Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
076707c0792571ea7c0f71c1fc7a454d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
076707c0792571ea7c0f71c1fc7a454d_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
076707c0792571ea7c0f71c1fc7a454d_JaffaCakes118.html
-
Size
1KB
-
MD5
076707c0792571ea7c0f71c1fc7a454d
-
SHA1
ba5ca2c796773ec256f011d6eddccdf6be68549d
-
SHA256
c54c4d4c8b0443af92dad068815898d5055b3bbeb9cc2e59d1598838c73709cf
-
SHA512
ba9aab5c67cc70fed6c26f50b48f8c04ddbfde741d8075555988480716fb180f074bad1d6d39d072ffa744624d832da206fa7b8229c43f6120b28d96763dda8d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0dbbed84414db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433978218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000373528372396a3963f1a9610cdb2a02257918d052bd71b636572a080ea27483f000000000e8000000002000020000000b0dfd2abc459f778c521ec8585d8e393d19a757b324d6c3a3f7e5f903fe1c32a200000000bed04d98f03f4f0efd190e38f543f8066fa8fb46fe9179274b1411ab471acca40000000569532b41582e451d80179825f9883786b816b221a8f272b686e998e63cc1c48238a7e2b7ded2b0f3d14301d6aba06d222b53375a9794f23f9db38b6047a4468 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{017FDF01-8038-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2752 2432 iexplore.exe 30 PID 2432 wrote to memory of 2752 2432 iexplore.exe 30 PID 2432 wrote to memory of 2752 2432 iexplore.exe 30 PID 2432 wrote to memory of 2752 2432 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\076707c0792571ea7c0f71c1fc7a454d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6335c1a7e439a8aa528be9eb040442
SHA1a0105e5bae9b77c76e761a706a8d8290598b92d0
SHA2563421c0e48a9a7dfd4a4711154213dea1edbc5eaa3711465f38d48718df8eb262
SHA512a2f5e2e4c3cc7254768ce05e7c52a3985401cf4eec66572512a4def1139390af88a9b683d4f7dc49f6c96d8cbfd0d18dc594d962e9dacf712d37287247b1adbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e06182c4e86ef850f36049a938db0b
SHA13fcf32e198b37149e52c78afb1bafa2f3480c3b3
SHA256cc4e9f27fd443049270fd3d92fb47a8c4afbf8bbdb4395814f807ae657a5a904
SHA5123baabed692c6040f71210b219b044ca233c6cabbf1e33e35b24a7ee0fc2ca485c78b78060cfca368a4773a901869b2ad3690ce4cfae358c00639237b747d7dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57680a8db24174a8b6b8ead4f71d02ff9
SHA105da67c067636b4f1c7a5f1c1cf25abde17c9e11
SHA25602d5d4045b85e245dc0a1c708c82a3e46489a24a97c715afb97e31cc19374096
SHA512292d31dea5a420024fa0496fb0a3f6a452f145c186ab1a8cde99661213d6371c9a73edeedcc5116c06ebc2b2d5f4a7833ab8a0cbfc48b219f48c1280b9037dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2a758461b5fdde68a2019850ffafcf
SHA1b494f1b27b3672833c43af12b6dc2e93cd848c88
SHA2562afe41fb37168a00eca4c68557456a8ea2f93e51b42974676606b373ae91de28
SHA512ed7a030f25dbbcfe38c96b83e6cabd7d5d88923151317c797ec9443c6795bcc5f2b81d87a2f8b72b8d960b79a90f9efde38147cca3528f4bfd35ed48874493cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5c312c959dbf37b16de6a09201ef74
SHA14fbc3122b97a5fce4b1539d0793d2f87ca05d448
SHA256bde31f2ffacef0a13a411ab2e7f97b8f927c11c17570fe929b55c32a67ba8298
SHA5125e3069ad694bff37d3dbe2e80ff992dd645c877681016619a2632cf4493134977631ba514f20ea3c6d2bb75c42e831c43c61eef90a5d096c03521a7bd61df465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219d1971eebfb78f4acaab1801100ac9
SHA182e4b1a48266aace84aee34c72de1089a8ca5bf4
SHA256efdee06d2a9a7588c66d41f537801e488583b6c756220721c8e9f9fb082dbed7
SHA512551cf7f32eede139e9af0e26e72918e3aa8f5bf472bcddd53adfc9291297522f5b8b92229b9f158c661151c0db6ebdb84f14927ec699404b2ccc27c6b65585c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3e0b6122178afe88a99dab3a9464f3f
SHA133b16b06a8368fc4b61ce328286ee094771ae5d3
SHA2564e051eac1165f86693244102e2d23b4fa6da6e9b92009b0a9bde51323a1b9a7f
