633c09cc52bdb1fa9232c6bb4212fd6022af6f1da6877a24a4a5ba7da48196f55097129bc31bd221af11e98ff9a4368ec61fbc9aabe5ea06a41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbdaaaa9711f0165d049313734736390
SHA15fc5cd52863aa5bf017b5d1964af522fd6a3aaff
SHA256ea1037f5b64fe1ff046e0575722aedc665a0319c4f14c45972053ecb5ca580c2
SHA5121ff4978c0a2affa4caa41648fffeb324e49534c8e5a0d2f95903ff9e3d3ebfb763718ba03438a8bb428a4bd5ea01be186fa4d74670bff2c1cc50acd0987f53ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5078254acb038f69da11706a356f6a7a9
SHA1bf284457bacdfa5e02ea61b1f641c40016524aaf
SHA256dc6189664d7362f490eeca01f6c3d8a648214143153adec3965f2f8f8840ff3f
SHA512c933aaa0c9f2e3c8bacd312da7a9b529ef0db5ece0058c5501fdd486398cacd31e73aacadb1c611a1f318f92833e754148f2efcf7e9e03e7f30768119b30afc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c593126ca05d2152c08343ec674a10da
SHA1bd5a0ce1fd899e297be5d7ed839554fe07820324
SHA2560c13afd30747aedbdd6c17990d9d1a07bd022e8c389fc09af4ba2de88688e325
SHA512ba5f5efbfb481b743c29c001e4807976a07d4bbc94db422ffec88f9698f82a26aafdcc84971ae66c9f340ad1f23a9e451092f8af54539aacafe0a9e81f211cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d902e1121c74d7a0b1278e316e4b958
SHA130e3d51d91f81662275fdd4b1fa33932fed151ee
SHA256254fbfa697cf9749f2b64ce9a905cc84b3e08e28ade933f6c2fc8a5e3ea7ca4d
SHA512161cdfc40f478504880f4a5a62f3f1b2320686a66f44dc1893f5229940e88953579fd0226826bd702345603f6a1c96e26ab3e8d612fe34eb68efbd024157f4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f863594274acfb382b7945131093dd47
SHA1238937719dd5005876d3a135f9045cdf960c78eb
SHA2560ea90242cae166b2e57d2084b06dc499f2c1124279576e5bbc86f9436ca7a81b
SHA5129e1118ca436375c5324a91c6fa27bfc47e7f592d257037a924a0bddc5381c3da63fcfeddac76886b7295e452091deea296998fb1760acd9ca741b56017d9248d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56675f2080078d41e12aa2b923c69cd0d
SHA1a3cdc94ff3a7d4426360fff7eb286cd6b5c67b7d
SHA2568271f80bbb5289142cc0512286a2babd16c8ddb10699e23e14ae9210c00baf48
SHA5120417aebbf93dbed0507511d91b5e132948f9a9a62e3c9371f98db34f841173b718c5a5cae75d9ce7d4610e173f270765bdb1ab9053d1fb1cc5e7ba81ce2ae141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5be8c4d5b1647798dd3dd2af2e9e1f8
SHA189539503c4a9cd099bb813e30f4fc0127a67b517
SHA256c7f0f41b4befa538e3720563e22359423e4f795ab7274468253d224af6b87500
SHA51207204f569fd51a53e8b50b1cdfb3d71613de1c0a6f651594c34204946b3ed35c7ea86d56bd5fe2f62ed99e66dee15b500bd47bd25673ae1160cf34cb4023b531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d5f449d213029f08bdb7f5277275e9e
SHA1f76d73ab7add8d9d22dc014b239aec6ca1578799
SHA256d5ac8fe49080087e01ea7844320eea962bce025d65c8343b44519105de713945
SHA512be1f0a25cbfdbb2e79de68032b9fc04edd5b29c0104fe29e81c91c511a142bb2556b0efc54b1e28e0e9536e84051ec28df4058e7708ae08d5c15152a71a67131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1bcb778eae2e4310f9775dbf72243af
SHA18708ecef4eb831ca17c3aa6429ea4e3cb405b50b
SHA2569d6d1df6809413157dceddc83ce196d62c5d322ae281f527f4bc557a4e192cc6
SHA5123fd41ac24183392638ff7e6896d7cab4d404255b1ff6a8c641bd8bb96e0dcf6fb7ade7b161bdb6b85d041f5dbe9b13590bdeeb78dd0dcba4785f2eb1e89d12f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f31ccacc2e4d837da74a602d6e2eec
SHA1c03f5617e1c00325bc806736fd3baf4a1db17847
SHA25656e63f29059bfd8a07a7694921a89f191c1029b9f2e3b2d15300f36f0dc115a4
SHA51281c89cc4ae6aca1ca8e5895260e3d4a68f701887a7860a1aa5cc1e8bd80db4ac85b7daf5e4d1549e54256cb76eacb1ce80822693693da134afbaf33056386faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9d88fac1ce5368ed1c640b14fd4386
SHA1dbbf8d27fdb085a5faa2145499918159bb060990
SHA2568c263883dc4ca5144eb253e1b108defaf645c7f7be2b181e8de42a9d6135edbb
SHA512fde6b680fa7024bc2f51fb97580beb067db94ff8246b2c0e34033906b6f9db28c395bb841e10a1f5e5591cf79fcadae7336691703a8751076ae5614521291767
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b