Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
113aa3af6527ca80fdfe6b67b31f2bfd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
113aa3af6527ca80fdfe6b67b31f2bfd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
113aa3af6527ca80fdfe6b67b31f2bfd_JaffaCakes118.html
-
Size
984B
-
MD5
113aa3af6527ca80fdfe6b67b31f2bfd
-
SHA1
b007ab1076e85c53d1bb3ce0cca3d44caaeb745e
-
SHA256
88fce635971c407c964c26a04d14a3bce1f76eea11b338cc53db5784b48cd742
-
SHA512
7ae2e06c58d5068c09c91cecca15579a607e9808adb9a7eaac21c3cf343883513e57d635d1511e4d2acf71c204e6cd66b791d5093a7123abfa46bb25a100917b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f5f0e6fa15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{126D1141-81EE-11EF-A701-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000a80d6dd98c8131bc40d10905af21532fee75544dea11c1f39093b8a644fa8443000000000e800000000200002000000020b28e783d353d94526c0620c2dacb6a90f69cb06eceed5c9e9f61a4d49a366a20000000252d049beff1ab982b3a4c433ea58b2e67255b02e7443d83e7452a2bc05938c7400000009112da41cec7cbc3abb4bc5be3e73c73599f6eeebf4c754ec0e10961cb7e3a47eac9981ebc532626a0157bceb0bb7c090a4cf82258b18663ee9525c5f39926ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434166365" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000001219167cec6f30276f7b0ced21f424f9bf2222b4e80b80ed7b9696f80931a463000000000e8000000002000020000000062ffbef035fa26a8de437092c4a6254eb3cd56c9b975dbf3ea0a4cf3c2d76d1900000003652a0b717c4b7b1178f53855d7723647dc7b1902b27a4ceeec6486b83d03585570de3d2a4855d771ef5397d195c6e6919e44cdc407c73cb011ca22459622b84c45786059897fb2da9a5cd83e4ac9ab708893a56f203991362075d17bc965cd199195c098888993ba59260e1d643114a1cde233c08330a67f67b1999be4f98c792dbeff017770e83ff4c889049e5f0f5400000002a74119ea8546c8251851b0b468aa2a95a9a1dad5e629a2b27c13c93cf131dca818c435fbd7fdb356484968a6c4a416b46b6ec43d19e77d2f3d72628c8412a3c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2300 2872 iexplore.exe 28 PID 2872 wrote to memory of 2300 2872 iexplore.exe 28 PID 2872 wrote to memory of 2300 2872 iexplore.exe 28 PID 2872 wrote to memory of 2300 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\113aa3af6527ca80fdfe6b67b31f2bfd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6737f14b29da0085091387899bf86d5
SHA1d1809bcc18ba7086cd778c02f9a2de1b49bf768a
SHA256f680f2eafa6d13f99ce5729d5fd0adf7584812a7d9bab43c1303d12d11de8ef3
SHA512c9d62aa4a52b86b35f7c349a2ce247bcddceb56000c5502f964271e81a76547682af7d3e6d6934d43701f6e076917cb110662518dc5430f775713b94594f1375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54945f0acc30fe1992e2927ebd16bba
SHA1d2f9c2e3bcf92d6769c7495d72c8d38a6f9d1f4d
SHA256fccdd8a7833daa26292996074e8a79b16f3c472543f52e07341a853b1140ce9e
SHA5129745dec01039578cacc136b8c2304a3ff0184ed17f5ed1687a7c39fdaae91108a8d24e545a2404f5ce370e4b4ac54eb6bf245cbf2ecd4dcd74eb5adeef92ea41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533dc85d858fda0dbe12506ea06787088
