Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
24d2bcd4252007e27abda3e5cb13f03f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24d2bcd4252007e27abda3e5cb13f03f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
24d2bcd4252007e27abda3e5cb13f03f_JaffaCakes118.html
-
Size
2KB
-
MD5
24d2bcd4252007e27abda3e5cb13f03f
-
SHA1
2d6b826da9501b8d0af377ba7d58b2f890a0059b
-
SHA256
04eefbd3813550487735a1fe4f6f33f9456ca4539d9e5980234d654bc5a9fe6d
-
SHA512
820eaf560ffc99aa826e4f34e607e881485370f59de9094e3187452837e76f969d96b2f42db55f19e8469dd6a21cf3f6181ee334ccf6c703ef1e5ac48ae49772
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08fa199ec19db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434600028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000538731908875f8b7989653852fa7e8d1b96ddfc9b3e177900c8f9b10e270c7cb000000000e8000000002000020000000ed387cee1b732738fe06a7856b535d7026ff450bb89573c743e5905562840b0220000000016ae3a1d5e316bee98b247ccab98498baabed7d2a41b3c328dec37787a5981440000000f93acaeb433ee24280e5933e8fd5925e483304b76578c0292b0d4e590d1ae377065072be33dc50c2b027ce56cbc8f68019b28146ffccfb5cef8577ff9e7d2f2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4934611-85DF-11EF-9218-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1320 iexplore.exe 1320 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2052 1320 iexplore.exe 29 PID 1320 wrote to memory of 2052 1320 iexplore.exe 29 PID 1320 wrote to memory of 2052 1320 iexplore.exe 29 PID 1320 wrote to memory of 2052 1320 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24d2bcd4252007e27abda3e5cb13f03f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba62fb83e76af02a7b4ef6c7d78695d
SHA10471badeaae655ac76c1dba50d702d975f2e06db
SHA256c2cd568758b16154a62a7dd14c540c3baabbfed930b84dba43dcbbf7058f65f0
SHA51242cfacb5bb3bd04cc9f021010a259c1a2a5aaf954bcd793b876a4e9ce1c492f31c001c57fd62b156fcc19781ad6dfe1cce18e1f59e525c4482a7de2192f044fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec76e421d4d445dcaec78968bcc61962
SHA1fa190fbb24f03757c7307a91d929f96acb5228a7
SHA256281a27cc12062f1d759d59047355f09400ce7cd62ac80c0bdea20ec5c03cc3f9
SHA5128383e1551634f8f18c518db43300d8be8c46993d3f078e743112faf345f299eccd76bd7358018e7e1b77badf81f552b140bd60c8c3c0ed90ee72c4af84e3e1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1657e30641157b78ee23ef7fae407c3
SHA19d8535b367117980787e55e1e49e422e81ac0f0b
SHA256be95048493b251e068db856e9ef54bd18574e0c8db47b8f4c59f60c723985fb1
SHA51267c665a5673f927e6d10fc7a4bda5b414cd71fc09cf5503210167ce286e605a607d1cf55d4aca7fdb80ef008097c25ba009efc1dc737caf826a48a4502fa53eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f116b289479cd4852a3bc9f20ab2473
SHA19c783003b85ff48b5622c5b573e9355bc0e69cb6
SHA256de417bb2a72dccfab933da68ae15990c91aa6701e2d6ee35e7d2629ce2090360
SHA512d29279d3ee01bc5ae79d18f2a04010594ca037d2ac81bf96f3f834f6143703df74896acdcb2ca6911bf80073d181fce613444661822c683e0743c9b0de8987d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ebffd18b333a8602d6f82214eb35ab0
SHA19d51df89f101b2ee0a12708ce0f29d601a74a9a7
SHA25604bf90144318699abaf1fb038b9bc9779635a498cb714486dee5403ccb72a587
SHA512440778234ada5858efd10e1351c2b696c211bcb5448ce188ac42783fd02619e8bdd03b3807e51e8241a4c85c20218681274f082897f14a2937c28ad577226543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee007c14554316cb5bff20f6b14f2b7
SHA1dd6cf2137ba62fb1f5ee920429b3db9f1ffd0560
SHA2561d539908d6d2956ebb0473fb1be922fe1e7a77f4a3bd21ae0b35dae725b9de9c
SHA512f2f49c291fc3fcfcf88a6a6d367f5416cf28fd2cb2e3d1a9865ac7324511dda3ab37ce8b6609356323f9b1f71dcdd3e00e448c2174e47cb754245c20fd9d2eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e819d1ca094b7570a48dede2af90e7a9
SHA106751a395d5696a3b0c39c4ec8d9333ac0329bdf
SHA25622815d90fbf5a42b3617147320eeb6db0dbd34216cf83cc38a3a9b91caaf5f27
SHA5129a561c28253cf815bf4d321750f37424c6ddc95f7a787ef16df6e8f54a5e5b412392ff9704f9f75426af971e7232149176d8580961c68a3a805aa9e0afbcea46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdcef547867fa1b3679e73eb898f0371
