Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
2659b11cad2c2e9ee009e92266699fe9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2659b11cad2c2e9ee009e92266699fe9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2659b11cad2c2e9ee009e92266699fe9_JaffaCakes118.html
-
Size
21KB
-
MD5
2659b11cad2c2e9ee009e92266699fe9
-
SHA1
c9beb6ee359a835f0ff3fa3951fc97564916b7b9
-
SHA256
7ebaf510c659887920021a8a37ab31c6ec56e08bd231abe51088cfa2eb738473
-
SHA512
fd28b05946b8d9b0b6661084647f04e8f4e421a9e5e1f5bb070f2b4c831f70bb1127f35f0bd1e57644a2a941420dff52571da678fd28f6c65b2f9d97f88f1416
-
SSDEEP
192:SI/5lLFuxq8/4/POVbWVBnkqyEQ18uwYY+uCINPyNA+cCINPyNNsCINPyNl4CIN4:SIvLR/WESXwzIC71NaJWptZg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000eff4236af8fecbe246d727a76fe43161fbfc64b0dfc13d6cb205815656330be5000000000e800000000200002000000019cdf93d743018da5f74e832f81e4f0eaf5aff7064c60097426ed364cc309a0b2000000077b011736cc5b3770342e668a74f2c88f1697c4f10332efd886d7feecb14eb73400000001ea66159832af442904a636d6cb9d5680f08201a846765cdc92faebe9d4ec8f555f2669c2032406537a348c723d7e78de60ce42cbcd19f582f5ab6625f8ffdad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6097ddfd081adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434612222" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{289624E1-85FC-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2659b11cad2c2e9ee009e92266699fe9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da9d631ef2b8ed88ba1c753b113f6cc
SHA19f04e3441a227fdd5b7dacd384f7eb4cdbefcbcd
SHA2561e4dccc2166767dfe771531572bcc41c47ecf25a6b4670ff193445b27473bc21
SHA5128e668cffe6f514d00a887ad6bd490307fbbd882b3edbda2dc89e3e286740a9f14514c44a971ff35a3e20037a3a75c63081bc7d861eb1b802b619e90c92e26b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf0ff96df658ae562643487254a4511b
SHA107106be8c4c67f1867461c550dddb2555845df9c
SHA2563ab2eadddbf8a680a5f83ed7df28922a2e6cf6f2890c7ca977fbb113d4fcc0e5
SHA512d0613f50c47347fe0dea5525f189694ac7c4897f2bc0f416599d41c28b9510143adc002750011e99ee9aa4e254e38c9dd22cbf103a021de09310dfc88e8216f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f962ecf00994b6eef74301b2d47dfef
SHA16de840eae3e53f235a00e783d333f3c25b71d1ee
SHA256aaea02ea91b5b37cdffc99046cadb7f769e28ba726cba25dbf30b3020e3dc976
SHA5128bbf161eb6696c1e502ee681503824053eee70d1469025c4ab4aaa9fe24d005afdf0c135bdfbc2c3a4fcf17dd924f88eb38740f40ed8c79de3c2aa916f3dc96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52282cf25f2a9e06fb6cfaa7bb338c2a7
SHA1455ce45f2dc183c45ad53e801bcd64244be96c60
SHA2560d7c30178a164c6bb1c0d0b411261aba45cefebe98b263fa9c82054f6256c631
SHA5128e74a3e8320da493d4a3e70a6e1e27475bc87272a33811fe5b2b3aab0d91fb5f86a3c0456f7fcce57ed73793bfdd281cee7197e72e7d293662ef9b1ea25ef1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f020bbac4ae77fcc7f1a956d369316
SHA1d8f43e0b2e0b6984a1a3a15323beada046bdae3a
SHA2569c927fd9b875d87c7d7e58dd4d292f7c7201857b47382b034932cd1707a8bdea
SHA5129afd87bb16d0b2a10d2557af08359791d5c7272e268a44c728b3b160d9be8c4e08a9e294b44f056c3bfa7c975f172ee1f9743e681406a6cb31a75aa484532ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830346d28fc20769a5589d12161b3a60
SHA1d653dc1da5ede9d1dd75c134b97ccd56ef87dbfe
SHA256a065171ff984cb8740ce91441c1d942a3bb7092c3d91d7e2fbdc24fae2eec610
SHA512b955efb54467f94fbb8cdb795464bb005698ba7bc81b84b00a4dae982aad9245ff8b8711952c6d20733186bba8af94008e7a280846afd4773bd70e420652b183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3d2a6688fcf074e0385493833b7c1b
SHA1606365d6d35f25be724d338ef579cdf384349a67
SHA25654f6fd23c7537d74e79faa198acaa6b12466c3df160b812603a328db68fa2996
SHA5121cbbbda515b56ea8bb73b2de18e7c76e1e726978d31f73b402efb09f75404e21569a6455eeb703e39f20ee0fae33c8f64ac85204818d05632ebc9263d514e66f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba4a9f32b9fd8f21219d555c6b79432
SHA16b95a5049423776f20276cf5a12b79d4065f5f3a
SHA256653c245536103490a2e83becae9d71fa6c045e7e4d40300ae8dc3e279869a3d4