SHA110e2cd64465fc65aa0f2fd5bab14cb66a1f5d09c
SHA256134e0a775aed11992a728139dcf2e9fc6e8e9f8a426f573c6b17eed7a6e8de4d
SHA5120d5889c420bf83cbd572a9f183fe2d6a5988bf1c3fdf45899a83feebf6e1bddd5b2833ea36a934b9a130a6e6f612dba7699b104d473189fa0222e5f5275a5120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599274549cb1719d09c3b0e3f7c9df3bc
SHA17d076d5da3320235d088c91f78a8e0f2b9e51058
SHA2563e090480767bc104e3a5a06ac031fcffb74a6092a99cf2960fe7faebf93c20d3
SHA512b42490653c447cc5f5c94da101890dbc32c9e5b1544760d32f12a0e04a36907c5560a2e1a3c6a62a6f880ea6f7ad65061f86c2e4ce07db5de45de71959344fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c572a2f4b60fdc97e5170ae6b105311
SHA140e3e8e96431edf3e404b1e8041e881b7b3864bd
SHA2566c406cc99893c57daa13105ebd1f796da1b8b74f60161fbe59f8a161ec7571bf
SHA5121ba66be3f7ad82f5c38a11945be784a06623f6ad195ca3c886ed3b8aa869d88952f5a64f8513dc19eadae75a043588f75263e2fb3d557786fc03953ee0b6d771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eba36e7a1c0674af1a1323662e973c0
SHA1d0cac10de463b4a2346d8bd544ce11bbba89e510
SHA256697b25655d5cd4e928008b0ec5bad6b7d32d38b4c78dc158417b8daff1d01d15
SHA51281021769de9a09aebf19e8c30c2351b530e8ffd2420b0cc49301942b634b8fdf617cb63537d9714dd3cd44169e88345b4cf2e87a0d5ca3a679d9f4397651d323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56bc80703a14cf6ec88e54e65f1fa4e
SHA1a9d4c99cfebfe6c5002a5d78ab47adebd2f5fc4d
SHA256f614b28db4aa29357ff97cd63338a236da471b7e4a40c3151cf28e9aa3a91db5
SHA51295df4e8f98c7450ef8e346f538865ebfc289a7e13e0e28db14088a04e7fb44e3a71ee2beda1ab706fd6de9d7823f067dfb90e59a6ef59ac464fb1d45ee482274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b715087a9a81176cd26c763747f6ad94
SHA166031f8110a10393c8464f8d7697890e64b85b7b
SHA256c462648fd8e63b9568345c9d8bc5c256ea22b9d362a516690bdeab44d8698e8f
SHA5127596c260b85f5776c92633bcc70d38e8a98e564bc2a3b8082aa327da9dd88b9f5c56f875a7da49e3eb20b8974945b727051ca5e20aa9c1b9256a8eb9e23821bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98ed01f61a665fc935189bf284a0f39
SHA1c9eef9bcbb091bfd502f72f83364b2831272a7f7
SHA25634dd47b3da90081f86d5e0f80529a3cb1329c79a48689263363dc18875b5a705
SHA512e4134620de5d26539df29f804131e05db1710b7f77ee22cae2e3fa46bd6e4937ee94693225987d97d92879bf16494021986767368a06240f7c1c66740f8f0bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d2c4ba750c130f2c0c54a989206d85
SHA10d11b6bcb9f6847e276984ead09b344973fcf9ba
SHA2564bce4b35e684e19fb0405f399ba4f376fa354e682b42f683b97a33ae5cd9a374
SHA512b438fdd288627c98692c72bf15b929628778ba7a67692fb9c42575df4680adc660ec5999326b61ece373451fd45083321d48e3d42fabebca94130c7952a15f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8cedc2643c6e4b99ea95a670bddfab
SHA14b0aae00c140e5a13dee5af15352cfda1223e6db
SHA2564dc96b893ff5aa2c252efae6079ba9392efb169687ffebfdefb1ed1e3c39027f
