Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
8255fdf15af2223de8c755d2f28a0a1a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8255fdf15af2223de8c755d2f28a0a1a_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8255fdf15af2223de8c755d2f28a0a1a_JaffaCakes118.html
-
Size
10KB
-
MD5
8255fdf15af2223de8c755d2f28a0a1a
-
SHA1
8cb86b4f7afdf5c94becb2581522cbedc0058b72
-
SHA256
5b6dd63dd1140f43888bac7476c95aec441e6464f66d5e43f65a91d665e42f9c
-
SHA512
0527186639460c16ea3d19d52da579c0f694cf2bb7cec9cc335bcd999d01d9a037d7c14e3dc0326c08c6d7e74d2e8e97c01cc735db5745d895333fbc5bc41692
-
SSDEEP
192:2VrlIsr037I8k/w1whqJk1OBm9nL+CKXg01y5uBuLbdU8d:srlIcu7o/g6OBm9nL+CKXg0y5guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428720420" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3DA645C1-5066-11EF-B557-526E148F5AD5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000befc2184ddfcfa9c2b6126a66fb1852433e21ba9a65e550ff3ce8cc3a2f96322000000000e8000000002000020000000ef3f708cf1f9d6dfb367cf734565fa423621925a7ae01957ed07f55dfd68506a200000003b4b2e1e2ba4df30ba6aef42564f76cee05a4f77084778b034153d5bd1e649034000000086e02a2bfafa6e8702ac2e715f06f1cb9e3b506c1cb0eb1601dca63bf752db25646a37e94059c1abbf3f7ca1f96c7bb2014188c96b108c17aef124631a5f6949 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8068124473e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1624 1908 iexplore.exe 30 PID 1908 wrote to memory of 1624 1908 iexplore.exe 30 PID 1908 wrote to memory of 1624 1908 iexplore.exe 30 PID 1908 wrote to memory of 1624 1908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8255fdf15af2223de8c755d2f28a0a1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e94bcf60efef444f688139cf59fed8
SHA1823c95f883f1fc0edb1e70169b99d6aebf57748c
SHA256b136ef244083c6ed5b84cfb14da9a4bc733e2cbea8005efc9fe66997208a1cd9
SHA512021cae341cbd6e33e814479cee8dbd78decc2e37105ca2b4b08f3c564c43975e44588971f4403035816bf7ed8a9896169f3f1c2acf1bc4b4a2e6245f71d0c8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab9228086d73b111abda61567195c78
SHA1a9115f613dd353eb81e5d82e3439a2722709d4a3
SHA256ad1dbb348373062dd9427bc6b19fda00afba5be911d3c1b5d07b9203858213ed
SHA512448c92ed1aa0bb3cb5cf75162d0f26282c237aa898e58f5d99c54e867b1ca1669fdd3069f936c59765a019906fe33f75f79af05ead6c3b7e7a3bcd72a3b163c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce11c5a8fb44223de4d1a59bcaa26c5
SHA1cf5003070798c39b4a699138bbadebe11c1fccf0
SHA256a574496201b30b24cb6214e67c9fcc40220731c2786495351a98acbcce8877c9
SHA512bde6026975e70dc4c0870566bcbedcf8b45ae251d8f368ff9a6331c16fa9d0d5a8c3c0ae99f37b23a711b777b0efbdbf578e2470e15cff1012f030317115692a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01d6a9bcce7e4c1894ea1e457b3d8d8
SHA1894b0916d1f20a66c637e5980f7d939fe9cd66db
SHA256e9e2a385865d534ed5c4174eb45a2ccddc5b1d53503360739d2c279cfc9cbfbb
SHA5120f599f2eeffb9ef833c5502ec17ed8e1ac2199364e258f53f350a828f278adf8365c75e1ad7616c5cce7f0b7579d082e980aef0716817a65f7a093bf8e5f9d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508eddeba135f6de5d8dce9265bc20f33
SHA1906a71cf4168fceb492605430da4dd6b6e914b10
SHA256e03edd9e0eea6d199c56d43183726f665b9830b36ff7ba3ac86521d07aa716e0
SHA512b8131f46b9a60406d97836265ddde72d6ad33944e93b749ba9ac3be61c8425e10e1e6a8d56e0fe554014486af9e395bcb543ef51ad1e6013c18da9c9ad10615b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577faab256671dbbb99dc07e5011a393d
SHA1cc9ca7a8c6f407791b6fa68cbdc62e38e04f1e6b
SHA25635aebeeaf7a3d3dab3f454b003882b4d977a61a385cacb9130956bce7f3f454a
SHA512d87eaef1cbdaed0267d0b3645e158e4ad450475b7b660349ce67fc727459d6b9270937c4ac7a269cdc4cd0829f92c55a8a1abd3e249e61317673fa4c9e02c7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba0c8550ab0b07640747331373986d8
SHA1dc05316ee1ba01cb27cea813292e5a6ea072e115
SHA2569c251db133cef4b7d26b7303bb6ea24e522b53372c2e3dd0c5128820757cebd6
