Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
8269c70d6974f435c096837f9633769d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8269c70d6974f435c096837f9633769d_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8269c70d6974f435c096837f9633769d_JaffaCakes118.html
-
Size
32KB
-
MD5
8269c70d6974f435c096837f9633769d
-
SHA1
5d5b555f585baaf2a70aaaa1590487181ee536e2
-
SHA256
97dbe6d4ba6a20c0f609527b1b9638e2f0c8a2d2470d4bdaef0f8af55d8302bd
-
SHA512
df1c07b462a1e4c9a7f8a56bbc9edc0d41ae6ee8adf33375aa984cccdbf479868d8b7f2cf9b2ed09c1efcde27860df6258473e87214a0db0c2c05066c2651b53
-
SSDEEP
768:Zcd9QZBC7mOdMw0pC5I9nC4n5ZwxwwwJNfPd:gQZBCCOdY0IxCy5Zwxwww3fPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00f50bf76e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000090c6402d08dd9cba8dc9ec0785f157d10c3c69c3b0037d3b13c98bddf34c5123000000000e8000000002000020000000bba904892a3093db51a844a74781737e85418190e767a53485b918bf08d1ff93200000006c272da92940e5dffd17b847c4c26bb7157e6fd6aae8f133f3c5ff6dfcef814b400000000a05f4f1667640627e37cb1ec0b7d377f172b854cfb5524a85d3d864154d1153b9e6ed95e8db6d41328f2b37fc900e4784075c735530d6b2eccb9a1297f6f47b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6A01631-5069-11EF-8E00-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428721994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2392 1976 iexplore.exe 30 PID 1976 wrote to memory of 2392 1976 iexplore.exe 30 PID 1976 wrote to memory of 2392 1976 iexplore.exe 30 PID 1976 wrote to memory of 2392 1976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8269c70d6974f435c096837f9633769d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5edc9a3721b98e077979372895c0968be
SHA154b6e1390ef5c64f1f1deefdf34a4d9be7ab4411
SHA25622b6de35967500d0df57ed4eb5d92b1696018b8b8f2bd73671dbec177fc6bda0
SHA51200e99a76a66a109898d958822010a13bbb7e8ba37099d6565ea6730ae0693803695c67451386e7523c3d4875f359fafa1be675b65d2a34f27c96387f040ef18a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54bcfef8d4eab7a4e3370a0818e4d7621
SHA14814167633495c5241d41f7c131405dd2ade9b62
SHA256a960e10a85f5482d57373dcb143ccb3e9486a6a6cab7aa70af7250b504a61505
SHA5124871b4ae550ca883a09ce995cdb8877dab0ad2c10bc289da70a2b0379a633376e1162da32f50c79f590ed14b9db555cd7f4df9842ecef036b80679f50887a906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59deac0abae978e99fda8481db8a5c883
SHA1d9a05099d760b68c5cf669aec6cb4edbf1d0583a
SHA2564dbf3f367811d6ec0e303c55b341c6bfeeeb031239ba88a5a2b97d906a3cee7b
SHA5129e59ac2572cb00ff240e54107892ccf9d74888efec1eece038eaed951b9b6bdd33b0e9538a9e564182079a391bfd7ff2d9698082cc5adb3b8ad24bbf3a80f765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bd0693d9584edeeef33223fc5213ad65
SHA18549fe1f90e037187388b22df044491dc5981372
SHA256e4106ec74f32160e9071a318d33c04ff5f3ebe24a94b9b55c6367426f82f0dfd
SHA512a004c0e2de2a3480bd34387c873ccbe07ff6e5b78eb6f4ff3d3e226980040f4e5ca0ba2f8577bd3ee60275f08eb7b9664f9011f95bc5c2d0ae3f5f77499de816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54811c05812864131d44828e8ffd5d4d8
SHA1dcb759ddab1b64b270963ffdcb2fefd4c6895816
SHA256ec2eab95c6dbb452f716fb52ce1da5ef860d2b7b2a66ae485e3fb9c47c0b9f6e
SHA512346fa4b69ff9226de5a7f42cf6ab063beae06182fc77b383c2075d22532758f5b1785403c5ec7e9b1e08a6725b1ac66b265ffe6988fa633efb24a207dffde931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506c7179291c455353c7a9738f94952f1
