Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
24d02332c911d348ace601e834fe387d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24d02332c911d348ace601e834fe387d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
24d02332c911d348ace601e834fe387d_JaffaCakes118.html
-
Size
2KB
-
MD5
24d02332c911d348ace601e834fe387d
-
SHA1
7037ecd877f04d371550d6eba36c03eb1103d66a
-
SHA256
a6e20cf3ca6e710f0862d004249fc757435938d261576c446e39b09b45581104
-
SHA512
e6f6ed098f42b3798eea200461702ad097d3519c1b08b2cfb684bef5fc7a7d4a68f8f44d8f566b65d2de385635b3027a72ce67003168a154a5e743c10483967d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206b0280ec19db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000003b47d2aaa87cf4a3e59675254599a7a6cc5e79bbf1ceee42aefccd8212a3e318000000000e80000000020000200000005148035ba8fdce67b53d47541241e39e5b20e1745fb9621c2ec0f4100cb207bf200000006a384cfa7ef7c6b1e410b33db12363fd9f12c6dc5f3134c77720f5354f3dba2540000000bef87c4804c1e6210b57f24e56583bcc3cd7963fa79d8b9df2230f0c7eece9b3e16e0fa36e2f49e1c3940f1e1d23d8d2c2a725e8247a483e5db8e8f5dfd4e120 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB7B52D1-85DF-11EF-B432-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434599984" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 548 iexplore.exe 548 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 548 wrote to memory of 2320 548 iexplore.exe 31 PID 548 wrote to memory of 2320 548 iexplore.exe 31 PID 548 wrote to memory of 2320 548 iexplore.exe 31 PID 548 wrote to memory of 2320 548 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24d02332c911d348ace601e834fe387d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5dafd59a3762696a8be10dcb437182
SHA1899f0cd2ddb1b24fda0791af87bfb2dfa1b12fd5
SHA2564ce8c81ded2c1f2d06bccefa7cdbf277930bc7da3dfd66e5b1f4c1898ac00f92
SHA51269b827c1e7c0668e76a80c9151ac99ebb0dcc4cee80568fc39383baa56235b6828f917e729ff5882442e12d6e163c9c589c362bcc1fbe3e85197ed195c8e410e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5016fe0b2050be8a68fd019bd5b8373b8
SHA1dc39902c63efc59f3b13811b0dbbc597a601bac5
SHA256783bc71637b2c47303aff060bd67d4668db116b3a9ffe45e10d40331c3090869
SHA5127848b59077cdef63c3936eb83162637df85a18d7275fb11054f395fa4a9cc782b2b8c449ef372836fb34a7e39fc7d4eecd69dec0eb9a54a154642154f4163f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d5f63eb29261d4a7265e422cedfd67
SHA18a92db1f7c934bad71079f2d76324b2b3406a788
SHA256a87dee3450d25e81517df801c6c960f42071457e591ada226acd2751a7c10b2b
SHA512d4e68979ed54f867d0d189f223703c0fa87817a78895d8dcd5be76cd029c73cd00c11be4db541e37d25ed72a0b7b60de1d2d997d8c52c4c2b40eb53a00e21cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544eb8043bd2b83c5a38a6d5ab0054ef1
SHA157a2b199a45d81e42072460a9102a2e8c3be3c56
SHA2569cf64e8c30fb15383af1b0b0abac3df0247dff8ce78edaec1058a0a540bb68e7
SHA5125a4340ae70e316cae54321e58ade2201631aaddb8ac4a0bb019df0204fc9666030e07d0dd70592cb5b3742e72679b89f3e43210f5948f2699ef2a36366574120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56932056f3e0e8b7485cdd6b6bfeeacdc
SHA1236cdc28d77a8b6547dfb637f9747a1f4376f241
SHA25659cc36c04c6adf6cab9470337929d0c222c847502579adfc577166642230d0c9
SHA512801462de5abad9716aea2b0ef432b87fadb912ca2a7b8493fbcc520123a8f14fda3b2eade951208df2c9b22bff2fc6a352226095dced8f5294f5631836886df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71c45109b1af60efe932bf49707510a
SHA1f8f545aa98bc58ecceb17d9d14499fd3acff7322
SHA256e938ac10aa0b58d15cb61c9fc7d1b9fbbe95c679b0d2da071c6c3e183ddab928
SHA512a638cf1fff151e7d1daeb5a7c0dbcc044b6b83f2ac259a65a1bbf63d49b8403b043be148a7b70543ed12a4f6e84ee22d68d1d8734d95a7539f2e654331728811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f5cd23ee7f32ea5d6af6d688f109c8
SHA14797226dcf97616c80f0bab4a2158d27f5d31ec5
SHA256cab7c0bd957b0c9ffb66287e35719a5a8063e28a2014a800014990a30f619915
SHA5127a17de31c0ec953c9ad6fc860df9558974187d178eb3f558c6c6a11d268375768eca9fc1b33da11d46bf9a2dfbecd608ae798447534e5ea25097d6650963fa89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524be00449144b0a136130b1c3853cb86
