Analysis
-
max time kernel
136s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 22:39
Static task
static1
Behavioral task
behavioral1
Sample
2686b63d966e238c1ef800286652f515_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2686b63d966e238c1ef800286652f515_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2686b63d966e238c1ef800286652f515_JaffaCakes118.html
-
Size
2KB
-
MD5
2686b63d966e238c1ef800286652f515
-
SHA1
6cb3b595470f289402cf4c9d062cc32649bd28d1
-
SHA256
beef25ec227de04abe6b1acce340ddfe015a0769ed49b698a5c7519bc8886d86
-
SHA512
d0e729db056378136a602d125a4f6ce1398fce7e4bce19309d96d6288bf8d414c7f55253e6267caebfade224b4f3ad187cc3a0d47dffb0051448917ae797504b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA509F81-85FE-11EF-8EF2-FE6EB537C9A6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009b13ccd18e40bbbcf47830e4857419270df28ea90ff7352d42586bc79a257f2c000000000e8000000002000020000000ac4c4f1145711c25be5550754997182bc46dd59c460beed87fde3304559fd04d20000000a5eb28338d9c953413f29a3b1c6f12a80232f7b0e600015dbb41d6d010bcf827400000007796f0f3eeed6fc0e836aaaf195a56ea2f8a530b292b5c295cc5ac9d6c756ea155cb586999b2f450a82e0fe620ecc5910a0abe8e9c96d3c2efab95262484697c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05ba6920b1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434613325" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2664 3064 iexplore.exe 30 PID 3064 wrote to memory of 2664 3064 iexplore.exe 30 PID 3064 wrote to memory of 2664 3064 iexplore.exe 30 PID 3064 wrote to memory of 2664 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2686b63d966e238c1ef800286652f515_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d2d2039bed167de12527cf6ad6a543
SHA11cd9500378c4fcf17915a8299b26d515aedad55f
SHA256a1f5ca3d9d677d9f44db9d255dc2162af35acd70a6f2d84b40a734461a470ba5
SHA51213dd85eaa5aa2aea4e442975e25952652ec284d40b9c335e26efe7068655be85278d2081c848c32b36d7a8c0fb20f8396923de7a443d614f61a21030c72017d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1ca378af32574d9adf4d2587aca8ed
SHA17ac5d01255427d23161f60a57ad32e762178ba9a
SHA256c1de6de1890378f826208aaded140021c382447c085c070363951e72fcf1c279
SHA512564da24fdd9179711bdb85b9145b9bc8a996fba347849a1d2d65710a80bd2371867a798527d29abd97cd5df67b10d6081514cc368bd1cc8be482c37458a13f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61ee3c25917a480921d3103a1e1e5f3
SHA12397c6f86d54fe73c346fe4e2db430b90f7c7d1e
SHA256e6007f66b6a220d34944a6caf9b599190c7d91cf970ef6d1ec26c7e4bac62d0f
SHA5120a715c05e1dd953e4feb6a68f02c05b8dc8d14de798ab2a737981bb7836787c901f4d8be8802188065f7b34ae4774066c2adab0ded49ac586047699a41837686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea51d8d2d0f7b0baa6fab104fba92ba
SHA164854dff1dbb21f6fdf00636b85efe2a20302020
SHA256b06b0f9b6814d4b675d59d728f6869eb5043f9fd8825af4a60c44120e4bf7b93
