Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
81cb0d6c16f81f1cc9608e56a9e982c9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81cb0d6c16f81f1cc9608e56a9e982c9_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81cb0d6c16f81f1cc9608e56a9e982c9_JaffaCakes118.html
-
Size
53KB
-
MD5
81cb0d6c16f81f1cc9608e56a9e982c9
-
SHA1
2d06f6aba4772b84160ee8aca8556f25c2f3b514
-
SHA256
18d5988d5b33e73e92bcb1c36c12580973d76c7b7371168f46a7743c943da6fe
-
SHA512
de96a5100a76c9699db55aa986d587c05dec18e99d7e11f163d04be59d00a35e88c748b6f16de9d01238d2e7e5a74234d2a7d521434d07f8f1b278d5b520329e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlYk63Nj+q5VyvR0w2AzTICbbboh/t9M/dNwIUEDmDM:CkgUiIakTqGivi+PyUTrunlYk63Nj+qk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07249175ae4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004260e52de6defa40d4dd5428443b1271bc1e8752894a5739a94676a3f46a5c07000000000e800000000200002000000010ac9922892450bc0bba22666d98cc31aea0a44e80094534c71a1c99b64291f420000000129ee73f18cc22ac4fc0666bfe9a15b545f4756b9f58a31a1a4c46333e097c854000000027b5948ac26de2ee1b2a7f0af818787e8259adc47658702991d469dbe667c046b22b9a2ff79c4e369647db80a5e7140694b620996dfa86dba35ecfba5f643790 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428709689" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{417E2281-504D-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81cb0d6c16f81f1cc9608e56a9e982c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f2f4244d9939321b9bd4627da9315f
SHA13ce3f7217fe56679e11e09021db67449fe6beb72
SHA2564cadf594efbc9dc59c87b50c8bc1217c3a15dd0049eadd71718dccc1b1496932
SHA5127b7d2a53afa3e8887cc90f77b86bffb56b6d10398a1298a20f14b840db0ad1b60b0c1c70d5ffc51a458cb8f4c2685284e00d2005969cf8e247dad445b882043c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54becf3ffb947172152cb46472fd2c931
SHA1ec5942c94079e6174d8a9bdf243c9978c0f7690b
SHA2561861e52010cf9e46cbdb322b1620435d2168ba9175287d3f4d3769031a80c010
SHA512e84e876bd212644d6d12bd7f53d474f3105483fce5eb440d2426eb34656acdac19202ea1833d3eec3ac282d7059cf94749ee12aad4b4a6df8338f0d640009a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0b75d214740257fcb91a270d9b65d2
SHA1aeb609bac2ddf67db329027e7fee091ad58ca237
SHA256fbf262d9b4acdd09c3af76bf0be25787fb0142ba0362216536560732b00aacbf
SHA51212c1e228b8ae168e311d5404ece8e9b99585e559ae9dd3e31b17d87f3b6577013aff479d66261c619bd099e501fc670f9195853871e8f2a570b15fc00631cee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902b3b7a0c2fe0f631943e4c36b624ac
SHA1562acaaa55ed3f144312632abe753b5af3c0d7bd
SHA256b8a4c1b32377354bc21b76439f47d1ee7f52987cba3684b27ca1349eadf00d9e
SHA512e5eb354b9249151ffea09fb48f0f7874a5b4216989a6a228a72443741c493626ebd919d028c24775831c2439fef0ca80798476824598012941e7570d7bcd0ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59222b15f137f4910f9df1db2e6bfb919
SHA12aa48d54039f985188c823ce1485e4a58ce855b0
SHA2560ec2a70761fa53a61245d307216c11dbb32d49a3245e2337f45b8b84f0c66214
SHA512be69b5ab2b0732a52c4879b98892d895526c3d5a7c126d88487bbcac882cc4600337ec6b434ec22e9494441292175a07f8bcec8582e9b9284d07127381688198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54551b929b6237efd1ceee27dfa3f4b57
SHA1c8e2fbfe42a8f92ac4c9e9bc618ed85825d30db5
SHA25646fb3fa9b3a95e9861576d81fa871445f6d483968df18b2d083aae7c41f39162
SHA5123cf2a4c66b85f2097a7d22264abf4b2109e2256186ac308ad3170592ecc4e59d3a570391223aa358ed22eacbedef4c9c12bdb0a2ba65ce6dd0f12cffe3256903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595abae7ebfd9f499ecf9b290a6722eb6
SHA19c923ff7bbda1e71a44e5d0ba6833324fb3613c6
SHA256d744026b1d6a2c005a53046f58f637ea607007d203a6aad104e46e0753d1eb76
SHA5123e20a80a0f8b5d4669bbe8d6d7904391d4b6d80a9546babcc60103dafea3d36bc50757f0af42eb4f69ec9edf732f1a3628985cc2dc3e840e701d038d2b673a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f31e782a25f80a923347d9d1febb62
SHA19d568ee7a339524f7e04240d56328b6cd272aad5
