Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
2b070406175e8a994152f09c62ba905d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b070406175e8a994152f09c62ba905d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b070406175e8a994152f09c62ba905d_JaffaCakes118.html
-
Size
57KB
-
MD5
2b070406175e8a994152f09c62ba905d
-
SHA1
c07d4a31c976aece72be854136db442a981b2ef3
-
SHA256
bddd2f8dcf495c9d226c3f7b0020777ddb213d619a32e61994d7a7d5901ba40f
-
SHA512
fa18ec57fbdd0898c908527ce383476c65f2690830894ede487923310fa912c0b436ddb55a8873c3d2a29047f8082c10bb2ab110e199feed14a898c88c4126fc
-
SSDEEP
1536:ijEQvK8OPHdFAMo2vgyHJv0owbd6zKD6CDK2RVro70wpDK2RVy:ijnOPHdFm2vgyHJutDK2RVro70wpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434645354" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a6b424561adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D83A371-8649-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000010045c05d0fe55afc7fce979d258e496ad3b1305b6f8dfd5119cc93abc92c11a000000000e80000000020000200000008eccf939c75bbe06474fa7e00b0ec19fac258a30fb2f2090d96cf906ede63f9920000000b8fe61c5eba48d671f8a0f6fa515c0d9adb048ad7d189150aaf5a01b5287fa7340000000817d1d1843b4def49fa5adc3cb7623ccee4e7fd3a073cb5a13f859b1d544875c6aeb714972d281bac107b1c13aa82503fe297aae4cf8ac786eca7e43cf89fa8b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2820 2096 iexplore.exe 30 PID 2096 wrote to memory of 2820 2096 iexplore.exe 30 PID 2096 wrote to memory of 2820 2096 iexplore.exe 30 PID 2096 wrote to memory of 2820 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b070406175e8a994152f09c62ba905d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD520244a0b259d91b1b2c06511ce1cd05f
SHA18339fa591a07848b36b06eb08ae0c71c8d939656
SHA256a72653fe85a5a2aba137328f94923874d1b91b89bc293325763e29827c4d5d79
SHA51289537bf05d90438be8bf5b90f857126dcef2e444b36a12ce3d3138e058f54034ae9cf64b4894b14c5e3df4f7bd0fd660a6281ebcd739b7103ba2bbc5cdddf967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f46b08310d710279b37e7b4639166a
SHA10a23635a6ba1b1ea7251d0bdb1c6d164990119e1
SHA2569a17fef13128f2f3efff196097a8fc954aa937f6c2986ec1e8346135422a7c81
SHA512ca3bf9dba05507a337ab8a157cc9c54b925a9cdd33dfbc3a7ae9003fe1bb90ddf5cc6018ffa0c3dbccf7eaedcba35e0ddce0e0a8ace75db7bb1b89501f75d36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54725e78b6620c1b7dcd0992b9bd28c31
SHA1311525c356a0dd6de9df7ee42b6cde2ff33b585a
SHA25686a399b1ee3b53b463c653c1a3e3569684f68701e0428514c61d4e476dcd9b55
SHA51266f06bf2b66abfbf1542c2c69ff826dea50bfd6530aad70195022f7729b333ac1a5a33a56df87527b5cba22e4690824106b2f046bf63585fd938a0b482b95e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba5eb18a32f81b0bdf6a4858db4acec
SHA1b70ac74b0979ad83642d4ad04159e6520209e70f
SHA256b333d113354afcac9a600213bef82c4a467a33e8204cf46d81d990aac249de92
SHA512a4fdc12b3cf426c76a27d4e94feec303b093eeecf4e92d9038d5d0b8422c4528d5d64f93672f00b657fa2bbeaa750ea40c841321d18960458eba6ed0c58714bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58062546b8625d3691a1428a4270de5c4
SHA1f7fca7d0429c31995e723a63cf95ecd3ef4cc102
SHA2568ea29c9ad0cea81c85895f8eeefd12e19693c1d02df7ad40a8a43724577d0d86
SHA512bfaaf36c8b57b0f44a8eec597e772b67681e3dd47ae737dd1af4369df80f5dda3ca71d0ed3adb711159abd15ae57621a1e8184eb428b80fddbdcba577a0df38c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618036c5781a6424f22255bb4ebf01dc
SHA183021fc54fc5094bc7c6b59acedf7aa91967447e
SHA256511b0894d06446e5243e41c771806cdb53bd2d5380fbc37babd2b3bc5c522f50
SHA5127a33488f3e83ae4008d0cc7991cc796d6ac9d8558fb556aaf540bf86169e42590a84eaed79925e9db55a2793044ace7fff64183c5babdd5adb9b04ad4dbb7d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1001ebf7598f38893c870da2361c152
