Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
81c8e02609f98267fe3a7d360ae1b304_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
81c8e02609f98267fe3a7d360ae1b304_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c8e02609f98267fe3a7d360ae1b304_JaffaCakes118.html
-
Size
11KB
-
MD5
81c8e02609f98267fe3a7d360ae1b304
-
SHA1
a337f275d6fef9bea033d0e2b892375f5e5c0b72
-
SHA256
149655f9f7d80178873e2e739ab8c1460bc16242a108d203e7a4073b1a9d14e6
-
SHA512
40ec5e3f81a7bc90f526f74d76aa94ec82a8c5de4ba94941229d21dd067ec7e959d67dd6d0e7b14be07d6c2395b58c44b02746f8d0e93d440989e37eed1ac259
-
SSDEEP
192:eawuHvfqrKz77sZqch5Df16EVHD88S/5B6qo92cTgUD24QC6uqfMhFwbHwjUf:e1u5zChhQEV8bo/92cTgUD24QnuqM8wq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50181db059e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB9B2851-504C-11EF-944F-F6257521C448} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428709517" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000009e7450acba90fc3b75a27cd1785862edac56177e78baf22269c7c45488e7afa5000000000e80000000020000200000007f48bef31719c9336091ca91c80e78f491ec77a122ad895270525ba7844bc51a2000000097ac20ecf51b1db287f954225fa3b45a22b8f01914afc40f73433ce1822586d040000000667c5f04b1b26b9b43872e274ce6451a091006e5a233eef8befd3d35d1932d9bec3395a89d875e9b6d88313bbb486ecda23128665c13a9168b72d23031e35596 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2432 2456 iexplore.exe 30 PID 2456 wrote to memory of 2432 2456 iexplore.exe 30 PID 2456 wrote to memory of 2432 2456 iexplore.exe 30 PID 2456 wrote to memory of 2432 2456 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81c8e02609f98267fe3a7d360ae1b304_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0d6e6ed5fbe04b9d157ed790143636
SHA13282dcf1675d5b2fb3302f78de053675e0b71180
SHA256068cb91b21f2a6a9bcb86b60b2aedc6fe9d19ca2b8ddf0aaf4e193308c3fc668
SHA512d9074a18eead80287699fbbc549a0f5c5bdcab3590c460036bbc1c3b46532b62c3e8ca945bc924fd048638c07977d9403d2c8624e5a0dff1ebde02dc90bd7538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5714af7196bb8d7085841576f21bebc7e
SHA14661bd080ac9fc718cb3f687452bdb83b9da656e
SHA2564beeb0daa3845efdee86941130623ac4c682a729419eb610c4528763c2784eb7
SHA512dcd75d9cb2dc104dbd4eadf1001d7ba8a7d530cbb79506778319c74669e800311cdb6b26ddd1e07904448b206382b5c03a3fe15bbf519e61cc126a87d473fce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55317c9fc1e693e6818a1eeb1436ff833
SHA110d97286b546890f978798eaf6fe897db7f0c437
SHA256f4c345d5d69c81a7735a6de54f41f87f841077f4a57ff8e1338d6c5506b4749d
SHA5122423d5fdc76541dade221329e3c1411a0fb15ba32751262e1edbc821c4e8896ffa92ae2d4a918e574881fd425ccf6e7f4b419ccb7c12bfd457211ed43645f9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec43a3e5dd07463ecdfb819fc8399cf
SHA1fa4ccdd78c8b538bb11f0bc2f2110ada2866d160
SHA2568ecd8f85424f2cd7151bcd4046179ef1e83ef7c168ee7578b2593959dc3b30cc
SHA5128f1074239fca883a48b12606a7646ddc24a407d1a80f43d373697c141667f3ed9af191770156a24f1d4737c4bc9599607ad02f7b2ab2fab8315a3f7242ac3170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd154243f93787b1dd6a306bcbc49876
SHA111ca85b6310b15783a1fff65ada4c91dfaa16a6f
SHA25654a7c36a7f19a60698add40ddd9d3c49755a1a85ce7514faee1423f9e8dfc96e
SHA512dd0d2febe4c620ab5690c5c2b1e034c900a480b83c792ee9a943a676ea9888899d934cfc5d879caa05f225956949385e9957c5616b8d733f7f1eca8aa7e4500d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a512d694ed3108f46ffb866a29ce11d5
SHA1855f13ab13d3bac77547732166250e1a0b15d0d0
SHA2566290f6968347c5476c3c03946f9c81930eabe60b279fee7e70e1988d09636dbe
SHA512913527ae6fbde03e6032d5cd1782a6d5548c3934bbbecee2ee40eb913cba36c272881a3120600de74f33c02aba5b58f0f5decce8869dc883b907ad3bf9d8e034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589589e04eb191f8c82a3d92884e13d11
SHA13918366a4c91173d72c8a1079de680a748016a9b
SHA25694442906e155bb29d7e050d982fae28ab96e9b8bc8e004f1b4b4e6c0085b13ef
SHA512fe82a54909c1399de50ac413bff3b9a0aae587d9a09a7e5d7bd4b2b3d267f2ab96f5cb4cb97323b35d21d1cdadd50802466d94b19741c7bdd67a3c62e6b299e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3db4c429268a0666e1cd7318f6d9caf