SHA256df6c6caf819fd536e4956832a1acebfccd2c58629f6b834392684894da37b717
SHA512832f2eb92fdbcd5702e35a84b077588fdf1ee8ec064f8e676a04b8deff22dbc2c9fc17928b7c78832a6000ebeca881b28e4837a2c7d22594203cc717868fcdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464e911291a0fe5de893e03914e8e0f3
SHA145bd789dad50ea46a577fda581b7b34454bce076
SHA256f2227364db32ec29ee42604f7c0431bfb7d6f98535b6d012e2b211f83ec27f11
SHA5128a4fd109e4986fae7dd96e7f8cb5f1dce885397e1bd96b11e50bef9143c2669a2511ab79ce056c59482feeec63ca8b30579fd6e2a2a36db4b89a063e23c50da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f9762c9045168bc60681e097aefd64
SHA11a4fa581acee0035d1ef1e64a7c550e520a4f034
SHA25604664c7f36062501d918b621e09999544a88caf1ed76f9093a09598ea4bef25e
SHA512a955686797f24c5afee3856121b8154c853870fc06b7cdcd68439b9ba49062ea5c8d50c31e4968c69c0cf0643a3e069e07b0ae7afcdd5968ecf6c2320e99a594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9df80de48072d81df90de6c579ce60
SHA1f10c2f067b9929997892c013dd9c26e8b15b7b48
SHA2568befcb55626184570681298ab259d45f2810a30fccd5a8e396f1fda7ed5ac60e
SHA512eb693aaf1d14e4461a6d779df374035ef64c1107d0191a5c14effeb5ee62327a0fe77f84ddb392d5a5f6c0d626720e0a6dccb9b217e3beedbf6ce1117a099dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b081aff08d004632ddc23df38a806405
SHA1943a125e7966d7dd09f3133bd3975a1c9fb41268
SHA2568f3e0fa0f5d1dcf41bb6d3e3ec40a68aaec96358d2b8c466533387611b1068f7
SHA512f8c692e82a69106e833d310c162714ac40330ae161b20db4dfa6ee3e58bf8334165d7ab2e46752a7578668b55ce87bc01919895c57e2d13a0e86a8158da8f814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df70fbf19af43234fa5e18439676069
SHA1407e7c9bdc77aadd02faf18686f96b0cd6b9fd0d
SHA256149ef8a952ebaaaa898d5c4e2a352ec49c7e2edd757db07fa27023f0aaeff7e2
SHA512307a305ec60abac1c75a049a5d211918f89381f3ea5164bc3c301f9edff80b25a51715927fc0cf9fcb4472cf40e934b3de18a01d4493b933d2f66372419ce029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cfdd5af5e216f599196f5c7d238434
SHA125a2c944166087793183c4df47fcdebf5ed2a2a0
SHA256de63649d040e588054fef8f7a8aa992e23fd7375439cbe4013709578f2c82b93
SHA5124426554c5195e9a3f830fa758e79a122d5fe225720ae356d5e9da0b920dc69d9aa6d081f723a15f558b3594a519bbca822a59cdc7464a0ff4750802bee72662b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e850dae66e8a28169fc43f9a9bb45bf
SHA119f8bcbd2a2d53b520ce6c3701f26b865bf1de19
SHA2567d10c444187e2f34c035a6bdc12a7b122247c04aa4461416e17136a73d96c492
SHA5126379ceccf0d168ba468bb089dd98aee1a3d299e1674f3c8cfdb3d1668ec9eec0dbd808d387182bfd8fef86003f81ad9899dac0c545a164a46b269a713b7e8163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9554f7f30b92f8168279685d3ab4739
SHA1731f8ae4ec257da35ca02b10c378677c38eda103
SHA25642f7a8aeceaf19827b73a709453c379a5f861713b1b58d1abdf5484349bc6cd0
SHA512922ba29802b171806a0f1648a95d3b51601e66579c4a745efb242d4e5322bb89da615c17ac3917cf96359389f681d76c113ee0b862dc102685dfc69353a9108b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e7d64e3fe4ab62fdaca16313fefc1a
SHA1f697401f168997f6a4706e1c54939266b901eabb
SHA256b1b9ff4218e5acc8ebe735c631b8029ad9a4e2246c802d1c1885d55735e11f30
SHA512657ac96782938d00968ad4b48474d61568cec5950ebc9624347b15b8f5163681777e977285665bf386172b4722f93fe7463b8595d27bddd1f17879f561877111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a85d92d8a67b8b69a5461e2b73aa08a
SHA14a95204c310e3926f9a2dd3effd46036c6100d6d
SHA2560084cc8f63f097d864335aae74f48e062afc2b0272e892fd6b49511dd76b718c
SHA512b874ccaa32ec84c018019d57e4eb525177a705ee30d69c147bbb75c23e79508eda59bef99d2fbac2f9cdbbe8766c7c22d6171a88f3b45c281710da7a741c6508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5ec85b1361a61b52e066dc755cf3a6
SHA13fe3f35c51ec06f29ad439c6ba67d15bd3c017c8
SHA25651116909b25189f776c931777806d45d045fd19ef16c45aa665b0feb3a68921a
SHA51288f0cb783e1ee1326f6fa397b43bef150313595581383d06181791d5f4c208f692e652bc53eb5e0697703c9cb2b0eb19e5b2ead4fa9babd6cb8cc173e1ff5238
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b