Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
2c0994d03082ab758fe11e48423691ee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c0994d03082ab758fe11e48423691ee_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2c0994d03082ab758fe11e48423691ee_JaffaCakes118.html
-
Size
2KB
-
MD5
2c0994d03082ab758fe11e48423691ee
-
SHA1
445d6024bad554307c8ea5a04a799ad00005ef9c
-
SHA256
f91fd83f5dc7b321970903a15a3c661cddd4315886efd727e1abb231879e9c81
-
SHA512
87cdc2ef20e4ad24d96184874f72fbc07a228a15c26daee672bee2b2e2d422b07c6bfada45a079770616635b8a1859539bbb237dc4603e6d1251c43154c4b652
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000085a940cabe06f66a682bfe9c20dd1700982272051d6b1e6a325ffaf9ade2207d000000000e80000000020000200000006a168a3b685e621734fd8c34a1c6bd311fc5a1a3c9ee5fae01847405b01cd6ab20000000df59ffafd6a4a143d26852bc5a0376ab7f197cc88201d4ffb789161908a9a6af40000000d747f0d4d83fb8398f890476f7c544dcdd4de76be197596d09be84773e747c81048f17ea6be5c113e1f52137d720f19efc5f7e3fe4475ebb6ad3ad5bb20c17b3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C744CC1-865C-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434653620" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f88c64691adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3064 2252 iexplore.exe 29 PID 2252 wrote to memory of 3064 2252 iexplore.exe 29 PID 2252 wrote to memory of 3064 2252 iexplore.exe 29 PID 2252 wrote to memory of 3064 2252 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c0994d03082ab758fe11e48423691ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ee2f46c1a798e1632302e36eb7c4bc
SHA1d6e47b315175425648ed41821fca9092d60cad1c
SHA256abc249585c10e5c5d8aab6c04f3fc8dc804d8046244038aa336ffa239548c52f
SHA512adc7ea6f078f9d3d2bb0a0a86d1bc94dd8d34241ef2a1bc51394674a3808a2abf2b65b010dd65678738c76213748a574e5a1efef1457315a0fbccc9061d08b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519daf414f82bc5bcfadc1e4532cdb3c4
SHA15013fb5509953b1cc7bf1eda1361d2e190198ee6
SHA2560f0ffbf7b63f549c1e8baa52ab6056d54b20a84a25521b289f7a41fd88b58396
SHA5127b42408b57f77a3b071dd18f740798cae031c657d829b2b28a145d1bf75a1aef910aed1ffc70b9d448235e8aca654aefc960ea44bd5cd2517f23bd6c14879835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba573e66c4ec5d271b56975e5be0efa
SHA18941c01ae50cda306e722bb45deb6b3b0763acb2
SHA2562af2605112b2cbf698e4abf20f9f597385042c391162e0a632e474f5aaefa08c
SHA512ca7be98ff50b6b467b2e49e91c53bc8594f84f476636c61b2237fafb32f0ad2871adf88f7dcefb65b8bfaaa75f233d06e0529be3dab9a8a5eb8c496a46eda71a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb396ced058ffa79dafff48c0be912f
SHA10566dea5ae7801dfe3ffeeda1c08277fd1dc6656
SHA256588eca658913c3900989f566c84260aff8aeded5b68a0d06b3b2718d6b6054db
SHA5123eb109f33225a570d695c67a2d4ae4e8a36c75383e3d205e9936f2b7d9324458d0e37b0bd2e581eaa4b895b16ab38cfc794e8de08c3e1dccabefc3a72e477622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710d4648210dfacd7aeb014dece096d2
SHA12c008f78a31f0d1114df4c5b4b6828e216daa6a9
SHA2565d6d44fc6d4f8a89f0053ea6a0c36cfb09269e42396f9d396e0e2cff6fd2d081
SHA5128147bc6f72524f9b168169a1eb42c4a625c3686ff71a53f2326d658d9ebe745989bba5f42a02a8dc9dd2525c11be1ea7a9a1def2791d09070e45d453248eae99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a28406133e1c5c0dc93aeaf298523824
SHA16e73640b4a3e4ae4d9e4bd6c6cbbfdba0c711c5b
SHA2560a8406f051a464285349d6e1f9499a48e214aa97f1c872e74920a10810a8b0f9
SHA51253a751cb7ac4b17088d78d64cd2613563d30cae9d980026323f5568e1780735d6127e677f690da7fe5538a03d9a741b905f42e4a88e8f9186dcac617aa2c690c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd5768e32edc0bc70eaa34e23e238fc
SHA183f69874bdf07e5196f4039e827875b0adbb0a74
SHA25621de0a74d5a242fc531eb018c832a08e649ceb0946d99543e7e1adfc8b81ceb3
SHA512af2bcf682af04f011e28e1f698910f731526c49f3df2fb0731f5fecbae3cb65b90c98bc691cd397808ebc0be4344d880d6a70255229fb0f35a69635efb79b341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e1c1c5e52045e45004cb46917fae4d6