SHA5125316fc8ef433375f9d13679e16d08d22ccaa2909ffddd1be45808842a368ebf87419f72a6f4b0e41197ac06747bf7683e1c06a1062585fb6c25fd260608e419b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d9095d7c4040c2a157eefe1b7fd3bc
SHA119e8fe26d5191ec9121e7bb33adfd35f265f65b3
SHA2564310989d1717b61b1ea7962e5f40c8c5ad86d8dcd146b29a833c9190ef49b1d6
SHA512f294c2cb7ce160140a3775b109b58b03289278eaae454856b07753831b282c6d067af528c8cec4ad0709d103ade2eb8ddd302587fc878dce5b2f978d6d636ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58223eb6643dce74e4900028cb018abe8
SHA1a00b5ac1a894b3d9a67e4a2dd34b6d15b475057f
SHA256948847fca5cf761a7b1498f0f9ec7cb1ce5e0321d0f7e8e625098d2bbc92cd2c
SHA512c63f297a960640a3b584eb8bcbaab7f3a82cee44f93f7509fe01a41cc454531e1c3c5945a885795324be7dd9075eda897607c410c6e69f25b5f7bb8b83918a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f736f22e864c1a2491e9e0ab86c8596c
SHA1754e62276b4dcfdb1b15aac967e714f6f0ab4eee
SHA2566741f088290a732c8e2701ec1fcfb7fca7b34092d65faa2592d5d2614ab3e933
SHA512bf604b36412559448f12cde2a2f32ea51a9dd8e656a8444c30421b14aeef232035bbc00cfa4af68a6bcb90f77af9b0db15b1fa81c5063fbd09af97096919adae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c24a385f19041c12af7b397475fa2f
SHA1fbc404ce62b96518c1f30b333db611ab1853d083
SHA2568b0c1ec37d53cde6fd0e113be53fd772274a31845cb8abfbb7821acfd92ddfde
SHA51251909630c7e5d48f6f217cfc23034d84045f3b6a470e5de1e4d1d00394695d4ac41d7047e390b89d0fe2b6d7ea15f444f3bed47319a24b31db085d840d056ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582359cb03d98d94502cf5eeedd9fb60a
SHA1607ef52ab41cfbfdc2c1489362e43d9d60e57b5e
SHA25627e2766768dabe119972e7aa3ef3cf5495fe6374525f3cc221001f58dee52b36
SHA512343b5ee7734ed541f3bb778ad2bb6668d79af54c1fd839c2624e53b2cc78dfb03a34e2369a5bb8ab19448274d63d0984653fa54c4407d86c0e07ed60a443039b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb70d15ed899822e2a92a1ef2843f7b9
SHA1d0ba723f32c2a401d65e26fd3f942c6bcfbe257e
SHA256a1a0e4d34d0e71dff4393c53a1098f12c6bfcf06c5d80f491adbd70cb5f1fc92
SHA51200340eaf6346f94de9917a3abb61158536428726830853ed0e4f75ca62b2915137e63d725e1004c136fbeb50bc411d3094a791c8d12a5f44e485a6bb76017d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd1f72cf361688828f7ed22baadfadbd
SHA1c4328f770520a69d480eda937b10e89173af67c4
SHA256059b659413901ef2f4059b9df5ad66024c16027478f236a64807da012f47e200
SHA5127d0e3f03e85a6418bf051a297dff33515026101379a12c1c9cc2ddef8988d570d5cc9fb3a889e42071e2cb645b7d632d59d4bb75f23584b7eadf4c32502e5a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e07d3b395f17e0c6a401fdfc3fec55e
SHA1c02a91e562a72ec8bd870b98828c57ebf40da9a7
SHA25602c76e83434fe278798ddf13c4a90320d84b2211d9b691972b12d09400c649e3
SHA512c05cf087cf4e83aa89230deb7d6f018737598aacf9daff012db2ea27db3dd95fe4188558a129dad83550b0cf61a50df6d5be6b8c83e0310fdb14cbbba60050be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b