Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
2c7865da42df387940169d5f98e9b181_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c7865da42df387940169d5f98e9b181_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2c7865da42df387940169d5f98e9b181_JaffaCakes118.html
-
Size
9KB
-
MD5
2c7865da42df387940169d5f98e9b181
-
SHA1
8034708a559f5f0e7a9e86c4997c1a59780f7dd9
-
SHA256
d9e4885dc3b1d70c9881c9d736b843123bd8f4b2b99857654f8ba5d4ecd3985f
-
SHA512
c96f4907d22837f9fc99dcf43572636e33644ee265d3bfb7b456d1e3c9bc5edfccc31722fb457712453c898fc88386d7210cc983528f643c1a49322064c09afe
-
SSDEEP
192:rrtgJqiPPmoRyRRR7RYcR/zRJRZw8TIrKczll8kpk15Wfc62xQ8JieM+xR0B3XH2:rrsqNakk8TEzD2ZYhO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12D6D991-8662-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b16ae96e1adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000007471b837e56504aa8797c786b3810b800000000020000000000106600000001000020000000446a62880a856a997f96a390ff2078718fec2443d28a5310206f52c48ade3515000000000e80000000020000200000003943174bad5977920259edc90be98c0c066a5440bbd493b1c48e4a44ae480448200000006008235ddd6b4db7102696f0d5b9438b36839f2c95d9a6141016698de40ebf1c400000002535f277d7a1d7d1922c2c9a95a2092320e5ff4050448ed428f6736878e946da81512194ec02d8f3ffddf069695526b80168bf6d361b26ca4453207562d64dc9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434655994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30 PID 2384 wrote to memory of 2536 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c7865da42df387940169d5f98e9b181_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD536243aab1ef746f3561d46109c04d686
SHA1201ae792a4973dafead5d9ef33b1e51b9cf3a963
SHA256a0f98a05699574ef6a44c0feda9ad78403e30de66e457a3ac51dcd3d819d93f4
SHA512118ddf59cc63700a37c1a2efcc11d17b49819ec2a48698e79a36e60c0c7df0a440d041b054525029db4b3bf4577678342efd26e008c42b889541bf4086c01895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2eca077de879298298c5d15edd9ad8
SHA196010abcc5e003c9642bce529bac7ada3ec82c2d
SHA25689a35b4cfaba0d74e39febebaabed1ae56285e214b97979c82ae6a9efa106244
SHA512737b7d971ad161a7f4adaff38dfdf41b8db6ca9ae2b2af895c42dae0c64f874c4bd5454f94abfca99e2c1aee20e19ff8279ffea9118cf79058ecc569acfdcc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d11700aada267d2a82801d315de2ff6
SHA1815af4d928575c74bd7013edda7ee2178b593c15
SHA2569265f40768bb7139f831ba0376fa0170d98cef362e001814cf7ed11129bee1fe
SHA51247ce54ef51c903f7de22325b04292ccaa9d30a18d1ccccc0601fe32354a0908900b480769e96ea78b04f24634a322534feeea3413c6e4508d032288a16c7b46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b93db9929a29bcb7d16ac0d83eecb338
SHA19e9eac999799471e78bb6fe26f0055a27d704a79
SHA256d2b5e0ecfac30a4d8673593a0c333ed7bf53255e7a7862e307274cdf8e4bb89e
SHA512c59a98f99fd125ab97566db2513dd28ffa5cd243f473b8b5a3e9604d0af257c60378a68d34275e88e7b7e1e4b5fda0110a4fc75c1fadc2acf4ddbae0036f3358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d908280be745e4200e7c81efde3cef06