SHA111e09e0018addc275a19794f4d8a7203a4c59677
SHA256297ecb0e32944ab57d260303745081649276c0e0c831d45eee05e05b58863d2e
SHA512e84516b1a416f08f2f3ca95af5a75787197159e47acc6f2c72637884c8c02bf5f40d47ad718454a603f16d81fc026458dfcb8576f7cd638b87340a250b61b3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa9316d42737ca06dbc4668b5160900
SHA17b4cf4b1b29a9e61315d7f6b4ff3d83033a9e1e1
SHA2568ab073e194031da9a12fb1667c6090239810e192dd1b8402d611c18ddf61acc7
SHA512c841791063783ed51c90eaf9b1b4d6eeb7eb0ccfafc4bf24d128f88c910019e475d4e471b67a605b92dbfef178c618d717ab6a492dbc9577b92e0492bd35acaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f575d6fbc764f103cdc1890ae997a2b
SHA127bbb8355efde9b1c24b229259a4c7c12d477410
SHA25655a0592d7c14f1e53ff807afb80639573fbe9c01a0c11d53fcb0222d2aefc0ad
SHA512bb28ce9e507c26ecbe62e4597f68454555a3fb84665c7808733864c5a861b5a3ee93d49d4e4fabdf1d6496e2f9f1f7458d5a49da607004dc6dad8756ca9d3843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c20b12cdbf779b0c818aab09cc0bfe64
SHA1f2709201ff89a34f681897c474f6ab2fee958f6b
SHA2564649ea1ba388a8a38525abdafd5e1f34b386f9becddb9fafaf38da4253d3d6f6
SHA5122d33311f7a06e113d5ca1632498536f2a64e7c7003a2f924d7a16ff5ab0d6e725c681bdb2e2de2439c877343e7dafe12103f8e6e64c1dd7f8f04c450eae6e33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec74185318939662c355dfe1d21bb84
SHA1fcb22f2eb137cc12fcadc0fae5cca58a2ef5bcdf
SHA2562135e358a607e2bf2958ff38c6b851ffd087b10b2e6201b756b2234b7771c1f2
SHA5124ad758601deba7ac7a3322d51ade9954428d0fab95122f7e0ab01bbd627f643f1fbfc7f63834e8d8d601e640e085369a5598a4438f48cf24dad5b9bec4b0668d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515247f382391d3e90a1bdac026207842
SHA1f19cc4a2bfc0846fcdae0d1f6d21c0edcba88eb6
SHA2566c0a107269a5a1266950b8ff13c08814661fbcdec0fa824f51c6a37bd46528e2
SHA5124dc1f481da208cc7cfae7deab0f878142d2c3c1e2c043ffb7ec520ccc1eddd7d82aff353cb43ef5ec9b72358faba3e0f008725813e8aec78c40feb0d8ee4441c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54393bb7753c7d93cddee7417732bd9d5
SHA1db2adc2c8123a665f23233ed5cff8704a5b626de
SHA256fa018c4a0cdefdb89087d28720434d6efc7ceddf31ceba7a59a658f1282f9ba8
SHA512ab2e1933536c9a6e0072c01f30810010cf1d071af55fc41becd8902ba17baf1e648a3cc88f01d62c1e5718bb8f47916a1af3fc290f22ff19a4bd531160f944af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c926cc83465ea896331c6a4a6bff23c8
SHA1ea194d33437a65d06a528d4f00acd6393e74f3ba
SHA256529ce26cc99fe7b669bd9f558fe8270327b1539be8b9b89ed88c18c6e1059725
SHA512df36ed568c91f9ab7b71caea7839cc20012d499cd734176fe85dd20f79ae1109463efda6d1c18227bed2a572ffbdcc749524a952384cd8d2096838d873281738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe474b47895157036f16cf026d38b07
SHA187cb9be5bf2b4b0b96df4d84d611307ea0531706
SHA25640f8aad994d94942aed4b63557221855e5943a46febd3f6da4a52d00f923f12a
SHA512a6e66d6e7f416768b9490705b2126f148f6e508acdc8636c417b8ce8ae703bd557a872a85eb7f28e0c43fa407cc59815d0b5ada28e3ab76408140da224b14d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af67dad8524ec88f95905750fed43413
SHA1ea9957abfd2e33eef18d3ee894851a3ae67a88ff
SHA256df8692e2a110f9e3a19ba4933b73bcd3a36258f14a9229ab4619775508dcddf5
SHA512287f042243ce54586ebcde6649c596ad44551274c87eda06381f134b8f07b05cca4bd15147f6638681a576b640992dbad80d9a11df807dfacf956f6518b4d0fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf4e15bd3183d7b77ca6e834be6b3c6
SHA19c5c3b50681fea14505b34de8debf247ca056862
SHA2567c5645561a263bb983de5be4ccb719a560628c183a19dc57e1ed02c809642ab9
SHA5121a26599eceae22ef142ef4c4c5025264f456ce04f8cbfebac3bc90c9c6e1ac3b8f9e9294b0cd441ed1f0e1544f7a41fabf5416acb2b86bb8b5067c862f483fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a2d2dee8b41f855fe92cea9571e0e87
SHA138a6a8be60789a7377ad2d97064504803cb8d871
SHA2563edc062301c63ea7a8ca917409465e4b0238b24ab8c3261bace15cfbd2e43eb0
SHA512fad40e2a012a704592c44ad84d5666306959f299e819448fc02a54eab3341e3da8687aec6f3c9b26d7dae8e81d9494bcdb7c400c02f790c254ef0dfe4c8657f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b