Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
2fa47ef1c1569980e6388b37455ea5e4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fa47ef1c1569980e6388b37455ea5e4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2fa47ef1c1569980e6388b37455ea5e4_JaffaCakes118.html
-
Size
3KB
-
MD5
2fa47ef1c1569980e6388b37455ea5e4
-
SHA1
83d626261a42d1cb36d970b8e06f4537db35e28f
-
SHA256
fa35fe3a7e7458fde03ef37622d7f8b01934c638511034857f6c894d89fc7d6e
-
SHA512
096d76fc691c1998b9e10486bf5e1b483484adfaf0e779862e40b3c92cfb01f5ce92d8e1cd5ecc3d63855d6cddf7196a668f67a82307ef0b02bb88a80ae405b9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434680480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000034a7c8919b315bcf1e0648fa31b871ab0f5f95200c2d79c6e33b4f0ba166c87f000000000e8000000002000020000000c98acd02c3d6d6221553e3202034bf3c34963bc057ee619e9eb236c153d486d020000000dfa2b82a835d1d23b1bf813ab0b79fead3b335ad991387c9e9df37ae33348580400000005ba2283c9727336190f54fe2b11eca4b671cd10a44d28cf53173af745e5fe2b7d3649fe616261fff39a0bd64f49417f55358f8d1522a0ff644327c59fd3338d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03411eda71adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16EBFCC1-869B-11EF-A701-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2088 2872 iexplore.exe 28 PID 2872 wrote to memory of 2088 2872 iexplore.exe 28 PID 2872 wrote to memory of 2088 2872 iexplore.exe 28 PID 2872 wrote to memory of 2088 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2fa47ef1c1569980e6388b37455ea5e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9821fd84bdcd7a87d0502aa9c4a21f
SHA1507537d33a82ee5b6ca143766a2b44d05b52c5dd
SHA256781f66a4a94601def858b37d77a75cefc6186bf385cd00c5d43d55dda86d4860
SHA5120bda715d03762b4afa539508a94b05d3bd5263be7ed198fb42369a538bff3b1396360dce8b06b1ef0bc155405a5eade4e1fce08b5be02c7142e0c18b28629cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8b8e29c0a8ccdfea1d8f498a5a08d7
SHA108753abff876067a1a6343793cea481d3f0a2d9b
SHA2560b72121c2226b530be1cce56cfd535685b8c0e77daf10da391fc6c931d299d3a
SHA512c25c76ac2436c10bed2e5afb27da01a584431ae09f7a2ad6fe94b186338430965008d621748bfb4ccec2a1aa96048a7c98b9c91b87e2e9d167a34e37847fc4b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01d7a73978a889405d52dbcfb6ca659
SHA185c9201aaf4f5589b82d2789b6a1d933c256742d
SHA256d21dab37c0fc627464e5193064e6e02403321cd2e4623569bacd32e3e54a8846
SHA5122b423bfcc9ff05daa58cbfb84ff82b124048e7590371a8df926ec9ad5d27a4a44a5aa2be3899c7446d9c4e2a1a79604317ff08fb784eb2439c63c4e5541478f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380f7dbfb7faf134bcb079cde8c13f99
SHA129e7b44139392d75768159c16db6f6d484d17e55
SHA2566dfe828c6038a8db72b684ae4b71bb4852450fb2b4aaed210abe581ec0299ee7
SHA512d6b4baf63f9a62fbe465307d470cad43ae39c15185a26968dba9f3398afe25f78bf3c7a739f9ede7e62cd35310e6bae2a79b55c109ceac1d31631cb436b5ed75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d5bb12141187379a3bdb9dd01e85e0
SHA14282d407a476735571dfb7f7b01e0cf43c340f8b
SHA2562673bd53c8bd53538177aa0525e36697deb97b6a85fd308ec64a1d90433eaace
SHA512218bb1fad1e82022b49bc65f4e53a9263f810f4e0f3a5824370ab61c99e03a13a1a3d22b1cae869b89e2ecba2a046a896bf1677d1eb5f7abb89e63c383753cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e3d8248314b86d01ead98514f0b972b
SHA123e117444dac35d41ced6e381ae5d3eaecb0c207
SHA256d2027018d61ba7c6f90692eec0661f8f7b91097b218b8ed0d191e6c58a71a011
SHA512346d0149b970e2d0eaac3244ef39da90475cc4878d66f31c1badf4f9ae1381ee6e812b64a87932d6b59dcd22b32f7ebe1f4c2f9d5fccb43943d5057defd371bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5198e12f584c231d4e6bde705ae7a0225
SHA1b0bfa6ead5872bae3201ab24775bc55628f1cb42
SHA2562edfff781e9e3c43ef2204ad6da9f6371a1f1dd55f25a30dc2f962b30c4f7d0d
