Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
2b7d6a602b9f5dd9cbd62cf8a198110e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b7d6a602b9f5dd9cbd62cf8a198110e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b7d6a602b9f5dd9cbd62cf8a198110e_JaffaCakes118.html
-
Size
6KB
-
MD5
2b7d6a602b9f5dd9cbd62cf8a198110e
-
SHA1
216aae7e161aff01146de5bfc2078962256b4f33
-
SHA256
b458f105712c92e3613e05f9010c1ed3e1ae5470c8162974078f75e188d32f4f
-
SHA512
d07594b7beee7dec351a22ac97afd2b882cab6bf5b6d7c264e1afca7ef3b91478c962104dccf3b941eabc0ce44eaea7d5560b1876071093b1f49537680a7d77d
-
SSDEEP
96:uzVs+ux7paLLY1k9o84d12ef7CSTUOH/6/NcEZ7ru7f:csz7paAYS/z4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a1c9793178a694d91aa78dc8feeaf5b00000000020000000000106600000001000020000000d0f0f9f94b1ef7fca9826cb9cfb12a01141d1aba42a8f2bf4049cc25e76a433a000000000e8000000002000020000000ded5f16958e40ea953ea3ed3bfebba0149af5d08703c6332331a54586b5c9f78200000003e789ce40247687c08edf1b500934b83e5af84a70663f39f0e12b08f02b3d1ab4000000038a03fec4eba8de70598f9faf66496ff742a69b93b8fdad5f1733394a0ce9928314bdff2041b96c0c296c98cb9a0da5687eca23b9be48195a48ff3761be64aae iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a12e255f1adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434649180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36165441-8652-11EF-81CE-7667FF076EE4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2236 1952 iexplore.exe 30 PID 1952 wrote to memory of 2236 1952 iexplore.exe 30 PID 1952 wrote to memory of 2236 1952 iexplore.exe 30 PID 1952 wrote to memory of 2236 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b7d6a602b9f5dd9cbd62cf8a198110e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5344f54c3f1c6eb13e93d9fec75c816d1
SHA18d1eb9f69a7dc65a40111bfeca8c89c77a84428d
SHA256575afcebc484b360909e69567aaa1cb9a82d3b068e4dcb3d0af8f83744093f4b
SHA5123808f2681675268e94c7e905235c7f9a9757f666d91bdd2d2b8b2b142cd1c4078803b5ab6e973df2c83dd59b464ca47909fe86c86f1b2f8fcb1b866b52666ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d24144b93fa240668d78ff71eb7de248
SHA194fc122e49752428a097ddd60dd68951a21d5f7b
SHA256eed42bf105990338967304b48bf69816f17903fc9ce0d2769fd22bc6668e5cb7
SHA51242597fae718e7a34e0413210c454ebe7601f90ebbf6957292d788bfc4c682b15dd1f6bdfab30ad01757a7dd1cb66ce2f35532b5320a7b7e16be802b1dc58309d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0488612cd05463c250baa4a461591dd
SHA12411258fde0de77c29120b9f27b6d4c546022153
SHA256dd35088d82fb92777e82cc911a3fb837ba3423318738befd3ac7dd1511861818
SHA51273ec518ab83e6caa7317c24f7f9b9fe44a36eb3659d90a03ef9d3eaeb291e6353cdd33001a6f5055faf4588bbea55e4d436920bb255f3f92cbf1db5e977dc9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f65ebb9297504ee33931caae8ef1e87
SHA1e6744bdc028ce28f304201c9d831eb52e0088325
SHA2562b920bc52c5de9c34504ac02d9f9a1af52380492fda2540250a03b2bfef6b860
SHA512588ec75784b9b4df4a973d9897a46ae6897395558ff49001326821f095c71b024521581c9c3e5f520854fd885beb9e2498b4dcf2b7a6fd4d4f5e92e04aa0923a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573355db48ea27f08cd7bfd146ef4f396
SHA18a06e4dc4f66dcd1e9943fbcaeb82ad3526284c8
SHA256a9bf7b4d640327759220638cb8905ba706b9f856291ce3cec84f1a9940c2a01e
SHA5127dd28931de46c8796913a49bad02d838750e614f2014b2ab964140f907330c5d8c9b9bb514b1e0c8d55fdc342d5f33d8dcf35a79c867b6ce3c8d2b833cd0c18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760666664e42e9da0bf3590a57a54671
SHA18a00498b756f00af2576d5d0123fffd6a9c73c3f
SHA2564aea7b928449352ba260d298e5518bb103308edd7f415bdef9ca4dcfe8ecac51
SHA512216ca0dad040d0e47d335c00ec58bf44e1f5d92f884a431a9a9bf2d4baf2e119c556480a5d2e32962fc5e8e94c141bb4d5457340de40fca4e293f85797efe2f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150fb423d44fa038d531d2b23c9cdcb9
SHA112c5a15eaecf163ce53b44bc4d48166c7109ff18
SHA256618504fde089dc9b76b41a6f86869c5c5edc4f88785ba94d7a87e7afea0ea2ad
