Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
29a95762232ae989aad5cdb701a43b7b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29a95762232ae989aad5cdb701a43b7b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
29a95762232ae989aad5cdb701a43b7b_JaffaCakes118.html
-
Size
2KB
-
MD5
29a95762232ae989aad5cdb701a43b7b
-
SHA1
9410c709958095d0992c07974832edab4acf3aa8
-
SHA256
ba00b112e99fabf46eedd0526525dadd039ba1504086d7b3ccf25048ef1b8211
-
SHA512
4ca7ac0402f5369bb1d74d22554f7056f2ea93d059ceae25592c452351a52f6b29ecc890516c40ea3b3b990814597a0381a60c3710b49c4f485dc23bf5837896
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5083d8a13d1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004906aff74742210512e34a419cfee0859901b64033956a1522727f6bd2a20246000000000e8000000002000020000000e788dfd4eba783b7c64e6062b181213cccac98fb67aa50a601af8db67034bb4e200000009b0c16d2e665bdf47185b06f2a8741c41024094e684008069fc321217fde255d4000000068230426ae3f163f546c641300e2d54b93c72549b447d228c5a5f5939e73607dbebfe39bc5676e72bfa96e7dfc699b15973917b38b5ee152865f573d59ee80d0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434634830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD588751-8630-11EF-925C-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2568 2960 iexplore.exe 28 PID 2960 wrote to memory of 2568 2960 iexplore.exe 28 PID 2960 wrote to memory of 2568 2960 iexplore.exe 28 PID 2960 wrote to memory of 2568 2960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29a95762232ae989aad5cdb701a43b7b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc9a791a0979b420590aca9505a38ee
SHA193eaa7c401f4e8586f7272396e7343a08224cf36
SHA256b9b609bed25e347d71fe97554b56e1dfb93ea11c19f07c60f1559cdf4d1fb961
SHA51242e258b8b109a5e71bde522d3a83dedf39eb4bdeb1265b85c0a32c4520cd009b2de6f38e7eded5efd30a1f72d93cecfe2ce72e96cfc242d8f200bbda0f75e720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b58d72c5c8e3927bcb592ebd98275aa
SHA113a31fdddc3f4f3696267c83b58f3a42b3f16eba
SHA256f166d5c2c5baeebddc607d649d6e4d3a7af8beb103dab00b090910f342faa1e5
SHA51205fca2d3d27c0088d916d4cca58f12b3853f4440d66036e7c4add07941af2eeb567dbed695c455016ffd027d4dbd07500ef7688f99931427a123177438779e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d06d4434c6524499fe1e79efc8486fb
SHA111998fd54ff3ca62f7923402d18d2ebe27960953
SHA256e17f25a68216ce680001dd2294ea0e69b622dddf5a3e90c1aa2dd9a28939ec87
SHA512f8cd61c027017849ea4d3ec29034cf12497e2a86bcfd739c1dc6c3e41c7919894966de37d22be1814f308a8c3f5e9217b7f782e1dc83cdc50d4ad1af98848969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7fcef1177248fbddc2a46cdf9fa54e9
SHA17930b78eb4a07268feae7a360b7c730d1345d857
SHA2565380de8de82f5d84ad0cdebee8fdd8a9006246889f0d9ca87542cf27aac91c9f
SHA51295094ce51e473702a1496abc7b2a4d8ba3445421f0b3e72e2c359e9f4a793e25b7152dd532ca99e8e7f4f52ee0287512a5ee24216c10ba18a859ac84cbaf2c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24313a0ca101147d1774aec4a21f5c0
SHA1e6a4b0292e88603c82e72c0a53acd9ee059e5cb9
SHA256150053e4e31459bd880ae047194a060746c8a51e67596384d8f1da1d0811ad49
SHA512bc6a92ef77e41aea7169aaa643e4ba60bd0cb9e7d757265bb128cb56f1bed8656ac515b0d913d3f14a0c35ace33ebf6272a5a1395188f1db59df0c1b9ff58080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57241224c879a98134415c731c211b587
SHA11e15e4b979fb6b91d4bf22e2982b7d64f6e86267
SHA2562a3bd62e824aee0419f45bdb1e051461864b6b58d1cb2f377bd084e41b056b82
SHA5129be56a0c5d16ff3ea583c603af307ad9974718c9e87354b288416405e2be19ba89019421670234a4a03dbe08d3f02a92ad3891eb6a9ac8820a73e1a94d161625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf63fbc052ac981574c6610cf2f2347
SHA17d7dc1f86079c91b0341d96f660a7667e56c72eb
SHA2564dbd7e735238062a300fb833cd8078dce5632b71c660f938b1cd517bf1816c76
SHA5129c08aea512fa47bdb36270d98636eeded094f0f921d5ac518110602d26a9d05f4de42d2ec7cfb460feb96e92476d26fbfd487c360e5be484f4885d06c52c2694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984cfa0b805a7a18dcf7523aad79c500