SHA1902e0935de97142fcbf7778fe983dd17b1043c89
SHA256eda84a72570b6fbf4d024516867c9d81e79addd4c30e1c6e79798a0e08ca11aa
SHA51283c1805ebc1dd542632693f46dca2f69a0876d20209f307495caf77cc5f9d0b39ac73353d326f5595ad4835b96902c0ea2acfc4272e38cd3c563cdf3f91e52fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5809904841357cce65901583ba917d166
SHA13dd24eef3cdda0f32064e4bfd5053bc588bef8ca
SHA256dd1b51ccabc1e186f33100420da9863dc274409471bbea581db3d35e944d46cd
SHA5125827f4e5a18c3c820bdffe7c72ed080b6c7ba2a530f98ea5f57f5cace6089ae3c1f0d4624fd423d7dfd0a1ac6e8c5fb54026d400d2476ee96f1fccdf60c6fbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327dbe19fa7b1bdd8d54b50a3bf6d6ec
SHA142f664763c5830db2d004281139aae6d6ab4c44c
SHA256ed258a7d86eb397203c440d7652df81e41620dff377c05bd3f230b9538690266
SHA5125eafc92f6a6eccf6bc5459c349b5041b93778101d595d65cc39339e463d44fab58f27d4bc11aee490a8161c5482dd69e705988cf3ebcf1020c7f5ce99b6fd615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58810496e36357a02a856555a4f2bc8a8
SHA19ce48938c103920a6a0d7c75e651c2d01c3cb103
SHA256051c9b9d2d79843290112709f1c3229ed92266b1d69a99048509d17f66e75f80
SHA5120bf28f0b1ba627efdb1cf64e1f37ef950571c0b9246b9134b55a0da8bb5e548ae8660adb025c446149c261d2a5f56e5587739ee9260bb83ec6b001d0e6f7b382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f9f1d346491aaef3f5ee53ae335c29
SHA1f009526204763c90feea2d8d5d140dcf72150681
SHA2563608393eab7678fa3a4e8f5e4d5abc3e2145b6840bf19dc9acaee9bf45b3a3a9
SHA512349647b16b2fd33fd95276110c0d4669ceb6748354c0441278e949a6488e7d95de65d16c15edb515e7827b2da3be84ec5afcd51d3c8f2c046c031d54d001cc49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cd7dace23657997b15ce884e977ccf
SHA1cad68b040f06105939051b60a4c4b887d2bfc47c
SHA25609887329a70c732c3ca21b15f956728d509c1cf7c3d88fea47427d40246a8104
SHA512246251cdf46157168ed2c3b72b389fe931ec7bfa57c9523a090f9cb61cbe1d87af0d6c14f69c6fadce1bf7b31538c552c5f33e766444e84c0dd759408871e078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0220a29f078b25ba1f029221e91f8d
SHA11715ea4124524381ad71fe67f62c9478b99acfb2
SHA2566d62100518ec4e288bdcc7dcb8624ee7b9d6cd81d956bed29ff374ee72323108
SHA512e5b3a4c0984cdfa03748646ef8e726dbcc078b1b10fd5ed427d72902998117df98ee585abdd5d8252feaac6df250ef8a5bfea4cd67a215f0a8736f28aed782d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50fa2da732d464a67eeb351e27e7e4710
SHA14d085e95ee660435fd99be4e6e2cd7f9b40b01f0
SHA256f77190297e8ccfc6c896d535f34fe7fede8461bf20f717cf62d2f0c5ba3553fe
SHA51237ef379d5aa8fa99ff2cea8a03940cb880ec28572aafa8f4a208a46d1bd6a4e48cd5060900ebf3e0a3ac42260697feb04a39b9dcc252adf30462c8bd4027c3a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55a376a0db9df32912850181844ea72f2
SHA1a3fa39fc301f3be831337c14c248ad93e1c77429
SHA25614e247ffaabb591b57a4757096d0a6c7f6f49ab2b8d865ae4fe4a280fac925d9
SHA512d0b5f4d67719096209b47f445694f8c183d4629b2a413ecea1b28f0b3c6b997e529bb5a543744815d218531dc38afd7d1465fadf843377d676935c942580b8bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b