SHA10c546a322269d58c43d89ef7a87d4aaf15ec9bfb
SHA256d4a8d45eb14bacef006188892c16b1e8cd808955b25247587db6898882f9719b
SHA512fdf4bfc77f0f2e6d55f4237dfe8b533dd0c998684e086a33c7042b5e21c8b661f4a10c07b3b3250e144834b333b6c899fe1f77133e5c416f64ae449e684b0a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549276002df99f30b84dcc6467f23f95e
SHA11fe327f8ad6fb9ca71822e7706ab59b8376b8703
SHA2563255a36fc56d358b6afc192edcd8bbd327d7eebf232c568d00fca9fc78726aec
SHA5129e57d27f44528a1c9e16bcf2942542c343aec1af7a2cc8d514f79aa7dcbc91b2ecfa86b414bb0b283e37653a0c7d94ac6cafc485ef5c703c1ba57025b4a91dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537db298ff011698c6f5c13ba262034b0
SHA1c0d62ec5d975c5023cb72ab1b740ee5ccfa74103
SHA256d8e7385193d1bd3895a3e56c9f4572dbb3acdca13ce12a0440d68ffa27625e3a
SHA512064dcfe240032cf99ad76e265e73c57e2d95c35382e2dfd8069feea0bb701ef05aea26de04fe1aa4e6c55802b1f717ad585b7622eed9b18dcda9b9b3d978e5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a091dbab0a5df5db05ee3be3843817da
SHA14a31e3aa2ec21979d9a5f078ed8c3c201c5675d0
SHA256652429244459075a06f2c10d4b67987c98a5e190d6b0dd152c4f98a0c2373997
SHA512096a21872f0e57cafb04bd0bbbe275cfb1bc4d7b6d3c96dca1dd6f7ec777e5a5ac14c216cb379a75943eafe46caf3d1fd11cfee659d4834a1cbf7f211543031f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504461deb62e363f230f344f754715057
SHA19ee1fbebe1834f41479c6f120ceedc27c9d2c1f6
SHA256fa126dc705242fcc4b0284e81150576f2b105f8c1d1aa714d6405d7f2b139fa7
SHA512d4618e47bddf5292e483257d990ce65dac545132f5f259124d983fed0995f0ffaf8d7b1d6a0ac2d4812dcb6815c39f86ae528949573762b8526ce08a60415a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c42e599551e29ec5f37171dcb18701
SHA1f4c32c90f7b028fb56e2f6bd5f641cec351609cd
SHA25686d2d7c5a0600ad80bcd870fbec88927440b92ca10f54904669f8950afeb1058
SHA512dec30620373f84ca92c1d0ff8dac6f49c2f830a8deda4b53e579ce6864215f32e2c63e3be6ec001065bad81b6127e5bbc1cfc8090d78ea33eb1459d6fb5d878a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5173ea556bb2aa7d4174c9cabd8613f6c
SHA14ae5c9ea9624a54eba9c4f6e56d68bad833f8ff7
SHA2561a4daa4d179f27f445ba6db458279af3ddc41b0968ffd9c20a7e0e996663954c
SHA512548aef7465fb445dacad684ba5ef96325f43ee24a1162d02f11503bc8c6afb4bdd510164fe2fc2f685590f571a062a44fd0a616d65602dde5ad88e534332083c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb2c4782902708d9ea92dbd8027b0bd1
SHA1694800be28d6ef3abbee6cea7b817c6653695627
SHA25657f9070a642117a0d9267fde8c68ebb2af5ab91ba4ab03a564593d3f33b8ce8b
SHA512974dc84c156c60df2a6f38fd125da82c3a56d5e45e4d4f052e43b695f1a1ee2d22504d77bb99e93fdd307b80c0889920bd077d52eda27869a5da8fc1be908b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ac8f91effd6db9475ef6e9cc09196d
SHA137d95b5cc124139d16dfee2b0623c644a1d901fc
SHA256dad31f2e0344d453f92484494aba204a39c140b5a4e7daaf5ad5341fab8cfe82
SHA512c165d5a7be98ce488f2500eaa665a8deeb580a2a44485cabfb5a9aee0c02ace21d41a5993e4657098aa100391f527ed2f3007ea7333cbcee208e1572e0a87545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59c2c8e5b880f195a5175ab97de96be9e
SHA1f3bb05004015eac2ba725acc4a01e7e49e9ebe20
SHA25627eba53c00a743ab62a79765b227034d3284cb4113acd8f33b343c7bd5912c73
SHA512961513d84ee61fc018b01a1b195f95df8849d6151d3cc8504067fea6274bac09682d91e5bfe85d4e4a7b0dd42a12e6cc26038575f0e734b3602c658941eba989
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\f[1].txt
Filesize40KB
MD5613dde91e2774a6b7955d1e7a6af09ca
SHA19e196a284401d45c1f49eef6d1b56ae2f32e66d6
SHA256ed3be498fa88c74c993b1c034ad77f532d3ce82375ba66049edb0df14464a8ac
SHA512df334970dcbd7256500c167b03f9dd79d60ad6acd257b3a35980373d9fc3b6301b4b85a7d0e8cc12d06eaf76e1d74920d98375bdf5b241755686bffba3f6fd94
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b