SHA1e907a350ecb8e181029b6d130c03738b30b30c16
SHA25610f5989c48cc3ff07eefba167430f76a76199e8734bd2754c025ab6ab8daefd8
SHA5121b6a076bda2aa2f03a41b6af4604bef3279cdfe807ca0ba800206bc1628af572a7c3035dcb29c4e399a1373a55a7e0be8b1e9ffaf41e92270ca131c201a92843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e92c96c2b47a7fcc77a7e377b0c3c5d1
SHA1b5be8fb312848231e513c0b25f5fbd480ec686c0
SHA256b334c1ad06ee9c86047a1ed19a34d257226a732d671efa99c0f410e0e844ea8e
SHA5129363214d1a6b9669d05b7f0e705713d9cd54b22a4b23b18dc0db8779d765026b2d6be291fcac923f9f7dce3ccb4200f3ae4290d897c0d7b9f754f3a1b20ec58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559870357ac2c7ccf8f0456b573b769f3
SHA1376cd50e7d96f2458cee6bfb4b240bc2dd70ab61
SHA256e1739d95a0c9d50908b105609bc13a0afceeec377e0667901e7dfb52545e2255
SHA5127e9cc2356999bb0c396135948b4a9e7e9a488fd802980e3cdcf4fcb57e30f4a040f1f361c1a765ec03c5d8f4fa7b51a21d714fc431ccb5959a28e499ffe2b090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cf5c10974add545a89e6c30a9a472e6
SHA19676a0e0fddb97d4036a2539efbe2a95dd52d42d
SHA2565a641d575bc838220e2e64a23883200854131e72d9f2439b0da3cda61beee65a
SHA51276c9c466d5f0103a95caf09bb02872254b7d3bb1b34ae40ffc0ee3c10cdfe59c4e7808a0672874a9c921bd541e66c09f76cf97cfc04814614abccf6880b828c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66655dd24aa18dec887fa5b0829bcb6
SHA16534d12a37771c8e9ba74379edfff02258c77a50
SHA2564f640c5c45026f3611855d3bb37095c2f3d77acf278286b35cb49d22ba9faac8
SHA51262f419a12256cdfba1286ced66773dc64fd01c043634ec2899cc35917c0b8443e95e78b91309c096556eb3752f0f05c394173d0baa12d815459decc88b1d1871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b502c1fcdb99978642cfe11d31b98d5
SHA121c1d436466aa3dbe18d5c2d15d9f0a03d09e856
SHA2562672dd0b9227da4dc6819037c94e28cd8f50ea1718df558f13057c43469aec74
SHA512ab94ded9551e05f53768e1496b46d6a8fa630f30d01d3964cc3c09809fcc1d099b839edf62aa2b87596f8fe3f78572100bf10059a4a8e49831d426cdc1e3ddb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444bb26b9582538a2c269d7c23e67727
SHA16d4ba8e1ea84296d68a28922fb4c2a15b15c1f55
SHA256891e68fbbff8cdc30d2c1df69f17f4e0db5a86a8be7775af5ab918c8890eddfe
SHA5129a249a7581b33b2706d6e5cefeec2bf0a8bfa242082bd00aac715894bb84b55562e78efe9a15478e56bbd6126fd785289f1bf477b2129f624e7833702f902dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c2b3f25c903933739ad6a79dbb26b3
SHA15fce9faf969fb41411ce62f9c60628d7c117c7b5
SHA256633d4ca37b122b827cb901c147e51ebaa6d51646a0bc3fe10ab9e107977a5e83
SHA51298cc373259b964fa8a5d44e163def59a15b1daadd0e357bc84ee7cfa59a217c28ac65ec2962efcb85dcce7d5a6fc7f96095d16da1e638ff0bdbd52cee85b9988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e02caba2943f735d7da24cde5af16e
SHA12c5af2181ce77e560e07e20c5071dee48759988d
SHA256af2ef75b4b2d7999257ee6c23f3efb547b7605c7c3ae45cd99564bb9c90cab02
SHA512cdd683ec3817e990910781b4d4acd6c6bf894cc5fcf09ecfbc941ac84a0a639b156a73a0756eb0863d6be1b0eb9620bcbf26ff9aa42bee5712f7dd4c055d1608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bbdc6b713a9af1d37a49114345b10bf
SHA10a815ad1e3e8b6119265b6f805d194c0de35eb69
SHA256237c3f9e6a92bb398a7a689d0ef4984f8996d8372c3ce2510e56b664077512fd
SHA5127ab1e823f97e56ebf7daf4a0e871d4ddd617ed6e51e879340904742ceef45f7ed6302ce5d620aea5d0e9005de792bd7f51edce34214c03098fe461572e260742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd0ca39695325e8fcca4b6d3c5dd11c
SHA157d630f9cafbc77a0ed9f1a09a4a40aeb2086dfb
SHA25643151b4b84394c0f9c7c67753c22d323502f7cffcf1438ffc785a268605af22c
SHA512eb4c82a697751b852a909abb0d1f69e6e182a684257a7df8555c831738b643cbe776950f8abc825da74010aadc8d7e846c06b8925091f89032744ec460cf3e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69a982dd0acc9bfa85876beded95ffb
SHA14af9c8c1bf94078a437648ae12793a1e70d52018
SHA2564d0e032c020652047f82aa50b1ba5e4918a7f8c1fad51adb0389f22229ea45dc
SHA512899728bf63998eca49eac8c642ad53f5ca184ec4ec95f62e40e81ac7ff3a6b5e3c51f3dcd58e0951882baebfaa611858b6e4f25653407a11f91ae60ded9f4eee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b