Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
2985ef51186fb92b81e7aee776c7e436_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2985ef51186fb92b81e7aee776c7e436_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2985ef51186fb92b81e7aee776c7e436_JaffaCakes118.html
-
Size
11KB
-
MD5
2985ef51186fb92b81e7aee776c7e436
-
SHA1
869a5dffc34304af8e135a8c8e9ceb231227faf9
-
SHA256
05f795e9fba290cf0666decc88856d3f6488f69215407cff7e9f34e34f930cb8
-
SHA512
cde1c87510b62b80bc04fa71691832e8918f8dff888058065c49b70e501ed9defc9e21eec42b9219bdbb5f1baf7c1a22084c51f8c4f328e5062c4181291f4a96
-
SSDEEP
192:PGMNyD92O8sFYnfd4Vx09fWjhzxmFujln3dXPH9e76JRKP76OLsggC+ww4O86:e39FrFXx09uFjT66JIz6EtO86
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF673301-862D-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434633546" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005381943b9dbea7418224cbee5c30ee3b00000000020000000000106600000001000020000000c0a9ef165a2b468d657a51e92d81f28d25de42588275f5338691bb88d3d82636000000000e8000000002000020000000bb6a7abb333d161d66397c92ce2794bd90d7a79ec3779b47102cf9b7fd55c43520000000586cfb26ffa70240244917a269d0fd3c71a28cc763a66203d038c2e88c4beade400000006fac2b084352ce4a613b4c80f897ea96a4f69498952d37fe88823e0ea7e13a4127909d5dba870264c0a3edd32e02daa11e28c211cd7ff640b8dc3f18bc907954 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08f18a43a1adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2684 2668 iexplore.exe 31 PID 2668 wrote to memory of 2684 2668 iexplore.exe 31 PID 2668 wrote to memory of 2684 2668 iexplore.exe 31 PID 2668 wrote to memory of 2684 2668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2985ef51186fb92b81e7aee776c7e436_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32ddc8c1cbbb1e3e322e615050795db
SHA1aad6cb78fb9ad76531a4da86cbf62c44f639b5ee
SHA256ddbd3197fd83aa00e8e03d817d33604c4a5a87f20d6f89fcc7f46fbf3c0d5a02
SHA512ebb4d262df2f02e82fdef2babf16cae472cbc9d58fe301694dec359496d1e6c5f8e7c6eb2a0d08e62c1a74891fe8a6ea880bd324648a72e1f030876ff389ec83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7c11fd2a79f4228ddd6e2fe0286983
SHA18c1d7fb3cd1c197a221e5290cce3ac29c6a93a47
SHA25614f9b0daf8be4b23f8799a0aea02cf9d421ce545b1face755bfffca4a7222fef
SHA512781a71d9b2ee30565d75d2b5efe31ed367795ec1e1f4724ba0fe034c19d1568b98c5533391705b2e6e492468e2ff902c5633bcf545281c8f9021ee1094f8448f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580af9fc11b5477bd36bdaca8f9de7f52
SHA19523d97953d02a50989560aad12fcb62c15a4baa
SHA2569b9efe70088a466dd0b6e880bfc1b23ed72e315650342a4334f0cc2b518139bc
SHA5121f5f93d1d443beb771985fa9814d5298a7ec3a3f2423771f4967ddb76fc8cecd8012de554aba5b054c83335de893897f0dabda2233febbf6e0798c8eda5134b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5093544a211ebf55b046261f9aded2c1f
SHA109a3ec7d838c3ef77140085000a63fe129374bee
SHA2568299484d6ff583def6ebd50d7b250107e4650d3c24374a68f9069c034195a828
SHA5123b92287bf12b300b428b4969d4d6bf42f5942af875ccc93063331e6b4ca00fcf8c93f24b9254da00cc052bef4f6e6b20937146b3c064bc2cfdb9bf987c091a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186558356d6fe4f5c425528d5812e428
SHA118d886df5e40a7b416bb645841e70dd12ba5502a
SHA256350b448e1ee83252017a46c666f556f48fdb7c11118e0245e89b2fde773dad47
SHA5129c98fcc879bb4025c14e15672e12554e705796ba0fbd81cf142b87ab5f1555e3a20e34ec323cc8b319f4d9c5403d01f6681d3a33ff9c23f81e2f11ddd8cf7e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b39c04a5217f25046ee963c6470268f
SHA1c43219f749f61b2279aa61dec5f5d075731df744
SHA256eb64752c3fd254834688d50fe1dc8bc8570343f25635daa92077170ea59644a9
SHA5126b7c2bc44db4b73152ecdaa2244fd060defb4cdbf35457eb629247973049dae32212322c277a3c4c4ea5d970faa67a81818b1e3779ba0ec8f5af6562e8c83bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e7bde50daebcae68eb540a8937f46f
SHA171e1f9112629ead8be3adefe7e0b679ac8dabbe2
SHA256d5275871fc27ab697f1bd8b709cf04e0a12f4a67bbcb22cb34138df48a66b8da
SHA512382ea2dbbf055ba01bb8e472429f8d4a0a40e19eb845f4348e0ace68fba6ccd08f80ee2360aaa20cc2c25089148e404fea73e3fa8943bdb8a9bd2cc36018c53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc7dc546d1ee19efbb229982791b55d4
