Analysis
-
max time kernel
118s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
81d057ff9b7592a965df3c0a2a879da7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81d057ff9b7592a965df3c0a2a879da7_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81d057ff9b7592a965df3c0a2a879da7_JaffaCakes118.html
-
Size
230KB
-
MD5
81d057ff9b7592a965df3c0a2a879da7
-
SHA1
2e8e7f94ea39e18a12e309a0e07b6a176c2cdf80
-
SHA256
3e5d44fdccccfa6fa387d97b4ea4cdf72917fc86ca6d535d01eb260ad16c7aac
-
SHA512
6989899dc2c05bf589d333f2fdcc71130a4e8c6f48a0279f4e3521a85c6d3cc703096261b9921fe559a8da5808108e5ad0ab99d2e9ce58ee32b8a000ceb1aa49
-
SSDEEP
1536:dmaLqZcrYSr+TZYoDI+papox+lpHHdwDqZAMNRYCTZjFiH15+l3Thr3WenkZ:9dyqJWuNs5+l3Thr3WenA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DB51171-504E-11EF-8FDE-E2BC28E7E786} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000002ba38c628cd1c29f667b02b7cb2ef394166fd0b7344a6a7429e3d402d7ee6da5000000000e8000000002000020000000dcdc02f7229a88ce0d4c5773d0733663246a4df2ec706ce80f938301d7736187200000001c75c54e62589d62164e1553bcef3b8e18cd8ac0bf437f1a3804649bcd6c3d5f40000000ca20128efbb7cacd1200ba1d872596264064335abac3f73c6a2f41e9392df5468469520763d532f82dda6e5a5aa97bc9bb370bd5cb0936910a298c1fca9d207d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20012f525be4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428710138" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1872 iexplore.exe 1872 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2464 1872 iexplore.exe 31 PID 1872 wrote to memory of 2464 1872 iexplore.exe 31 PID 1872 wrote to memory of 2464 1872 iexplore.exe 31 PID 1872 wrote to memory of 2464 1872 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81d057ff9b7592a965df3c0a2a879da7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d019ffd63ad5479fea2c9eac0e2b3048
SHA1bc73568e39c97bbda8927dfd8567880af220fa6c
SHA2565a4397472c495915897848266431da94451f4329bcb65145d8c4078d4f7271b1
SHA5120126f7673fa0c703cbab957c87b89fddf7b6e532b8df14e41c611b21d32179f39f50b69692a8a20560d294fb71e74f2f2524ce4ddb53995d40b5f2bfc04f0869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505cbb2f25d15ae06dea055411dde4e37
SHA1a70f79637156d71f4468525ffa0d13327a0fb718
SHA25677406ef553d74da8f7ae79532c61a6b9672fa0620f7b4eb0f579a74e4db3f054
SHA512bfe683ea2364efc4e5b2aa02e4be109f17bf1c09fac0b475128c1a9879c0e3d7de51a84deed7057c4763c35003aa9742437a8863590d5f3fe31c967f76ecceba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5021b1401c390fa4a7ae4a28f4547a61b
SHA1d80a886e9d0aa110d378039e4068b6c3755dad26
SHA2562a058de893fb084ffa9a009e11cb549f00f8e72c1f8067faee871d8f4997050e
SHA512105cda94f6c03c08f73dc23bcdc8ebea5bcc360fb848956188a4f053c732fe4f16ef28e3a9a2acad3a5f7ebfd9b40a5ac6e763430bb9e71480f0ed99c9108a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bb10713b8324a177ef5279ecbf6f35f
SHA1c031d0e21eefe7d95b344455b77b53d668326db8
SHA2569ac81a62e9c4119bc48aac2f55cd9b86e8ae86c4b56e3cceff549561f2a55ebb
SHA512ce3ba4a8f6feb8ec0fc17e57f526b4c83b401163f317e26c18ce796cdc289bfc890b9574ebac1e30018cdfc9693eaa6dc121b2e2758a80ba08b8c32b3d1d8547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544bc1f632c5e22827a42c9d706137376
SHA1851b3ca4c390acd55d5b849aa91532af3ddcea06
SHA2560cd9e1403896dc0b45ade4c1a593180b7d150134b4ece95c154537cc14a32e96
SHA512f805354343ae3f35e467e3c2ccbe589c6070661aa4a7380a64cc47933a65e887c4ac41353c1077a00d6f2d8c0629778648278196f9c5a96a2499ce7cd2dcb67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57667906e3fff1e3f5098b40e7d3c1e9f
SHA1013ac28f865f5f607a51b5956a43be4d5eb74d39
SHA25696040048baa205997b6b742b015c69a93dac9284417d0b9f7d8ccd3df20e1f91
SHA5129e6cef5a557c56b95c8d9c2689df47ecf03836ed2c45d225540526c2b741d602aff8925f9c9676cb9a28cc297518943e65245d3ce915598de8221b82db3a89aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520abf8fe4b8d2f38b54549b434c3c384
SHA1e78698021dd3e13093ae812f4e63c3231321f564
