Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
81dcceae00bf52f509fc69fa6e563ae3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81dcceae00bf52f509fc69fa6e563ae3_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81dcceae00bf52f509fc69fa6e563ae3_JaffaCakes118.html
-
Size
16KB
-
MD5
81dcceae00bf52f509fc69fa6e563ae3
-
SHA1
bf2232c7f9d9b32a48576093cce2bd9d964ffd69
-
SHA256
50120f4046f02481284d4dd14a81e70c5a5211888dc15b6decb61859a1bd02c6
-
SHA512
ea143a354e306f7b1d4da3f224c7cdcee7d96844bab36f786b1da4b61b26dff5d64b28e4a4c23812259ef2c5bfeaac419e42a3ab2171c1dcb557058ae66df445
-
SSDEEP
384:3d/A1rPMGg7v9aIxxnR1f0ZaO4T0fI2GS8NvMGFqZ:321rPHgT9lTbtNTN2SMGQZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f5001b5de4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428710982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000007e1d277487fc43861b679719382774bd4dd07eca7532c1ac8da688771ef47de2000000000e80000000020000200000002c56d8d6a0394af5fc7d11371017bbc968fa1a47863cc12be3dfd1b866e47c54200000009a8c9aaeb80e1d9e132cdf3d9966cbe1dbab82a2c0ab1dd81adb7f4f9ea479ec400000007f67876283221169ce623c9c552cfaa0175221a54391cd6ba47381d1d39290204be579798e9766e32cd4ed2ac31b784392d43cddfe6cca3ab422a67a1082c5ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44C37A51-5050-11EF-93D0-F6C828CC4EA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2992 2052 iexplore.exe 30 PID 2052 wrote to memory of 2992 2052 iexplore.exe 30 PID 2052 wrote to memory of 2992 2052 iexplore.exe 30 PID 2052 wrote to memory of 2992 2052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81dcceae00bf52f509fc69fa6e563ae3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb83bea1e286fc5858efa61217aaa34
SHA17e78beb66cae4921b1302559b036233e4dd6a264
SHA256aaf186a58008cbc17baa3e0873353764b69a8c108e22b25ce352a3fef9a6b8e7
SHA51225c7e96088e30a119025cfd6993c1be18fd404c4d609a72b5ac6cdcc62e90e0547f8a732dee85530b6145606f27413beb177d9870ea059177eff559c1e6a0b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548279c99b13ac38f9074ccc78ad87a17
SHA1c41fa3b3375924f513a27ef8ca16c094fd52270d
SHA25695c3de26f2abbbc23d20aa605e0968e07b080d99da4b769e6b1cbbacaec472a3
SHA512e5fc3e4575db4096bd85afcf30927b0911abd257a4ed314f96cc7ce8c0e3115c349008fa84b3352996d7494643aa9f273f336bca3f3b874f62c5288e977dfaea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8bdf2f430c9604abe57321ff525db3
SHA1a7f44a4fd89da08c2f5d9f1a27c09e89db77fd43
SHA2567413bb77c5cc175c94cf4ddc1d914a3ce3072e7513a9b4c0262c07d67703f811
SHA512b2245e19f1799fd4f5147d7fab42681ec0de08d0df18ff0d09f238e765426b3bb9401b4c9693d5713bea5fa6cbe94863eca688a8564980720c406ec82b78e44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd76199805fd547f4db88a17ca50aa92
SHA14d04f1076b53ddb3bccf0b15c66e96b23406f9e0
SHA2561b6ce611c97eede0de130f2549e6d351f9b14f37c7cb5665f2ae8f14f2dc2ab1
SHA512e47e27678673df644a5b6195c21cd3e714f2ccb1e93a15a5f3a0337c35e7ee499f038944623e4af30fceb35be5baeab725df61d53faadb09b4e90231551bb7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d654d408f6d408b93d2f62ff4937e44
SHA17e5f1e1b1dd6b3def4e9c31941a0cdef8d73daa0
SHA2568892d2420b0e14cec8678c6cb90d4dab91d3b2dcc9ec96d8e48fac7b3a6e2f88
SHA5126e6b57661ca7240e0035b4f45c2db665317e98223e15f6c263d6539077fb4f09c449de7401a9abc5cdd40f70089781471c48b47d46044159af5791ae263a28c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a2457967fed06f9847b4c267a84483
SHA1bbf1942c6a44ba176f5d4d582109965071be7ee7
SHA256a5994bd508efc6b3f04bf54f88c5d97d5144740f9e06ddf8b3d13276ca92514c
SHA512a8299624d46fe0b5b13b5039ce1eecd89baf0952f82f9e4fac98f8b1da9eb93222d928b0c5337e0417a721efd6cfd4d755295ae04d5db5742939b96f6b800271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5f4f42772f30434c991e724b97406a
SHA10b54d08a3f50c14500e04f3201158440f402c8c8
SHA2566e935d17d5d4fb644baf6bc2af3fe807d2993be84bfcd574fdd0349367b6fe87
SHA51241390013b097c0bb0d6537ef9ab5e665c28db4a0c2017ad586faf26127e72dbf8320762b224bb1ef718781636d35287c4d4179bc64c857aa47c066c44863d92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f118f472aa2bce065a9bd863e3b9bf