SHA120f8dbd44b8bc12911c00d81bea8db8cb3144636
SHA2563ae9869730da28b3db2c501bbfa17d4d2ff638ea87f705df91d811e444596013
SHA512c1748837621113e9d33c59edcbe9cebfacc280240d7684567fa031138bcb152e84c602b76beb2114a14a06c3dacebcf9ff2d3dbdc6b9c75e19d10e70102b382f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572eaf8f621aa58b54458ff8950410f59
SHA1c762411d26f4a61071daa89853870816d3bf129a
SHA256d96ebdefe2d4278f9c9e79ee2f87e66c135765b9d8c1a9110a9b8e455c2078d2
SHA512510182984b7839f76d7b2bb82e95db329887a8958428a7c0086712f4093f5b403474f367cd0ffe9a2597f9d24a0a2bc5100391fe29f64bf6c5225651aa67ef23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523920074d0309e610ce63bc6b42c75e6
SHA1ca9de3129c054dfbdd4a2f1793218f304e9246f6
SHA256606bae48d66738265f6381b9ec29fa8ad72fb6aebae6ca92100c3a3f15c15835
SHA5120da8f8f62fcf7d27fb9f60f8ca7ec883e5d44067e6ea6d32aecb6b4cec0e1b856bef1ab6748b47b21c1350db29b191bbf3c991b0ae9c5acf4df7ae819d9e68dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bd9a1f27a5e6c49f08b1ddb4a17bc28
SHA1752eb7d5419be591a1c03eadf046d5acb10a00b2
SHA2567352cab1fe097db13e7df84f1071df403edf219066bd1ae53a03ff1fbf467e26
SHA5129d4945868a9e005bbcf803884f0895b5c90eb05a7e2530fdcdb6a894ebd96f62b596e6bc967522a17ff3539561a9fb226ac60739c5ebdcb990fd5f6973b21eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784b0a5364bb29445224db403be94b6c
SHA11ec5a853730171a3263440400fbdfaf71864d779
SHA256f81645f3bf4befd813ace0e90ffbf9f6c73fe3d57162754b506ca530dd77185a
SHA512b6cc426d5d4bcd16882f738d1b5ba61705711a87c266f3fce2ea72e1a3f89de288b6ccac633780a11867ed6763bd2199e0fbf22d38f280a2828f144ea8fc9aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd72763834bd45110cda10c2dcf595e6
SHA120c586d12022b40b3e7136f225818ac954602e1b
SHA256f3bb3889068ccc430f7a4e0d94365d0f3afb02fecf487940de5e48c725f56e92
SHA5128a5ef2adebc0980c0521a9192aa5605d3c0f1da0e647b4ca51b3ce0ba7fd99fcfd84637f3818089642008ca7e84d998d57a22f02f9797e347c87d9e09efade24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579081266108269f883323ebbd2965d5c
SHA157f933f34bcbee09179285d641acb364b58db842
SHA2565ef626b99fdc02f686525bc15a62f24819e94079c1c5ab6afbe66ca84c4fe7e4
SHA5121e0180c56d6c3f08d61cc6e5fea427fbc2fd3eeefe8c652baa67a04c951b40596ab4b1acdf3066765b078511e63201241a1dc7d407fea7db91c07ee20f69bd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28da7808867a469b6101c16aa7134ee
SHA11b4f2b10d590624aa148528cbc6b2a3ce951f7ce
SHA2569b7931fe9291a59de74c5a0f2d439e1d10748a737e0a497bab8a88253ce3c0cf
SHA51240f4d2f93e0fff13dabe45a20bd2eb41b543de27b4bb4111e749c2baab77541fbc2c859e0861fc5e06a1eb759f6c77673140c0521bc5d58d07911c4539871602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57620d12a37754b6c7e90df154e34475a
SHA1a2643deca160df33fe5aff3ba3face724b36a87b
SHA256a03d73c7d16f16fbe973f8ff3a047be36dc3b44071de7def37cfc1e1466dfee1
SHA512165dc4dfa178a6a5144548d6323e59ebe3fc4e0b53d2cdd935a4429203fda056584c80d6262a29525d662a5fe83ab54b8c3cd7f2b94af807a2c9c6bb31c10d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5a867e8e9e6a7a83d57f429139c132
SHA127081fcbc765ef7494707b7095641c40f29528c7
SHA2560835d9eb9679e07a812186eb0796d25489faad13236741c0f348085bfadd6d60
SHA512ad8363ea73a0a3e1340ce6b5e61f5d0c0c349b73a560c9ecbaa6c93244c99913616fa34871404a2b3902c8a23d0a70a06d78cd08bcfcc4cbd83553cb84f409dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6d265cb1470a31df1032b94a6135fc
SHA18a51cae96ccd450ddcbf52d2b8022b18f985d760
SHA2560df381e28e3eea7875fbd94ad4d60f0845368af51d7eb5994a4929eaf1782058
SHA512b5044347f63b4937f5cafdc8b7fbb2ba5feda1f711a9de9aa7555d0db9d4b79acef56f55c576553bfe0f8359488a9ff15ace90e4be8ea4f052e10ff873538b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275c3b615bdc0b4dc0b7639b0f0c932f
SHA12cc4e0c19ff971af124cbaa214a889e980fcc50b
SHA2568f4e6aa58266f146702e5ffa769015198ee2011bdad5557732909e327fddc6b6
SHA51269c9a21c843f049163a9805b66730631cbd145e8a16fd388f168379e239fe9c5b49358f5c67c6f5b607297de69510ad589c337f899e10ac0141300dad8c79e34
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b