SHA1432addc21d55bd4297b80990e7a88f6d40cd0823
SHA2561f4175a7613c5924efaabf74918c01550772d57b734eea304217e2967acb4f17
SHA51251e2971521d6e4bfc11ef96e2206b79438bb8cee44eef7d3ec05cda13d9c58977cae085cbcadb8ba9c920f9eb6be1cee6b9d1070b2e1342ceac403db4b0b6eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1733c9abbb3d44fa0c158a7efbe1f9
SHA1f8c5d47b0c1fdd99309620558805edde49e37baf
SHA2562ba9c938eba5430bd66fd29fb4507b318771b5a70fb3378b6ef08ce7cccdb0a5
SHA5121ace43cfccfa6915c9a02a79028215e873296713b3f3a8e20dbabcb64703cd518b4eea26cc6cdaa4e49af0ed404da57f89299238a07bbb36770adc9e157c37e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c56b7e1aee92e4e8e2272ce36afc88
SHA1430294da064e30a343b67657cacdce811f149fa3
SHA2568bb5145102fc7733a50f51b8477fbbaa56b1c8b4137b975cb71ba4e2cd710749
SHA512fc75fc58e688217ee5503449c7e9a41a02c7878d9b1a5ed018b0f454e92518dfbc222649602dadeb73bf0e112bf890dd5ccb0c26b753f28a865cd270e21bbb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f5d2aeab1049ffed1207c00e17ac7e4
SHA19b78825e308b0f11631754da174de938d202e868
SHA25690576eaa9a2171631cc96d17c081e7a1368a72a4869cb6da7a7c084924d68b14
SHA51208d71a1df9482d2e81acdf8575eda20f41ca188e02e4601085b0208abe690405d1b47f290f49ff6682122ea8233be715eb7adfe818fe1d11d4315591375b35a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f37d6c32f4584bec4f4944aed3722f
SHA1fa854ee3fc459a0681c7ccf547a222956373b037
SHA256467c9e1fd25e8981cdf9d763497e939b54261c9496371de3f1583ec11f90f21e
SHA5127773f786bca0a4172335f5cadc55b17cccbf2bee2740cf61e801b7cfdeeb52ccaffab4d8210e89e7d4e61fdde46b8ef6705b7dffe9be8b4e6d43ea07a74ae6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534317839e3476c48edd7900731a672f4
SHA12d2a525caf496bf5dd24394bfc040ab0420b2657
SHA256b15796bebb6768723e19062ce7efa65592e63e74ec5b30fa473c1d051f6e2361
SHA512bd1a0dc2998a3d92df9584b4bc8a8db603fc60c89b0b903a390e64aa37a5a95bc7aaf3e1893f17d86e8e302c7d78249f0a98f8d15867ea5afb6a743183c573ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d590ed81a55ce7b2c9f9cc41f490b4
SHA19cdb97cf66344abbad69763516a68aee54a2f8a0
SHA25624b952581a1646b9959fa0288d38e9b91313bc96e5dd6dbe577591fff4c2a855
SHA512a54bc390fd38057a9b7f0fe015f916e614809cbfb37bdb20117bc47fe67d6d0df53b6dec9c1af092598eefb36704d3b5949a6c290a52414d35bda3462798fc2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3aa490f444f168958577a2b35c84dff
SHA191985ae892f817a6d49a23a392dc0ff2441201f3
SHA2565d3f14165abc3befada6ba54f3bde2e1496476c076b67bc3fe6560a2def00b60
SHA512353c680c14519f94bcfab8aeb54c9bbc935e4964025f34c66a3d21f687bc9d0a9a482dda8d8160c0c0679854a46be875dbd6db11de6ee02c242fcfe1c47d47d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed3c3375b26e919a9f5a4d2b8647c35
SHA1dee8bd1b6ac6856d6e36866ae360e8b38f1bbd36
SHA25627c1126041003efd7140154870910649eb3dcd15759cf865d3240621e8dba03e
SHA5123f03f903fbad81d2e15088f37403310205c8b947253546b677aec421b717f87571c085ca005eb02201d0e11d0c6d46c9b4198f29fbbf2edcef342cbf984a23aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f826c1136ac3c20dc7bf1ce4af270e0
SHA1ff8e98a50cf443dfc04f0d24c05011cb616b89e2
SHA256ed1e932b841719c6cc5795bd640332a5f95c666ea0acfc9477aa9629eabe3bf1
SHA512df576f40c42d4184900c55826acdec5f19ca1344f290b602f2a502357813ca6d65b35c48b704971c981445c7d13028ecdaf3bf6ab91c2c204b518a7fd6a34a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507cfac4ae0e35fbbf636bf299142feaf
SHA164edd62c4072f8859c0e0f2f1a1296e7c330d4d1
SHA25678efddcf5c8cd72a1aa6aaff28a6553742aecd00076b8546f69e6fc163de9951
SHA5122ec93a6837032292dbe000bb9cf422bbeab8b35a9b3f6781e9a921cf658c568e7aef035580a87a06d0e5bb828af2e9d54401c8c527bcf7707f89f679dec20357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66b60244256cf43288d0d629b6250a3
SHA14ac976699c049ee1fc70039508903c3f642f61da
SHA25690b1d0e87d732e3b4787da0e00eb8a85931921bf74998ddc81cb1d3fdccc4f24
SHA5121e2c4df42392935ea6f1a9401afe78b5dc9e61673e020a2b45a4977c7160d4d69705af7c67c0946cc09ca77844a884165d2760865131b9edf3b1991c97654e77
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b