SHA256dcec91308353c639351db5fbeb6619500a8a0c1ac9f3beed8d8ae970e2ffc01e
SHA5124a27603b856a778a1b6f791b031562071f3b5e314c164624ba79d666b5f5a388bdeef8b9c416a3be9087408c8f8bd1afb4aba8b5d44850c7f9c680cc54f38629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9b3ca7281255b298b731e916f78009
SHA1a9988bbf9a6ae96fb7cc9d6413171b1701be8de2
SHA256caaeca8c5137b3a8bae0963fa76f239b2c6872ccb83be4933d32a22b48e95597
SHA512e6ffa48903aba583e29870d488d249632a4678abc4e340784eab5146303d627cce66efba80e5e91424036e647bae04f02f19fe3d633daad894d7325fbd831611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d9eb2a17163ac084e6df9bbdf7d3c2
SHA110d05cc9ab1cc13c07e1b4690e9fd628b6c5a22e
SHA256b94715a262b33216da86146a4a6dfdeaf25610ecb80b5890eb48d843c1df6392
SHA5124f7a37868b5ad7602dbb4d1af00350c0d3be9c8d0dcbb872fc11d5a2a78aa6b5589e3c7c6b01c34d79f818af1e4fb0d7dca835dd9eb4f8a53e768e2e7ce09dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee8bc76cd29c6207bad38f42072170a
SHA112c0ac943c3ea79f5920dfb63e262fdc1be2991a
SHA256cb068173f6c259784b8293448afd71e70ed337ab7f9483e8389c097937be65b7
SHA512680b4a8b4c7415f454a67810a5e73b201e4bb357ecfa51314fe7860be901093708be4a31443aed58eeb604fce88f62821aa97a48fce84b926cf6b4e8339371b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda44aed8fc9573f0b4ab10d7777ca6c
SHA1c40c883d965b39859f3d3ba7dc0a5bdfbacb07c5
SHA256096f4b465cdae1064b3ab9819b513c5dc56ac928f4e1a57fe81d8e9e56f7bd0b
SHA5125985bbbbb4fb90b3595dae2c42ab1a0eb5a4c66efc2231c2db1c9083557540d45b2726bbc6e75b7a10cef082735dd2ee5bd178d4660aa2617b8ae00f75b22e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5b6fc5c8e71043fca3f36cd4e53633
SHA1b604356d3c8c97a157bd11add188966904210210
SHA2564d41cba5c7637269652258c4923737667f1c0ce43eb83d2003e5c57b2aab8bcd
SHA5122824696a300896e73ea9e35c95263571cb2b17cf74bc92818bdc3be5ee9983543625d34d75957c70774955d99971028ed789790e379b73485bb207ede78c0a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6ac12e4959953291331b6691b46c72
SHA107365fca983079668122bf61b1855edcd188c1c2
SHA25626640eee5382dadc19e41d029f0745642808d043485d355fba53103b9a22d836
SHA51231a6bd0c39474b268ef1abee05092173d031fe4ec87ff127c437382284ea044534426a6fc0974f2248cf6254207b5369eb9434a7ac1f7e505afc8ed07a176183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb370f661e178b2716c67935edc485b5
SHA1cde005c9482fe85aabe9f2cc6245805b91cceb11
SHA2567f861d2fffdf0fa29087fe82163f115fd06cdbbe4540ab0494d49692949f6d66
SHA5129a7822656aaaa3340f71a3b184cb145e2644000f72b574a57eddd9c4ba3202d7ef4c799e5271cf8778642c2c011b32b363d283f701905a335fdb188f1cf0b5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c0fbd7b81ecc9fe034d988f36793f9
SHA1168e750d99deab8b49c99678cea5afdc2333b141
SHA256df3276bd32405b33944a54d07daca64f108cf68cb9f874e85d2209c0113f76fb
SHA512181a0f4959d459be5048ceb2515b1cbbdedc3ffb937ca16a6dbb79e4236bc09d6fedf6d96222b242efa98593c3192eeda9017d260ae656e35718958d2ddd92ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c037656ccbff6fa0f4aaf9266b3ebf2
SHA17445bfedd838f69f297d7a340ed38a1f686e42c2
SHA25641d1e46380db2960496043a05b447f93e2623b705c7d874f09844d05589bd684
SHA512a316d4111bc79182078377fab8360f4900b56f34afd3400d34e8d19f5d9de688cdd1718f7b96e949f2d680c5fc4cef10bfb6f3fc8b3ddc598c941a96449c7cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce64d00fcc9e58714aad884e24bcf4d5
SHA1e9d86eb3d4d29fd4fc59de6ab83c2f995cdf5662
SHA256420d4421b1374fdeb8e066ec5bb6c17adcbfb37cac8c83ef5e845eb512bf107a
SHA5128c68bab33634ae29b55099e8e8ba660731ddb5bd8ba829306a3f359ed52a16dca12e62789e427aff0f6d61bdd5e945d464e7e1d402df7e9be27363a276e98e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586fcbf39cf1a024c4c3cf31bb2899012
SHA1eff2252eb777c96db090a37028c5e443dbc39a69
SHA256d42ec27270dbf985ff66da3f7578556d20076fea7ed60653aed704e23f62091d
SHA5126a3aaa9a5b2c08ae02a97e652e2409abb4eda1547cd565fc285a3f2511aced41fb9a3ff769515af5f5d531ba02b20a9f4624cef6ec411e2f353469289f0749d4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b