Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
81c8e8a2ddf302d9efcb94da705691ce_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
81c8e8a2ddf302d9efcb94da705691ce_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c8e8a2ddf302d9efcb94da705691ce_JaffaCakes118.html
-
Size
135KB
-
MD5
81c8e8a2ddf302d9efcb94da705691ce
-
SHA1
d206cfcd0d549e6baa128504fb526dbc1fdade89
-
SHA256
62e98aa1d4ab4813eaa6bc952c9969fded71341b653880825b9e229d8c4b49cf
-
SHA512
486e1ce95130410beaf787b1e4215b6c9dc06c7f174ce7362a889ac74effebf0065afc718a338dbba9f149ef0c3f00fb2c02238c691c394a3092546404735709
-
SSDEEP
1536:7fUdcM3W6c87dvaeqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:7cqfEdcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0504421-504C-11EF-902B-EAA2AC88CDB5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000049494695491ee7a2ffa3083c3ae01902c358a6812340d2dd4bde2b94b830fca0000000000e8000000002000020000000c87feb745317b5906aee395ee64b4388898ff7bad32aaa2a2a54a963227d375420000000d056267456446b51e6d92a14debeecdc6379a568d5e46305c6eb5bbb0c227ef44000000011bba6bbb67973ebb44c72c441d0a0fb1d3d5a17e950560082e5287140fd024c8169158739114300594a71bb2802e4c629ce0a8d87c2e9b786cd46fd85e8cfd3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428709525" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b2e4b459e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2224 2528 iexplore.exe 29 PID 2528 wrote to memory of 2224 2528 iexplore.exe 29 PID 2528 wrote to memory of 2224 2528 iexplore.exe 29 PID 2528 wrote to memory of 2224 2528 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81c8e8a2ddf302d9efcb94da705691ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1821f47a151bbf55e239625362a0ae
SHA1397df5034aeb9dba837c84197d19275745debf24
SHA2561b524d7e10780951c4e7cba57bd3803effd1203410aa6882f4722fef4718dddd
SHA512193fe9b330bd0b4f1de1bf82b0410c272758ef01dadb28d992d1990f9c4f2365d9f485c651bb985257675601c0b5c4be592fad6a3e4147bbb6c1a9222efdb3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56063d66c8c8cc83269b87230a94ba8c7
SHA12deb3a3e1cdb1fbb3c759357b9f5058e331ea41d
SHA256401cf03f9f55fd3281328e0ddcf234d1cabbf22b5fe56fe773095965ed63e0a5
SHA512c5923d10f9f5f77249a6b502f53cddbd64163b3b2f8395fee271f957548529688b9fe4e455ed37b2f8bb37f23b4aa07497c84201f0e7ead98ab8cc98b30323aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3297857a2eca0e1a3046baeb09d5ca
SHA10abb37d80071a401dc553538aeda46ba70d3e645
SHA256feb612e21e06da66b1ab164bb5a5930de73358d315f8692bee52be2e1fd1a81a
SHA512a286f6a5f02125face4190136a246acb8479fc744f9cec9fb96b4c2029de50fb2ac4d002a4a33006667062458b0507d102ec52d26a1e08383b83159b323bb865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525daf8b6d1b2f623c1abfce843f2afde
SHA1e744453211218f90e64458c5159662d7f5c5e69e
SHA256c3b14a7d797445fcbbd1d31c00be0963cb77dd55dc20c3df4d984c7e1397ae5e
SHA5127cfc28db36ace4428d78e649d97dae2d639b27c2ca187be0e8ab24bd326d458a7c69943d8387fb3c5f915c1ed90d0b67ef27fa520242dfca72b10c74bba847e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9b3a5d9b6fb9a3522d690d478c6d1b
SHA1de132622f0b25ebbec3597dbd816711c2ef7ce43
SHA256c27eb15dd47dab7209dfbfd66938655d007ef83613f0b039471176b7211eb274
SHA51253b0f2a42dd7a01c19215b6d7d95fac205b39099094ac3709aea8381d3f4a3308d398c0b4d9cea5313c655b81cfb087dbc9fa5414c258b0b2d24ddf703447cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b90c9147b0081b1cd24093af20442c2
SHA17cf568e21fc326334d77a84cc1bf6ad144183d1a
SHA2568913b30baab9cfa142b479f06ed6e310083516b07ce113d3c94f6a2b4499e038
SHA512421a37a651b4fbb92018e70235c46592c8c4375ec8552562740169a6a4d1e16d2118222b0b9b4e9f33b672ac659615f4ec31fb36ff49d21eedf42e1a7dd51876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383b02fea02656ec59ef37672e7704c1
SHA1d917cb651a60ef64d99fbf0d033bbb86d34ca031
SHA256e30e6a99c0f58dc6c7c6f983ca475602d212bb6770073b2644496aac2d2803e1
SHA5123e558334a220279a800f1f564573d1b882344b06a233050a805a6200558ecd69c0bbf7803f2d1a67f52c0feb3a61829afa456807cf7fa1cdb43c7b8ca676e099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14e44406ac39cee429905f7bba8813e