SHA51256893c02bd2dfe4ca26599decf9c0d1fe44b08e969d7071219a8121b6e89099e72850c7ce0e468e7dca2239aede270a1734c84edb898545878378c6453ee733f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eec95a74dd45f63e0510caf075401e2
SHA141cdd912c62af195afff289219ea14e831d22e90
SHA256c232e8c44099586d64d3cf15e93c7a242a32b486a3702b58c71acf8bcd8bde73
SHA5127af1c94caa326131811f5e82db56ca47b1936c76301fabc6d3f0b1faa2e81d4461d6123fdedb98e5ac29f0ad793fb6f4edd16ecca3ee404aa365eddc00a1d27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71103663bc136f7da511516e5304534
SHA1c03125ccf9dc7f9af5f2bcb70b45f7a35e26a6d5
SHA25699851773e3701cb4ae9a4967705016f200c9731a76fd005e3f999d1353851b41
SHA5129749b99c94384910bdb3e8c1bdd82b169c89bc570a09930cc8ea3152463bf6c62ff94771b5845e921b2d8304208f75487e3656a1ed442dd22207a24b4769a9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505abbe59b37f54e485dc1d44d64f0530
SHA187bfe217c09cb61e01d529a483fc82bf876e84f3
SHA2565c6a4399bf4d04f30857c6936702874ff05cfaadb283ddb30ee8da8c873f9039
SHA5129fa5679b1eb12a9aa9ab3fb1a748ea1717d7ab8222dbfe9a55106821ad44a4793bc7c5c2355fdf6594ef17f0374bddeddecb6a8ee014821792cf4d84955a8829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09b09f4c33add127cba42d032d59259
SHA1659a59905f0cdcdf24b61e2aa0600815fc2327bd
SHA25656e072506223d97bdb5beab82a64180c4e2d9be377201b65851fe6965ccc8bb5
SHA512699848ae432b01e6e0a7bcbed5cfb672339af512b8c75b5eb30f282d0ac5332ff3f63ac8f7c823a01552d7ef5d671753aff62b5a184885b895e1f64c6888f476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e55fd159d3880cd4deff7081e9f8d7
SHA19d5c44f9c35855e3f5152dbc914ea9a6262f18ca
SHA256c3f19b6b09e35d8c3b1a766809abba194d2e1eac4571b3a58e878c6ec018e986
SHA512897a7021e9dee51621d7c28014908722fc1b6791bca3d0438ea404dcefb913c8eb234a2d0ac3cf041e8a1d2a8a887e4cb7147d66ad5b144b971f10dae773c090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec38fe3129573e2ec7c98df9cc741e7
SHA12b1d36505e1b312e1edaabb15030df87f1173d3c
SHA25688d79d1accb87d5b5b69b38bfe792d523a4ac397beaf862dac95ac607eed10af
SHA512e4a13bc07ce3bf0d2fdedcf8c03e971d6960df9d45ea4c4dc674188efb8b9a61b7dd4411dde02945db8802cc3eccb1da8aed921b3b44951ae5d5222e6b3a964f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb94afa77d1e897ff5eb47a96e237994
SHA1773f2d2ac11c1f4ccb768d8e6f144c6ad4bd6327
SHA2566b4360b0c2362f7dfb267d66f363475157eab6ea5c774b47052ab8ae24ded29b
SHA51294e4e794057d5a9c1b48c48453a620c01af637fe06d996db8885655264da3ecf303045fe716dc6cc08da96edba091b05aaaa8a4662efb9c2b4f268033950bc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f989afc4cd5f19893b452e62bbc279
SHA1b6661a684b459439c80d7c8cc07cf833cdfd974d
SHA256b6f97272439e3639ef73bd21be87e6dfc001072b74f7eca9bf3f52137558a371
SHA51269e9a18b43f311c73304c13cde54e9738eb0dad8532624ec2ebe9a62536c049ef996639848fd2889a94064606e3e43cd408c44a05f38670879438b0d1cc53beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a8cb75afa852702c8295f420f95b67
SHA1444f7cec13112ce7754a5b4bfede36ec8ed34af2