SHA51262d6a13160aec9da09f991053754809c605fcccc04b39310ba4961cc9c317d8d950185e8a97ba566adca502ec1d860e543430540a0501e96d3e24636c8ef999f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1b081d355598e7f00608d50deb47df
SHA1f39589f786c83c1219d99de967c688b3adeb252a
SHA2566956cdc6944827c7b32ee59f3314fe7711557548434b4de22573f21f52c9dbe4
SHA51280506f76a9f02c0276063c5d58528d66ccda9ca3be89eaa82a4a1f6eb691a13b7e44ce051315ace2fd76005a4df8417d60587e3923c0a0df51f2b23a837a10ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c87b15b762fb3c1df6ad1d067e3b0e72
SHA12f12e1d7dbba0dd7efa9b73c3baa9c06433ea7e5
SHA2561f695c3862e97983dcf13e34ce452289f3ba7abc45cf5c6f0205720c6ebbd6c7
SHA512d135de5bdd869596276e0907d3cf5e782ca84a0085feec3348dd072ee4589a857462d22c07229c65e925623af25c38df160e268302f14575d217c921540f657b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3dd7b559ffc7c76485ebfe84a88c0b6
SHA18347300904b3d2ed3cf60cd8a80620a2c6989766
SHA25680c66d6deca12607b2455f9740e03a9a7b4a7bd29d734a2780a2eecab6c5a457
SHA51247410c98f03297267a693a2b9161de227f60b70290aef8eed97efec5a7bfef88c429e745badd582dfc0f4fbb64f00917351f1ba9750f946ba799edcdfd6810c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b37a88a1bda9b7f6e51aaa76ab9539
SHA1e9f5adf0b08480eb59444148ab75b1e28cbdc1b7
SHA25615a306ebe16727b76238d4703012d02aade685518ff2b86fd84949d848e0cff6
SHA51237393ae54e468378b7f58a16704e6370dbad122a3a8b6bfb5014f316e4b92c40aa6db5f95884a2d64079391940651dbe29bb654b829fcbe57e8546157b3c7c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f99b9c5dac82d60561739b1297737a
SHA1ad13d40ccd2144a7ec47f5480be8921298db4dba
SHA2565da48c13ece74bac95b945c37683aa04948851228626097a42ea502a77201850
SHA51244ae9a2930fefcb15dc9bc7826d1b9eedc2264ac5e998afb2c8ffc7e6a05b4382abfa71f2ac7460f2d932e1d140c8d6a5b34508aba4b9c0f4479d9f3b11afae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115694a44b7d8f3803e0f832a06532c4
SHA155da9783e8892e082a61cb1c7e718df3f500a605
SHA256ffc7627a6e2d328acb7cf86b8db865f2083dca91a61e62b5f7bb0549a2acd2fb
SHA5122382316057d24c56d52e6042f693669de2842e048b7402beff0abbb1d643b3dfb25695c3650e23334294ebdbd9a49205449538871d4a478d99326987a387400f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec8db7d0dcf3362ad64168d111e597b
SHA1c0bfc8ef45d002efe6929ff7e90a614fda7da948
SHA256e1856c3ffcbb2a5471e63e83b8ade766724cb13aa8f2c8a104e102f53a468f86
SHA5121e2775eb54915becac04b1a3c2575e4acf7b2b03594fa83e8577e53866ef41889cafbda53b225ed2f3a8a9bd43b645ed7585dcb2dd969d44f0956276381dfa25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b96d00cb2bca86e1376d66679d5d73c
SHA1c548876a08824ba5025cfbe3dad8e9dbcdce19c1
SHA2567405405e964e72cc860c062e1bb40d87fa472ef5b46d4324800c6a4080a5842d
SHA512a42f09d5e1a2e5c5fddb252a8768c2a2e574567bd641767fce93381afc81c2f51424b85665ec526fc8095831dea21382c9890f21da72b10aae169cf295f75b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc2943168d54bca663c6c2a081b79d4
SHA1781caaad5b4db25a47d812d39e1b7786dae9bfd3
SHA25615ede3ae0d6f5ef8ea93ec994e6614fd1626810fc9b575ede1fa04c21cf5385c
SHA51291ede73e0439e102b9043905eeda7c33c877afde25b294db3ca23839181ab66304ac80668cd00f3e65290b59af12d56afde8befada53e53abfba198e5321076a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a559a4c6211a11bc2ffb79684b125682
SHA1cb8fd9698cd2936d540ba529a21d9a451beb78fa
SHA2561c7daef5273e95184d342ddf9139c3774836b9f76a9221daaab5a460d136b0ec
SHA512007a16f7b35e2b6d95cba8da94c8b40ed4eba59362177e0f0431ef3abf1135917413760c4fc95e1143b38d43aa52d0d9aa18d81413cf715b7def9a2e17065f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0cbc96979895c12925db842d4022bd5
SHA128e16e566501e6babca95f4dc7d09594d1218be9
SHA256bcc296847b0f1455df9f38635cc785506d5004693cf17d7151101552b0db64f4
SHA512b5740a2a59ae89e2ac463aa559e195cdc1ca9a024404635f9179259f373db31543b5fafe04e1f7f308446a1683af7884a311e6c08188e441c818ad7cc54e4476
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b