Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
2ad8aede3337932c9515d074b80d0eb7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ad8aede3337932c9515d074b80d0eb7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ad8aede3337932c9515d074b80d0eb7_JaffaCakes118.html
-
Size
6KB
-
MD5
2ad8aede3337932c9515d074b80d0eb7
-
SHA1
a2e16571f4b095da3f67a4eb3182a61e5d237c69
-
SHA256
9ed9a223d7416267789b8e66e1b87de41a88edbeac14a3e88f1d0b1101bd4add
-
SHA512
cdd2739f07872cfb1e9a5ae523edd225fe65d299c199f5fe2794641e4d3077fddc6a4b5675887ac436bb6cb7b70793790ffc7492c7fdf485dc5337dfe033ca5e
-
SSDEEP
96:uzVs+ux7f1LLY1k9o84d12ef7CSTUFj9ecEZ7ru7f:csz7f1AYS/1b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000005005fb29a822d71f9a925333048056d4f384672b583fea1f85438d143e6c14d5000000000e800000000200002000000085280cbef42819e4768cfb81e923a0d9a05384239e32be494c31decad9bfee982000000056558b1b1ae8da2ae873f11f2df98b6d1c853c1a0bfe829b014dbcd98fee2e3140000000a3cbff29c42cb88223423f0813da7e6ed19ec741fa9d22c0925d8a83502ad4f52a84d5438d49a2bb3e2b6d8eedc76164ded2c1a8e8a7500949231dce45672586 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9093b8c5521adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434643909" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0CC0A81-8645-11EF-9917-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2728 2400 iexplore.exe 30 PID 2400 wrote to memory of 2728 2400 iexplore.exe 30 PID 2400 wrote to memory of 2728 2400 iexplore.exe 30 PID 2400 wrote to memory of 2728 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ad8aede3337932c9515d074b80d0eb7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522689fd5c991d3f1056a4719a62c14f
SHA1b3e0c6e02d2a6c1721766cd3e6f10aac71486fab
SHA2565e067190cf32c5ae686c7566297be26a4db4e02deb23eb8e09caff0d48fd6f56
SHA512059b518cc714d39b5fd4f8d94b22a1375ce992b8adf098dd091f975daeae8591b8a3eafa040d99467f7e1673ccbe669484dbea6092d2f9ba9abdb670789c806d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e5081dabb5336c1d176900c7332d3a
SHA1c7a2a1433f11d8adc318d019759fc3cd08751317
SHA256b8ca6bc34cd9e86a323b132322edfd2c326274845ff62bc8f052ad66b581a339
SHA512dea047b8d08b66358240e97cdd5991596e9a4870452f5a985fff1db7ca3979d8de939fe9021109fcc511649a8d85076d9389e245e39a247b9242d88173e3e316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573eabf4a5323cf3542c2a016c4c9f6c8
SHA18258ac0d56c55d3d7d65e4650a33addec0bb8934
SHA2568285c4a822dbfd19a0744d37ca8f4a92ab516793bdb575bb289b30e20abce145
SHA512737be0b614fedd2a450fa5eca413c5860cb5a121b5fd2fec90e3e2d286b6784a92cbdddb1b38f43a22c77ea80519367243244e32a281e8975a83e011b137ac1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525393b80dfeed556d9ac2bdf4136cc90
SHA120691d60c579fc8de4dfd03ca1050e922f6ad10a
SHA2566f9a0c8be77aa2d861fd5113bc04ca786ca5f0e7b508c5cb2ead920795b3a02a
SHA5127b0c5d7621ee966918c0ed7f12332605a2dd83b6909eadf47b5f9707f6902b4e21f423f0411deb1af7ed1d88b9b1fac2038af7e70dbb204aff6746ba7180aa18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ca6d03bb2cae9e8b69f048b676274e
SHA1a00f21310b3d62ff23368abb17ec7dfad3b94f0b
SHA25621945f57f90ad71cc0da92f4297c28a2ffe6fcf0df4fecbb3c7d14bce5243f0b
SHA512b9c21b13270131f329468be5d2b4c118523bd9548f9dbb53858788b9b0d6ee25355b7fbf6756444a19121efc2bb905357f5b43b744591539a0af59da039109a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a2cf59632127da28eeb1d4f2fd04df4
SHA13d16a588fcb7df27e9aae99df177e23b21534e3f
SHA2562c7915357d4dc18deebf113d8be06e0871cbc90451d97f4d6dd32d0f7026acb8
SHA512f7750532aff44880dad6ff87d9ada7f6a2f4bdc1f078b91e954af40db3f794469aed59aff255de6714a4a00981cd456d7489537b6b01cbde3e5d9c0622830662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0ca4da6008683ce4e46bf50092ef52
SHA1ecf5ccbaf76d79c8bb91d30bde2701a3de495c2c
SHA2561b57f1e0dabbb944ed7884cd15c3eb8d9beff28ba8f20764258b2e0b6ec464b4