SHA51247cdff978493b971efc9aa66b6143fd3c326fb69861d333cdddeefe6e44fc164f74aca9a6fc359dbe2b86a4c11fc344d25b31e9bae4df2a6b1c686dcaf3ebe93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29da85729cc95340b4817ca78438388
SHA1c65a865f8ed6950d3f13c4abeb35ab8f622c6513
SHA256b7d8ad772d61427feebf727d5843e7006c149015a1b6f87df8477ac985398825
SHA5128119232c39cf2ad5ce07bb7c07174da4423aec0db1401322c0f92ac627704f9c85c026598daad9bbd85167517b01cf61925be8b01488019c27762a7f6fb3ae71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4fbe9e3d528f0d0a1636b830d3d47de
SHA159602c3a2d610f92aa65a98e7cf0a1f9b3738f84
SHA256d76153ce98485220f8ce8b3fb43385c3a60af2bd8eb09498540929c93502cf08
SHA512aad8c72df939f71ee8fc472f03f995c473467c8bd3bf3dbdee02d1b9ac5756b0fd1f6144b7e56548ead31dd812ad4d96d3294a6584c213648d0aba10eb4f66fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3dde1237150ddb56aacdf5b3097d0f0
SHA15e2139f6aca42b2e4f9240e0c340020474ded1b4
SHA256f989ca9e4fc9e61f23b6bff3b0a694a351908f306d28ff4dc19fa3b7b0ad8e47
SHA512efa2ab9e5b7286bbc5fbc8ded6065012afdeaa8108eed284046ca4ffaa73d93b4a61ade58ef6a5f14f6fbd18a3db2e39bcadf4f555f03adaf45a9b409926b2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587879649c541474747cd3762ca1081d
SHA118684d2962f4da34446fa554f61c1c08e623b56a
SHA25645dee790f6962287d963c0e227e5d80582f19ed71f414d2e3f30f46540d0dccf
SHA51284559af12a3cabc8c7c848fcb00aa8924fa982e9c2b554aace9b9d193f6daa61320158f9da9288eb768d45182c8d0c2757430f2e59b975e78f0cb3b1ddc8941a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5e8e4efa4efd097074d65601a3c652
SHA1801ee034fab128cfa8bbd371ded39435415be8fe
SHA2561e1124871511fe40fe2603dc20b8199448e76b4ef8080247da05ade838e003a9
SHA51296bb6bea636ef7bbf4da58242afb441ad4f24c01fed1a3c4954c1da69af85f9fb1139f1da7b46f474dad261570a73462426bc94d18180d1e0d7f739d57ee6da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55861ffb1ad34a65ddf68ebef277fe56a
SHA16720fef51c3c5a786e07018492fbea358b860533
SHA2560123c26c68bf42c6375eeaec36194962a6c0c7ff40dd860aab268ec73aeeffd0
SHA5128d04491deaaf645daa2537e60818e85cad538781b54a498a9b4213546d59f84df9e6877b27aafe72ee04790c0f261f0be607e6caa42227b228c4a9fe649cefd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b788ddd9e5848c87ef118f120d3cef99
SHA1f12bda56ebb7bd9af820fb0f8496e69eb287664e
SHA2564754899013741084f5cac7c9377091405cf4d6ecde5ae157a585020da3e5d76e
SHA5121e1893db76e445b5bbc040f131638f67cfefd63efc3f3a30b420e896b9bfd02bbb4ff9ced23e865b8bfbd73d0ad6346ddb02e0dceac78a2ccca87b7a9ef68634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d679680aa40588f27d3b57f6770e4b4a
SHA1dbdfc5392daef9d6b325fe64b9967e05ab3c38c7
SHA2568c9891194574c7819c3b80a991f6e47aee6553a36d3b50402892e03269196495
SHA512f2f640742b6063696c21392f486868bd231f6f5dbdac16362e763512786d6c62af338fe4b8c573c2fb332713f4077d64e9214eb79480c1390ad30b9367e96518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5517497aeb96854a183ac8e185a16d421
SHA1ae2451b91ad1ed9f7fd1a00fd7bb9980b6bd2cf6
SHA2565000eab8d8b329a00d78de97c1deba60d3a039dfa2e0c53315dc006e7355f938
SHA512be90d3271ed72f6c5a0a70eecd73055682146d66c78a9db872555ef2d48f7f8730b9c7b85d8c048c61ec7893dc5dbb4dd720b46527e3e981d225c62195c11d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac3865b98f2fe861d536e89f00808d5
SHA12131d5145eef0783b4b060792a16379ad5789afb
SHA2565423312c8cd7f150e8e51cb6b0be41485cc616eb8d167ab6cf7ca0e6edfd2fc6
SHA51221157424c08a497b55614563092942becc7ef17acc2b7ed0b7c522211e5bfd7a31a72195eba7e3cd1fca56dbfbf7693dac553e9114f37a1681bb2e429c67033c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708ae55d2d1a7c0783f2d8f49de50a60
SHA18d369bca9b24ad38b8ba1bc938e07e43492f3b1c
SHA2569fe66e8ca15b01c8530d4d0032ee035c5e20645d0d54dd5f860ee7e99744167e
SHA51246f1fa33af97bfa488f50ab72a1ee38120d061b67e944328f967491ba8c9b0d97900624d3794b64705c28f493627647707a135dcb40f01e250771599cc7bc989
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b