Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
8228dd973043fa7fc82780cc484f13b1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8228dd973043fa7fc82780cc484f13b1_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8228dd973043fa7fc82780cc484f13b1_JaffaCakes118.html
-
Size
109KB
-
MD5
8228dd973043fa7fc82780cc484f13b1
-
SHA1
6b206ccb97fba850d0fd90bd6d6974bb8f9781f9
-
SHA256
0dd4f3c7fb8572c3638e77620fabd76c0e42ea5d1e2edb791c104a01dba35a1d
-
SHA512
3eeae3efe794a5b3a53fe15ce7fdb060bb8ef9db74ca820dce31cb47b584c6192a34fcf9656254de66780ebbe8507eacdeb833314882cdc3a2f899f1ec3ec89a
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcW6MHAnn6LAQOQcZTyuQ+p:sru6Lhq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000007cd84ce38d7f4c3c5d60767fe35ba97f9407a92ca2fa6a39943019d4a4fad244000000000e8000000002000020000000fcd7013b4b884e8a517ea6966445f273f07c1e09d951adacf1b55fa731f96a7120000000c2efeead6c517577a229048bf813a20d91d351ebe2d196ba936746339444c69640000000157cd88d39a528a43569a12faea79df9329abddb050ca2f810c32489192918762911aee086fe9d11c6c5f10cc38d1117250ba712f67e5b366b2c0fa1ef80ee73 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30662bea6ae4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428716874" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FCA9B641-505D-11EF-9982-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2712 2668 iexplore.exe 30 PID 2668 wrote to memory of 2712 2668 iexplore.exe 30 PID 2668 wrote to memory of 2712 2668 iexplore.exe 30 PID 2668 wrote to memory of 2712 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8228dd973043fa7fc82780cc484f13b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8208509a16d58485d8774d53d8409b1
SHA1af1398d155cf7d57bff896a9b8a23473d840e129
SHA256ac9f69e0136cf3ed1816b7b6438b69091693cb2bacfa0a4bd810ef70601082aa
SHA512f4d50302c2c95acb4ae08c7311eb22644f4dfdf1fb15b5ce82f52b9c836c7e4d699c56c38e0fe860623f09fcd6b2775f7e40f54f4dc8db6775064a87cdb620fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076226999faceed46c6379b58a55a6a0
SHA131151aca1320cdfcbc41777ad1049e73de568c7f
SHA2566aaa89699ae3eb41e26076cc4378b003910c21788b9e92f5986505a1a69a23bd
SHA512834c06da871a20b922039870f2f94ce94643396480337a4b3e1d3669349c199bf1b0e8b2b96f70096e879ddeee5d1c64b7c59d1ad3d44287ca900316cea93444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b58be0ac511c00191d93e10d79549f
SHA111f020ef7a05e29dc963e64d52ae78fa3486d2c8
SHA2569b7af4af96c0bcc78dfe1fc6bca7e8c7a6e75f944f46484b412ad39c532f64da
SHA51288b235d492f9ef3b1396213ea23c698d12ca9cfac6d64cf7610cf587f260334dca9c6071c96c62220d1ac7ac2609607aaa0554d61e9869f78ab887be73c1b5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f7b43ffafe113d539762d2aa8e58cc
SHA14ba207cd7b469a253ebe5b64275ab426a2276e52
SHA2566f0157c77af4a3bbf5507a8b35cacf1aa922056ac1fe8a0f963bf836b83f5d1e
SHA512ecf27d19e6916e5e5920d04d30af04b64ad510250c60062adc85b465c9fa7461f282bf841d0d4adcccb8d1e5522373c4728b72a3331c3c320ca4bbaf98111830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f53d8926ca8417af6a1725e34b460d
SHA122ca49fa50535ec61004902bc18ddff6d831d127
SHA25613bd8be79a27c1f7a062f520e3ae4c3c459d0d76ae596a1fadb397ded5bcad24
SHA512f5633116522b7d90f38be2cad1b530c8ca638056e6be26b3fef03a51704dfb334b51eca49ba5034089c1ed4390450b1b1a034d43af471f7d6d93a2c1a42ccb70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250106d28d123eb109182c67c79d533e
SHA17aa8afa433b6613ffd7857395818f9d36622b2e1
SHA2564048af666dbbdaf419a2e04a9ef5da39996a5acd5fcbb356ccefd354ed6bb70f
SHA5124ad8cc4647652af8c25f580d7272158a5b7478272ffa915b4befdc5a28e0c06a14923b28c98149daf292c971b5d2c07e531624bc2e152b83f572dc9389ba8d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf88341a32cbb9c700b05c3d7824ee5b
SHA1ba25c259b3ce9ee9ca1bb33461a90447fd33f17d
SHA2567971d254b4b1a06ea80635c43e3d35113ce4b460e2823365cb2d7e3eb505e59e
SHA51289ebe40bc590d122e448ab3e0f6633dee174f5c3f65fa23a90193f8e1b43496eb619555ffbc6c0581e85a2dcee88544df621101f953b33fc699948cd11d0a1be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e6b1132b65f1c3256d0c68680bab10