SHA1b3665e11c89e654be3daf458044f938b96d6609f
SHA256266ef3d1faa78bdfb030ed71f91d2d3c262464850f0fc782d018bbc80dcda4e0
SHA51239a13f347a7f5ddb60fde1d50ffd04fd70104ab2d45e038ef76fe90ec3201bb93a3137cbe5ad45fa0afd6b6a7d09ea5d33bde3e7cc692b91f9f053907fc853c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593ab4243d5f2a26b4d78ec1471ddf537
SHA1857a0622662e30ddf746612aa55b1196405646dc
SHA2563a84749d45d903c41081fc321e722bc18721226be6c7fac7c4e548da1dfbc04a
SHA5121e3459b765aa63758ec5d833730ad43106127f6613881134094fdcd0991f0f38833bf3a859122f488eaf2f3a3efda5de6df4dde0724023be98d1ce96a5aa1666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2aef7927b7caa7d727fea553f2916bc
SHA178da9058290ae9c06aec6dcf4d235a5a5cbb95f3
SHA256495ffb981dd10a0f39adc0becd534319fcc28cb7ade47b9e477476554fae8e23
SHA5127d47766d1f62e644363bcaa758bc01a26f1b12f36abb8356498a5b4cd07ca42b935dfca560b583bfe08ff69a3f954bc9f4b2c05ae0f299362dae218516d5d268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef5402b2ab27971c34ac7f47686f0f1
SHA14e95a84b7015405b1f225951d188626b74bdbd33
SHA2564cbec2719521742f54d24d5bacf54045bedcad4a79d4a1e076f66d852ce0a286
SHA512fc208ed45d94f245960e6301f3bab1400d77a3ccd7580830027926b405346088539c487ad1b0cbf2fc784db31633f4883d750ab86d94458f67eb192299d9e3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b629ee72cc0f08e5545157ab052127
SHA124e0db6298c366e35b4a0a5a663e2e98214af3d2
SHA256d35a1020c361eceab8de64f658dea2a9b10953eee2680d6dc37b9e156c14ad44
SHA5122eb6f91899e15cc3f47b11e2fb1aec0fb570fcb493527eb88a3bf37db6b48d714f21e7ebe9ebf9705555978de5d2f26ddf085c085605278fa7c47a1face5cdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e26279a5eb6da97cfe4db51ee53b96f
SHA16ab7146c433f136c68d2bdea39c06d6c71bbce97
SHA256912c5e8d3f24aaaced57cc0e8bd79d60b4d7d168cee7ccaa90779d6d669bb4fa
SHA5127dea3ad5d76775db786e9b4c60638973ef9cff166d627dd0cd10870ab43fb2d40612d06861f4b1ce147f0152d7b246e22b1f8b1629417bd71f51a50a0637eaab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7678978fabf5df1dd3c719e3e3ea0f3
SHA1713666fc575db81c30dcd008cf1479c23f2e573e
SHA256e8f78f7a096f50b190dada5588a8b50c35b884304123fa3241fafed6fd732737
SHA51202b2a8b53d0e77bd54e6a46b7db58fdc701fe90ddfba84016407be26e5d51cfc8fea8a339b5d617d35f5f5a72eab039aa1eca59eebdcbdff72d7bfa7cd9e4e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516772b6ad294da1b129d758074ec1c62
SHA101a600390fc6dd641413c67ae191f43edcb02bb6
SHA25671612f134cc2dd7b4e8d8410b089b2f684a3e5a805e536b36d11ea64786708da
SHA512f3989d250a3926a7caf6e64287631531228e043a0f04861f81815d80c01d0b3ecb611eec2246fcf1f00e1e45e2df877a2d13fcd1e1f29059b9b91f50f161d82c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321cb2b73dca1ef755d084117bc25dac
SHA1410f0576f485f93e4cf03b21c3eaf077dacd6031
SHA256f3b5725c206dea98e850a4f82d7510b5467bcd16b0d2744eb120b9abf3146f13
SHA512f47a012763a8f8d1185b4959a21fdecc220e37c8820afa46940b1cd75f7c2687cdf5a5847a87296ee43f09779b9afffd1528e74ff3d0c25048bf26a299a7142d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b706ad04ddaf82163358c2cef9d7c0
SHA147c1a3b7b7f16f316f1776a24cf850b7762e4348
SHA256a5f24b62d08a378d5eacc4980b1eb968ed8ae359328f2e2aacfa1072ae887667
SHA512ee374ad560d61e727057393f79b2b97524b359a327c54df9ac94218b588b8658e23af7a269a9d0d10d4f6c379ef7650342a8f1d4b0856355a8fd28f7c45d801b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517873ae8ad99fd28735cf0143424d9bb
SHA17e2c86ffd97c381609798927636edcd1fa860e18
SHA2563b113f60c4e0fee422553850632386cd82c3d2bbcc685a819366592c00a76b2b
SHA512120f8fa57f74e5ebb1ddddd303d0fdf0e78f10932a4aea1cd9e6952d7e2250321a089b2e60d7fe6690088f4e3520e8c279c69640d4c61a559db3bead31144011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252f7e30bcf5ee16c378ec057fd959bb
SHA1032b44348328a11e7399b52c5437e1f28a634af3
SHA25600da509b706fa9719a9f60c3697d1e4e526d47fd53639a32ccf4afd2f2946ab7
SHA512a64ace7c8dc4bd7c9a3aa3f6346a6c59d30bc8472f3646c067f6f28ee89ef8a60d23471f0e97e66bb27e89e6d8c197784b56b41936b0768f18cb2cac245317df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b