SHA512a1833bd04f4980d459e2464e45ebb5f2d01a0628db060cc54a99d5c9c673d6fa29356bb60d968b51d90a8c6b937e43987c987b1d046d51e78ae38a8d94da3d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4a052008d2ed3c1d40dbf77428c9d8
SHA1b0e7bc0b5218e3cb0f92eceabbb7bec8eb4bf2af
SHA256db528cd6caf5d107db15c2ae36b91e0dce92ecf7e7d2d09fefbb9489a7fa445f
SHA512b61164ce5c6d13ec704943a88c42eecfee1ba3e3e2f7289d9fe2581dda8635023aa6b9cfac839eb36283c232561a6235804784095e13a28795f86eeef55d721f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b67d4f41fd5c6e1cd6c5da58c53aca
SHA1925195863952181c83ed08c9a633bbd544962d23
SHA256636b4777d52f6920637958be1593161159c38779458ae10630c915eb82fa884f
SHA512d17967aaf88a4663f1cd148d3f2c2d453a8f076d9a44c494fb62dfa0c0d35964626890c2f6bb47b0afaf2cf58e9e8817971e714746b912d3f668a84bf79e6d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5156f0993f2891d740ce6e4bdb63da3c4
SHA131030b7cb79cb4c4255549b4fd82d9b088010b80
SHA2567324387e4b31bdbe44f3c29ee9ff04e39d0ba8b330bb8ac787d2d5428be0dbcd
SHA5120bee6398f12046c781dd081218a722e51bff0d89e43ab1c00f6e6502f8f1353d91afbba5c49f7aaaee06e76d00021b755bc91756f6f949a616de8c32fdbda329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5693ecf22cd66207f455eec33247b2994
SHA1230dd12d99af328b4b18cf07603d742304cbc083
SHA256df0d4a361c5cdca9c505375c774bcafc7b1feae1ef280bd900966682f24c2d58
SHA5128cc07cf3878a79f4e1ee08b6a745b3c988a0230b188dd42586d3b7db1234846e578c9ed91e9f78f5a4c8da5d47e3ab85d68738fd047bb4896c03ec6aeb64783b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8057d5636257bbda5a1bfc71fadafd
SHA18d0f4ef8346c9a2674d7c5921cafcbe4fba0c8ab
SHA25608be94f5582e309f902a07ed6102f9fdf776c4cd0b97ee682fd58c789dab92fe
SHA512663e81625c3cbc892d7bac375702c14c72d5cc040b490b09ceb09a973578152af9448cb78765d63754e1e3f6b2237fcf9f03aa207b43162cb60b9198a2f73035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d488f92e12a9316eeade7d0c88843dd
SHA1e407da6e257409d5154bf75c257858af14b0c13a
SHA256034852ab06a1c9fca7964a512b1d96fbf59cffe2a820958c60a96a05f790e05d
SHA5129edfa04e45761b4969c4fbec1e54632bebb878fe96022a5309fae274715c5e6ff68c7d8e2a5ae4dc8b343b6bea1d9966d8d5ddde0cc40c815ce7b6327711c2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ccbe2f9e8454740204bd84d838d9891
SHA1d4ed10e47077d6dca31579c7ae848cc70b601683
SHA256459f45e6b9653f9376fbff4d4eb441dc906ca3afa0960ce752ddf012866dd8d4
SHA5126b8957e8d16191c7777b0d25471d1d7f59ee53c8878c908411973e3285dc48b0d91c1aac9ec39b0f54e7087f146d3ed79a8d8f7beeefa92d0d5d2dc1c426c62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439e22836fef164c835fe3e7d3a463e9
SHA1babe90ce49fb6a0d2869178ab13cab837b313c78
SHA2561973e37b4683d7a91a59e953f8d6fc0c6a07fb1e582fb53ae3b3080a7098b303
SHA512b58df5a99d378dc7a797ff3ed82851f27d25bcc8b59cfb73fb49dfe8e695f4c040d14c9f9db8c4ffcd938e3c7fc90e783499d5af728133368d5e677b5376ba06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53358ab42f83317e6392dd017aa83d4a8
SHA1e088441482815bed7f0766d7ef9d743731ca3e38
SHA2562cdb9b94a18256273a30d653826b1c1126c28c0753014895796f7ae70dec6170
SHA5128ca6415e179680c3714aff223e7a7f8126c76f6d60dec1c0e4b31f48c10bba1b3a8e7ef4dc2246c2fb92d1201bf6d5ec0db9f1e593a9f4f77d9d0c490d0bbca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d659d3fed6fa6d6c93cdb906c7c930
SHA193d894238e0f53f73a3b3dfbf9ce0c99c8c186bd
SHA256730b14ddd24620f7a14fffa347cec64f1a99f953638a526dbabe016dc2886176
SHA512c118ad369d393b3c334ef98a7446d8258afd41f1405b1b641515b18a14e03353b3b57fc646aefcc475f9acde2a546cc02536d0578cc8c9bd295f4fbc33ede0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad58a9a92bc06f2fd35e4ddb7bb0982
SHA1749fc8f770606967a6a34a345c48de64216abf23
SHA2569567156209f5c62268d001bcc33a7a8208b960cd372202974d5173c95f9f644a
SHA512b7ac1ccd6eaadb3bc37a81c2112a535075eada8684166ddcf34583ab7f7b9b914bdddb2a12fd076e1328817bdbd70009256110fec25b23eaa500dcd3536f6b2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b