SHA512fdbcfa47be614d1da9dd1c7116fed21326cac6ada7ccb43f0ba0beeeee135acd4514a996d9e42a298cb94e4cd3d5892bb5c2a9f75b6b1c36ba34ad75f938c8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66b1896dd92f91a6ea4884e749688fe
SHA1e34b679b3c1deb1373978067b93c6a4e3108714a
SHA2567066b607e7073bef05c089c31933edd1a18bcffa0abd9a916426f8e10e9abd1a
SHA512ab6e91cc8f0b8365511ff5647e711cf3cef480ca12b046761b0498c018c6d273b544d4db36f48a0d6845f7c8d01b1dff0ccd26be33d177918d878c93701947ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ea026af23e15ba24f10a1bd5a0ba57
SHA15fec019e0b980fa840d2689d28f275ce12dc0d38
SHA2566d01648b34b9d7fbc932f1cb8245e4553bb31066d7eb837159552a5c72c404f9
SHA5123918111aee5d2664e8d2e4b93851370be7ddbe539ce87d1afde50f77b207bdad92e96e2b8993ebe9118383d298369e906660e460bec430b5504f30b9c1f4d24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524cd8f81fb7347e0aa0c1c3eaa6faedb
SHA1f903f3794c8ba679b080aebc30395853a0633ffa
SHA256615fda93bc8107028cf51b636d8ac7bdce5500050ae4c2218bec7cf002f5dfec
SHA512a63e11d10052376848026e3d1f8a531e0571b8a138770b7e7b64e4c9a7277269b3a98bb3a6e7d082aa50bef5d53a981686ced9cc91c411378a93d45560f3e2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c979e980f11fcfa16c8dd291954de5
SHA1861a4a69ac2c7804b1f261f6eb29721054c7b8bf
SHA256042a89a3ae5fe3d9e596c8a74a32aed7c4cc15d7fd2bdfb6799ee3fb8c6bfa3b
SHA512661c441cca4b7340a7991f22b9ffd99d12af6fcf1918a015c581d5fcecfba76e29f1a05a7a6554913998dd14d95febb95bf063c4bcc1bb604c701d56832aad66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54465b581db2ecc79cfd7dfe9c75cf4e7
SHA11e17fda6423fd8ec8469feedd8c3653f0f50d8b1
SHA25632c24fdb3633ae702395ab4b1ae25b50e796f925f7da37922f4e05f0aecf5471
SHA512ed321cdcfc83037f34fd3563692a1db7018f5fc1b4c2583cfce353f6a0004ff673405a1b340e385b0522bf2a9383951dbf6e3fadf9776701070580ac2cbee425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b40cb966825bb241fd7e18c1f8968f
SHA13076df825ff4b9cb76fd1dd8e9d8c05820fe266a
SHA2564e2e546d60a92ab990a4f543c973f21250ddedf08fa715f1266f4959f6ea80f5
SHA512ba1b328a03a2169fb49227fedda691e12edae418c3cf6ec1cb0ec7caedcf83c0006db47e815b465169761d183d77ce615228bd868bbf0ffb167b5ab90ef0beb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51447e514d81c39e89afefd51680427ba
SHA1a7a723218b412c240631dc0ce2ccfb561dae4b5c
SHA2561d0c9256b742410b97fd342401db06b768af31a97431da115eee93968f9d8bc2
SHA512a6d27abe96a58c410464b5c07fdac067542cec485c8cc93b17ce78129a49a41aea7b0bdb1282afe18e5fc887537a6923c39a5f54e9ce2df93f56951c4454fcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7038e4ee0a3d30a670576336d1d46d
SHA1ff906510e4f50a98f300b20052acf0a901ba4c1e
SHA25635814f0d0d0775b35dc9e1a14a904b5330d789f9967e965c7427d18c201e1e09
SHA512614c5ae72eddabf68ef5ce3c906014a7ba9221725d3b906cb16d5fcdbe877862624eb5da357f40f8796e3928dd3bc5dc4a018ad0b8988d4fc6afce1dd3415863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5813a868a8021519aea43e7eedb86b0c6
SHA17e592ee5b77445b08e3337232e3e322bb7a90f68
SHA25681f0e3f48516b407ca671e767bd79acbaaf6732d698244e977b8e3040a65ea78
SHA512e0a01c566c7b77589bbfa186e6a4346380b9e54d478c4878d0eb15b4b9023b9e8cf17970e7d722fbdb9c2a75e4377da839dc7c9df3ad7ae312516f616234c9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39f9ac6be952514e4dac55ad303d7d2
SHA17b8cbd3a831530a5a154b0f46bc63da8f19d9f1d
SHA256a8ac41a61873bf43d1c78963911480299cb4a0c08d902ababe691d60a850b70f
SHA512019f856f4107f9d9de2803d066ad802dd68bcb79554bec60eb1cdf00d8fa650d18369d383df24956e634985b7cc12dbdb766d133cf49e929189f59e09371f377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52edc12e239fea31ee4126b1e21599a92
SHA1039d7e57cb8bdf77780492153e6bda6d3f157597
SHA2566ad34f099ac84c5c7d896b7857d17c0d4a75efc0bb17be829bf180735b522576
SHA512412451e78b99dfdbfacf677ecf41a7742d193032d43acdd925f342e316712a5e0a6cee9c0046ecd15a3f4f2b783353ed01403016db31d0a934db0f729fbb0248
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b