SHA1e260bbcf2288334691c16b334cdb852311fff29a
SHA2565cfcdc656ecce212f77064b3890504027a2e605f94b379623699813ae1ce6633
SHA5122ebd8d5a2b546458b6037ddc53999093b971129b2be9dd4ea7cf8e2bf64d1e42d67ef3b8bd306976a1c90717aeddfed8f3303f295e8bcbbfa52249f243bfc397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b10e14811d250ca94d5bca06dc3c67
SHA12fd03f9e9640cc8a3c5226cc4802a65623fcf6ef
SHA25693f15a40c90b4d6c363f693d51fd02f7b7d25e11b2ccf7f27edf6174e25f3620
SHA51272765fc232b27efc327aedbbfdb649ac2a6cd45144855f08bce89728db938751728922b6f0c12c56f0ecca6606a370f9e98d294be6e06ece1cfcd86f625d3138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cdb17c8e5afcc7581b5d781dbbdc3cc
SHA1a9e2c5c2fb52c1692a28e7aff93427fe9614a10d
SHA256cc4241fe12c92bd4a2ddc4a36dd10a5dae44acfe5a7d44a59a6429fe06a64fb7
SHA5128c98de1267b7ed3d244f9b1c208e6a6ff0e6a4dc18f3ed76f172419e2c20c4b713ebcf9930f93f308a923711451a86396390d0a9bd796926a19cff5b8bdb620e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a55eff9815cdae09457a32d8ebd1d4
SHA17f359e20f3f8fa7b0e6cffd4f653f21fa7b45997
SHA256795e8f24c8d1dd278eb72e9ae42e70ee83b9033120034211a8d4f55bd6731fcf
SHA512e2fd9ab7dd729d771646bd87b8966b5eaefabe0de4dc01d5ba0e4da047d88875293a7115b0a7597e67f80d8fa9b75135bf421171c360d0479c8cc4b10afb30b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5e6658658113bf500657d5a63521d9
SHA1e08a85d5920c1eb4d6051005be793ec29ad54ceb
SHA2569946028ee44b5b8783234f564cd51804f4e77e536c0194518020e7281f3d630b
SHA512c0dfa2fa5f8342ba7b63f554c00599169ac9c5b781199056c08e928a54f169478eebc02352f4624339ff2a5f424aca804ca4cd0978ad44b86e3acb85595b9986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a35a0a7b2335319f4575018b1718b775
SHA14b9a03ca64455ce5ae715368c027a3a2bd8f7d81
SHA256971a78a85ea54ccd25d3c85a040acd6dbfbb43ba55d6dcf94e2d8e9703905945
SHA512147bd70744d8377d031655032fb662b5e3f0136ec8c79d8cb45ad17f859e9915319c93f9e45ca49dbaa7157e2559e7ea492adea0c86cf7da2e1680589c31c08b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038fc2056b7e0153f43c4badf9802ba2
SHA1f212f1d7827f56055e83a2cadd4552b0dbf4d908
SHA256a56fe4095645bda9a359a1d767e17cdf64a188510734fd9b7649695d5aa08300
SHA5128b92bd2f5e16ee48d40d0200ca37433545207259e3ba4a5982c79bc112d5b41fc3bd68120448230281cf87f25538fa5c59ea5652d2f91a91e2bb7cd50de8d9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595831388b6041cb444e7b8c68481c965
SHA1d583cefe90089bdde93a853fcdc75c58894ca385
SHA25642ae12931149d8f10fae3e350b5602df035499682cc621f7c9a5f930b6ab079b
SHA512ef05867a437297077023e5a00855bfb6ea16718cc237193558f852b54b8b2d2743b86abccbd929a84261020717fdce31844cc15797f141ab747855ed2c763717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52222d6af73b90b26c72ae67ec2ae2b45
SHA16d1dc1260c7e1d9970f0fc628adc72da8705a0e7
SHA256c94c6ef87c972e13c7d0449f03d9f3271cec9044cdc7f6228237c5621e19aafd
SHA512bf90c37575322111bd289e59de49c7cb56b9647791b812be523b4af257d8b5ce4fc2325e12c8bd5ad990999f9b1368b7b3c698ea27d4adcf6182aa399d1f3254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df863bf7620e6a0b5eecf025a9234db
SHA1291affb4fb184f531f9da972a09992aecb7842de
SHA256cc6f7c16f951e36f91c4cb0adf602365ea26a227146fa6f879c568b050195cee
SHA51248e4503a102967d574ac23d28dfbf94a36b46c9d6a450f3fa065afe79dfb0470bc61f960cb09a84b6c9b4eb424e1dcf9d0dff44fb6aa2f5c56aea4170a754ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709f6c4022bd034dda62b598fc0ffa76
SHA1c8e2ade174dfe7a039f62cf6ba06c454919919c8
SHA2565e3366fb0a9ab0ecd23b298988ac0cd06b22c456faf0f7b12b490d2cd8437460
SHA512f99bf54868be58dd7075a3f2e4933516991543dbf9006a118fe35427c5ecde6972e4ab2bf54bbf4b2cafc4f8b27c7f13810fc5328c722733d595d5029e3d6e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad28600bcef58002cf9765aaadd9473
SHA1ecf6cd35b8f5245e1dbfd186ca45aa1784456ea7
SHA256ac58a95b0dd5b9e099060b9b86bd4a85eb73311b8c539d4a5250e49f6819628a
SHA512a2fb9baec462db774233b98ef4a42ff7f9973b385c5cb4f6f7054eafdabad3b78c4638c7fc392dc2384ef58eac3d125b88c990983405ff104e0ca5bb8f1e4424
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b