SHA256b25b50debda076a7ea22a19e3ab8ceeb404f9fbaac99531a88d0bd5325ee28cb
SHA512cc55dcb54b27db952f7109617a7b118e62fc661ad4becbb43b5d46a86cf86fab3d4462e5138283aaecdfa644ca0e1780dd1ef628ddef30d7066e8f59ca4a95c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b7e7f02001a4611294324a4f491f1f
SHA15d2c78cc6ca96084bfb35a00dc002a28b1448272
SHA256bded5ba28585a8ed46a7eecf24d05ab2be405ab7226f79a3e1f14b290b015f85
SHA5129728d78f458aa7394e1e122e7ce21f69bd923549790caf2410936616c55d1da52d61602827f929ba1f9eda464d58a6592435a7fcdceb47c7e246695ef3a47da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a3445b66ae651eb6014280e0b6956b
SHA1d3313efab25fbc04600d849955507f62afebd153
SHA2562ff0bd109c6e09f459fa840b9399df38f692b2c6f9a97fc189bb39d7352748b1
SHA51200c8f437ac4498fa376f6a87a80c8b2e9e421a5f6d7d0e72e368a442ab879402e7b4e0027a9ccd7983921efbf4cf62feca4676629bfa86761adc5c23461420fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e586c494442f6f4cc78f15458b866d9
SHA1898af1cf423ac1a26a9b13fd721b5dc2f7732093
SHA256afcfe770a2f5c6f00e966eb1a0c1f7fbc535569b662ae6f5366d3686d26fb93a
SHA512a694bf82c8979f37c7573ef68f45eef0ffdd6128feb7ecc791f013e4b6aaa40f27006c5d9f86075257cfd31d34dfbea8d8d7b1ae016ea560e9e931eb4a4fd81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aeec48f7ecc568f4fd727f265a1bda0
SHA145039f584b5c2a7b4031bdf254f1be01835f3c70
SHA256ecda78b17958291a311f8cc7f04f696d0f31e339fd7f1ac0f284b2a720791b3f
SHA5127a79a7ec56a414ab662598b2437a67c6b1434afa575afb48ab20326bee760f8ab5c1064a3b26cdb3dc89a861e152696602e9d247c9124b6d8898362da2ce43f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3df6e3f5ec8d3fe7039e57044c4ae0f
SHA1f04ad9f28473176c91ebada72ee980b845110b34
SHA2568d788f0adcd0e55fc57d017412a03603f5de824c4bdafc9e409eef43a6c4d2f0
SHA512b591f3108ca56bde16bd1449a4917a4377e9132c175b2a82044d038075a947eed98a188e694b4fb33f58ed9078895665d0698078f4471c895f33e1bd44e4cb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0d33e9a258b54ff8257f6c3166d5d5
SHA12d41a9908a227da35765be1291d0046df673b74b
SHA2560e80a03013cfd8518bff3b8881ddb8f5a0d749173c1710e641561d8cecb1b032
SHA5124b6e474ad77cbcdbca6ec65242b9edbe7bbe5b4bc02866d0e1a3a83c1c536781e5ecd549d0c12e7cd2de8520e2bcfc6f1198229208a3306aaa5ff63196c9aafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fb78e63b4aa81e4db8436e36629f12
SHA1c1b903e61a4b936e0ecc70b5e828e5521cca0394
SHA2565e48baeea08c18cf2b05090632971c884ab4bc6131056ef2055c739a2e18fe80
SHA512b24d9a81421d0ffb58cd5461d438a1204328a5a89429017ce1ff770db3d78dd5288edbcc5facf381d06ab84bf7adb562159763ef60a6f8b1d837a62687fc0b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7d1ed8cf642b13014c59d58c077a4c
SHA1e8e2f0d988d72c3686daf46a7ae4ae26fe21803f
SHA2568e01740f4fd78945d9d6e5f2e42bc8f49a76cae287db5c5909160a50e74fdcf6
SHA51231a68889ea675f6c2d7b08f7c75f5b989c2dc5b2569f2e3c3d3d74c256379f2da8285225840ecdb971282de049e2438f7eea43b06f52ea81cf3b96369070a326
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b