SHA5124b57ed9f14eb2abeec45d923601dc089859bc0c1bb2ed18109d0d7619fa34f41c3437ab4a5a3b42054df722ebfddadd13a7c21dbee6bedefdb2c91d81faf6fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15ac11cec17cc512a56ebd4b199b9c8
SHA1c2742bbe1d5e14c6960ec1afc946b9b0e1b30526
SHA25651c102c46f6e61b7cfc3c5a279f0c27946a4e1a6f241a23f8658f34d77935be4
SHA512731a22fdc91af4051ffc062f132820b51e70dfc2f8682122e2baafe1fdee1956ba4fc1b127d3b401f792cdac0a50fcc49e6ecf1535d1627fb40e46f5643ff86f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2023dd8d798d2c5c1ed3c96ebeba8a6
SHA1fadcb78fb955328a5ea27ba4defd8fc3f3cab879
SHA2563872462a403bf2eb58e42e53eca9adda09c601841da33cf54894f0b9e0e63424
SHA5129b2e3c7b7db16df608ec7aa2e433ecaaad572c7d8ccd17152f041f15547d23deb1be74f748ee198280fe6622f0014c7c47f3c756b5bd62b09a0e31b86952ada2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e244dc04f1ebdb21a0d653e027830b2
SHA1a1d0015949a215a328715cba38ff72286323fbad
SHA2565b6e7a245b79a8929d73103f09a7f20d6322d1ba212666a8650bba6dff4058f1
SHA5123293eb2cb46fa80bc67556f1533af9b19fd5c87abdc0f2ff783c651640e8275fb7cad528707d082a878879d4ac70472c14f8742ede1616fec40b7e440d486cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbf526fe8321f0c58d7ff7b7e0759bd
SHA1b8930dd31cfc4e6c81d4288fe2a77faaf1500caf
SHA256c44e5b691b6feec66e246dd336ce83609f0f9feb0e2ac4711e23a61744e667e0
SHA512a8689028b6695eb77e0d67df9b78287436b2427e7e3434c32a568d8dbd0331e8d93ca04d7dea637cd994085b8ad04f10b49fe706cfc5699581cba1379fd643c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546219e09881c37badbf3918a568052bc
SHA14a6450904ba70d864668324e3e898f37bac49414
SHA2565dc0b3da9b572ea248f3c8b360dc7314215f52bfec7ef90f488cc2590203e525
SHA512006b86ae467fc0e7b34f4c319677bc0bf9f06af1e99293d7821fc079b4d33810af189a98adc90fdadefecb7a08c5cc4a5d4fc8adb711107a56ef549e8b6b84db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968bf67f9803bd8e188a6f68c2f5ad22
SHA14f8945195ab27367334e07cb0441304c5acf017a
SHA2569d4deb94b715c79b6197eef16087a7f43e3a9633eb62b257cc51078feb1e8310
SHA5125a4d41dec8b446dd5cf5ed04937a5ece9ec0c32e0449699be5e01b94e7c41bd142e054905d59df64404d450a652778fce6e432f88d200cfe63de4949a9cb272b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0be26e04bf3392ef6fa886188fb0827
SHA1a2b8c756db59b06165d024d521766236bb0ab593
SHA256c7df3a04dd719f2e77f06417054b5dfadb60a23cffe31a52816e152cab516272
SHA512f9df69f3c9b2eb8cea17a5f1aa8f4634117e36c87e88fed9575ea9dc9effeab2b8504d09fb69e63b0b8807407f94fc9e9244f6b731079513850c6c3d2720f9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d25e9e55a330c1c2bb7f4d6fc55e17aa
SHA1f7230bcb957f46994ea05f5491f81f1c7a9ec112
SHA256c7c7563496d92c295cd8ee3e8670334f019b29aedf765aa5cd534f572344bab0
SHA5127a550b991c004a8b2cca306ccb701563819995de4f0a59ac1c8db5fcb13bc6de99e53d96b6faccc594e3573471a6a5f8e2c76f38eb1acbb5c0a33c1fce58f4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba69d1fee24aa882d808fb5efeca514
SHA10356b06bb5d39d91d86dc11cd45db30d3c8cb3cb
SHA256b6c2e1d29979533768927414b4ab246d9f9b4f3d3b88435ba1c02db13bf18621
SHA5121291152b66ddc515ff3d1a9de16f37b9390e2d031abee77b7d7e34613e79f993ec68d77a1306888c088087f22462b454507e3221f35c01f3023e54f1c50ba853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c595c7bc78db6a7fbea243adf83b65
SHA19a5c65046ab627f104613a0743cd9f7397ca8f08
SHA256645d275c8d611e1820ce8075f27516f71d858cd18ff1f038d2e71ac27dc3fb1a
SHA5124baa9894c79ea6b04b8eeb98194f243eab486c746cf6089c8e0672427bc6996d5c9c8577fba7f80fc7993205798a7fe80fca7feb6d86c2d7ce571b76b943ecca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550e4fade34cd63f7984f3c7fc469ec8
SHA1a7b83110d6588b69c895a14ad82662b5afb163cd
SHA2560b06172f5a5b3ed437e42ae3abb52ebdeee2d1549017b5ed2051e93bcb95f03b
SHA512cdac2172923e3af4c6d2c92511a17d33cd7c81981a439dd792391fd289ce939663735f5f5e04f6c5fadf92d581c7f9ab1838a875d47166b11619a624f12fade9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b