SHA5120b42e484d1abf7b2fb211790661bd161733f58be0e73ea63824175c30d7970912453db0191fc2ad4ad4afab58ebe9e6cb77c711ac59d79dbdd7533419558a5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8d9e488d1f4d39bce6e1bf4a856e4f
SHA124eff998f8d99ca9814e24caf92174914a50eff2
SHA2564439fab59fad279165d01cf3e54ed84bbccf97b71ae2f863d904c073673e6a9d
SHA51299b0bd520190aaf41648277487cab7130da89fd4d337c40c8f822784a922de06449c21056d32a256a7fd3592fb697533696009e1adaa93a2ccd8259e81ffa612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4ef80322a9816f1083b907a7591c4a
SHA145bb32a834980b2d91768325725248311bfb1b30
SHA256254fcffd393f7118b1d52977ae3032fd61a911c6643e0ba2afc95d9eb549992c
SHA512dc38b69737fa27bd11fd0d6af4723748e982a4c3d9502d2e32cb3bdf0a78fcda7e6ad695d9a63fc833b12fe10feb4d888beb0309bbc9c581af93cd27eeed429e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f30e571c4da17853944311df6aa4dd3
SHA13d57877ffbbe5e6ad24e417d077b61f23038cc56
SHA256ec115f2316fee2724d593ce73f794d930b38c363beda1599999272fea1a39527
SHA512f032f71c1cb232c5a4d1fb0ca03136b5d95a233159243fe2a7275cedede204f640caf7567b2a3d55a28dde681bc0ec97d37ac772550eed765306a3ee8602d55f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a3904bc0f106e866b46bf5d4a73402
SHA18873c5fedc263b6695f0e3999997fc68ae400d84
SHA256140a829ec5206c66c0e3d97107d35ddf55122db3336f137ccf863b78aaaf4631
SHA5122dfcca2f58c12c5653429bca038d04804768103b4c6674db5e5bbbc44bc09ab72241850ee626da2af636912bf716ba41106c3d15f24e09048a23bb73e4a1f084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdfe2aa7dcc2ffb2fa36d2c9cdb6c39d
SHA15dc9574e9a9a7e74279e4ba4cea1a1b5b3441f63
SHA256efa965aa9ffea25165b977cea1e2742601bb0d8f5b99b3ae336f0a72579a32d0
SHA512fa79665a762ab4f8404e84e1be0cfb3b5365b834c9d1219ce3022a14251acb1aae499764243977c66cfb451cdf3e9bf087969ef1d2065dcc9c6762858675aaa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755a5e2e62443f58213784536ab2faaf
SHA13c85eaea8868c4b27115097e18af69fc3fff4a3d
SHA256f7948bef67b839e4233e5420846546df3e5784e9d61ec41cfab227773afd2290
SHA512ea709f475319f4a1cf51db429a48f0428303bf4ce6350308713c6e7a57fad2c0a4c235606a597438172bcbbbee460d4b61751b03a193a121fd86d59939e17eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3582631cf792ab0b5fcc42f041b8934
SHA1af10db33fae76e61bb7de5fff0541a9a8681578c
SHA256e278c6639eb6a1efbac6736c1e605687f93b6d174f68f98445a91d0510f24798
SHA512aae556c5221053cd9e3e277132198a6fcf98a91a1f14b6da074bfebd5851a123788442d2f70c31704f971ef9ac0c6e0f20157c1eb68ae099442210a7cc8bde25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5953930ea27656f29115cf8aebe90e865
SHA14079edd36a5dbc42f35f0ed5cdfd6bbcdd8aacdc
SHA256ee50f88d2b82dd1cbaf651e2cf579bb7711ba3314d617b462d306bdb283dfbf1
SHA5122750339b17fefe309b627059ea194b69b33299af25bc4ecb59d80daa9df7b245719adb7cda340cfd13d8c10c00e958a7e1570fb4d677c448c9503324bc7122ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1bc924dbf2488ee2d086e5d5f55137
SHA1e80fb36bf0adcb421c32b4b22461471b6f472b58
SHA2560a23437f072e9869eebdec9e63e351369678db2d3fe29afc86153f2c6e5adbfc
SHA5121f10b01b183c24a469a10b163c3ed0307c9f56dbf5945a767a67287fe315d41124ca11c9f8c592513a4f70e505144f0922d9ce6ac0c1d5b68c06fc1268423d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585f5feb8f509a0854e8977d839234a6
SHA17bb7dde655eddd535cd3728ef1c4b10602c47481
SHA256c1fd32cc3bdda1078f8716ba6bb07cf07eb5541a381b0b148ad349ce5068dad5
SHA512ee7f4f9a7ce214f2922ad030c8e7743244131719a3c00c91a7e1d48cb2f87e5ddf48888bba6c18bb62226c600e5656fdf4f815d904edc9b75c26eb52c3418cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6d6dfd108e5d46d4bb098750c70157
SHA1e8e945f2cebef1e1ec38fe0866713f8f599b7391
SHA256689ccfb69caa407d3929b7ba09a19805fdc98b29053456c9660c10094fc25c69
SHA512614c383abd88f7bd4693f0415ebfcd74848f136fab63b091078891c47d9aba97767ffcc388c11f69c0f77dc3ac7c7e8be3425b863ff6a8f8a218516d478f8330
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b