SHA1037748585a2687130371c45c6b1daea3e83499cc
SHA256eef4a5ab39adc97e34f73fbcee7e376cb9b7d40d11a6927ce9ce64be3d823832
SHA512b31e838f7cd77fffe5c71be5693d3d6ef99e7a8f9992b66843f7468573b52a8590a4c4909ba0ed49c7ed5b6f3f7e42174b32d5218544a9617a2d5d1e97a82e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d002158c8ece251230d7e8e6f12df01a
SHA1744225a2a44a95f163d7f8264e5d0932b5790128
SHA25634abbfac24409c206ad7271f52d9863188413a48ff7cd8fbad610320e4a3516e
SHA512589604e692ef692500714647acbe67048dcd752ef5b0722b1c415cfeb47e220081c1fbb77336dcc4a4dec5b2eddf197b58c95cf0fb9e821efd3951b117781916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d46f61bc57b2fa7d34d250eaca0ac17
SHA1d052c19415137a64e3ffe2d71768e8bdc78bfa3e
SHA256c873850b743c2e124fdb754de69dd1bdbe5394aebc586d17e03f57a0fc78fe50
SHA5122492d09d2d06987d17dc03a0f0f9d0085c8e5ece8da2e107f8309023d578ee49383e088302737589cdb2e035a7296ab97201d78497c3714754b9ac3e192be890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a32677991f0086a24a5702e3fde91b
SHA128104d9d4e6a1040d3bf6361f6a4a2e9c8be537d
SHA256315efcb42826570d0e37c0b5a95268f06db6e03e1f556532773889da11d5d794
SHA512a0cbac2685b9369abd2f53ce67dbc60c8fb295ef2de7132bf5110ac7eaee10aaca1250030e6e89926c345fb4540c2f44da1652b0768539d60179039dad28bfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0d900f813c66d88076ac3a5ba6da30
SHA139ccecf892e16c5cef0738065b73c590a671178b
SHA256986d6b8e66421dce9c3272a537ca2f55ad001c5a050498aaddf6a71edefba735
SHA512e3f0906ee58c40a1f01b08292f7b005fdd7b2b3ee377470435dcabc09629f47364d1ef257b8f6e38a578f31be1645adad9c433abf6ba12a6e65d690693032a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fdba55f186466cda7225cc9c9e1ce69
SHA116a284099a35763a50555f0a1e5dc59bae74a918
SHA256c279076800284aebb8de48a8ceea82acbfc07b61e6ef9795931c087016075fd0
SHA512a2f663c0ce6ba7afc6cf16c611d4d7e8b6bd0e16712140c7849d978ebc952ce24752e657764a6484d2629dbae5bdc29100f6509f63295ced13a6876ac170ee9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b419c3e5a9d3db92a9e57b588823c7
SHA1c94f111155207b4611503575f6ea97d516f66602
SHA2560072dd16a7aaaae846f73c787e17567ae41bd48ad0d8d58bfc75b84f8d5b71fa
SHA512baaf3bd0eca293cccf32acbbc773ada4e501f8835009b70d8f01365965caf98b6b8d1b055a9ffbd6073d88561b0bebcab7955916492f9ed616829049cfaed165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577baf94dcdaa54bdcebe09ee0b760ff1
SHA1809e495c5422c0f9f74dcc6aa59825ba4c29176f
SHA256743cbfe1ad96398ad003553faca2d2686815ef0d70ed2cf75ccac82de9528674
SHA512874c7003260a772bc8c6a10ea867d8794dc2dfb023089df13d70ef9b3c3c05f7da74c270ee824330df16b7e7960d44ed4e4127650453461ba98a942d71172e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7695debf1a2d0e78b9ec238c78e18e
SHA19a2de2a82f72cfe3b8c6e6170aadc6bb8d4ba150
SHA2562a7e6922f2ea5a4ad0b2f88cb3cbb527756b2c4b8ceddc251539eafaad253f75
SHA51218187567190cdbcadece2f6ab9acfb6c218fb3c48de8dacf1e3c8e28545ac59967f25faf033e5e9d38ed0b22111f05c2b1590fddb389a4e32377fa9c730d6480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46a7b773b950a01e6d3b2d19fdc5d66
SHA1e10154e2d308bc420e9bc92fadf90f6f796b92d0
SHA256b4fa1f9755e490aa198fac0039e18675a12171c252e5d28bc6bd85ff0a005b50
SHA5129fa3bc241398d4fe375c45cd28af63ec3341d1044c2430b208d37b3a34f15f17e9c9bba78fed1d1697c107a4581a7ce9316253ab4ad35769e38fdd53405e4bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a18d54beaf3e5c7e038cc634a9138ce
SHA1f290b6a237e8bd2ae5c32398f243e6db9366bf32
SHA2566b89d8aafdfbdac25ef01d60ef4482fb14c73d1669e3d7f577b5f6c54bfd42ee
SHA5120210b7a125c5c962dc7e20dd651ef15e967b7738fe291f2089cee814f2ede617d832e0c4a6d9954c3add790a947b374073dfc18b73e4d3bc43c6fb31ed99f509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233192492c9b94233d8a2ce6e562905d
SHA1bb41a52994c4d0b4153b2c11d7d825ee6769bab7
SHA256a9072c65945808a2393c9d604558049b1198e08dc41b236892349c5a1a8e3fd5
SHA512147895c0e1f8ba760b82d52cebc1fe3a71c533ed2ca4b0b596e6c26809d5edb3117aaa28203ca8505d5f7bce5d86955cb48364328591c773f24ed292cdc75dd8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b