SHA167cd2ad40bd4a0505f3d068efc2ba64a3d88d51b
SHA256af9d50153dd4a8d7731eca7ef078f18dc8225c884db1e22a50b2d12b79c14070
SHA5126d0604725bf1871babe8b57f2c98cb11f3616bc9e1c659e9f5b4d1292457cc43d9b0d5e4f6b83f252ea49f392b6ed70872204c7322c19e636354165d5f1a4b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc7f0a10a2adbb0fb770cfcfd63de93
SHA17cf2c7aef79673d64186bc88caf0cffb26796d49
SHA25638ef10047bbd8d1ac5f53c3e074796f567c9ecdd76f1a74267e8ea1c454f605b
SHA51206398af3e7727db98b6a23ada63f7803d75b95df7c8b3f1a3c5b75ee8463fc9ecd25a74d50d9e2c686fc4af2f1189df06053f41105ff892d6fbe46b076aecf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052cef0eb9293c6e0b852be649e9bdfb
SHA113cc73149fea059876ae6f54bffee268014eac23
SHA25603ab1faad41ec6f27101de8635b54ec00392b21de4ea5d0a7573f084e0330aaf
SHA51203d11cc7f4d3a8afe06fc78b0a114e1cf5dd59aef0d9ee07d7b8765f8a1d38de2d390f46ad3ebe5981579dc903cedc2d0de1151ef71ed016b1106bfac9975893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708c3fafc821bee408e80b661f17cd53
SHA19acc1c5c68653c874a259872921d4d1244d20320
SHA256b282cda25163761a616f764bdf68b9bbbdc1990120c30e5baa866b01e92ca2f1
SHA512cdb7112f0be056e242d49ef2b53e58f47d1ebbe54a8c6483ed7a232047652ca4ba49aa6dc79692fec8c9f5a01246176f3e7cf17e0d32347a200c321d9622f8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5f65f509ddf34df3c8d357b448f935
SHA115bdc6bba4c7fdc7e9495c1fe64ca18b1706062b
SHA2567729c48d6c1a2c8521108c5b8a3b58108540e7342a7aacb6136f26f03bc04f09
SHA512e571143ee767d38c8b63da6c419f935c6220e69314f12a8b06ee68ba1da62aca485d2972adcd127e77702f220969252f4b362c22a5d73db8cb553be1f79a6678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f1879065ad1fb5bd7bce9bd24c8fd8
SHA12e54c00d38d087e60bc3837be21a023bd89e09c7
SHA25628996a4c8650b2affd6f36ecae960166ab1de1ff7bd15d65ccc0b45808daaa7d
SHA51283f21ace3fdbab55c108a19d2feb0a87ecd2f2739a8f847956d56c105c7ed71adb8bd19b8f29788cd6f70fd1f4aa167c34cd829d2f407b1d2b92f9bcda037d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee62f9bd4e4466300972c0264f8728f6
SHA125101556d79ab58ad75748117960b0dcbec301a5
SHA25606c792d9c6ccc731318384f46d60da1ccb70cc0aaeccc6a4eff9121159cf054a
SHA512a8e6ac76a97348ec117230ba86eb79078021349d490a711b89c40ca23e2405e83b1b2cee0f3c61e794d6410ba358d504b1fe9a3789623e0226edf5915728573f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9330286e317ab68199651eda98fcbf
SHA1e77c3f36fe473099c6bf90460510e3680acd0757
SHA256fa279f9978b4db78e2069e42f807061d3b1c9444118777f1c1e08bbfaefe58ce
SHA512c707ca3d59e47e9293639dcbfbdab1c9d078f9e7bec25410dd415eb34d84682c06cd51340de4afe1b43ee31a24ac82d665259e95824c94c840bc4c35471d563d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263359ee1021b37acc4e9d02555d14da
SHA1c8a0b4b565519fb40d6d6e1b199725633a344a37
SHA256037d0225d7c37d4dd36b652de353b6e74327b44c92e119daa4dd766e2f0b767b
SHA512c70699f1d48602a5347ece4f144464a6d3cb553ccfdeccf812a51b962b8df1ceb34fc84cea647064e91e9fb10a2b5fe322375881e29c34b045632b97687b4f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf236e0fc0405bd076cdf6445a09df60
SHA1f2a538d6e799f604de8440d2c3c0d13c7ad9ed7c
SHA25695b701b7c4f46587e94ecd1c0b95e80ab418192d2e9bca69b6864cd314e61c37
SHA512c19f339269c5465441f8c751b3a47906535381e9ed3805ee44d6cd872b55b5800246bf52efce4e41ab9c5ffc30d69fdc694089f5b0c82c4b8ff9ab43ebcd193e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59385d1c090ad51d9dac892515da61780
SHA1e6670be1610a60280bfc359371739875d65fa927
SHA256a5234a6fca226798574fabcfbd281de3032f9f6813cad354902c79bba7833777
SHA5127bde83ef30798a488c47e96a4d4640d9f0a6b3dfb44e3322888164f1ba1d7549666dd588a3a6f7b3b2045ed1105ab73cc4cdaf8e9b64133843886836068ad71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560979949d3fc8834c39f7b2a9f0b9fe4
SHA1dda0ee64bc58a8f31773d6d2f5feb46c4227058b
SHA25666e323d75aef1cf4a52c69688e5eaf03a2b4a75ff3c5ac3e10b380f57ebb9360
SHA51208293d21fc98488907b4ea427a9b4f3a5674f43a6c7211f433b40a067ed121c60d22e794caa1b2323ba5f46747518cb292c0ce3375ecbe6666a78dd2686f9461
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b