SHA14ac0d6f209dd063ef2cda3f3e257e9acb523f221
SHA2561010cadc2ee3c6955bb336bcd487f3d4515bb31e42fcbc5b9f74e347688815bc
SHA512cee35c9abb25537019893843c6e003ea4104ece11183ea743f734057cb081a05fd11ce8672b3ae361015cedb357505b8c5f5f13f3bb577820af8089d58a71e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530c54c81913efa3064456c3c4cb3492b
SHA16f669cf93a5b731efe183f0f1fa6d88a0961c7cf
SHA256a5a6152bb0a3d37ec7b702ca61e84d916498230dbbfcc3c6c2e3c37ed326c88c
SHA5123023f69e3eb21d3e3708db94bca0fef85c0523993871aa7d3cca414e8252cfa556372d5e645316bef2e7a8f4886b59e4d79efb9830fb3e2015eef750ff82fa03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a522b73134e65f692d179f8a37e037d
SHA15d99b9785d3566650489e86e27df1d315afdb501
SHA2563f1ff33c36513eef4b0f6b18f9290c3650a118ce2ef36bb7f9ca8b7bd6d18ee1
SHA512c94fb466629b0649e030b0b7e2c5a8c1ad199b12937d6708f1c6283f2095a9a19d4d80ec75eac456abf04540febf8afa3d77896397785cb7c6c400c19d5e42bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bdd6d774f2daa31399ff265e55249943
SHA1dcaee62749df9aae6cbda319be00088089f70fb0
SHA256cebd582a40dfe1420609090a9857af7b1a0d13989718d0e057c780ecca10a8d1
SHA5128c06b215986dfa2e3b19d269b8e0121a5be98fb7d725d42bfa1a2414c8f4616bbcc0c71e6a3f3b8f2db03d23ae7c5b9eb34f58d982c3caf099c9a7fb1a357376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5632fcd260cff2abcb18e20bd248f42f9
SHA16175839ee2060adf39371b1f66300b5b29776d2e
SHA256114f819bf71a62528eb36bac5eab538fab1574894c0ca281c151dcc9a218040c
SHA51232d6df487c113ab566c8afa312f6c9eed0b95e5b35791c034048c758f4326dabca2236842fc1f5681a43d330f86b3386614ec6d7a15beafe8e3c0f2eb65305c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD536341a723d102b19041f30804a4cc0ad
SHA1a1cd687d2b7bc56751c444022d7d222dd4bd890a
SHA2568b801d52456170cea655a4139871ad4364d0a9f2342633c0286857bb8a5be628
SHA5123fc96ac749c029648b4140567031bf73c920a19828386eaf7ba167d7faca8f76f31cedc77c14821b1a51a4f47f76e46001f5d044b7f5abaf0c6cacef886c1d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55823ad13ab7730b765d4236df9899c4a
SHA119a6c8a4bc828561a7378ea72a0fefb7cebf1704
SHA256a0a19b9b2b086ca7972d12b44c330c09400694df90794a0d570654dbe940f094
SHA512d824ecf8a19f2d8eddb8906ac89013ac3397847ec338512c6e44f21a75952822aa0dfbf36d3099b2a8e33a6f8cdbf2abe31db01e6201e334d7de74d41f1c5055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59fec8f0f9aebd71c8059939c292c357c
SHA1c065f138bb63b9336a641bbe67f07550a7c98660
SHA2565b99b13effdf2e08817a82c145cd3b944232ccfdc3583665eef8a53cf53b1dcd
SHA5122e6a22b01e158281441229cb9a50a5ce1d4d7a1497f39b17cf75494681da0cc5301178a8b44ca0d1f8086839baa072fa9ba453d7962cfc1ef2cdd623683bd7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59d44cb3a1d72c010a00c62aa921da54f
SHA1089422e0e75f8355e245a7465f0ac7b397c1277f
SHA256710ed0f6aea0e2a1f4da806237e6615b525b52b14101a3d01da1eb4200750c4d
SHA512d9233c06fbc1e19fea4a156e926920a787a73d378287a6340e02d509aed5859e73196d9a379debd4de5e9bac82d009a53ea92eb2ef1cb5b06419f1ff4010bb12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD594ce34c6b32da3d2a9947c3ff812e904
SHA17179907d8e8f131f49b06eb5d8c8b7f425a11616
SHA256bc5bf52b78e4f4d5605946c0f143b24064a2327a20d9c3a38211841cfd18add5
SHA512007cdbb68871f6d98e40006b7a3e48947b020734fd793531c76411b0e5785259281be13fb7ed922e295e01591d34cbce439f53018e791cb7cbb639709b560ea9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b