SHA17aec57a9f11b2d4f75560c9f4abdba2637dea54e
SHA2566b94a15559b2d8a0c30f12b3c55a1c48ab1f30c78c1527c89836e194fa029830
SHA512df1b4b0d2b37a7aecb8a7f5ff8c5e616691478ace3afbb1a22db349b291f938c680511981d77e676f56e9fcc3952dd6abb88c643c5229bc4251de66bc7b86191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c081ec79da05d8a3dd9c01856633da5e
SHA11d0fc93bcc40926fffbe4adddfb85abf67ca32ee
SHA2560109b0426b15a1fe61542f38ed5e0548740d76c241226a823d375f566544f0f9
SHA512526aba97dc7debe89a2586a1ce3e6f221c8c822698f8c22d23e45203c03e1ae07f9d56a6216a95adf317c4f81c24ec7133d88f9815898a130fc3a6e3fbad5ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479ab2c4bcc7a75b8a47a2fdf8c5b6ff
SHA19394c7c0bce37d08526e5bd7ea15f9aa20055c46
SHA256850b09e023b0ea97380de2a84dcb35048d813a3b343c642a557ee651e39d73f2
SHA512f2d0a0e7ae5f4f2c5ce0cd13dda9d2bd35ab398c52d24db00904ef6de2ae0a940e63be94174a40832fb0926e5f9ab5032c4e1b40713e35bb76e15fb14a94ce39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3c6cd94c4d54d2f25f0f252b2601c7
SHA1351caa5877f1e9691380caee11e9e1a93fc2d7a4
SHA256e6701394b25fc170c9ab0fa0c0d596916e4a7fa23b9f2b116f5a8c9362247d8d
SHA512b5502f13917d4cdd5408978b59d015da7016cc7db7cb70f640b24165a44c9212cdc518f6f7e58acb579a1a001afb927ac50a1ba65674efd0e1936e8343797dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556402a73133b6b4afc240f5e3495cf67
SHA163591c019fd8d70f2eddec2c516a94985f330b74
SHA256ce84e401d47e0397ae8ec568b7dd2059846adbfdce809938cb3570db48041036
SHA51225404a0906711bdfaec2fe366bd8d78a759f303278273d9f7d0d10d38ebb94b9ac05defe64640f2cb3c38dc9eed3008ac03f4874dbc1a77b1dd2896ef045700c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598b606d5b9ed6370097d029fe66ed57
SHA136b30bdb291f9a2a9ed2c294225c2cbc41518f60
SHA256705b989d975a02590e7eec26996af92321470e03a99975ab22f35a7a887ca2de
SHA512d680a98f63500ecb6ba99dad9984b935aeaa7070466d4d9c7a0aa33550cbaf8a73250085b311b8620ac97ea431b96058116fca0b1de3052c1fd6903fb7c3c145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09790dc4554d6433970662f528d2e8c
SHA106ca038349dcdde89a0173cf6673c3391706c3f0
SHA2562b8c9cb4c06c0d4884569fbb4fa8f585a3c61ae1334eea1260361a50a9c48a85
SHA512e51fa6f48be699b86efa0f592c992877250af49ba09d1cd4a8a1b1abb27ad6eb9a3ae0e5596a22fb24b81ba33c0a4970be12073dc6cf9413bacca595bed9604e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57352edf287cc32d3d7ed3c9a8d8f167f
SHA169dd28a2b2cd972e689d1d3a41e2db3f69b27b2d
SHA256e40222838a4fd8b015b47812241ecce2616786fe6d6c0a210d34ad25edccd5e3
SHA5125240a8edcb320b1a5aecc09063e33f8731b9fa19f35ffff6b80f9081102dd4715280f5bc7acbd9da751ca7b56c0c446230fa92944072da7c920cccf0af005475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed3c7841791acef6ff6afb9c33d779c
SHA1368aedc8a55b5aa02f464880b875ef09ae3b481e
SHA256e24509a627e4c1461ef319a35c96bd274342e46de6d008e489c4142c77f6f0ab
SHA5121484dafdc013f343a7250f8a7254ed9f19f0ecd77124f3a5914c037d518bdd86cb006fa9bf3ba4f50f20c3f15bf46a35645a1f87e96527a07f22774a1ab612e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90d29f45b9b0d995a7d47ee89a65d6b
SHA1bb1818179bd31881ae141f74dd814f72eef86bdf
SHA25637f2c2f85d5df173ef355ce1437416da72cb00dc2e676f55143cf1f1680b57b5
SHA512b8973d01de5f4cdc0e2d1f3bdee4055fcd156b0f068e0ab217dc8e678843dc752489172a6f578a9cf080e1b6b314a2e4b4f152bbb8f98704afa63e71d80e9646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53329149dccf7d1329175e0f08f1bcc1f
SHA1ae8d4d4071c2cc2792a4c2b4a4bff8b76b16c6d3
SHA2568789b1c9ca5bf479816581c473cf2084cece9cb515b820b0e0734631224ef9d8
SHA512e52467b53b0b6df36ac9804e0bc7bef477300b1eae47a7bdcefb80c7bd46a65760968d649ce6b9d40cb7069f48e0cfc4cb0bd10b912288f2801edab12049c6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e4d9f5413af7b6ba05d13525f1308a
SHA19c585be66ce0ecb2cb6e133f5c7818f9c06dcd81
SHA2567fe87093aff91d41186edbb03f6dbbee1c6be0c28802406bd741ffa51bd56ef2
SHA51242ca4664e60c8436b410b3b2adae438a985c7b315368e39e446e0838fd466d7afb28c0d261519c40eb00d23019da423cd0efff5eb601395065f8a63c6583ae55
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b